Difference between revisions of "Syllabus"
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
! style="text-align:left;"| Date | ! style="text-align:left;"| Date | ||
! Scope | ! Scope | ||
+ | ! Reading Assignments | ||
! Notes & slides | ! Notes & slides | ||
− | |||
! Review Questions | ! Review Questions | ||
! Labs/Quizzes | ! Labs/Quizzes | ||
Line 10: | Line 10: | ||
| 8/26 || A brief overview of the Internet, its components, and performance aspects || || Chapter 1, RFC 1958<br/> FYI: RFC 3439 || NA || NA | | 8/26 || A brief overview of the Internet, its components, and performance aspects || || Chapter 1, RFC 1958<br/> FYI: RFC 3439 || NA || NA | ||
|- | |- | ||
− | | 8/28 || Network applications & the web | + | | 8/28 || Network applications & the web || Chapter 1, Sections 2.1, 2.2<br/> FYI: RFC 2616 || || || |
|- | |- | ||
− | | 9/2 || The Domain Name System (DNS) | + | | 9/2 || The Domain Name System (DNS) || Section 2.5<br/> FYI: RFC 1034, RFC 1035 || || || |
|- | |- | ||
− | | 9/4 || Transport layer overview and socket programming (UDP) | + | | 9/4 || Transport layer overview and socket programming (UDP) || Sections 3.1-3.3, 2.7.1<br/> FYI: [http://docs.oracle.com/javase/tutorial/networking/sockets/index.html Java sockets tutorial], [http://ftp.itb.ac.id/pub/ISO-IMAGES/linux/filenya-putu-shinoda/bukulinux/TCPIPSocketInJava.pdf TCP/IP Socket in Java (book)] || || || |
|- | |- | ||
− | | 9/9 || File transfer application (FTP) and email application (SMTP) | + | | 9/9 || File transfer application (FTP) and email application (SMTP) || Sections 2.3 & 2.4<br/> FYI: RFC 959, RFC 2821 || || || |
|- | |- | ||
− | | 9/11 || Other useful Internet protocols & mechanisms: ICMP, DHCP, NATs | + | | 9/11 || Other useful Internet protocols & mechanisms: ICMP, DHCP, NATs || Section 4.4 (pp. 345-355)<br/> FYI: RFC 792, RFC 2131, RFC 2131, RFC 2663 || || || |
|- | |- | ||
− | | 9/16 || P2P applications | + | | 9/16 || P2P applications || Section 2.6 || || || |
|- | |- | ||
− | | 9/18 || Principles of reliable data transport | + | | 9/18 || Principles of reliable data transport || Section 3.4 || || || |
|- | |- | ||
− | | 9/23 || A closer look at TCP | + | | 9/23 || A closer look at TCP || Sections 3.5, 2.7.2 || || || |
|- | |- | ||
− | | 9/25 || TCP flow and congestion control | + | | 9/25 || TCP flow and congestion control || Sections 3.6, 3.7<br/> FYI: RFC 5681, RFC 6582 || || || |
|- | |- | ||
− | | 9/30 || IPv4 protocol and Internet routers (IP addresses & subnets, router architecture) | + | | 9/30 || IPv4 protocol and Internet routers (IP addresses & subnets, router architecture) || Sections 4.1-4.3, 4.4 (up to p. 345)<br/> FYI: RFC 1812 || || || |
|- | |- | ||
− | | 10/2 || Routing (shortest path) algorithms | + | | 10/2 || Routing (shortest path) algorithms || Section 4.5 || || || |
|- | |- | ||
− | | 10/7 || Intra-domain rouging protocols, i.e., OSPF, IS-IS, EIGRP | + | | 10/7 || Intra-domain rouging protocols, i.e., OSPF, IS-IS, EIGRP || Sections 4.6.1-2, [http://ccrg.soe.ucsc.edu/publications/interop94.pdf EIGRP paper]<br/> FYI: RFC 2328, RFC 1195 || || || |
|- | |- | ||
| 10/9 || Review session || || || || | | 10/9 || Review session || || || || | ||
Line 38: | Line 38: | ||
| 10/14 || '''IN CLASS MIDTERM''' || || || || | | 10/14 || '''IN CLASS MIDTERM''' || || || || | ||
|- | |- | ||
− | | 10/16 || Intra-domain rouging protocols, i.e., OSPF, IS-IS, EIGRP (contd.) | + | | 10/16 || Intra-domain rouging protocols, i.e., OSPF, IS-IS, EIGRP (contd.) || Sections 4.6.1-2, [http://ccrg.soe.ucsc.edu/publications/interop94.pdf EIGRP paper]<br/> FYI: RFC 2328, RFC 1195 || || || |
|- | |- | ||
− | | 10/21 || Inter-domain routing (BGP) | + | | 10/21 || Inter-domain routing (BGP) || Section 4.6.3<br/> FYI: RFC 4271, Avi Freedman BGP tutorials ([http://freedman.net/bgbgp.ppt BGP1] and [http://freedman.net/bgp102.ppt BGP2]) || || || |
|- | |- | ||
− | | 10/23 || Multicast routing | + | | 10/23 || Multicast routing || Section 4.7<br/? FYI: RFC 2236 (Sections 1-3), RFC 3376 (Sections 1-6), RFC 4601 (Sections 1-3), RFC 4607 (Sections 1-6) || || || |
|- | |- | ||
− | | 10/28 || Link layer & Ethernet | + | | 10/28 || Link layer & Ethernet || Section 5.1-5.6, [http://en.wikipedia.org/wiki/Spanning_Tree_Protocol Spanning Tree Protocol]<br/> FYI: RFC 826 || || || |
|- | |- | ||
− | | 10/30 || Link layer & Ethernet (contd.) | + | | 10/30 || Link layer & Ethernet (contd.) || Section 5.1-5.6, [http://en.wikipedia.org/wiki/Spanning_Tree_Protocol Spanning Tree Protocol]<br/> FYI: RFC 826 || || || |
|- | |- | ||
− | | 11/4 || Wireless & WiFi | + | | 11/4 || Wireless & WiFi || Sections 6.1-6.3 || || || |
|- | |- | ||
− | | 11/6 || Cellular networks & mobility | + | | 11/6 || Cellular networks & mobility || Sections 6.4-6.8 || || || |
|- | |- | ||
− | | 11/11 || IPv6 | + | | 11/11 || IPv6 || Section 4.4.4<br/> FYI: RFC 2460 || || || |
|- | |- | ||
− | | 11/13 || Security - A cryptography primer | + | | 11/13 || Security - A cryptography primer || Sections 8.1-8.3 || || || |
|- | |- | ||
− | | 11/18 || Security protocols | + | | 11/18 || Security protocols || Sections 8.4-8.8 || || || |
|- | |- | ||
− | | 11/20 || Attacks and defense systems | + | | 11/20 || Attacks and defense systems || |
* Section 8.9 | * Section 8.9 | ||
* Overview: [http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf Arbor Networks worldwide infrastructure security report (2014)] | * Overview: [http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf Arbor Networks worldwide infrastructure security report (2014)] | ||
Line 68: | Line 68: | ||
** Attacks: [http://tools.ietf.org/html/draft-ietf-rpsec-bgpattack-00 An Attack Tree for the Border Gateway Protocol], RFC 4272, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks] | ** Attacks: [http://tools.ietf.org/html/draft-ietf-rpsec-bgpattack-00 An Attack Tree for the Border Gateway Protocol], RFC 4272, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks] | ||
** Defenses: RFC 5082, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks], [https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-overview/ An overview of BGPSEC] | ** Defenses: RFC 5082, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks], [https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-overview/ An overview of BGPSEC] | ||
− | || || | + | || || || |
|- | |- | ||
| 11/25 || Attacks and defense systems (contd.) || || || || | | 11/25 || Attacks and defense systems (contd.) || || || || |
Revision as of 19:01, 21 August 2014
Syllabus
Date | Scope | Reading Assignments | Notes & slides | Review Questions | Labs/Quizzes |
---|---|---|---|---|---|
8/26 | A brief overview of the Internet, its components, and performance aspects | Chapter 1, RFC 1958 FYI: RFC 3439 |
NA | NA | |
8/28 | Network applications & the web | Chapter 1, Sections 2.1, 2.2 FYI: RFC 2616 |
|||
9/2 | The Domain Name System (DNS) | Section 2.5 FYI: RFC 1034, RFC 1035 |
|||
9/4 | Transport layer overview and socket programming (UDP) | Sections 3.1-3.3, 2.7.1 FYI: Java sockets tutorial, TCP/IP Socket in Java (book) |
|||
9/9 | File transfer application (FTP) and email application (SMTP) | Sections 2.3 & 2.4 FYI: RFC 959, RFC 2821 |
|||
9/11 | Other useful Internet protocols & mechanisms: ICMP, DHCP, NATs | Section 4.4 (pp. 345-355) FYI: RFC 792, RFC 2131, RFC 2131, RFC 2663 |
|||
9/16 | P2P applications | Section 2.6 | |||
9/18 | Principles of reliable data transport | Section 3.4 | |||
9/23 | A closer look at TCP | Sections 3.5, 2.7.2 | |||
9/25 | TCP flow and congestion control | Sections 3.6, 3.7 FYI: RFC 5681, RFC 6582 |
|||
9/30 | IPv4 protocol and Internet routers (IP addresses & subnets, router architecture) | Sections 4.1-4.3, 4.4 (up to p. 345) FYI: RFC 1812 |
|||
10/2 | Routing (shortest path) algorithms | Section 4.5 | |||
10/7 | Intra-domain rouging protocols, i.e., OSPF, IS-IS, EIGRP | Sections 4.6.1-2, EIGRP paper FYI: RFC 2328, RFC 1195 |
|||
10/9 | Review session | ||||
10/14 | IN CLASS MIDTERM | ||||
10/16 | Intra-domain rouging protocols, i.e., OSPF, IS-IS, EIGRP (contd.) | Sections 4.6.1-2, EIGRP paper FYI: RFC 2328, RFC 1195 |
|||
10/21 | Inter-domain routing (BGP) | Section 4.6.3 FYI: RFC 4271, Avi Freedman BGP tutorials (BGP1 and BGP2) |
|||
10/23 | Multicast routing | Section 4.7<br/? FYI: RFC 2236 (Sections 1-3), RFC 3376 (Sections 1-6), RFC 4601 (Sections 1-3), RFC 4607 (Sections 1-6) | |||
10/28 | Link layer & Ethernet | Section 5.1-5.6, Spanning Tree Protocol FYI: RFC 826 |
|||
10/30 | Link layer & Ethernet (contd.) | Section 5.1-5.6, Spanning Tree Protocol FYI: RFC 826 |
|||
11/4 | Wireless & WiFi | Sections 6.1-6.3 | |||
11/6 | Cellular networks & mobility | Sections 6.4-6.8 | |||
11/11 | IPv6 | Section 4.4.4 FYI: RFC 2460 |
|||
11/13 | Security - A cryptography primer | Sections 8.1-8.3 | |||
11/18 | Security protocols | Sections 8.4-8.8 | |||
11/20 | Attacks and defense systems |
|
|||
11/25 | Attacks and defense systems (contd.) | ||||
11/27 | NO CLASS - THANKSGIVING | ||||
12/2 | Attacks and defense systems (contd.) | ||||
12/4 | Review session |