Difference between revisions of "Syllabus"

From CSE538 Online Wiki
Jump to navigation Jump to search
Line 28: Line 28:
 
| 9/25 || TCP flow and congestion control || || Sections 3.6, 3.7, RFC 5681, RFC 6582 || ||
 
| 9/25 || TCP flow and congestion control || || Sections 3.6, 3.7, RFC 5681, RFC 6582 || ||
 
|-
 
|-
| 9/30 || IPv4 protocol and Internet routers || || Sections 4.1-4.3, 4.4 (up to p. 345), RFC 1812 || ||
+
| 9/30 || IPv4 protocol and Internet routers (IP addresses & subnets, router architecture) || || Sections 4.1-4.3, 4.4 (up to p. 345), RFC 1812 || ||
 
|-
 
|-
 
| 10/2 || Routing (shortest path) algorithms || || Section 4.5 || ||
 
| 10/2 || Routing (shortest path) algorithms || || Section 4.5 || ||
Line 50: Line 50:
 
| 11/4 || Cellular networks & mobility || || Sections 6.4-6.8 || ||
 
| 11/4 || Cellular networks & mobility || || Sections 6.4-6.8 || ||
 
|-
 
|-
| 11/6 || Security - A cryptography primer || || Sections 8.1-8.3 || ||
+
| 11/6  
 
|-
 
|-
 
| 11/11
 
| 11/11
 
|-
 
|-
| 11/13  
+
| 11/13 || Security - A cryptography primer || || Sections 8.1-8.3 || ||
 
|-
 
|-
 
| 11/18 || Security protocols || || Sections 8.4-8.8 || ||
 
| 11/18 || Security protocols || || Sections 8.4-8.8 || ||
 
|-
 
|-
| 11/20 || Attacks and defense systems || || Section 8.9 <br/>
+
| 11/20 || Attacks and defense systems || || * Section 8.9
A brief overview of the state of Internet security: [http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf Arbor Networks worldwide infrastrucutre security report (2014)]<br/>
+
* A brief overview of the state of Internet security: [http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf Arbor Networks worldwide infrastructure security report (2014)]
RFC 2827 (BCP 38), RFC 3704 (BCP 84), RFC 3833, RFC 4778, RFC 4948, RFC 5635
+
* DoS & DDoS:
 +
** Attacks: [http://cseweb.ucsd.edu/~savage/papers/Tocs06.pdf Inferring Internet Denial-of-Service Activity], RFC 4948
 +
** Defenses:  RFC 2827 (BCP 38), RFC 3704 (BCP 84), RFC 5635, [https://www.nanog.org/meetings/nanog28/presentations/sink.pdf Sink Holes (NANOG presentation)
 +
* DNS (Attacks & Defenses): RFC 3833, RFC 4778
 +
* Routing
 +
** Attacks: [http://tools.ietf.org/html/draft-ietf-rpsec-bgpattack-00 An Attack Tree for the Border Gateway Protocol], RFC 4272, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks]
 +
** Defenses: RFC 5082, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks], [https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-overview/ An overview of BGPSEC]
 
|-
 
|-
 
| 11/25
 
| 11/25

Revision as of 13:14, 15 August 2014

Syllabus

Date Scope Notes & slides Reading Assignments Review Questions Labs/Quizzes
8/26 A brief overview of the Internet, its components, and performance aspects Chapter 1, RFC 1958, RFC 3439 NA NA
8/28 Network applications & the web Chapter 1, Sections 2.1, 2.2, RFC 2616
9/2 The Domain Name System (DNS) Section 2.5, RFC 1034, RFC 1035
9/4 Transport layer overview and socket programming (UDP) Sections 3.1-3.3, 2.7.1, Java sockets tutorial
9/9 File transfer application (FTP) and email application (SMTP) Sections 2.3 & 2.4, RFC 959, RFC 2821
9/11 Other useful Internet protocols & mechanisms: ICMP, DHCP, NATs Section 4.4 (pp. 345-355), RFC 792, RFC 2131, RFC 2663, RFC 2131
9/16 P2P applications Section 2.6
9/18 Principles of reliable data transport Section 3.4
9/23 A closer look at TCP Sections 3.5, 2.7.2
9/25 TCP flow and congestion control Sections 3.6, 3.7, RFC 5681, RFC 6582
9/30 IPv4 protocol and Internet routers (IP addresses & subnets, router architecture) Sections 4.1-4.3, 4.4 (up to p. 345), RFC 1812
10/2 Routing (shortest path) algorithms Section 4.5
10/7 Intra-domain rouging protocols (OSPF, IS-IS, EIGRP) Sections 4.6.1-2, RFC 2328, RFC 1195, EIGRP paper
10/9 Inter-domain routing (BGP) Section 4.6.3, RFC 4271, Avi Freedman BGP tutorials (BGP1 and BGP2)
10/14 Review session
10/16 IN CLASS MIDTERM
10/21 Multicast routing Section 4.7, RFC 2236 (Sections 1-3), RFC 3376 (Sections 1-6), RFC 4601 (Sections 1-3), RFC 4607 (Sections 1-6)
10/23 Link layer & Ethernet Section 5.1-5.6, Spanning Tree Protocol, RFC 826
10/28 Link layer & Ethernet Section 5.1-5.6, Spanning Tree Protocol, RFC 826
10/30 Wireless & WiFi Sections 6.1-6.3
11/4 Cellular networks & mobility Sections 6.4-6.8
11/6
11/11
11/13 Security - A cryptography primer Sections 8.1-8.3
11/18 Security protocols Sections 8.4-8.8
11/20 Attacks and defense systems * Section 8.9
11/25
11/27 NO CLASS - THANKSGIVING
12/2
12/4 Review session