0% found this document useful (0 votes)
15 views

Chapter_0_v8.0

Uploaded by

dongyoon1026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Chapter_0_v8.0

Uploaded by

dongyoon1026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Computer Networks

Fall 2024

Choonhwa Lee, Ph.D.

Department of Computer Science


Hanyang University
Instructor
Dr. Choonhwa Lee
• Office: IT Bld Rm #721
• Telephone: 02-2220-1268
• Email: lee _at_ hanyang.ac.kr
• Office Hour: Mon 14:00 – 17:00 or by email appointments
Class Material
 Text book
• Computer Networking: A Top-Down Approach
• Jim Kurose and Keith Ross
• 6th edition (2012), 7th edition (2017), and 8th
edition (2020)
 Resources page
• Authors’ Website at
https://gaia.cs.umass.edu/kurose_ross/index.php
• Publisher Website at
www.pearsonglobaleditions.com
(https://www.pearson.com/en-us/subject-
catalog/p/computer-
networking/P200000003334?view=educator )
• PowerPoint Slides, Wireshark Labs, Self-
Assessment Quizzes, Programming Assignments,
Interactive Animations, etc.
Schedule
 Week 1 - Intro
 Week 2 - 3 - Computer networks and the Internet
 Week 4 - 6 - Application layer
 Week 7 - Transport layer
 Week 8 - Midterm exam
 Week 9 - 10 - Transport layer
 Week 11 - 13 - The Network layer: data & control plane
 Week 14 - 15 - The Link layer and LANs
 Week 16 - Final exam
TCP/IP and OSI Model
Chapter 1 – Computer Networks and the Internet
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access network,
physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Chapter 2 – Application Layer

 Principles of network  P2P applications


applications  Video streaming and content
 Web and HTTP distribution networks
 E-mail, SMTP, IMAP  Socket programming with
 The Domain Name System UDP and TCP
DNS
Chapter 3 – Transport Layer
 Transport-layer services
 Multiplexing and demultiplexing
 Connectionless transport: UDP
 Principles of reliable data transfer
 Connection-oriented transport: TCP
 Principles of congestion control
 TCP congestion control
 Evolution of transport-layer functionality
Chapter 4 – Network Layer: Data Plane
 Network layer: overview
• data plane
• control plane
 What’s inside a router
• input ports, switching, output ports
• buffer management, scheduling
 IP: the Internet Protocol  Generalized Forwarding, SDN
• datagram format
• Match+action
• addressing
• OpenFlow: match+action in action
• network address translation
• IPv6  Middleboxes
Chapter 5 – Network Layer: Control Plane
 introduction
 routing protocols  network management,
• link state configuration
• distance vector • SNMP
 intra-ISP routing: OSPF • NETCONF/YANG
 routing among ISPs: BGP
 SDN control plane
 Internet Control Message
Protocol
Chapter 6 – The Link layer and LANs

 introduction
 error detection, correction  link virtualization: MPLS
 multiple access protocols  data center networking
 LANs  a day in the life of a web
• addressing, ARP request
• Ethernet
• switches
• VLANs
Chapter 7 – Wireless and Mobile Networks

 Introduction

Wireless Mobility
 Wireless Links and network  Mobility management: principles
characteristics  Mobility management: practice
 WiFi: 802.11 wireless LANs  4G/5G networks
 Cellular networks: 4G and 5G  Mobile IP
 Mobility: impact on higher-layer
protocols
Chapter 8 – Security in Computer Networks
 What is network security?
 Principles of cryptography
 Authentication, message integrity
 Securing e-mail
 Securing TCP connections: TLS
 Network layer security: IPsec
 Security in wireless and mobile networks
 Operational security: firewalls and IDS
Grading
Midterm – 30~35%
Final – 35%
Attendance and class participation – 10%
Programming projects & lab assignments – 20~25%
• Java programming skills required
• 2 programming projects and 3~4 lab assignments are planned.
• Late submission penalty: 50%, 25%, and 0% of the full credits will
be given to submissions being late “< 24 hrs”, “< 48 hrs”, and “>
48 hrs”.
Some Policies
 Don’ts list
• Absent more than 1/3 of the classes
• Not showing up for either of midterm and final exams
• Being dishonest for exams and assignments
 Face-to-face exams only for midterm and final
• Beware of possibility of having either midterm or final exam only
 No A+ grade for students of 4th year and up
Q&A

Questions, concerns, and suggestions?

You might also like