CSE/EE458 Computer Networks S05

nullpitNetworking and Communications

Oct 23, 2013 (4 years and 17 days ago)

81 views

CSE/EE458 Computer Networks S05

Course coverage

1.

Networking and the layered concept. (2 hours)

2.

Physical layer


signals, impairments, media, modulation (3 hours)

3.

Data Link layer communication interfacing, frames, error control (3 hours)

4.

Media access laye
r


Shared media access (3 hours)

5.

Local Area networks


Access protocols, ALOHA, Ethernet, Rings, optical fiber, wireless
LANs (5 hours)

6.

Multiplexing


frequency, time, synchronous and statistical (2 hours)

7.

Network layer


circuit switching (2 hours)

8.

Net
work layer
-

packet switching and routing (4 hours)

9.

Network layer


Voice networks (T1, T3), X.25, Frame Relay, ATM networks, SONET,
GPRS (2 hours)

10.

Transport Layer


Connection oriented, connectionless, reliable transport (2 hours)

11.

Internetworking, TCP/
IP protocol suite (5 hours)

12.

Applications: DNS, Email, Web (2 hours)

13.

IP Multicasting (2 hours)

14.

Mobile IP (2 hours)

15.

Network security


Security issues, IPSec, Wireless network security, VPNs, SSL (3
hours)



Grading Policies

1.

2 tests (20% each), final exam (
40%)

2.

5
-
6 homework assignments (20%)


Text

Computer Networks (Tanenbaum, 4
th

Ed)



Instructor:


Bharat Madan (Email:
bbm2@psu.edu
, Phone: 865
-
0734)


Detailed Preliminary Table of Contents

You can preview th
e linked chapter and chapter sections from
Computer Networks, Fourth Edition

on the
chapter samples page
.

PREFACE

CHAPTER 1 INTRODUCTION

1.1 USES OF COMPUTER NETWORKS




1.1.1 Business Applications



1.1.2 Home Applications



1.1.4 Mobile Users




1.1.5 Social Issues

1.2 NETWORK HARDWARE




1.2.1 Local Area Networks



1.2.2 Metropolitan Area Networks



1.2.3 Wide Area Networks



1.2.4 Wireless Networks



1.2.5 Home Networks



1.2.6 Internetworks

1.3 NETWORK SOFTWARE




1.
3.1 Protocol Hierarchies



1.3.2 Design Issues for the Layers



1.3.3 Connection
-
Oriented and Connectionless Services



1.3.4 Service Primitives



1.3.5 The Relationship of Services to Protocols

1.4 REFERENCE MODELS




1.4.1 The OSI Refe
rence Model



1.4.2 The TCP/IP Reference Model



1.4.3 A Comparison of the OSI and TCP/IP Reference Models



1.4.4 A Critique of the OSI Model and Protocols



1.4.5 A Critique of the TCP/IP Reference Model

1.5 EXAMPLE NETWORKS




1.5.1 T
he Internet



1.5.2 Connection
-
Oriented Networks: X.25, Frame Relay, and
ATM



1.5.3 Ethernet



1.5.4 Wireless LANs: 802.11

1.6 NETWORK STANDARDIZATION




1.6.1 Who's Who in the Telecommunications World



1.6.2 Who's Who in the Internati
onal Standards World



1.6.3 Who's Who in the Internet Standards World

1.7 METRIC UNITS

1.8 OUTLINE OF THE REST OF THE BOOK

1.9 SUMMARY


CHAPTER 2 THE PHYSICAL LAYER

2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION




2.1.1 Fourier Analysis



2.
1.2 Bandwidth
-
Limited Signals



2.1.3 The Maximum Data Rate of a Channel

2.2 GUIDED TRANSMISSION MEDIA




2.2.1 Magnetic Media



2.2.2 Twisted Pair



2.2.3 Coaxial Cable



2.2.4 Fiber Optics

2.3 WIRELESS TRANSMISSION




2.3.1 The Elec
tromagnetic Spectrum



2.3.2 Radio Transmission



2.3.3 Microwave Transmission



2.3.4 Infrared and Millimeter Waves



2.3.5 Lightwave Transmission

2.4 COMMUNICATION SATELLITES




2.4.1 Geostationary Satellites



2.4.2 Medium
-
Earth O
rbit Satellites



2.4.3 Low
-
Earth Orbit Satellites



2.4.4 Satellites versus Fiber

2.5 THE PUBLIC SWITCHED TELEPHONE NETWORK




2.5.1 Structure of the Telephone System



2.5.2 The Politics of Telephones



2.5.3 The Local Loop: Modems, AD
SL, and Wireless



2.5.4 Trunks and Multiplexing



2.5.5 Switching

2.6 THE MOBILE TELEPHONE SYSTEM




2.6.1 First
-
Generation Mobile Phones: Analog Voice



2.
6.2 Second
-
Generation Mobile Phones: Digital Voice



2.6.3 Third
-
Generation Mobile Phones: Digital Voice and Data

2.7 CABLE TELEVISION




2.7.1 Community Antenna Television



2.7.2 Internet over Cable



2.7.3 Spectrum Allocation



2.7.4
Cable Modems



2.7.5 ADSL versus Cable

2.8 SUMMARY


CHAPTER 3 THE DATA LINK LAYER

3.1 DATA LINK LAYER DESIGN ISSUES




3.1.1 Services Provided to the Network Layer



3.1.2 Framing



3.1.3 Error Control



3.1.4 Flow Control

3.2 ERROR DETE
CTION AND CORRECTION




3.2.1 Error
-
Correcting Codes



3.2.2 Error
-
Detecting Codes

3.3 ELEMENTARY DATA LINK PROTOCOLS




3.3.1 An Unrestricted Simplex Protocol



3.3.2 A Simplex Stop
-
and
-
Wait Protocol



3.3.3 A Simplex Protocol for a Nois
y Channel

3.4 SLIDING WINDOW PROTOCOLS




3.4.1 A One
-
Bit Sliding Window Protocol



3.4.2 A Protocol Using Go Back N



3.4.3 A Protocol Using Selective Repeat

3.
5 PROTOCOL VERIFICATION




3.5.1 Finite State Machine Models



3.5.2 Petri Net Models

3.6 EXAMPLE DATA LINK PROTOCOLS




3.6.1 HDLC
--
High
-
level Data Link Control



3.6.2 The Data Link Layer in the Internet

3.7 SUMMARY


CHAPTER 4 THE MEDIUM AC
CESS SUBLAYER

4.1 THE CHANNEL ALLOCATION PROBLEM




4.1.1 Static Channel Allocation in LANs and MANs



4.1.2 Dynamic Channel Allocation in LANs and MANs

4.2 MULTIPLE ACCESS PROTOCOLS




4.2.1 ALOHA



4.2.2 Carrier Sense Multiple Access Protoc
ols



4.2.3 Collision
-
Free Protocols



4.2.4 Limited
-
Contention Protocols



4.2.5 Wavelength Division Multiple Access Protocols



4.2.6 Wireless LAN Protocols

4.3 ETHERNET




4.3.1 Ethernet Cabling



4.3.2 Manchester Encoding



4
.3.3 The Ethernet MAC Sublayer Protocol



4.3.4 The Binary Exponential Backoff Algorithm



4.3.5 Ethernet Performance



4.3.6 Switched Ethernet



4.3.7 Fast Ethernet



4.3.8 Gigabit Ethernet



4.3.9 IEEE 802.2: Logical Link Control



4.3.10 Retrospective on Ethernet

4.4 WIRELESS LANS




4.4.1 The 802.11 Protocol Stack



4.4.2 The 802.11 Physical Layer



4.4.3 The 802.11 MAC Sublayer Pro
tocol



4.4.4 The 802.11 Frame Structure



4.4.5 Services

4.5 BROADBAND WIRELESS




4.5.1 Comparison of 802.11 with 802.16



4.5.2 The 802.16 Protocol Stack



4.5.3 The 802.16 Physical Layer



4.5.4 The 802.16 MAC Sublayer Protocol



4.5.5 The 802.16 Frame Structure

4.6 BLUETOOTH




4.6.1 Bluetooth Architecture



4.6.2 Bluetooth Applications



4.6.3 The Bluetooth Protocol Stack



4.6.4 The Bluetooth Radio Layer



4.6.5 The Bluetooth Baseband Layer



4.6.6 Th
e Bluetooth L2CAP Layer



4.6.7 The Bluetooth Frame Structure

4.7 DATA LINK LAYER SWITCHING




4.7.1 Bridges from 802.x to 802.y



4.7.2 Local Internetworking



4.7.3 Spanning Tree Bridges



4.7.4 Remote Bridges



4.7.5 Repeaters, Hu
bs, Bridges, Switches, Routers, and
Gateways



4.7.6 Virtual LANs

4.8 SUMMARY


CHAPTER 5 THE NETWORK LAYER

5.1 NETWORK LAYER DESIGN ISSUES




5.1.1 Store
-
and
-
Forward Packet Switching



5.1.2 Services Provided to the Transport Layer



5.1.3 I
mplementation of Connectionless Service



5.1.4 Implementation of Connection
-
Oriented Service



5.1.5 Comparison of Virtual
-
Circuit and Datagram Subnets

5.2 ROUTING ALGORITHMS




5.2.1 The Optimality Principle



5.2.2 Shortest Path Routing



5.2.3 Flooding



5.2.4 Distance Vector Routing



5.2.5 Link State Routing



5.2.6 Hierarchical Routing



5.2.7 Broadcast Routing



5.2.8 Multicast Routing



5.2.9 Routing for Mobile Hosts



5.2.10 Routing in Ad Hoc Networks




5.2.11 Node Lookup in Peer
-
to
-
Peer Networks

5.3 CONGESTION CONTROL ALGORITHMS




5.3.1 General Principles of Congestion Control



5.3.2 Congestion Prevention Policies



5.3.3 Congestion Control in Virtual
-
Circuit Subnets



5.3.4 Conge
stion Control in Datagram Subnets



5.3.5 Load Shedding



5.3.6 Jitter Control

5.4 QUALITY OF SERVICE




5.4.1 Requirements



5.4.2 Techniques for Achieving Good Quality of Service



5.4.3 Integrated Services



5.4.4 Differentiated S
ervices



5.4.5 Label Switching and MPLS

5.5 INTERNETWORKING




5.5.1 How Networks Differ



5.5.2 How Networks can be Connected



5.5.3 Concatenated Virtual Circuits



5.5.4 Connectionless Internetworking



5.5.5 Tunneling



5.5.
6 Internetwork Routing



5.5.7 Fragmentation

5.6 THE NETWORK LAYER IN THE INTERNET




5.6.1 The IP Protocol



5.6.2 IP Addresses



5.6.3 Internet Control Pro
tocols



5.6.4 The Interior Gateway Routing Protocol: OSPF



5.6.5 The Exterior Gateway Routing Protocol: BGP



5.6.6 Internet Multicasting



5.6.7 Mobile IP



5.6.8 IPv6

5.7 SUMMARY


CHAPTER 6 THE TRANSPORT LAYER

6.1 THE TRANSPORT SERV
ICE




6.1.1 Services Provided to the Upper Layers



6.1.2 Transport Service Primitives



6.1.3 Berkeley Sockets



6.1.4 An Example of Socket Programming: An Internet File
Server

6.2 ELEMENTS OF TRANSPORT PROTOCOLS




6.2.1 Addressing




6.2.2 Establishing a Connection



6.2.3 Releasing a Connection



6.2.4 Flow Control and Buffering



6.2.5 Multiplexing



6.2.6 Crash Recovery

6.3 A SIMPLE TRANSPORT PROTOCOL




6.3.1 The Example Service Primitives



6.3.2 The Exam
ple Transport Entity



6.3.3 The Example as a Finite State Machine

6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP




6.4.1 Introduction to UDP



6.4.2 Remote Procedure Call



6.4.3 The Real
-
Time Transport Protocol

6.5 THE INTERNET TRANSPORT PROTO
COLS: TCP




6.5.1 Introduction to TCP



6.5.2 The TCP Service Model



6.5.3 The TCP Protocol



6.5.4 The TCP Segment Header



6.5.5 TCP Connection Establishment



6.5.6 TCP Connection Release



6.5.7 Modeling TCP Connection Mana
gement



6.5.8 TCP Transmission Policy



6.5.9 TCP Congestion Control



6.5.10 TCP Timer Management



6.5.11 Wireless TCP and UDP



6.5.12 Transactional TCP

6.6 PERFORMANCE ISSUES




6.6.2 Measuring Network Performance



6.6.3 System Design for Better Performance



6.6.4 Fast TPDU Processing



6.6.5 Protocols for Gigabit Networks

6.7 SUMMARY


CHAPTER 7 THE APPLICATION LAYER

7.1 DNS
--
DOMAIN
NAME SYSTEM




7.1.1 The DNS Name Space



7.1.2 Resource Records



7.1.3 Name Servers

7.2 ELECTRONIC MAIL




7.2.1 Architecture and Services



7.2.2 The User Agent



7.2.3 Message Formats



7.2.4 Message Transfer



7.2.5 Final

Delivery

7.3 THE WORLD WIDE WEB




7.3.1 Architectural Overview



7.3.2 Static Web Documents



7.3.3 Dynamic Web Documents



7.3.4 HTTP
--
The HyperText Transfer Protocol



7.3.5 Performance Enhancements



7.3.6 The Wireless Web

7.4 MULTIMEDIA




7.4.1 Introduction to Audio



7.4.2 Audio Compression



7.4.3 Streaming Audio



7.4.4 Internet Radio



7.4.5 Voice over IP



7.4.6 Intro
duction to Video



7.4.7 Video Compression



7.4.8 Video on Demand



7.4.9 MBone
--
Multicast Backbone

7.5 SUMMARY


CHAPTER 8 NETWORK SECURITY

8.1 CRYPTOGRAPHY




8.1.1 Introduction to Cryptography



8.1.2 Substitution Ciphers



8.1.3
Transposition Ciphers



8.1.4 One
-
Time Pads



8.1.5 Two Fundamental Cryptographic Principles

8.2 SYMMETRIC
-
KEY ALGORITHMS




8.2.1 DES
--
The Data Encryption Standard



8.2.2 AES
--
The Advanced Encryption Standard



8.2.3 Cipher Modes



8.2.4 Other Ciphers



8.2.5 Cryptanalysis

8.3 PUBLIC
-
KEY ALGORITHMS




8.3.1 RSA



8.3.2 Other Public
-
Key Algorithms

8.4 DIGITAL SIGNATURES




8.4.1 Symmetric
-
Key Signatures



8.4.2 Public
-
Key Signatures



8.4.3 Message Digests



8.4.4 The Birthday Attack

8.5 MANAGEMENT OF PUBLIC KEYS




8.5.1 Certificates



8.5.2 X.509



8.5.3 Public Key Infrastructures

8.6 COMMUNICATION SECURITY




8.6.1 IPsec



8.6.2 Firewalls



8.6.3 Virtual Private Networks



8.6.4 W
ireless Security

8.7 AUTHENTICATION PROTOCOLS




8.7.1 Authentication Based on a Shared Secret Key



8.7.2 Establishing a Shared Key: The Diffie
-
Hellman Key
Exchange



8.7.3 Authentication Using a Key Distribution Center



8.7.4 Authenticati
on Using Kerberos



8.7.5 Authentication Using Public
-
Key Cryptography

8.8 E
-
MAIL SECURITY




8.8.1 PGP

Pretty Good Privacy



8.8.2 PEM

Privacy Enhanced Mail



8.8.3 S/MIME

8.9 WEB SECURITY




8.9.1 Threats



8.9.2 Secure Naming



8.9.3 SSL

Secure Sockets Layer



8.9.4 Mobile Code Security

8.10 SOCIAL ISSUES




8.10.1 Privacy



8.10.2 Freedom of Speech



8.10.3 Copyright

8.11 SUMMARY


CHAPTER 9 READING LIST AND BIBLIOGRAPHY

9.1 SUGGESTIONS FOR FURTHER READING




9
.1.1 Introduction and General Works



9.1.2 The Physical Layer



9.1.3 The Data Link Layer



9.1.4 The Medium Access Control Sublayer



9.1.5 The Network Layer



9.1.6 The Transport Layer



9.1.7 The Application Layer



9.1.8 Ne
twork Security

9.2 ALPHABETICAL BIBLIOGRAPHY

INDEX

Home Page

::
Prentice Hall PTR

::
PTG Interactive


©
Pears
on Education, Inc.
, publishing as
Prentice Hall PTR
.
Legal
Notice
.