![]() |
Jim Kurose and Keith Ross Computer Networking: A top-down approach. 6th edition 2013 Published by Pearson |
Announcements:
https://websvn.mcmaster.ca/cs3c03-se4c03/<yourmacid>
Labs, Assignments and Midterm:
The assignments in red will be graded.
Type of Assignment | Date | TA | Files | Comment |
Lab 1 | Tuesday January 21 | Neerja Mhaskar | ||
Lab 2 | Wednesday January 22 | Amar Patel | ||
Lab 3 | Tuesday February 4 | Neerja Mhaskar | ||
Lab 4 | Wednesday February 5 | Amar Patel | ||
Lab 5 | Friday February 7 | Neerja Mhaskar | Wireshark Lab 1 | Presentation of lab to TA |
Midterm 1 | Monday February 10 |
Amar Patel | midterm1.pdf (Feb 3) midterm1.pdf (Feb 10) |
Chp 1, Chp 2, Chp 3: Sections 3.1-3.4 |
Assignment 1 | Thursday February 13 | Neerja Pophli | Prog. Assignment 1 | |
Lab 6 | Tuesday March 4 | Neerja Mhaskar | ||
Lab 7 | Wednesday March 5 | Amar Patel | ||
Lab 8 | Friday March 7 | Amar Patel | Wireshark Lab 2 | |
Midterm 2 | Monday March 17 | Neerja Mhaskar | midterm2.pdf (revised Mar 19; Apr 9) marking scheme |
Chp 3: Sections 3.5-3.7 Chp 4, Chp 5 |
Lab 9 | Tuesday March 18 | Neerja Mhaskar | ||
Lab 10 | Wednesday March 19 | Amar Patel | Assignment 2 | Thursday March 27 | Amar Patel | Prog. Assignment 2 skeleton code |
Lab 11 | Tuesday April 1 | Neerja Mhaskar | ||
Lab 12 | Wednesday April 2 | Amar Patel | ||
Exam | Saturday April 12 | examp.pdf |
Lecture Summary:
Week | Lecture | Topics | Kurose & Ross |
---|---|---|---|
Week 1 | Jan 6 | Introduction | Chapter 1 |
Jan 7 | Physical Network (Tubes); Network of Networks; Protocol Stack | ||
Jan 9 | Nodal Delay | ||
Week 2 | Jan 13 | Application layer; HTTP | Chapter 2: 2.1-2.5 |
Jan 14 | Cookies & Web caching; DNS | ||
Jan 16 | DNS; nslookup | ||
Week 3 | Jan 20 | Tutorial on SVN | Chapter 2: 2.6-2.7 |
Jan 21 | P2P; BitTorrent | ||
Jan 23 | DHT; Socket Programming | ||
Week 4 | Jan 27 | Transport layer; (de)multiplexing; UDP | Chapter 3: 3.1-3.4 |
Jan 28 | RDT1.0, 2.0, 2.1, 2.2 | ||
Jan 30 | RDT 3.0 and briefly Go-Back-N scheme | ||
Week 5 | Feb 3 | Midterm 1 | Chapter 3: 3.5-3.6 |
Feb 4 | Amar Patel: Connection oriented transport: TCP | ||
Feb 6 | Neerja Mhaskar: Principles of congestion control | ||
Week 6 | Feb 10 | Midterm 1 repeat (There was a fire alarm during the first try) | Chapter 3 & 4 |
Feb 11 | Review of sections 3.5-3.7 | ||
Feb 13 | Network layer, routing vs forwarding, inside a router (4.1-4.3) | ||
Week 7 | Reading Week | ||
Week 8 | Feb 24 | IP datagram format; IPv4 addressing; IPv6; subnets, NICs, and CIDR addressing; NAT (4.4) | Chapter 4 |
Feb 25 | Routing Algorithms: Link State vs Distance Vector | ||
Feb 27 | RIP, OSPF, BGP routing protocols; {uni,broad,multi}-cast | ||
Week 9 | Mar 3 | Link & Physical layer; Error detection and correction: parity, checksums and CRCs (5.1-2) | Chapter 5 |
Mar 4 | LAN Broadcasting: FDM, TDM, Random Access, Slotted ALOHA, CMSA/CD, Taking Turns, DOCSIS (5.3) | ||
Mar 6 | ARP; Ethernet; Link-layer switches, and Physical-layer hubs; Data centers (5.4-5.7) | ||
Week 10 | Mar 10 | Basics of security and crypto; three types of attacks: cipher text only, known plaintext, chosen plaintext; caesar & monoalphabetic codes | Chapter 8 see slides |
Mar 11 | Hash functions; one-way fn; collision resistant fns; applications of hashing (passwords, message integrity, fingerprints, downline security, signature efficiency); constructing a symmetric cypher: substitutions & permutations; DES rounds | ||
Mar 13 | No class | ||
Week 11 | Mar 17 | Midterm 2 | Chapter 8 see slides |
Mar 18 | XOR Boolean fn; DES; Mangler Function, Feistel cipher; htpasswd challenge | ||
Mar 20 | IDEA and AES ciphers; RC4 pseudo-random number generator, and applications to WEP; discussion of breaking WEP, and its replacement: WPA/WPA2 | ||
Week 12 | Mar 24 | ECB and CBC; weaknesses of ECB, and threats against CBC (integrity and replay); hashes; application of hashing to Digital Rights Management (DRM) - example of DVD encryption | Chapter 8 see slides |
Mar 25 | Hash collisions and the Birthday Paradox; attacks on integrity; GPG and OpenSSL | ||
Mar 27 | The Discrete Logarithm; Diffie-Hellmand and ElGamal PKCs | ||
Week 13 | Mar 31 | RSA; Elliptic Curve cryptography | Chapter 8 see slides |
Apr 1 | Key Distribution Center; Certification Authority; basic authentication protocols | ||
Apr 3 | Needham-Schroeder authentication protocol and Kerberos | ||
Week 14 | Apr 7 | Trends in Cyber-Security | |
Apr 8 | Course Review |