This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Introduction to Computer Networks CS/ECE 372 Spring 2008 T R 12:00 1:20 Milam 213 Instructor: Paulson email@example.com http://web.engr.oregonstate.edu/~paulson Office: KEC 2061 Stay tuned ... office hours might change W: 10:00 11:50 am, 1:00 2:50 pm R: 2:00 pm 3:50 pm F: 10:00 11:50 am other times by appointment Teaching Assistants Viet Le Dong Nguyen Craig Furtado Office hours in Dearborn 205 Web pages
http://classes.engr.oregonstate.edu/eecs/spring2008/cs372 Textbook: http://wps.aw.com/aw_kurose_network_4/63/16303/4173750.cw/index.html Assignment submission:
http://engr.oregonstate.edu/teach Textbook: Kurose & Ross., Computer Networking: A TopDown Approach (4th Ed.) AddisonWesley, 2008 ISBN: 0321497708 One copy is on 2hour reserve at Valley Library. Prerequisites
CS 261 C programming and Unix familiarity Flexibility, patience, tenacity Integrity, responsibility Academic Honesty If you are having trouble with an assignment ... If other students ask you for help ... discuss it with other students, TAs, the instructor, or anyone else who will listen don't just have someone else tell you how to solve the problem! let them explain their solution plan don't just let them copy your work! It is possible to discuss problems without plagiarizing One of the best methods of debugging is to explain your solution to someone else. Academic Honesty If you get help from, give help to, or "work together" with someone ... Programs that are very similar will be subjected to review unless both programs indicate that they were produced collaboratively you must (in the program header block) list that person as a collaborator and describe the help If you get help from printed or online sources, you must cite your references The bottom line is: Generally, this requires registering a "partnership" Each student is expected to produce and understand all aspects of his/her own programs and solutions. Teamwork Some assignments will have an option to work as a team. Teams must be registered with the instructor before a specified date. Team projects will have additional requirements. Integrity, responsibility When you take a networking course, you reach a point where you know enough to be dangerous. Be careful ... use your talents to help make the internet world a better place Spoof email (Lab #1) Packet sniffing Etc., etc., etc. Multiple firewalls and activity logging daemons are watching Course calendar Linked to course home page Check here every week Schedule may be adjusted if it becomes apparent that more/less time is needed for some of the topics. PowerPoint slides will be available here after the actual lecture. Do not depend solely on the slides for the course material Much of the lecture material will be covered using other media. Learning Objectives
On completion of the course, students will be able to 1. describe the hardware devices used to create a network 2. give examples of networking technologies, and examine the associated standards 3. describe the essential features of a networking protocol 4. describe various congestion control, error detection, and error correction schemes On completion of the course, students will be able to Learning Objectives 1. create a local area network and a model intranet by configuring networking hardware and software in a controlled laboratory environment 2. create lowlevel clientserver application programs using the socket API 3. demonstrate (simulate) the processes of packet construction, packet switching, and packet deconstruction 4. apply a route discovery algorithm to determine the shortest path in an internet represented as a weighted graph On completion of the course, students will be able to Learning Objectives 1. compare/contrast cable networking and wireless networking 2. use a variety of networking services, such as DNS, NAT, and ARP 3. associate networking functions with the appropriate layers of the ISO/OSI network layering model, and associate internetworking functions with the appropriate layers of the TCP/IP layering model 4. describe network security issues and some of the methods for managing those issues Scores will be posted A score posting code has been sent to your onid email address. Scores will be posted on a link from the course home page. It is your responsibility to check the score posting frequently and report any errors with your scores. Grading
5 homeworks @ 1% 5 labs / reports @ 2% 2 programming assignments @ 10% 2 quizzes @ 7.5% 2 midterm exams @ 15% Final exam June 11, 6:00 PM
We will analyze these in terms of Data transmission media, data encoding Packet transmission data exchange over a network Internetworking universal service over a collection of networks Network applications programs that use an internet Networks are an important part of everyday activities Business Home Government Education In the real world ... Globally, the Internet is growing exponentially Started out as a research project with a few dozen sites Today, millions of computers and thousands of networks worldwide Growth of the internet Ethernet made local networking possible TCP/IP protocol made internetworking possible Growth of the internet Fundamental changes from centralized to distributed computing Incorporated features for reliability and robustness Exponential growth approximately doubling every 18 months Multiple links Distributed routing Counting Internet Hosts
Aug 1981 Feb 1982 ... Feb 1986 ... Jan 1991 ... Jan 2001 ... Jan 2006 Jul 2006 Jan 2007 Jul 2007 Jan 2008 213 235 2,308 376,000 109,574,429 394,991,609 439,286,364 433,193,199 489,774,269 541,677,360 Source: http://www.isc.org/ds/ Recent growth Why was there a decline in January 2007? Economic impact Large industry has grown around: Companies must integrate planning, implementation, management and upgrades Computer hardware / software Networking hardware / software Network standards Research started in 1967 to develop an Interface Message Processor (IMP) Group started a repository for comments by other researchers ... Request for Comments (RFC) 1969 http://www.rfceditor.org grew from this. It is the place to find all of the latest adopted standards for networking. First "opensource" community The Internet: a little history ... Roots in military network called ARPAnet ARPAnet began in late 1960s (not using TCP/IP) TCP/IP developed in late 1970s ARPAnet switched to TCP/IP in early 80s Start of Internet Few hundred computers Few networks A little more history ... Question: ARPAnet or DARPAnet ? Advanced Research Projects Agency (ARPA) established 1958. ARPAnet began in late 1960s ARPA changed name to Defense Advanced Research Projects Agency (DARPA) in 1972. ARPAnet not changed. DARPA changed name back to ARPA in 1993 ARPA changed name back to DARPA in 1996. ARPAnet still not changed. Many refer to ARPAnet as DARPAnet ... and that's OK with me.
Source: http://www.darpa.mil/body/arpa_darpa.html Etymology Common variable names in RFC foo bar foobar http://www.faqs.org/rfcs/rfc3092.html Questions?
Read K&R Chapter 1 (all) Lab #1
Linked to schedule page Using telnet /ping /traceroute Due Thursday (4/3) before midnight Be sure that your name is on your document ...
View Full Document
- Spring '07
- Computer Networks