CS536-2009-01-20-intro

CS536-2009-01-20-intro - CS536: Intro, day 3 Charles...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
CS536: Intro, day 3 Charles Killian Slides used from Kurose-Ross, Computer Networking, a Top Down Approach Introduction 1-1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Announcements Did anyone get an email from the course mailing list? Slides available on website: Username: cs536 Password: killian Assigned reading for Thursday (Feb 5 th ) Listed on course webpage Akamai tutorial: Globally Distributed Content Delivery, John Dilley et. al., IEEE Computer, 2002. Introduction 1-2
Background image of page 2
Last Time Circuit switching vs. packet switching Statistical multiplexing Store and forward Transmission (bandwidth) vs. propagation (latency) Delay: additive 4 sub-parts: nodal, queueing, transmission, propagation Bandwidth: bottleneck link Layering and encapsulation (airline ex.) Introduction 1-3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction 1-4 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Background image of page 4
Introduction 1-5 Network Security The field of network security is about: how bad guys can attack computer networks how we can defend networks against attacks how to design architectures that are immune to attacks Internet not originally designed with (much) security in mind original vision: “a group of mutually trusting users attached to a transparent network” Internet protocol designers playing “catch-up” Security considerations in all layers!
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction 1-6 Bad guys can put malware into hosts via Internet Malware can get in host from a
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 19

CS536-2009-01-20-intro - CS536: Intro, day 3 Charles...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online