01Overview - COS 461: Computer Networks Jennifer Rexford...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
1 COS 461: Computer Networks Jennifer Rexford Princeton University
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Goals for Today’s Class COS 461 overview Goals of the course Structure of the course Learning the material Programming assignments Course grading Academic policies Key concepts in data networking Protocols Layering Resource allocation Naming
Background image of page 2
3 What You Learn in This Course Skill: network programming Socket programming Designing and implementing protocols Knowledge: how the Internet works IP protocol suite Internet architecture Applications (Web, e-mail, P2P, VoIP, …) Insight: key concepts in networking Protocols Layering Resource allocation Naming
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Structure of the Course (1 st Half) Start at the top Sockets: how applications view the Internet Protocols: essential elements of a protocol Then study the “narrow waist” of IP IP best-effort packet-delivery service IP addressing and packet forwarding And how to build on top of the narrow waist Transport protocols (TCP, UDP) Domain Name System (DNS) Glue (ARP, DHCP, ICMP) End-system security and privacy (NAT, firewalls) Looking underneath IP Link technologies (Ethernet, wireless, …)
Background image of page 4
5 Structure of the Course (2 nd Half) And how to get the traffic from here to there Internet routing architecture (the “inter” in Internet) Intradomain and interdomain routing protocols Building applications Web and content-distribution networks E-mail Peer-to-peer file sharing Multimedia streaming and voice-over-IP Other approaching to building networks Circuit switching (e.g., ATM, MPLS, …) More on wireless networks, multicast, …
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Programming Assignments Stanford Virtual Network System Constructs virtual network topologies that integrate directly into physical networks Traffic forwarded to your program, running in user space http://yuba.stanford.edu/vns/ Sequence of three assignments File-transfer directory copy IP router Reliable transport protocol Some written questions in each assignment Based on material from lecture and the reading
Background image of page 6
7 Policies: Write Your Own Code Programming in an individual creative process much like composition. You must reach your own understanding of the problem and discover a path to its solution. During this time, discussions with friends are encouraged. However, when the time comes to write code that solves the problem, such discussions are no longer appropriate - the program must be your own work. If you have a question about how to use some feature of C, UNIX, etc., you can certainly ask your friends or the TA, but do not, under any circumstances, copy another person's program. Letting someone copy your program or using someone else's code in any form is a violation of academic regulations . "Using someone else's code" includes using solutions or partial solutions to assignments
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 35

01Overview - COS 461: Computer Networks Jennifer Rexford...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online