1. Trang chủ
  2. » Ngoại Ngữ

Advanced-Networks-Syllabus-Fall-5781-Remote

6 1 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Advanced Computer Networks Remote Learning Option
Người hướng dẫn Michael J. May
Trường học Kinneret Academic College
Chuyên ngành Computer Networks
Thể loại Course Syllabus
Năm xuất bản 5781
Thành phố Israel
Định dạng
Số trang 6
Dung lượng 128,17 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

5 Lecture Schedule The schedule for the course is as shown in the following table.. Additional course material can be found in books by Perahia and Stacey [4] and Peyles et.. Each lectur

Trang 1

SE 14-428: Advanced Computer Networks

Remote Learning Option Department of Software Engineering Achi Racov School of Engineering Kinneret Academic College

Instructor: Michael J May Semester 1 of 5781

1 Course Details

The course meets at 9:00am–11:00am on Sundays (2 hours of lecture) The Targil for the course is at 11:00am–1:00pm on Sundays (2 hours of Targil) The course is a followup for the course “Introduction to Computer Networks” and continues where it left off

2 Prerequisites

The prerequisite for this course is 12-331: Introduction to Computer Networks

3 Overview

The course is the second in a series of courses on computer networking It assumes familiarity with the basics

of network architecture including the physical layer, the link layer, the network layer, and the transport layer The topics will be divided roughly into three sections:

1 Transport layer issues: intra-network and inter-network routing, MPLS, congestion control and avoid-ance, multicast, IPv6, resource reservation

2 Application layer protocols: WWW, HTTP, web servers

3 Alternative network architectures: cellular networks, fixed infrastructure networks

Protocols for the above topics will be discussed along with their properties and ways to improve them Protocols considered in the course include: Border Gateway Protocol (BGP), Multiprotocol Label Switch-ing (MPLS), Hypertext Transfer Protocol (HTTP), IP version 6 (IPv6), 802.11 Wireless Networks (abgn), UMTS, GSM

4 Goals

At the end of the course, the student will be able to:

Trang 2

1 Explain the roles of OSPF, CIDR, BGP, MPLS, RSVP, PIM-SM, IPv6, and SNMP in the modern internet

2 Perform basic calculations to predict the behavior of routers using CIDR, RED, and Weighted Fair Queuing

3 Explain IP level multicasting and its supporting protocols (IGMP) and write peer-to-peer applications

in Java which communicate using it

4 Write client/server applications using communicate using HTTP, SMTP, and POP

5 Explain the general architecture of GSM, UMTS, cable internet, and ADSL internet connections

6 Read and understand a network algorithm standard, summarize its behavior, and perform scientific experiments on it

7 Use a commercial network simulator (e.g ns3, Cisco packet tracer) to simulate a network topology and perform experiments on it

5 Lecture Schedule

The schedule for the course is as shown in the following table Lecture contents are correlated with the books for the course The main books for the course are by Tannenbaum and Wetherall (TW) [8]; Kurose and Ross (KR) [3]; and Peterson and Davie (PD) [5] Additional course material can be found in books by Perahia and Stacey [4] and Peyles et al [6] Each lecture below is shown with the corresponding chapters

in the main books or in the supplementary books (shown in the O column)

1 OSPF, Internetwork Routing 5.6.6, 5.6.7 5.3, 5.4 3.3.3

2 CIDR, Border Gateway Protocol (BGP) 5.6.2, 5.6.7 4.3, 5.4 3.2.5, 4.1.2 [7]

4 Multiprotocol Label Switching (MPLS) 5.6.5 6.5 4.3 [7] Congestion Control 5.3, 6.5.10 3.6, 3.7 6.1–6.3

5 Queuing Examples

Congestion Avoidance 5.3.4-5.3.5 3.7 6.4 [2]

7 Quality of Service (DiffServ) 5.4 9.5 6.5

9 HTTP 5.5, 5.6.3, 7.3 4.3, 2.2 4.5, 9.1.2 [6]

10 HTTP Implementation

11 SMTP and POP 7.3, 7.2 2.2, 2.3 9.1.2, 9.1.1

ADSL, Cable Internet 2.6, 2.8 1.2, 6.3.4

Trang 3

Since this is an advanced course, students are expected to come to class having read the material listed above in the lecture schedule Students who do not come prepared will find themselves at a significant disadvantage

6 Assignments

There will be three assignments during the course of the semester Both will involve a fair amount of programming work The assignments can be done in groups of two (2) students

One assignment will be done with a network simulator (i.e Cisco packet tracer, ns3) One will involve an actual network protocol implementation Details of the assignments will be given out during the semester

7 Recitation and Laboratory Assignments

Exercise sessions are a combination of recitation and hands on experimentation sessions Students may ask questions during the session and the instructor will answer all questions and issues posed

Some exercise sessions will include a laboratory assignment due at the end of the session Some will include

a laboratory assignment due at the beginning of the following lecture period Any laboratory assignment will be based on material covered in previous lecture or readings, not new material They will not be taken into consideration in the final grade

8 Attendance

Students are responsible for all material presented in class, recitation, and laboratory sessions, all assigned readings, and all material provided for additional reading out of class

Attendance of lectures and targil sessions is expected and required for this course Attendance will be taken from time to time, but will not be taken directly into consideration in the calculation of the course grade Students who miss lectures do so at their own risk and expense and will be expected to make up missed material on their own

Students who know they will be missing two or more lectures due to circumstances beyond their control should inform the instructor as soon as possible before or after the fact to prevent misunderstandings or problems at the end of the semester

Students who miss a lecture or targil are recommended to contact their classmates to get notes or find out what material was covered The course syllabus and web page will also indicate the material covered and have the slide sets presented at all lectures

8.1 Decorum

Students who attend lecture are expected to give their full attention to the material Reading newspapers, talking on cellular phones, text messaging, or other distracting behavior will not be tolerated

Students must arrive to lectures on time, within the first 10 minutes of class After ten minutes into class, the door will be locked and no student will be allowed entry The door will be opened at the next break in the lecture (approximately every 50 minutes) Students who need to leave during lecture for some urgent matter must leave quietly and may return at the next break

As per college policy, the instructor reserves the right to expel from the classroom any student who is disturbing the lecture or others

Trang 4

9 Submissions

9.1 How to Submit Work

To ensure timely submission of projects and work, students may only submit work via Moodle Materials sent via email or via any other means risk being ignored or ungraded without consideration of their merits Technical issues with the Moodle software should be directed to the information technology support staff in Kinneret College who will address them in a timely manner

9.2 Late Submission Policy

Students are expected to be on time with their project submissions and assignments Each assignment must

be turned in by the date it is due

Each student may turn in one assignment up to 7 days late without penalty Subsequent assignments will be penalized as follows:

ˆ 1-4 days late: 10% penalty (90% is the maximum grade)

ˆ 5-7 days late: 20% penalty (80% is the maximum grade)

ˆ More than 7 days late: 40% penalty (60% is the maximum grade) Assignments may be submitted until 24 January 2021 or an earlier date as announced by the instructor, which ever comes first Students who are called up to Miluim duty will have their assignment deadlines extended in accordance with college policy

10 Cheating

Cheating of any sort will not be tolerated Student collaboration is encouraged, but within limits as set forth in the college’s rules on academic integrity Any students caught cheating will be immediately referred

to the department head and the Dean and may receive a failing grade for the course

Cheating includes:

ˆ Copying information, content, or verbatim text from other students, internet sites, books (other than the ones listed in the bibliography), other unaffiliated individuals to answer questions, solve problems,

or aid in programming projects

ˆ Copying or submitting source code, documentation, or other programming aids without attribu-tion from other students, web sites, online repositories, text books, open source programs, or other unaffiliated individuals

ˆ Project teams which submit work which is identical or substantially identical to work submitted by other project teams, whether current or from previous years

ˆ Other forms of academic misconduct as described on the site: https://catalog.upenn.edu/pennbook/ code-of-academic-integrity/ or as reasonably assessed by the instructor, program head, or dean

If you have any questions about what constitutes cheating in the above rules, contact the instructor as early as possible

Trang 5

12 Grading

The instructor will not address questions about specific individual grades during the lecture or review sessions Students may contact the instructor in person during office hours or after the lecture/review sessions at the instructor’s convenience

Final grades will be calculated by combining grades from assignments and the exam The grades are weighted as follows:

80% Assignment (Required)

20% Summary Assignment

13 Books

The following books are used in the class They are shown below in the bibliography as well The main books are:

ˆ Tanenbaum and Wetherall Computer Networks Prentice-Hall, 5th edition [8]

ˆ Kurose and Ross Computer Networking: A Top-Down Approach Addison-Wesley, 7/E edition [3]

ˆ Peterson and Davie Computer Networks: A Systems Approach Morgan Kaufmann, 5th edition [5] The supplementary books are:

ˆ Perahia and Stacey Next Generation Wireless LANs: 802.11n and 802.11ac Cambridge University Press, 2nd edition [4]

ˆ Pyles, Carrell, and Tittel Guide to TCP/IP: IPv6 and IPv4 Cengage Learning, 5th edition [6]

ˆ Dordal An Introduction to Computer Networks Loyola University Chicago, Release 1.9.19 [1] The library has copies of the books listed, but students are encouraged, to purchase one or more of the books listed

14 Contact Information

Instructor: Michael J May

Email: mjmay@kinneret.ac.il

Trang 6

[1] Peter L Dordal An Introduction to Computer Networks Loyola University Chicago, 1.9.19 edition, July

2019 http://intronetworks.cs.luc.edu/current/ComputerNetworks.pdf

[2] Sally Floyd and Van Jacobson Random early detection gateways for congestion avoidance IEEE/ACM Trans Netw., 1(4):397–413, August 1993 www.icir.org/floyd/papers/early.twocolumn.pdf [3] James F Kurose and Keith W Ross Computer Networking: A Top-Down Approach Addison-Wesley, 7/E edition, 2016

[4] Eldad Perahia and Robert Stacey Next Generation Wireless LANs: 802.11n and 802.11ac Cambridge University Press, 2nd edition, 2013

[5] Larry L Peterson and Bruce S Davie Computer Networks: A Systems Approach Morgan Kaufmann, 5th edition, 2011

[6] James Pyles, Jeffrey L Carrell, and Ed Tittel Guide to TCP/IP: IPv6 and IPv4 Cengage Learning, 5th edition, June 2016

[7] William Stallings Data and Computer Communications Prentice Hall, 10/e edition, 2014

[8] Andrew S Tanenbaum and David J Wetherall Computer Networks Prentice-Hall, 5th edition, 2011

Ngày đăng: 25/10/2022, 01:26

w