CSED353: Computer Networks (Spring 2018)


Introduction

Instructor:

Lectures:

Office Hours:

TA:

Course Requirements:

Required Texts:

Suggested Reference Books:

Course Evaluation:

Assignments:

Course Schedule:

  1. Introduction to CS353 Computer Networks course

  2. Introduction, Protocols and Layering
    2-1 Goals and Motivation
    2-2 Uses of Networks
    2-3 Network Components
    2-4 Sockets
    2-5 Traceroute
    2-6 Protocols and Layers
    2-7 Reference Models
    2-8 History of the Internet
    2-9 Lecture Outline

  3. Physical Layer
    3-1 Overview of the Physical Layer
    3-2 Media
    3-3 Signals
    3-4 Modulation
    3-5 Fundamental Limits

  4. Link Layer, Part A
    4-1 Overview of the Link Layer
    4-2 Framing
    4-3 Error Coding Overview
    4-4 Error Detection
    4-5 Error Correction

  5. Link Layer, Part B
    5-1 Overview of the Link Layer
    5-2 Retransmissions
    5-3 Multiplexing
    5-4 Random Multiple Access
    5-5 Wireless Multiple Access
    5-6 Contention-Free Multiple Access
    5-7 LAN Switches
    5-8 Switch Spanning Tree

  6. Packet Forwarding and Internetworking
    6-1 Network Layer Overview
    6-2 Network Services
    6-3 Internetworking
    6-4 IP Prefixes
    6-5 IP Forwarding
    6-6 Helping IP with ARP, DHCP
    6-7 Packet Fragmentation
    6-8 IP Errors with ICMP
    6-9 IP Version 6
    6-10 Network Address Translation

  7. Routing
    7-1 Routing Overview
    7-2 Shortest Path Routing
    7-3 Computing Shortest Paths with Dijkstra
    7-4 Distance Vector Routing
    7-5 Flooding
    7-6 Link State Routing
    7-7 Equal-Cost Multi-path Routing
    7-8 Combining Hosts and Routers
    7-9 Hierarchical Routing
    7-10 IP Prefix Aggregation and Subnets
    7-11 Routing with Multiple Parties
    7-12 Border Gateway Protocol (BGP)

  8. Midterm Exam

  9. Transport Layer, Reliable Transport
    9-1 Transport Layer Overview
    9-2 User Datagram Protocol (UDP)
    9-3 Connection Establishment
    9-4 Connection Release
    9-5 Sliding Window
    9-6 Flow Control
    9-7 Retransmission Timeouts
    9-8 Transmission Control Protocol (TCP)

  10. Congestion Control
    10-1 Congestion Overview
    10-2 Fairness of Allocations
    10-3 Additive Increase Multiplicative Decrease (AIMD)
    10-4 History of TCP Congestion Control
    10-5 ACK Clocking
    10-6 TCP Slow-Start
    10-7 TCP Fast Retransmit / Fast Recovery
    10-8 Explicit Congestion Notification (ECN)

  11. Web and Content Distribution
    11-1 Application Layer Overview
    11-2 Domain Name System (DNS), Part 1
    11-3 Domain Name System (DNS), Part 2
    11-4 Introduction to HTTP
    11-5 HTTP Performance
    11-6 HTTP Caching and Proxies
    11-7 Content Delivery Networks (CDNs)
    11-8 Future of HTTP
    11-9 Peer-to-Peer Content Delivery (BitTorrent)

  12. Quality of Service
    12-1 QOS Overview
    12-2 Real-time Transport
    12-3 Streaming Media
    12-4 Fair Queuing
    12-5 Traffic Shaping
    12-6 Differentiated Services
    12-7 Rate and Delay Guarantees

  13. Network Security
    13-1 Network Security Introduction
    13-2 Message Confidentiality
    13-3 Message Authentication
    13-4 Wireless Security
    13-5 Web Security
    13-6 DNS Security
    13-7 Firewalls
    13-8 Virtual Private Networks (VPNs)
    13-9 Distributed Denial of Service (DDOS)

  14. Reading Week

  15. Final Exam


Dr. James Won-Ki Hong
Professor
Dept. of Computer Science and Engineering
Pohang University of Science and Technology (POSTECH)
Pohang, Korea
Tel: +82 54 279 2244
Fax: +82 54 279 5663
Email: jwkhong@postech.ac.kr

Last modified: May 5, 2018 This page is maintained by J. W. Hong. If you have any questions or suggestions, please send email to jwkhong(@)postech.ac.kr.