SE 14-428: Advanced Computer Networks Remote Learning Option Department of Software Engineering Achi Racov School of Engineering Kinneret Academic College Instructor: Michael J May Semester of 5781 Course Details The course meets at 9:00am–11:00am on Sundays (2 hours of lecture) The Targil for the course is at 11:00am–1:00pm on Sundays (2 hours of Targil) The course is a followup for the course “Introduction to Computer Networks” and continues where it left off Prerequisites The prerequisite for this course is 12-331: Introduction to Computer Networks Overview The course is the second in a series of courses on computer networking It assumes familiarity with the basics of network architecture including the physical layer, the link layer, the network layer, and the transport layer The topics will be divided roughly into three sections: Transport layer issues: intra-network and inter-network routing, MPLS, congestion control and avoidance, multicast, IPv6, resource reservation Application layer protocols: WWW, HTTP, web servers Alternative network architectures: cellular networks, fixed infrastructure networks Protocols for the above topics will be discussed along with their properties and ways to improve them Protocols considered in the course include: Border Gateway Protocol (BGP), Multiprotocol Label Switching (MPLS), Hypertext Transfer Protocol (HTTP), IP version (IPv6), 802.11 Wireless Networks (abgn), UMTS, GSM Goals At the end of the course, the student will be able to: 1 Explain the roles of OSPF, CIDR, BGP, MPLS, RSVP, PIM-SM, IPv6, and SNMP in the modern internet Perform basic calculations to predict the behavior of routers using CIDR, RED, and Weighted Fair Queuing Explain IP level multicasting and its supporting protocols (IGMP) and write peer-to-peer applications in Java which communicate using it Write client/server applications using communicate using HTTP, SMTP, and POP Explain the general architecture of GSM, UMTS, cable internet, and ADSL internet connections Read and understand a network algorithm standard, summarize its behavior, and perform scientific experiments on it Use a commercial network simulator (e.g ns3, Cisco packet tracer) to simulate a network topology and perform experiments on it Lecture Schedule The schedule for the course is as shown in the following table Lecture contents are correlated with the books for the course The main books for the course are by Tannenbaum and Wetherall (TW) [8]; Kurose and Ross (KR) [3]; and Peterson and Davie (PD) [5] Additional course material can be found in books by Perahia and Stacey [4] and Peyles et al [6] Each lecture below is shown with the corresponding chapters in the main books or in the supplementary books (shown in the O column) # Subject TW KR PD OSPF, Internetwork Routing 5.6.6, 5.6.7 5.3, 5.4 3.3.3 CIDR, Border Gateway Protocol (BGP) 5.6.2, 5.6.7 4.3, 5.4 3.2.5, 4.1.2 [7] BGP 5.6.7 5.4 4.1.2 [7] Multiprotocol Label Switching (MPLS) Congestion Control 5.6.5 5.3, 6.5.10 6.5 3.6, 3.7 4.3 6.1–6.3 [7] Queuing Examples Congestion Avoidance 5.3.4-5.3.5 3.7 6.4 [2] QoS Intro, RSVP 5.4 9.5 6.5 Quality of Service (DiffServ) 5.4 9.5 6.5 Multicast HTTP 10 HTTP Implementation 11 12 13 5.2.8 4.2 5.5, 5.6.3, 7.3 4.3, 2.2 4.5, 9.1.2 SMTP and POP 7.3, 7.2 2.2, 2.3 9.1.2, 9.1.1 SNMP ADSL, Cable Internet 5.7 1.2, 6.3.4 9.3.2 2.6, 2.8 2.7 4.4 4.6 1.2, 7.4, 7.7 7.2–7.3 7.3.6 2.7.3 2.7.1 2.7.2 Cellular Networks: GSM, UMTS Advanced Topics in 802.11 Bluetooth O [6] Since this is an advanced course, students are expected to come to class having read the material listed above in the lecture schedule Students who not come prepared will find themselves at a significant disadvantage Assignments There will be three assignments during the course of the semester Both will involve a fair amount of programming work The assignments can be done in groups of two (2) students One assignment will be done with a network simulator (i.e Cisco packet tracer, ns3) One will involve an actual network protocol implementation Details of the assignments will be given out during the semester Recitation and Laboratory Assignments Exercise sessions are a combination of recitation and hands on experimentation sessions Students may ask questions during the session and the instructor will answer all questions and issues posed Some exercise sessions will include a laboratory assignment due at the end of the session Some will include a laboratory assignment due at the beginning of the following lecture period Any laboratory assignment will be based on material covered in previous lecture or readings, not new material They will not be taken into consideration in the final grade Attendance Students are responsible for all material presented in class, recitation, and laboratory sessions, all assigned readings, and all material provided for additional reading out of class Attendance of lectures and targil sessions is expected and required for this course Attendance will be taken from time to time, but will not be taken directly into consideration in the calculation of the course grade Students who miss lectures so at their own risk and expense and will be expected to make up missed material on their own Students who know they will be missing two or more lectures due to circumstances beyond their control should inform the instructor as soon as possible before or after the fact to prevent misunderstandings or problems at the end of the semester Students who miss a lecture or targil are recommended to contact their classmates to get notes or find out what material was covered The course syllabus and web page will also indicate the material covered and have the slide sets presented at all lectures 8.1 Decorum Students who attend lecture are expected to give their full attention to the material Reading newspapers, talking on cellular phones, text messaging, or other distracting behavior will not be tolerated Students must arrive to lectures on time, within the first 10 minutes of class After ten minutes into class, the door will be locked and no student will be allowed entry The door will be opened at the next break in the lecture (approximately every 50 minutes) Students who need to leave during lecture for some urgent matter must leave quietly and may return at the next break As per college policy, the instructor reserves the right to expel from the classroom any student who is disturbing the lecture or others Submissions 9.1 How to Submit Work To ensure timely submission of projects and work, students may only submit work via Moodle Materials sent via email or via any other means risk being ignored or ungraded without consideration of their merits Technical issues with the Moodle software should be directed to the information technology support staff in Kinneret College who will address them in a timely manner 9.2 Late Submission Policy Students are expected to be on time with their project submissions and assignments Each assignment must be turned in by the date it is due Each student may turn in one assignment up to days late without penalty Subsequent assignments will be penalized as follows: ❼ 1-4 days late: 10% penalty (90% is the maximum grade) ❼ 5-7 days late: 20% penalty (80% is the maximum grade) ❼ More than days late: 40% penalty (60% is the maximum grade) Assignments may be submitted until 24 January 2021 or an earlier date as announced by the instructor, which ever comes first Students who are called up to Miluim duty will have their assignment deadlines extended in accordance with college policy 10 Cheating Cheating of any sort will not be tolerated Student collaboration is encouraged, but within limits as set forth in the college’s rules on academic integrity Any students caught cheating will be immediately referred to the department head and the Dean and may receive a failing grade for the course Cheating includes: ❼ Copying information, content, or verbatim text from other students, internet sites, books (other than the ones listed in the bibliography), other unaffiliated individuals to answer questions, solve problems, or aid in programming projects ❼ Copying or submitting source code, documentation, or other programming aids without attribution from other students, web sites, online repositories, text books, open source programs, or other unaffiliated individuals ❼ Project teams which submit work which is identical or substantially identical to work submitted by other project teams, whether current or from previous years ❼ Other forms of academic misconduct as described on the site: https://catalog.upenn.edu/pennbook/ code-of-academic-integrity/ or as reasonably assessed by the instructor, program head, or dean If you have any questions about what constitutes cheating in the above rules, contact the instructor as early as possible 11 Summary Assignment There will be an end-of-semester assignment (non-programming) instead of an exam in the course Details of the assignment will be given during the course of the semester 12 Grading The instructor will not address questions about specific individual grades during the lecture or review sessions Students may contact the instructor in person during office hours or after the lecture/review sessions at the instructor’s convenience Final grades will be calculated by combining grades from assignments and the exam The grades are weighted as follows: 80% 20% 13 Assignment (Required) Summary Assignment Books The following books are used in the class They are shown below in the bibliography as well The main books are: ❼ Tanenbaum and Wetherall Computer Networks Prentice-Hall, 5th edition [8] ❼ Kurose and Ross Computer Networking: A Top-Down Approach Addison-Wesley, 7/E edition [3] ❼ Peterson and Davie Computer Networks: A Systems Approach Morgan Kaufmann, 5th edition [5] The supplementary books are: ❼ Perahia and Stacey Next Generation Wireless LANs: 802.11n and 802.11ac Cambridge University Press, 2nd edition [4] ❼ Pyles, Carrell, and Tittel Guide to TCP/IP: IPv6 and IPv4 Cengage Learning, 5th edition [6] ❼ Dordal An Introduction to Computer Networks Loyola University Chicago, Release 1.9.19 [1] The library has copies of the books listed, but students are encouraged, to purchase one or more of the books listed 14 Contact Information Instructor: Email: Michael J May mjmay@kinneret.ac.il References [1] Peter L Dordal An Introduction to Computer Networks Loyola University Chicago, 1.9.19 edition, July 2019 http://intronetworks.cs.luc.edu/current/ComputerNetworks.pdf [2] Sally Floyd and Van Jacobson Random early detection gateways for congestion avoidance IEEE/ACM Trans Netw., 1(4):397–413, August 1993 www.icir.org/floyd/papers/early.twocolumn.pdf [3] James F Kurose and Keith W Ross Computer Networking: A Top-Down Approach Addison-Wesley, 7/E edition, 2016 [4] Eldad Perahia and Robert Stacey Next Generation Wireless LANs: 802.11n and 802.11ac Cambridge University Press, 2nd edition, 2013 [5] Larry L Peterson and Bruce S Davie Computer Networks: A Systems Approach Morgan Kaufmann, 5th edition, 2011 [6] James Pyles, Jeffrey L Carrell, and Ed Tittel Guide to TCP/IP: IPv6 and IPv4 Cengage Learning, 5th edition, June 2016 [7] William Stallings Data and Computer Communications Prentice Hall, 10/e edition, 2014 [8] Andrew S Tanenbaum and David J Wetherall Computer Networks Prentice-Hall, 5th edition, 2011