Description
A whirlwind introduction to both theoretical and practical hands on computer networking concepts
The reliance on computer networks is increasing in today’s world. There is a large number of IT professionals however who have never been exposed or had the time to delve into the fundamentals of how computer networks function. This course provides an in-depth study in 1 day of the most important features of computer networks. This course will introduce the concepts and principles of computer networks in both theory and hand-on practical lab sessions. Attendees will be given the opportunity to learn how to test networks, implement security and resolve network problems. Students will gain a knowledge of basic skills in networking, and configuring networks. Students will be introduced to packet sniffing software which allows deep analysis of the underlying network.
In a nutshell
This course provides an in-depth hands-on approach to transmitting packets over modern networks. This course will introduce the concepts and principles of configuring & understanding computer networks. In addition, students will be given the opportunity to learn how to configure and test networks, deploy packet sniffers, work with network based software applications and resolve network problems. Each module includes a practical component where command line, application tools and packet sniffing is used to demonstrate the concepts outlined earlier. This course content is a reduced subset of the comprehensive 3 day course. Attendees who take this will get a discount if they later choose to take the 3 day course.
Syllabus
1: INTRODUCTION TO NETWORKS
1.1 USES OF COMPUTER NETWORKS – 1.2 NETWORK HARDWARE – 1.3 NETWORK SOFTWARE – 1.4 REFERENCE MODELS
This module introduces Business & Home Applications, Mobile Users & Social Issues surrounding networks. We briefly introduce Personal Area, Local Area, Metropolitan Area & Wide Area Networks alongside Internetworks. Next we examine Protocol Hierarchies, Design Issues for the Layers, Connection-Oriented Versus Connectionless Service, Service Primitives & the Relationship of Services to Protocols. We first meet the OSI Reference Model and the TCP/IP Reference Model which is the model used in this course. We compare the OSI and TCP/IP Reference Models and we also critique the OSI & TCP Model and Protocols.
2 PACKET ANALYSIS AND SNIFFING TRAFFIC WITH WIRESHARK
3: THE DATA LINK LAYER
3.1 DATA LINK LAYER DESIGN ISSUES – 3.2 ERROR DETECTION AND CORRECTION – 3.3 ELEMENTARY DATA LINK PROTOCOLS – 3.4 SLIDING WINDOW PROTOCOLS
We start the Data Link Layer module with an examination of the services provided to the Network Layer including framing, Error Control, Flow Control, Error-Correcting and Error-Detecting Codes. We next look at a utopian simplex protocol followed by a Simplex Stop-and-Wait Protocol for an Error-Free Channel and a Noisy Channel. Next we introduce a One-Bit Sliding Window Protocol and protocols using Go-Back-N and selective repeat.
4: THE MEDIUM ACCESS CONTROL SUBLAYER
4.1 THE CHANNEL ALLOCATION PROBLEM – 4.2 MULTIPLE ACCESS PROTOCOLS – 4.3 ETHERNET – 4.4 WIRELESS LANS
This module looks at Static Channel Allocation, Assumptions for Dynamic Channel Allocation, ALOHA, Carrier Sense Multiple Access Protocols, Collision-Free protocols, Limited-Contention Protocols, Wireless LAN Protocols, Classic Ethernet Physical Layer, Classic Ethernet MAC Sublayer Protocol, Ethernet Performance, Switched Ethernet, Fast Ethernet, Gigabit & 10 Gigabit Ethernet and a retrospective on Ethernet. With regards Wireless, we look at the 802.11 Architecture and Protocol Stack, 802.11 Physical Layer & MAC Sublayer Protocol along with the 802.11 Frame Structure.
5: THE NETWORK LAYER
5.1 NETWORK LAYER DESIGN ISSUES – 5.2 ROUTING ALGORITHMS – 5.3 CONGESTION CONTROL ALGORITHMS
We begin by covering Store-and-Forward Packet Switching, services provided to the Transport Layer, Implementation of Connectionless Service & the Connection-Oriented Service plus a comparison of Virtual-Circuit and Datagram Networks. We introduce the Optimality Principle, Shortest Path Algorithm, Flooding, Distance Vector Routing, Link State Routing, Hierarchical Routing, Broadcast Routing, Multicast Routing, Anycast Routing, Routing for Mobile Hosts and Routing in Ad Hoc Networks. We look at Approaches to Congestion Control, Traffic-Aware Routing, Admission Control, Traffic Throttling and Load Shedding.
6: THE TRANSPORT LAYER
6.1 THE TRANSPORT SERVICE – 6.2 ELEMENTS OF TRANSPORT PROTOCOLS – 6.3 CONGESTION CONTROL ALGORITHMS – 6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP – 6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP
We start off looking at services provided to the Upper Layers, Transport Service Primitives and Berkeley Sockets. Next we discuss Addressing, Connection Establishment & Release, Flow Control and Buffering, Multiplexing and Crash Recovery. We examine Desirable Bandwidth Allocation, Regulating the Sending Rate and Wireless Issues. Ne introduce UDP, Remote Procedure Call and the Real-Time Transport Protocol. Next is TCP where we examine the TCP Service, TCP Protocol, TCP Segment Header, TCP Connection Establishment, TCP Connection Release, TCP Connection Management Modeling, TCP Transmission Policy, TCP Timer Management, TCP Congestion Control and the Future of TCP.
7: THE APPLICATION LAYER
7.1 DNS–THE DOMAIN NAME SYSTEM – 7.2 ELECTRONIC MAIL – 7.3 THE WORLD WIDE WEB
We start by looking at the DNS Name Space, Resource Records, Name Servers, Architecture and Services, The User Agent, Message Formats, Message Transfer, Final Delivery, Architectural Overview, Static Web Pages, Dynamic Web Pages and Web Applications, HTTP–The HyperText Transfer Protocol, Mobile Web and Web Search.
8: NETWORK SECURITY
10.1 CRYPTOGRAPHY – 10.2 SYMMETRIC-KEY ALGORITHMS – 10.3 PUBLIC-KEY ALGORITHMS – 10.4 DIGITAL SIGNATURES
We begin with an introduction to Cryptography and discuss substitution Ciphers, Transposition Ciphers, One-Time Pads, Two Fundamental Cryptographic Principles, DES–The Data Encryption Standard, AES–The Advanced Encryption Standard, Cipher Modes, Other Ciphers, Cryptanalysis, RSA, Other Public-Key Algorithms, Symmetric-Key Signatures, Public-Key Signatures, Message Digests and the Birthday Attack. We then discuss Certificates, X.509, Public Key Infrastructures, IPsec Firewalls, Virtual Private Networks and Wireless Security.