The importance of understanding networks from the bottom up in this Network Connected Age
There is a growing demand for qualified network engineers in today’s marketplace. Many IT specialists have spent time learning to code, build hardware and/or develop web based systems but all too often they have neglected to get a grasp on how computers transmit information over networks. This course provides an in-depth study of computer, communications and networks. This module will introduce the concepts and principles of computer networks to guide the installation and maintenance of modern, high quality reliable networks. In addition, attendees will be given the opportunity to learn how to configure and test networks, deploy network based software applications and resolve network infrastructural problems. Students will have an in-depth knowledge of basic skills in networking, and an appreciation for emerging themes that could impact networking in the future. Students will be introduced to packet sniffing software which allows deep analysis of the underlying network.
In a nutshell
This course provides an in-depth hands-on approach to transmitting packets over modern networks. This course will introduce the concepts and principles of configuring & understanding computer networks. In addition, students will be given the opportunity to learn how to configure and test networks, deploy packet sniffers, work with network based software applications and resolve network problems. Students will have an in-depth knowledge of core skills in computer network systems along with an appreciation for emerging themes that could impact networks of the future. Each module includes a practical component where command line, application tools and packet sniffing is used to demonstrate the concepts outlined earlier.
1.1 USES OF COMPUTER NETWORKS – 1.2 NETWORK HARDWARE – 1.3 NETWORK SOFTWARE – 1.4 REFERENCE MODELS – 1.5 EXAMPLE NETWORKS – 1.6 NETWORK STANDARDIZATION
This module introduces Business & Home Applications, Mobile Users & Social Issues surrounding networks. We briefly introduce Personal Area, Local Area, Metropolitan Area & Wide Area Networks alongside Internetworks. Next we examine Protocol Hierarchies, Design Issues for the Layers, Connection-Oriented Versus Connectionless Service, Service Primitives & the Relationship of Services to Protocols. We first meet the OSI Reference Model and the TCP/IP Reference Model which is the model used in this course. We compare the OSI and TCP/IP Reference Models and we also critique the OSI & TCP Model and Protocols. We introduce the Internet, Third-Generation Mobile Phone Networks, Wireless 802.11 LANS, RFID and Sensor Networks. Finally we discuss Who’s Who in the Telecommunications World, International Standards World and Internet Standards World.
4.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION – 4.2 GUIDED TRANSMISSION MEDIA – 4.3 WIRELESS TRANSMISSION – 4.4 COMMUNICATION SATELLITES – 4.5 DIGITAL MODULATION AND MULTIPLEXING – 4.6 THE PUBLIC SWITCHED TELEPHONE NETWORK – 4.7 THE MOBILE TELEPHONE SYSTEM – 4.8 CABLE TELEVISION
This module begins with an introduction to Fourier Analysis, Bandwidth-Limited Signals and the Maximum Data Rate of a Channel. We look at physical media such as Magnetic Media, Twisted Pairs, Coaxial Cable, Power Lines & Fiber Optics. Next, we cover the Electromagnetic Spectrum, Radio Transmission, Microwave Transmission, Infrared Transmission & Light Transmission. Communication satellites covers Geostationary, Medium-Earth Orbit and Low-Earth Orbit Satellites. Satellites versus Fiber is discussed. We look at Baseband & Passband Transmission, Frequency, Time and Code Division Multiplexing. It is important to look at the Structure & the Politics of Telephones, the Local Loop: Modems, ADSL, and Fiber, Trunks, Multiplexing & Switching. Related to this is a look at First-Generation (1G) Mobile Phones: Analog Voice, Second-Generation (2G) Mobile Phones: Digital Voice and Third-Generation (3G) Mobile Phones: Digital Voice and Data. We end with a look at Community Antenna Television, Internet over Cable, Spectrum Allocation, Cable Modems & ADSL Versus Cable.
6.1 THE CHANNEL ALLOCATION PROBLEM – 6.2 MULTIPLE ACCESS PROTOCOLS – 6.3 ETHERNET – 6.4 WIRELESS LANS – 6.5 BROADBAND WIRELESS – 6.6 BLUETOOTH – 6.7 RFID – 6.8 DATA LINK LAYER SWITCHING
This module looks at Static Channel Allocation, Assumptions for Dynamic Channel Allocation, ALOHA, Carrier Sense Multiple Access Protocols, Collision-Free protocols, Limited-Contention Protocols, Wireless LAN Protocols, Classic Ethernet Physical Layer, Classic Ethernet MAC Sublayer Protocol, Ethernet Performance, Switched Ethernet, Fast Ethernet, Gigabit & 10 Gigabit Ethernet and a retrospective on Ethernet. With regards Wireless, we look at the 802.11 Architecture and Protocol Stack, 802.11 Physical Layer & MAC Sublayer Protocol along with the 802.11 Frame Structure and a comparison of 802.16 with 802.11 and 3G. Bluetooth is covered with regards the 802.16 Architecture and Protocol Stack, 802.16 Physical Layer, MAC Sublayer Protocol, Frame Structure, Architecture, Applications, Buetooth Protocol Stack, Radio Layer, Link Layers & Frame Structure. RFID is introduced through the EPC Gen 2 Architecture, Physical Layer and Tag Identification Layer. Finally we look at the uses of Bridges, learning bridges, spanning tree bridges, repeaters, hubs, switches, routers, gateways and Virtual LANs.
7.1 NETWORK LAYER DESIGN ISSUES – 7.2 ROUTING ALGORITHMS – 7.3 CONGESTION CONTROL ALGORITHMS – 7.4 QUALITY OF SERVICE – 7.5 INTERNETWORKING – 7.6 THE NETWORK LAYER IN THE INTERNET
We begin by covering Store-and-Forward Packet Switching, services provided to the Transport Layer, Implementation of Connectionless Service & the Connection-Oriented Service plus a comparison of Virtual-Circuit and Datagram Networks. We introduce the Optimality Principle, Shortest Path Algorithm, Flooding, Distance Vector Routing, Link State Routing, Hierarchical Routing, Broadcast Routing, Multicast Routing, Anycast Routing, Routing for Mobile Hosts and Routing in Ad Hoc Networks. We look at Approaches to Congestion Control, Traffic-Aware Routing, Admission Control, Traffic Throttling and Load Shedding. Next we examine Application Requirements, Traffic Shaping, Packet Scheduling, Admission Control, Integrated Services and Differentiated . We examine how Networks Differ and how Networks Can Be Connected, Tunneling, Internetwork Routing and Packet Fragmentation. We delve into the IP Version 4 Protocol, IP Addresses, IP Version 6, Internet Control Protocols, Label Switching and MPLS, OSPF–An Interior Gateway Routing Protocol, BGP–The Exterior Gateway Routing Protocol, Internet Multicasting and Mobile IP.
8.1 THE TRANSPORT SERVICE – 8.2 ELEMENTS OF TRANSPORT PROTOCOLS – 8.3 CONGESTION CONTROL ALGORITHMS – 8.4 THE INTERNET TRANSPORT PROTOCOLS: UDP – 8.5 THE INTERNET TRANSPORT PROTOCOLS: TCP – 8.6 PERFORMANCE ISSUES
We start off looking at services provided to the Upper Layers, Transport Service Primitives and Berkeley Sockets. Next we discuss Addressing, Connection Establishment & Release, Flow Control and Buffering, Multiplexing and Crash Recovery. We examine Desirable Bandwidth Allocation, Regulating the Sending Rate and Wireless Issues. Ne introduce UDP, Remote Procedure Call and the Real-Time Transport Protocol. Next is TCP where we examine the TCP Service, TCP Protocol, TCP Segment Header, TCP Connection Establishment, TCP Connection Release, TCP Connection Management Modeling, TCP Transmission Policy, TCP Timer Management, TCP Congestion Control and the Future of TCP. Finally we look at Performance Problems in Computer Networks, Network Performance Measurement, Host Design for Fast Networks, Fast Segment Processing and Header Compression.
9.1 DNS–THE DOMAIN NAME SYSTEM – 9.2 ELECTRONIC MAIL – 9.3 THE WORLD WIDE WEB – 9.4 REALTIME AUDIO AND VIDEO – 9.5 CONTENT DELIVERY AND PEER-TO-PEER
We start by looking at the DNS Name Space, Resource Records, Name Servers, Architecture and Services, The User Agent, Message Formats, Message Transfer, Final Delivery, Architectural Overview, Static Web Pages, Dynamic Web Pages and Web Applications, HTTP–The HyperText Transfer Protocol, Mobile Web and Web Search. We look at multimedia by an introduction to Digital Audio, Audio Compression, Streaming Audio, Internet Radio, Voice over IP, Introduction to Video, Video Compression and Video on Demand. Finally we look into Server Replication, Content Delivery Networks, Peer-to-Peer Networks and Overlay Networks.
10.1 CRYPTOGRAPHY – 10.2 SYMMETRIC-KEY ALGORITHMS – 10.3 PUBLIC-KEY ALGORITHMS – 10.4 DIGITAL SIGNATURES – 10.5 MANAGEMENT OF PUBLIC KEYS – 10.6 COMMUNICATION SECURITY – 10.7 AUTHENTICATION PROTOCOLS – 10.8 EMAIL SECURITY – 10.9 WEB SECURITY – 10.10 SOCIAL ISSUES
We begin with an introduction to Cryptography and discuss substitution Ciphers, Transposition Ciphers, One-Time Pads, Two Fundamental Cryptographic Principles, DES–The Data Encryption Standard, AES–The Advanced Encryption Standard, Cipher Modes, Other Ciphers, Cryptanalysis, RSA, Other Public-Key Algorithms, Symmetric-Key Signatures, Public-Key Signatures, Message Digests and the Birthday Attack. We then discuss Certificates, X.509, Public Key Infrastructures, IPsec Firewalls, Virtual Private Networks and Wireless Security. Authentication is a core aspect of security so we examine Authentication Based on a Shared Secret Key, Establishing a Shared Key: The Diffie-Hellman Key Exchange, Authentication Using a Key Distribution Center, Authentication Using Kerberos and Authentication Using Public-Key Cryptography. Finally we look at PGP–Pretty Good Privacy, S/MIME, Threats, Secure Naming, SSL–The Secure Sockets Layer and Mobile Code Security.