Textbook


Excel Book Cover
The recommended course texts are:

  1. Computer Networking: A Top-Down Approach, 8th Edition, by James F. Kurose and Keith W. Ross. ISBN: 9356061319.

  2. Optional: Computer & Internet Security: A Hands-on Approach, 2nd Edition, by Wenliang Du. ISBN: 978-1733003926.

Please note that there are several options with respect to obtaining the book. Students can purchase the text at any bookstore in both new and used format, buy or rent it online directly from the the usual Internet textbook resellers such as: Chegg.com or Cengagebrain.com. As outlined above, there are many buying options available. Pick the way that works best for you!

Quote

"The only man who never makes mistakes is the man who never does anything."

- Theodore Roosevelt

Lecture Notes
Class Outline
I Intend to cover from the following topics. Some of the outlines might be entirely from my lecture. The order will depend in part on student interaction and input.
  • Course Overview and Intro
    • What is the Internet?
    • Edge and Core
    • Performance: Throughput and Bottleneck Link Analysis
    • Protocol Layering and Security Basics
  • Application Layer
    • Principles of Network Applications
    • The Web and HTTP: Architecture, Web Caching, Cache Design Basics, Cookies
    • Electronic Mail and SMTP: Architecture, Message Transfer, Mail Access Overview
    • DNS: Name Resolution, Caching, Hierarchy
    • P2P Applications, Video Streaming, Content Distribution Networks (CDNs)
  • Transport Layer
    • Principles of Transport: UDP; UDP and TCP Sockets
    • Reliable Data Transfer: Multiplexing/Demultiplexing, RDT, Pipelining
    • Reliable Data Transfer Mechanisms: Go-Back-N vs. Selective Repeat
    • TCP Connection Management: 3-Way Handshake (SYN/ACK), Teardown (FIN), Reliability
    • TCP Flow Control
    • TCP Congestion Control
  • Network Layer: Data Plane
    • Overview and Addressing
    • Dissecting a Router: Destination-Based Forwarding, Switching Fabrics
    • Circuit-Switched vs. Packet-Switched Approaches
    • Packet Forwarding: Packet Scheduling Algorithms
    • Internet Protocol (IP)
    • Generalized Forwarding and SDN
  • Network Layer: Control Plane
    • Routing Algorithms: Dijkstra’s Algorithm
    • Per-Router Control vs. Centralized Control
    • Software-Defined Networking (SDN): Architecture, Abstractions, Control Logic
    • SDN Control Plane: OpenFlow Protocol
  • Link Layer and LANs
    • Introduction to the Link Layer and Multiple Access Links
    • Error Detection and Correction
    • Address Resolution Protocol (ARP)
    • LANs and Virtual Networks/Links
  • Network Security
    • Network and Transmission Attacks: Eavesdropping, Session Hijacking, IP Spoofing, DoS
    • LAN and Name-Service Attacks: ARP Poisoning, DNS Poisoning
    • Buffer Overflows
    • AI-Enabled Traffic Inference and Anomaly Detection
    • TLS and IPsec