1 91.413 Data Communications I & 91.561 Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang.

Slides:



Advertisements
Similar presentations
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Advertisements

Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
CS 325 Computer Networks Sami Rollins Fall 2003.
Data Communications I & II Project Sequence Tom Costello.
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
What’s the Internet: “nuts and bolts” view
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
Introduction1-1 COSC6377: Computer Networks Rong Zheng Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
1 Next Few Classes Networking basics Protection & Security.
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
Network Computing Lab. ( 1 Network Programming: Syllabus Spring 2009, Prof. Kihyun Pyun.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
1 Network Core and Network Edge By Muhammad Hanif To BS IT 4 th Semester.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
Introduction 1-1 1DT057 Distributed Information Systems Chapter 1 Introduction.
Introduction and Overview of Network and Telecommunications.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
IP and Networking Basics Selection of slides taken from Internet Society Workshop Resource Centre:
1 Ram Dantu University of North Texas, Practical Networking.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
CS 5565 Network Architecture and Protocols
Computer Networks Dr. Adil Yousif CS Lecture 1.
CompTIA Security+ Study Guide (SY0-401)
TOPIC: Applications of Web Technologies in Distributed Systems
Introduction and Overview of Network and Telecommunications
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Day 01 - The Internet.
Part 0: Networking Review
Slides taken from: Computer Networking by Kurose and Ross
CS 3214 Computer Systems Lecture 21 Godmar Back.
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
OSI Protocol Stack Given the post man exemple.
CS 3214 Computer Systems Networking.
Introduction and Overview of Network and Telecommunications (contd.)
Introduction 1 1: Introduction.
CS 5565 Network Architecture and Protocols
CNT 4704 Computer Communication Networking (not “analysis”)
Network Architecture Introductory material
CSE 4905 Network Security Overview
Lectures Computer networking تمرین 3 نمره. پژوهش عملیاتی 2 نمره.
CompTIA Security+ Study Guide (SY0-401)
Chapter 1: Introduction
Review of Important Networking Concepts
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
TCP/IP Protocol Suite: Review
Network Models CCNA Instructor Training Course October 12-17, 2009
Unit 8 Network Security.
Internet protocol stack
Presentation transcript:

Data Communications I & Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang

: Internet protocol stack  application: supporting network applications FTP, SMTP, STTP  transport: host-host data transfer TCP, UDP  network: routing of datagrams from source to destination IP, routing protocols  link: data transfer between neighboring network elements PPP, Ethernet application transport network link physical

: “Nuts and bolts” view  protocols control sending and receiving of msgs e.g., TCP, IP, HTTP, FTP, PPP  Internet: “ network of networks”  loosely hierarchical  public Internet vs. private intranet  Internet standards RFC:  Request for comments IETF:  Internet Engineering Task Force local ISP company network regional ISP router workstation server mobile

Computer Security I  Threats Eavesdropping Impersonation Forgery Intrusion  Countermeasures Encryption Authentication Integrity protection Access control  Success of Internet means huge numbers of computers attached to it Can be attacked from afar Need to resist attackers

Topics  Basic concepts of cryptography and network security  Modern symmetric-key encryption algorithms  Public-key cryptosystems  Key management  Authentication and digital signature  Methodology of writing secure code  Students will implement encryption and authentication algorithms as network applications  Industrial strength socket programming Current Project