Presentation is loading. Please wait.

Presentation is loading. Please wait.

Big Picture and Organization

Similar presentations


Presentation on theme: "Big Picture and Organization"— Presentation transcript:

1 Big Picture and Organization
CS/ECE 372 Introduction to Computer Networks Spring Dr. Attila Altay Yavuz Big Picture and Organization Intro to Computer Networks Dr. Attila Altay Yavuz Spring 2017

2 Lecture and Instructor
Course website works All course material and information will be provided in this site Assignments, deadlines will be updated, please check! Lectures TR 12:00-1:20pm, WNGR 151 Instructor – A Self-Introduction Cover my background and expertise “Call of Duty” Slightly different approach

3 Self-Intro Assistant Professor, EECS at Oregon State University
Adjunct Faculty, University of Pittsburgh (Jan now) Research Scientist, Bosch Research Center (Dec Aug. 2014) Develop security and privacy research programs Privacy-preserving Big Data Technologies Secure Internet-of Things and Systems Ph.D., North Carolina State University (Jan Aug. 2011) Compromise Resilient and Compact Crypto for Digital Forensics MS, Bogazici University ( ) Efficient Crypto Mechanisms for Military Ad-hoc Networks Dr. Attila Altay Yavuz

4 Self-Intro (Cont’) Research Interests: Applied cryptography, network security, privacy Lightweight Cryptography (funded by NSF CAREER ) Cyber-security for Critical Systems (funded by DoE, NSF CAREER) Secure smart-grids Cyber-security for air drones and vehicular networks Privacy Enhancing Technologies (funded by Robert Bosch, OSU) Cloud Computing Some Impact Examples: Secure Intra-car Networks (OEMs, 2019) Privacy-Preserving Data Outsourcing ((six continents) ECU Dr. Attila Altay Yavuz

5 Logistics Task division and material rationale will be given soon.
Instructor Office Hours: KEC 3065 Monday 5 -6 PM, Friday, 4-5 PM Teaching Assistants Location: KEC (atrium) Mr. Mohamed Grissa 3 PM – 4 PM, Thursday, Friday Mr. Ceyhun Ozkaptan 11 AM – 12, Tuesday, Wednesday Task division and material rationale will be given soon. Chapter 1, slide:

6 Textbook/Slide/prerequisite
Textbook is Required Computer Networking: A Top-Down Approach, 7th Edition, Games F. Kurose, Keith W. Ross Prerequisite CS or ECE 271 or an equivalent course Basic mathematical/probability skills Textbook Acknowledgment: The power point slides used in this course are drawn heavily from Kurose & Ross’ slides provided with the textbook (material copyrighted , J.F Kurose and K.W. Ross, All Rights Reserved) Thanks to Dr. Bechir Hamdaoui for providing his slide set to me! Chapter 1, slide:

7 Grading policy Assignments: 30% Labs: 15% One midterm exam: 25%
Each student must hand in one copy 4+1 (optional) assignments (extra credit questions) Optional take home(s) (extra credit): Hard ones! Grade added after final notes Labs: 15% 4 labs: About one every two weeks One midterm exam: 25% Final exam: 30% Chapter 1, slide:

8 Lectures & assignments
Objective Deep understanding of basic and fundamental networking concepts, architectures, and philosophies Organization, structure, performance analysis Algorithms and protocols Reliability, efficiency, and security IMPORTANT: this course is not about setting up your router at home, or writing a twitter program!! Network programming is out of our scope. Wireshark will be used. Approach: how to do well in this course Attend ALL lectures and do ALL assignments & Labs Do your assignments/labs individually (how could it be otherwise!) Get benefit from extra credit assignments: Hard but good ones... Absolute fundamentals, must know these!

9 Labs Objective Understand how Internet protocols work
Force network protocols to perform certain actions Observe and analyze protocols’ behavior Approach Software tool: wireshark First lab: shows you how to install & use it Allows you to sniff and analyse traffic sent/received from/by your end system: real measurement of Internet traffic Chapter 1, slide:

10 High-Level Overview and Objectives
ISO/OSI Model application application transport network link physical presentation session transport network data link physical 5-layer Internet Protocol Stack 7-layer ISO/OSI model (OSI: open system interconnections) 10

11 Internet protocol stack
Cyber-security application: supporting network applications FTP, SMTP, HTTP transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements Ethernet, (WiFi), PPP physical: bits “on the wire” application transport network link physical Introduction

12 Transport Layer Data loss/reliability Bandwidth Timing
some apps (e.g., audio) can tolerate some loss other apps (e.g., file transfer, telnet) require 100% reliable data transfer ACK/Retransmit/RTT and Timeout Bandwidth some apps (e.g., multimedia) require minimum amount of bandwidth to be “effective” other apps (“elastic apps”) make use of whatever bandwidth they get Flow Control: Sender should not overwhelm receiver’s buffer Timing some apps (e.g., Internet telephony, interactive games) require low delay to be “effective” Congestion control TCP Tahoe/Reno: Fast retransmit, slow start, congestion avoidance Security (separate issue) Privacy, authentication, integrity

13 Network layer: data plane, control plane
local, per-router function determines how datagram arriving on router input port is forwarded to router output port forwarding function Control plane network-wide logic determines how datagram is routed among routers along end-end path from source host to destination host two control-plane approaches: traditional routing algorithms: implemented in routers software-defined networking (SDN): implemented in (remote) servers 1 2 3 0111 values in arriving packet header

14 Link Layer Services link access and sharing:
Sharing and multiple access: allow medium/channel sharing reliable delivery between adjacent nodes transport layer-like reliability: ACK’ing low bit-error link (e.g., fiber): rarely used high bit-error link (e.g., wireless): often used error detection: errors caused by signal attenuation, noise. receiver detects presence of errors error correction: receiver corrects errors w/o resorting to retransmission

15 The Data Encapsulation at Work
Transport Layer: Segment Network Layer: Frame More details will come later

16 Network Security (Basics)
Basic Threat Modeling and Security Services Passive/active adversary, authentication, integrity, confidentiality Symmetric versus Asymmetric Crypto Scalability versus efficiency Ciphers versus public key crypto End-to-end Security SSL/TLS, use of basic crypto Public key Infrastructure Selected Topics: Privacy Enhancing Technologies Guest Lectures from leading Industry Experts (Optional)

17 Task Division and Structure Rationale
Instructor Algorithms, concepts Design choices, security mechanisms Take-home(s) Mid-term and final Researcher and academic career advising TAs Homeworks (all questions about HWs goes to TAs) Labs Grading Lectures: Algorithms, concept, design, principles Not hand calculations, not solving bunch of Hw questions... HW: Calculations, analysis Take-home(s): Math background, foundation, research Special Lectures Featured Topic Guest Lecture(s) from Leading Industry (OPTIONAL) Chapter 1, slide:

18 Announcement: Note Taking Service
There is a student in our class who needs a copy of the class notes. The pay for providing notes is usually $50 to $100. If you have a 2.5 GPA and take accurate, legible notes, please sign up at the DAS website, ds.oregonstate.edu. Further information:  If you can help, please either apply online via DAS website, or contact with   Pam Hoene Notetaking Coordinator Direct: Chapter 1, slide:


Download ppt "Big Picture and Organization"

Similar presentations


Ads by Google