Course contents and goals
Contents
Overview of the TCP/IP and OSI models, addressing, local and wide-area networks, routing protocols, transport protocols (TCP/UDP), switched and routed networks, name lookup, IPv6, network security and address translation. The course contains several guest lecturers and a thorough lab course.
Aims
The course will give you
- knowledge about the functionality, mechanisms and the principles of the Internet
- the skills to solve networking related problems
- the possibility to apply your knowledge in lab sessions
Detailed goals of the course EP2120 and IK2218
After the course, the student should be able to:
- Generally describe the architecture of the Internet, its services and protocols, including the administration and organization of global Internet resources, such as domain names, IP addresses and Internet standards.
- In technical detail explain the central protocols that constitute the Internet, including IP, UDP, TCP, ARP, ICMP, SNMP, DNS and SMTP.
- Describe abstractions and principles for network design, including layering, the end-to-end principle, the hourglass model, encapsulation and multiplexing.
- Describe how the procotols are implemented in end systems and routers. Explain how packet forwarding is achieved in a router, including routing, forwarding and error handling.
- Assess different methods for naming, addressing, routing and error detection and explain how they are used in bridged and routed networks.
- In detail explain how reliability is provided by the Internet transport protocols, such as TCP and SCTP. Describe algorithms for connection control, flow control, congestion control and error handling. The student should also be able to describe the protocol behaviour by studying a packet trace.
- In detail describe how name lookup works in the Internet and be able to configure a simple name server.
- Describe security aspects of networking and how firewalls and address translation work and why they are necessary.
- On a general level describe how routing works internally, and between autonomous systems, as well as explain how the most common VPN technologies work.