Presentation of Networking course - I3S

Transcription

Presentation of Networking course - I3S
Master 1 IFI
International Track
Networking Course
(6 ECTS)
Guillaume
Urvoy-Keller ([email protected])
Master 1 IFI International Track
Networking Course (6 ECTS)
Guillaume Urvoy-Keller ([email protected])
Dino Lopez Pacheco ([email protected])
Chadi Barakat ([email protected])
Bruno Martin ([email protected])
Laboratoire I3S, Université Nice Sophia Antipolis
INRIA
October 3, 2013
Keywords, Grading
Master 1 IFI
International Track
Networking Course
(6 ECTS)
Guillaume
Urvoy-Keller ([email protected])
Keywords
Internet ;-)
Top-down approach
Algorithms for networking
Cryptography and Security
Grading
30% labs/exercices
70% written exams
Outline: Introduction to Networking
Master 1 IFI
International Track
Networking Course
(6 ECTS)
Guillaume
Urvoy-Keller ([email protected])
Course 1: General concepts - circuit vs. packet switching, history,
protocol, layers, access vs. core, etc.
Course 2: Exercises
Course 3: Application layer and transport layer
Course 4: (graded) Lab on application layer
Course 5: Socket programming
Course 6: (graded) lab on socket programming
Course 7: Network layer and addressing - course and exercises
Algorithms for Networking
Master 1 IFI
International Track
Networking Course
(6 ECTS)
Guillaume
Urvoy-Keller ([email protected])
Focus on Algo. at different levels of the protocol stack
Congestion Control: TCP, TFRC, ...
Routing: RIP, OSPF, BGP
MAC layer: random access networks.Ethernet, Wifi, ...
Cryptography and Security
Master 1 IFI
International Track
Networking Course
(6 ECTS)
Guillaume
Urvoy-Keller ([email protected])
From cryptography to network protocols
Security and threats in the Internet
Public and secret key cryptography
Network security: authentication, exchange of shared secret and
confidentiality.
Bibliography
Master 1 IFI
International Track
Networking Course
(6 ECTS)
Guillaume
Urvoy-Keller ([email protected])
J. Kuroze and K. Ross. Computer Networking: A Top-Down
Approach, Pearson edition
CN3 initative: http://inl.info.ucl.ac.be/CNP3
D. Salomon, Foundations of Computer Security, Springer, 2006
W. Stallings, Cryptography and network security, Prentice Hall, 2006

Documents pareils