Net-Centric Computing (NC) (9%) For Computer Science Students
NC1. Introduction to net-centric computing [core]
NC2. Communication and networking [core]
NC3. Network security [core]
NC4. web-client/server computing [core]
NC9. Wireless and mobile computing [elective]
NC1. Introduction to net-centric computing [1%][core]
Minimum core coverage time: 2 hours
Topics:
Topics:
NC3. Network security [1%] [core]Minimum core coverage time: 3 hours
Topics:
Topics:
NC1. Introduction to net-centric computing [core]
NC2. Communication and networking [core]
NC3. Network security [core]
NC4. web-client/server computing [core]
NC9. Wireless and mobile computing [elective]
Recommended Books:
1. Computer Networks by Andrew S. Tanenbaum
2. Data & Computer Communications by Williams Stallings
Recent advances in computer and telecommunications networking, particularly those based on TCP/IP, have increased the importance of networking technologies in the computing discipline. Net-centric computing covers a range of sub-specialties including: computer communication network concepts and protocols, multimedia systems, Web standards and technologies, network security, wireless and mobile computing, and distributed systems.
Mastery of this subject area involves both theory and practice. Learning experiences that involve hands-on experimentation and analysis are strongly recommended as they reinforce student understanding of concepts and their application to real-world problems. Laboratory experiments should involve data collection and synthesis, empirical modeling, protocol analysis at the source code level, network packet monitoring, software construction, and evaluation of alternative design models. All of these are important concepts that can best understood by laboratory experimentation.
NC1. Introduction to net-centric computing [1%][core]
Minimum core coverage time: 2 hours
Topics:
- Background and history of networking and the Internet
- Network architectures
- The range of specializations within net-centric computing
- Networks and protocols
- Networked multimedia systems
- Distributed computing
- Mobile and wireless computing
- Discuss the evolution of early networks and the Internet.
- Demonstrate the ability to use effectively a range of common networked applications including e-mail, telnet, FTP, newsgroups, and web browsers, online web courses, and instant messaging.
- Explain the hierarchical, layered structure of typical network architecture.
- Describe emerging technologies in the net-centric computing area and assess their current capabilities, limitations, and near-term potential.
Topics:
- Network standards and standardization bodies
- The ISO 7-layer reference model in general and its instantiation in TCP/IP
- Circuit switching and packet switching
- Streams and datagrams
- Physical layer networking concepts (theoretical basis, transmission media, standards)
- Data link layer concepts (framing, error control, flow control, protocols)
- Internetworking and routing (routing algorithms, internetworking, congestion control)
- Transport layer services (connection establishment, performance issues)
- Discuss important network standards in their historical context.
- Describe the responsibilities of the first four layers of the ISO reference model.
- Discuss the differences between circuit switching and packet switching along with the advantages and disadvantages of each.
- Explain how a network can detect and correct transmission errors.
- Illustrate how a packet is routed over the Internet.
- Install a simple network with two clients and a single server using standard host-configuration software tools such as DHCP.
Topics:
- Fundamentals of cryptography
- Secret-key algorithms
- Public-key algorithms
- Authentication protocols
- Digital signatures
- Examples
- Discuss the fundamental ideas of public-key cryptography.
- Describe how public-key cryptography works.
- Distinguish between the use of private- and public-key algorithms.
- Summarize common authentication protocols.
- Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.
- Summarize the capabilities and limitations of the means of cryptography that are conveniently available to the general public.
Topics:
- Web technologies
- Server-side programs
- Common gateway interface (CGI) programs
- Client-side scripts
- The applet concept
- Characteristics of web servers
- Handling permissions
- File management
- Capabilities of common server architectures
- Role of client computers
- Nature of the client-server relationship
- Web protocols
- Support tools for web site creation and web management
- Developing Internet information servers
- Publishing information and applications
- Explain the different roles and responsibilities of clients and servers for a range of possible applications.
- Select a range of tools that will ensure an efficient approach to implementing various client-server possibilities.
- Design and build a simple interactive web-based application (e.g., a simple web form that collects information from the client and stores it in a file on the server).
- Overview of the history, evolution, and compatibility of wireless standards
- The special problems of wireless and mobile computing
- Wireless local area networks and satellite-based networks
- Wireless local loops
- Mobile Internet protocol
- Mobile aware adaption
- Extending the client-server model to accommodate mobility
- Mobile data access: server data dissemination and client cache management
- Software package support for mobile and wireless computing
- The role of middleware and support tools
- Performance issues
- Emerging technologies
- Describe the main characteristics of mobile IP and explain how differs from IP with regard to mobility management and location management as well as performance.
- Illustrate (with home agents and foreign agents) how e-mail and other traffic is routed using mobile IP.
- Implement a simple application that relies on mobile and wireless data communications.
No comments:
Post a Comment