MIC0007 | Specialised Protocols in Computer Networks |
Teaching Staff in Charge |
Lect. DARABANT Sergiu, Ph.D., dadics.ubbcluj.ro |
Aims |
The main course objective is to provide to students a deeper approach to computer networks protocols as studied during the Computer Networks lectures. The course is presenting advanced features of computer networking protocols and leads the students to approach some practical issues of today’s networking technologies like firewalls, tunneling(IP-IP, PPTP, GRE, L2TP, OpenVPN), IPSec, IPv6, bandwidth control and Quality of Service, P2P protocols, etc. The students will be able not only to understand the theoretical aspects of these technologies but also to practically apply them on simulated environments or real networks. |
Content |
1) Network security at the IP Layer: the Linux fireall architecture, iptables
2) Building a linux firewall. 3) The Windows Vista firewall architecture. 4) Proxy Servers and helper protocols: squid, Microsoft ISA, SOCKS 5) Virtual Private Network: Architecture and Technologies. 6) IP-IP tunneling protocol. Setting up IP in IP tunnels. 7) PPTP/GRE tunnels. Setting up Linux-Linux, Linux-Windows PPTP tunnels. Windows PPTP servers, Linux PPTP servers 8) L2TP tunneling. 9) OpenVPN - tunnels. Implementing Routed and Bridged VPN tunnels with OpenVPN. 10) The IPSsec protocol. 11) IPSec Transport Mode. IPSec Tunnel Mode applied to Linux-Windows networks. 12) QoS and bandwidth management. Differentiated Services. Queing disciplines: FIFO, PRIO, TBF, SFQ, GRED, HTB, DSMARK, etc 13) Ingress and Egress traffic control. 14) VOIP technologies. Audio/Video compression and transmission. The SIP protocol. H323. Software VOIP: softphones and server applications. Asterisk : free opensource digital PBX telephony platform. 15) Hole punching techniques for P2P networks with NAT-ed peers behind firewalls. 16) Hamachi, Skype - hole punching - applications. 17) Mobile IP networks, advanced routing. 18) P2P protocols : bittorent, emule. 19) The NS2 simulator. 20) Wake on Lan techniques- remotely starting computers over the network. 21) The IPv6 protocol suite. Addressing, Automatic configuration. Main Architecture, IPv6 over IPv4. |
References |
1) W. Richard Stevens TCP/IP Illustrated, Vol I: The Protocols, Addison Wesley, ISBN 0-201-63346-0
2) Gary R. Wright and W. Richard Stevens TCP/IP Illustrated, Vol II: The Implementation Addison Wesley, ISBN 0-201-63354-X 3) James F. Kurose and Keith W. Ross Computer Networking, A top-down approach featuring the Internet. Addison Wesley, 2001. 4) Douglas E. Comer and David L. Stevens Internetworking with TCP/IP, Vol II: Design, Implementation, and Internals. Prentice Hall. 5) William Stallings Computer Networking with Internet Protocols and Technology Prentice Hall 2004. 6) Forouzan, B.A. TCP/IP Protocol Suite second ed (2003) Mc Graw-Hill 7) Hassan, M. and Jain, R. High Performance TCP/IP Networking Concepts, Issues, and Solutions. Pearson Prentice Hall 2004. |
Assessment |
Student’s activity will be evaluated during the semester by their contribution to the practical works of the laboratory and at the end of the semester by an oral examination. The lab activity consists in a semester project/presentation. The final grade will be a weighted average of the lab activity and examination. The minimum grade for each of the two marked activities is 5. |
Links: | Syllabus for all subjects Romanian version for this subject Rtf format for this subject |