Lecture 2: Background

Date: September 30, 2013
Homework due: Oct. 4 at 5:00pm

  1. Computer hardware
    1. CPU, memory, registers
    2. Secondary storage
    3. Network, graphics cards
  2. Computer software
    1. Applications
    2. Libraries (static, dynamic)
    3. Operating systems
    4. Kernel-loadable modules
  3. Network structure
    1. Basic types of connections: broadcast, point-to-point
    2. Local area networks
    3. Gateways and routers
  4. Network protocols
    1. What is a protocol
    2. Network layering
    3. Internet: Internet Protocol (IP), TCP, UDP
    4. Domain Name System (DNS), email (SMTP), web (HTTP)
  5. Examples
    1. Sending an email
    2. Accessing a web page
  6. Discussion question


Discussion Topic

After the first Gulf War, some generals realized that the Iraqi networks had been remarkably resilient: as soon as the Allies destroyed one station, the network promptly routed around it. The generals discovered that the Iraqis were using Internet routing protocols, which were designed for resiliency. Several promptly suggested that those protocols should be classified. What are the problems with doing this?
You can also obtain a PDF version of this. Version of September 30, 2013 at 12:27AM