The Internet and Its Protocols

Computer Engineering: 240-643

Lecture 1:
  • Introduction to the Subject
  • Teaching methods, etc.
  • Assessment
  • Books
  • ISO Reference Model
  • The Internet Protocol Stacks
  • Overview of the Internet Protocols
  • Example Internet Protocols
 
MagicPoint
PDF
 
Lecture 2:
  • Evaluating Protocols
    • Correctness
    • Scalability
    • Adaptability
  • Case Study #1
    • TFTP
      • Purpose
      • Operation
      • Protocol
      • NetAscii
    • Evaluation
      • Correctness
      • Scalability
      • Throughput
 
MagicPoint
PDF
 
Lecture 3:
  • Case Study #1
    • TFTP
    • Evaluation
      • Correctness
      • Scalability
      • Throughput
  • Case Study #2
    • UDP
      • Definition
      • Addresses (Ports)
      • Checksums
      • Evaluation
  • Case Study #3
    • TCP
      • Purpose
      • Specification
      • Sequence Numbers
 
MagicPoint
PDF
 
Lecture 4:
  • Case Study #3 (continued)
    • TCP
      • The Window
      • Data Exchange
      • Acknowledgements
      • Connections
      • Data Recovery
      • TCP Flags
 
MagicPoint
PDF
 
Lecture 5:
  • Case Study #3 (continued)
    • TCP
      • TCP Flags (Continued)
  • Finite State Machines
  • Case Study #4
    • TCP Connection Establishment
      • TCP FSM
      • Synchronise
      • Connection Identity
      • Open
      • Sequence Numbers (reprise)
      • Close
    • Graceful Termination
    • Options
 
MagicPoint
PDF
 
Lecture 6:
  • TCP Evaluation
    • Window Size & Throughput
    • Increasing the window
    • Option Negotiation
 
MagicPoint
PDF
 
Lecture 7:
  • TCP Evaluation
    • RTT Measurement
    • Typical Connection
      • UDP Comparison
    • Improvements?
    • Maximum Transmission Rate
  • TCP for Transactions
    • Design
    • Correctness
    • Unusual Cases
 
MagicPoint
PDF
 
Lecture 8:
  • IP
  • Evolution of IP addresses
 
MagicPoint
PDF
 
Lecture 9:
  • IP Address Assignment methods
  • IPv6
  • IPv6 compared to IPv4
    • Header fields that are
      • Essentially Unchanged
      • Modified
      • Deleted
  • Example (Similar) Packets
 
MagicPoint
PDF
 
Lecture 10:
  • IPv6 Headers
    • Chains
    • Processing
  • Options Header
    • IPv4 Options - and why they are not used
    • IPv6 Options
  • IPv6 Addresses

  • Host Configuration
    • IPv4
    • DHCP (introduction)
    • IPv6 Autoconfiguration
      • v6 address generation
 
MagicPoint
PDF
 
Lecture 11:
  • When to Autoconfigure
    • DHCPv6
    • Router Advertisements
  • IPv6 Addresses
    • Loopback
    • Link Local
    • Site Local
    • Local
    • Global
 
MagicPoint
PDF
 
Lecture 12:
  • IPv6 Addresses (continued)
    • IPv4 Compatible Addresses
    • IPv4 Mapped Addresses
    • Multicast Addresses
  • Fragmentation and Reassembly
    • Fragmentation Example
 
MagicPoint
PDF
 
Lecture 13:
      &
Lecture 14:
  • Fragmentation and Reassembly (continued)
  • Fragmentation
    • Fragmentation Example
    • Fragmenting Fragments
    • Design Tradeoffs
  • Reassembly
    • Queues
    • Fragment Merging
    • Example
  • TTL & Reassembly
  • Odd cases for reassembly
  • Where to reassemble
  • Fragmentation Problem
  • Path MTU Discovery
  • Fragmentation Lessons
 
MagicPoint
PDF
 
Lecture 15:
  • Lessons from IPv4 fragmentation
  • Fragmentation & IPv6
    • IPv6 Fragmentation Header
  • Issues with Protocol Development
 
MagicPoint
PDF
 
Lecture 16:
  • ICMP
  • Issues with ICMP for IPv4
 
MagicPoint
PDF
 
Lecture 17:
  • ICMPv6
  • Development of ICMPv6
  • ICMPv6 Error Messages
 
MagicPoint
PDF
 
Lecture 18:
  • ICMPv6 Information Messages
  • IPv6 Neighbour Discovery
    • Router Advertisment
    • Router Solicitation
    • ARP (IPv4)
    • Neighbour Solicitation
    • Neighbour Advertisment
 
MagicPoint
PDF
 
Lecture 19:
  • Duplicate Address Detection
  • Neighbour Unreachability Detection

  • Security of Neighbour Discovery
    • Issues
  • Cryptographically Generated Addresses
 
MagicPoint
PDF
 
Lecture 20:
  • Cryptographically Generated Addresses
    • Generation
    • Signing ND packets
    • Verification
  • Router Advertisment Security
    • Trust Chains
    • Trust Anchor
    • Configuration of Trust Anchors
    • Certificate Chains
 
MagicPoint
PDF
 
Lecture 21:
  • More Complex protocols
  • E-Mail
  • Definition using grammar
  • ABNF
 
MagicPoint
PDF
 
Lecture 22:
    (coming)
 
MagicPoint
PDF
 
Lecture 23:
    (coming)
 
MagicPoint
PDF
 
Lecture 24:
    (coming)
 
MagicPoint
PDF
 
Lecture 25:
    (coming)
 
MagicPoint
PDF


 

More to Come