Performance Modeling of Computer Networks - Introduction
|
|
- Roxanne Green
- 5 years ago
- Views:
Transcription
1 Performance Modeling of Computer Networks - Introduction What this course is all about, what you will learn and how you use it in real life Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR July 17, 2017 Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
2 An Example Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
3 Objective of the Course Broad Objective To understand the behavior of different network components (hardware and their interconnections, protocols etc) and apply them to refine or boost up the network behavior Image Source: Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
4 What are the ways to understand the behavior of a Network Protocol? Implement it on a network testbed and check its performance. Difficult to check the scalability of the protocol - global implementation is not possible For many of the early network protocols (like IP, TCP) people have first implemented those, and then understood their shortcomings - large amount of network resources are wasted to maintain this backward compatibility Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
5 What are the ways to understand the behavior of a Network Protocol? Implement it on a network testbed and check its performance. Difficult to check the scalability of the protocol - global implementation is not possible For many of the early network protocols (like IP, TCP) people have first implemented those, and then understood their shortcomings - large amount of network resources are wasted to maintain this backward compatibility Simulate the behavior over a simulation framework (like NS-3, Qualnet, Opnet etc.) Simulators can not capture the real network conditions. Also the implementations may be questionable as the framework is seldom globally verified. Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
6 What are the ways to understand the behavior of a Network Protocol? Implement it on a network testbed and check its performance. Difficult to check the scalability of the protocol - global implementation is not possible For many of the early network protocols (like IP, TCP) people have first implemented those, and then understood their shortcomings - large amount of network resources are wasted to maintain this backward compatibility Simulate the behavior over a simulation framework (like NS-3, Qualnet, Opnet etc.) Simulators can not capture the real network conditions. Also the implementations may be questionable as the framework is seldom globally verified. Model the protocol mathematically, and analyze its behavior to understand its internals It is extremely difficult to capture all the dynamics - several assumptions are made to simplify the analysis Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
7 What are the ways to understand the behavior of a Network Protocol? Implement it on a network testbed and check its performance. Difficult to check the scalability of the protocol - global implementation is not possible For many of the early network protocols (like IP, TCP) people have first implemented those, and then understood their shortcomings - large amount of network resources are wasted to maintain this backward compatibility What is the best way? Simulate the behavior over a simulation framework (like NS-3, Apply Qualnet, all theopnet three etc.) methods together to do a rigorous analysis Simulators can not capture the real network conditions. Also the implementations may be questionable as the framework is seldom globally verified. Model the protocol mathematically, and analyze its behavior to understand its internals It is extremely difficult to capture all the dynamics - several assumptions are made to simplify the analysis Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
8 What you ll learn in this course How to characterize a network protocol? What parameters affect the behavior of a network protocol? Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
9 What you ll learn in this course How to characterize a network protocol? What parameters affect the behavior of a network protocol? How to verify that a protocol is correct (it ll do what it intends to do)? Say, you are designing a FAIR channel access protocol. How can you ensure that the protocol indeed provides fairness. Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
10 What you ll learn in this course How to characterize a network protocol? What parameters affect the behavior of a network protocol? How to verify that a protocol is correct (it ll do what it intends to do)? Say, you are designing a FAIR channel access protocol. How can you ensure that the protocol indeed provides fairness. How can you find out (guess or say something about) the performance of a network protocol? Example: How TCP will behave over a 4G (LTE) network? Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
11 What you ll learn in this course How to characterize a network protocol? What parameters affect the behavior of a network protocol? How to verify that a protocol is correct (it ll do what it intends to do)? Say, you are designing a FAIR channel access protocol. How can you ensure that the protocol indeed provides fairness. How can you find out (guess or say something about) the performance of a network protocol? Example: How TCP will behave over a 4G (LTE) network? With this knowledge of network performance (or protocol behavior), how can you tune the protocol for a given network scenario? Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
12 What you can do with this knowledge Understand the limitation of current network protocols and what are the requirements for future network protocols. Optimize the use of network resources - network planing The cellular network companies/service providers are very much interested to find out the optimal deployment of cellular base stations for maximizing performance-capex-cost trade-off. Can you design one? Exploit the internals of a network protocol Design a new security attack Prevent a security vulnerability Make the network INTELLIGENT (Cognitive Networks - You ll learn more later on!) Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
13 The bad thing is that we have to do some mathematics for all these stuffs! Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
14 Don t think this is a pure mathematical course! We ll apply the knowledge of mathematics over computer systems (specifically networks) and learn/design new aspects of it... Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
15 Contents of this course We ll cover the mathematical pre-requisites as a part of this course: Network Optimization: Network resource allocation Stochastic Modeling: Network resource allocation Game Theory and online learning: Network intelligence Petri-nets, Formal modeling: Protocol verification We ll apply this knowledge in different protocols span over different domains (wired/wireless; mobile/cellular etc) Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
16 Classroom/Exam Policies In the classroom: Discuss the basic mathematical pre-requisites along with how to apply them Out the classroom: I ll periodically post some practice problems, try to solve them in groups Class discussion and problem solving: We ll collectively try to solve some unsolved problems! Term Paper: In a group of maximum two select a problem and try to solve! (TAs and instructors will help) Grading Policy: Mid Sem (25%), End Sem(45%), Term paper, Class discussion and problem solving assignments (30%) Expectations from students: Make the class-room interactive! Feel free to ask question. No question is a bad question. Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
17 Why Both Assignments and Term Papers? Assignments are for understanding existing ideas Term papers are for innovating new ideas. Many good publications from previous term papers, Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
18 Why Both Assignments and Term Papers? Assignments are for understanding existing ideas Term papers are for innovating new ideas. Many good publications from previous term papers, Kumar Ayush, Varun Rawal, Raja Karmakar, Pradyumna Kumar Bishoyi, Samiran Chattopadhyay and Sandip Chakraborty, Supporting Throughput Fairness in IEEE ac Dynamic Bandwidth Channel Access: A Hybrid Approach, in proc. of the 42nd Annual IEEE Conference on Local Computer Networks (IEEE LCN 2017), Singapore, October 09-12, 2017 (Acceptance Rate: 25%) Satadal Sengupta, Vinay Kumar Yadav, Yash Saraf, Harshit Gupta, Niloy Ganguly, Sandip Chakraborty, Pradipta De, MoViDiff: Enabling Online Service Differentiation for Mobile Video Apps, in proc. of the Mini-Conference track of the 2017 IFIP/IEEE International Symposium on Integrated Network Management (IM 2017), Lisbon, Portugal, May 08 - May 12, 2017 (Acceptance rate: 16.88%) Kumar Saurav, Kartik Vermun, and Sandip Chakraborty, Adaptive Redistribution of Resources for Ensuring Service Quality in a Post Disaster Situation Analysis Network, in proc. of the IEEE International Conference on Advanced Networks and Telecommunications Systems (IEEE ANTS 2016), Bangalore, India, November 06-09, 2016 (Acceptance Rate: 26%) Gurman Bhalla, Raja Karmakar, Sandip Chakraborty, and Samiran Chattopadhyay, CrowdAP: Crowdsourcing Driven AP Coordination for Improving Energy Efficiency in Wireless Access Networks, in proc. of the IEEE International Conference on Communications (IEEE ICC 2016) - Green Communications Systems and Networks, Kuala Lumpur, Malaysia, May 23-27, 2016 (Acceptance Rate: 30%) Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
19 Classroom/Exam Policies Feedback: Two anonymous feedbacks will be taken - mid-term (by the course instructor) and end-term (by the institute). Always feel free to share your expectations. Contact me for any doubts/clarifications/suggestions. Attendance: Institute attendance policy would be followed. Poor attendance may result in de-registration. Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
20 Books/Study Materials Michal Pioro, Deepankar Medhi, Routing, Flow and Capacity Design in Communication and Computer Networks, Morgan Kaufman Publishers Anurag Kumar, D. Manjunath and Joy Kuri, Communication Networking: An Analytical Approach, Morgan Kaufman Publishers Dimitri P. Bertsekas and Robert G. Gallager, Data Networks Research Publications - will be discussed and distributed time to time Lecture notes - will be published in the course website Course website: CS_60019_Autumn_2017.html Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
21 Teaching Assistants Satadal Sengupta ac.in CNeRG Lab Abhijit Mondal Systems and Mobile Research Lab Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
22 Class Timings Slot H3, Classroom: CSE-120 MON 02:00 pm - 02:55 pm TUE 04:00 pm - 05:55 pm Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
23 Thank You Sandip Chakraborty (IIT Kharagpur) CS July 17, / 14
CSC8260: Wireless Networking and Cyber-Physical Systems. Hongwei Zhang
CSC8260: Wireless Networking and Cyber-Physical Systems Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course Build up your background in wireless cyber-physical systems (WCPS) Wireless
More informationCSC6290: Data Communication and Computer Networks. Hongwei Zhang
CSC6290: Data Communication and Computer Networks Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course You may have gained basic understanding of computer networks in undergraduate study,
More informationCSC6290: Data Communication and Computer Networks. Hongwei Zhang
CSC6290: Data Communication and Computer Networks Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course Ultimate goal: To help students become deep thinkers in computer networking! Humble
More informationVenkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)
Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in
More informationExperimental Evaluation of Large Scale WiFi Multicast Rate Control
Experimental Evaluation of Large Scale WiFi Multicast Rate Control Varun Gupta*, Craig Gutterman*, Gil Zussman*, Yigal Bejeranoº *Electrical Engineering, Columbia University ºBell Labs, Nokia Objective
More informationAYAN MONDAL ayan.mondal/
AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)
More informationAcademic Course Description
BEC002 WIRELESS NETWORKS Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC002 WIRELESS NETWORKS Sixth Semester,
More informationAcademic Course Description
BET008 WIRELESS NETWORKS Academic Course Description Course (catalog) description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BET008
More informationDepartment of Computer Science and Engineering Indian Institute of Technology Kharagpur
Address: Department of Computer Science and Engineering Indian Institute of Technology Kharagpur, Kharagpur 721 302, West Bengal, India. Telephone (Office): +91 3222282898 Mobile: +91 9547499374 +91 9433035639
More informationFundamentals of Digital System Design ECE 3700, CPSC 3700
Fundamentals of Digital System Design ECE 3700, CPSC 3700 Instructor: Priyank Kalla (kalla@ece.utah.edu) 4 Credits Tue, Thu 1:25-1:45pm, WEB 1230 Office Hours: Tue, Thu: 2:30-4pm, or by appointment Office:
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationPerformance analysis of voip over wimax
Performance analysis of voip over wimax Shima Faisal Ahmed Muhi-Aldean 1, Amin Babiker 2 1,2 Department of Communications, Faculty of Engineering Al Neelain University, Khartoum,Sudan Abstract: Voice over
More informationExperimental Evaluation of YouTube Performance on MPTCP-based LTE-WLAN Integration
Experimental Evaluation of YouTube Performance on MPTCP-based LTE-WLAN Integration Shashwat Kumar, Himank Gupta, and Dr. Antony Franklin A. NeWS Lab Department of Computer Science and Engineering Indian
More informationWhat a lot of folks might call the class but as we ll see later, it s not entirely accurate.
1 What a lot of folks might call the class but as we ll see later, it s not entirely accurate. 2 Class composition; note that while CS students are the largest group, they re still only about a quarter
More informationFormal Foundations of Software Engineering
Formal Foundations of Software Engineering http://d3s.mff.cuni.cz Martin Nečaský Pavel Parízek CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Goals of the course Show methods and tools
More informationCredit: The lecture slides are created based on previous lecture slides by Dan Zingaro.
CSC148 2018 Here 1 Credit: The lecture slides are created based on previous lecture slides by Dan Zingaro. 2 Larry Zhang Office: DH-3042 Email: ylzhang@cs.toronto.edu 3 The teaching team Dan Zingaro: LEC0103
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationCS140 Operating Systems
p. 1/2 CS140 Operating Systems Instructor: David Mazières CAs: Varun Arora, Chia-Hui Tai, Megan Wachs Stanford University p. 2/2 Administrivia Class web ØØÔ»» ½ ¼º º Ø Ò ÓÖ º Ù» page: - All assignments,
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationTopic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date:
Topic 6: SDN in practice: Microsoft's SWAN Student: Miladinovic Djordje Date: 17.04.2015 1 SWAN at a glance Goal: Boost the utilization of inter-dc networks Overcome the problems of current traffic engineering
More informationIntroduction ETSN01 Advanced Telecommunications. Emma Fitzgerald
Introduction ETSN01 Advanced Telecommunications Emma Fitzgerald 2015 Course administration and overview Expected outcomes Pre-requisites Course structure Teaching team Assessment General points Socrative
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More information[MS20334]: Core Solutions of Skype for Business 2015
[MS20334]: Core Solutions of Skype for Business 2015 Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Skype Delivery Method : Instructor-led (Classroom) Course Overview This course
More informationCSE 466 Software for Embedded Systems. CSE 466 Software for Embedded Systems
CSE 466 Software for Embedded Systems Instructor: q Bruce Hemingway CSE 464, Office Hours: 1:00-2:00 p.m., Tuesday, Thursday or whenever the door is open bruceh@cs.washington.edu q q Teaching Assistants:
More informationCore Solutions of Skype for Business 2015
Course 20334B: Core Solutions of Skype for Business 2015 Page 1 of 8 Core Solutions of Skype for Business 2015 Course 20334B: 4 days; Instructor-Led Introduction This course teaches IT professionals how
More informationCS F 303 COMPUTER NETWORKS JANUARY 11, 2017
1 P a g e o f 5 Birla Institute of Technology & Science, Pilani (Rajasthan) India Instruction Division Department of Computer Science & Information Systems Second Semester: 2016-2017 Course Handout: Part-II
More informationEECS 282 Information Systems Design and Programming. Atul Prakash Professor, Computer Science and Engineering University of Michigan
EECS 282 Information Systems Design and Programming Atul Prakash Professor, Computer Science and Engineering University of Michigan 1 What is the Course About? A second programming course - but different
More informationCSE 262 Spring Scott B. Baden. Lecture 1 Introduction
CSE 262 Spring 2007 Scott B. Baden Lecture 1 Introduction Introduction Your instructor is Scott B. Baden, baden@cs.ucsd.edu Office: room 3244 in EBU3B Office hours: Tuesday after class (week 1) or by appointment
More informationCOMP 522 Modelling and Simulation model everything
Fall Term 2004 COMP 522 Modelling and Simulation model everything Hans Vangheluwe Modelling, Simulation and Design Lab (MSDL) School of Computer Science, McGill University, Montréal, Canada Hans Vangheluwe
More informationCOOL: Common Optimization and Operation framework based on network utility theory for 5G technologies & IoT
1 IEEE 5G Greece Summit COOL: Common Optimization and Operation framework based on network utility theory for 5G technologies & IoT Symeon Papavassiliou National Technical University of Athens (NTUA) School
More informationEECS 454: Modeling and Analysis of Communication Networks
: Modeling and Analysis of Communication Networks Spring Quarter 2008 Meeting time: 12:30-1:50 MW Instructor: Randall Berry Office: Tech, Rm. M318 Office Hours: by appointment Course Overview Primary goal
More informationThroughput Considerations for Wireless Networks
Wi4Net White Paper: Throughput Considerations for Wireless Networks About us CelPlan Technologies has been a worldwide leading provider of wireless network design, optimization and performance evaluation
More informationCURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela
CURRICULUM VITAE Name: Dr. ASHOK KUMAR TURUK Personal Data : Position Held: Assistant Professor Department : Computer Science & Engineering Office Address : Dept. of Computer Science & Engineering. (NIT)
More informationWhite Paper. Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul
White Paper Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul End user demand for ubiquitous broadband connectivity,
More informationCourse Introduction. Off script lecturing on whiteboard Just as important towards exams, etc.
Course Introduction Introduction Matthew Green, Professor Teaching Assistants: Venkatesh Gopal (head TA), Eyal Foni, Shikha Fadnais and Praeen Malhan (maybe more soon!) Registration: 60-80 students If
More informationCSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits
CSci 4211: Introduction to Computer Networks Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office: Keller
More informationSan José State University Computer Science CS 122 Advanced Python Programming Spring 2018
Course and Contact Information San José State University Computer Science CS 122 Advanced Python Programming Spring 2018 Instructor: Office Location: Telephone: Email: Office Hours: Class Days/Time: Classroom:
More information1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)
Dr. Jelena Mirkovic (Y-Ellen-a) University of Southern California Information Sciences Institute If you wish to enroll and do not have D clearance yet, send an email to CSci530@usc.edu with: o Your name
More informationEE6364 Advanced Data Networks
EE 6364 Advanced Data Networks Fall, 2014 Instructor: Dr. David C. Wang Office: Office-Hour: by appointment Mailbox: NH Room 549 E-mail: dwang@exchange.uta.edu Course web site: http://www-ee.uta.edu/online/wang
More informationEvaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone
Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone Sandip Chakraborty 12, Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology
More informationAC : A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE B COEXISTENCE
AC 2007-1360: A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE 802.11B COEXISTENCE Warith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman Warith Al-Sulaimani is a Lecturer and Consultant
More informationCSC 172 Data Structures and Algorithms. Fall 2017 TuTh 3:25 pm 4:40 pm Aug 30- Dec 22 Hoyt Auditorium
CSC 172 Data Structures and Algorithms Fall 2017 TuTh 3:25 pm 4:40 pm Aug 30- Dec 22 Hoyt Auditorium Agenda Administrative aspects Brief overview of the course Hello world in Java CSC 172, Fall 2017, UR
More informationCSE 504: Compiler Design
http://xkcd.com/303/ Compiler Design Course Organization CSE 504 1 / 20 CSE 504: Compiler Design http://www.cs.stonybrook.edu/~cse504/ Mon., Wed. 2:30pm 3:50pm Harriman Hall 116 C. R. Ramakrishnan e-mail:
More informationA Global Operating System «from the Things to the Clouds»
GRUPPO TELECOM ITALIA EAI International Conference on Software Defined Wireless Networks and Cognitive Technologies for IoT Rome, 26th October 2015 A Global Operating System «from the Things to the Clouds»
More informationComputer Networks IT321
Computer Networks IT321 CS Program 3 rd Year (2 nd Semester) Page 1 Assiut University Faculty of Computers & Information Computer Science Department Quality Assurance Unit Computer Networks Course Specifications
More informationPUBLICATIONS. Journal Papers
PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.
More informationEmerging Trends and Opportunities
Emerging Trends and Opportunities Smart Homes & End User Engagement track_ TEF. Digital 06.11.2014 Emilio Martinez Head of Utilities & Building Energy Efficiency Telefonica M2M Global Unit 1 Wireless Connectivity
More informationCourse Specifications M. Tech. / PG Diploma Programme
Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationISM 324: Information Systems Security Spring 2014
ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method
More informationCS 332: Computer Networks Introduction
CS 332: Computer Networks Introduction Professor Doug Szajda Thanks! I ve taught this course many times, the most recent being Spring 2014. Each time calls for a rethinking of the topics and new material.
More informationCongestion Control in Mobile Ad-Hoc Networks
Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com
More informationIP Networking Fundamentals Theory and Practice
IP ing Fundamentals Theory and Practice Introductory course into computer networking Prof. Dr. Károly Farkas Guest Professor Department of Informatics, UZH farkas@ifi.uzh.ch Introduction Reader: Prof.
More informationDatabase Design and Implementation
Database Design and Implementation CS 645 Course Overview Alexandra Meliou Yanlei Diao Teaching assistants: My Phan Tim Contois Graders: Utkarsh Srivastava Suraj Subraveti Josh Pikovsky Resources http://avid.cs.umass.edu/courses/645
More informationRetos Actuales de las Redes Inalámbricas en el Ámbito Académico. Ing. Francisco J. Haw 22 de Abril de 2015
Retos Actuales de las Redes Inalámbricas en el Ámbito Académico Ing. Francisco J. Haw
More informationEECS 282 Information Systems Design and Programming. Atul Prakash Professor, Computer Science and Engineering University of Michigan
EECS 282 Information Systems Design and Programming Atul Prakash Professor, Computer Science and Engineering University of Michigan 1 What is the Course About? A second programming course - but different
More informationCIS*1500 Introduction to Programming
CIS*1500 Introduction to Programming CIS*1500 Learning to program The basic constructs of programming Programming in the C language Solving real problems Not just about coding! About me??? Some basic things...
More informationCenter Extreme Scale CS Research
Center Extreme Scale CS Research Center for Compressible Multiphase Turbulence University of Florida Sanjay Ranka Herman Lam Outline 10 6 10 7 10 8 10 9 cores Parallelization and UQ of Rocfun and CMT-Nek
More informationCASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007
CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007 Lecture Hours: 2 Lab Hours: 2 Credit Hours: 3 Class Time: Saturday 8:30 AM - 12:00 PM Room: BU
More informationCOMP9336/4336 Mobile Data Networking or ~cs4336. Course Introduction Mahbub Hassan, UNSW 1
COMP9336/4336 Mobile Data Networking www.cse.unsw.edu.au/~cs9336 or ~cs4336 Course Introduction 1 Lecture overview Course management Motivation Syllabus 2 Teaching team Lecturer - Mahbub Hassan (www.cse.unsw.edu.au/~mahbub)
More informationIntroduction to Security
CS 166: Information Security Introduction to Security Prof. Tom Austin San José State University Why should we learn about information security? Computer Security in the News Computer Crime for Fun & Profit
More informationECE : Fundamentals of Wireless Networking - Spring 2007
ECE 6962-003: Fundamentals of Wireless Networking - Spring 2007 Instructors: Roland Kempter and Rong-Rong Chen Grader: Hong Wan 1 Roland Kempter Office: MEB 3252 Phone: (801) 581 3380 Email: kempter@eng.utah.edu
More informationScheduling, part 2. Don Porter CSE 506
Scheduling, part 2 Don Porter CSE 506 Logical Diagram Binary Memory Formats Allocators Threads Today s Lecture Switching System to CPU Calls RCU scheduling File System Networking Sync User Kernel Memory
More informationBiodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),
Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date
More informationVISVESVARAYA TECHNOLOGICAL UNIVERSITY, BELAGAVI Scheme of Teaching and Examination Choice Based Credit System (CBCS)
Scheme of and Examination 2017-2018 III SEMESTER Hours /Week Examination Credits in hours 1 17MAT31 Engineering Mathematics - III Maths 04 03 60 40 100 4 2 17CS32 Analog and Digital Electronics 04 03 60
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationCSE 332: Data Abstractions. Ruth Anderson Spring 2014 Lecture 1
CSE 332: Data Abstractions Ruth Anderson Spring 2014 Lecture 1 Welcome! We have 10 weeks to learn fundamental data structures and algorithms for organizing and processing information Classic data structures
More informationCPSC 5157G Computer Networks
CPSC 5157G Computer Networks Instructor Dr. Jianhua Yang Center for Commerce and Technology 28 (706) 565 3520 e mail: yang_jianhua@colstate.edu website: http://csc.colstate.edu/yang/ Office Hours (Fall
More informationDistributed Systems Intro and Course Overview
Distributed Systems Intro and Course Overview COS 418: Distributed Systems Lecture 1 Wyatt Lloyd Distributed Systems, What? 1) Multiple computers 2) Connected by a network 3) Doing something together Distributed
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationLecture 5: Matrices. Dheeraj Kumar Singh 07CS1004 Teacher: Prof. Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur
Lecture 5: Matrices Dheeraj Kumar Singh 07CS1004 Teacher: Prof. Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur 29 th July, 2008 Types of Matrices Matrix Addition and Multiplication
More informationGo-Fi or Wi-Go. Photons Everywhere. Jon Crowcroft December, 2005
Go-Fi or Wi-Go Photons Everywhere Jon Crowcroft December, 2005 Google Cluster + WiFi Access A core mesh network directly connecting all major cities in 1 fiber hop Access networks in city 1 hop, and around
More informationIndex Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows
International Journal of Computer Science and Telecommunications [Volume 2, Issue 8, November 2011] 12 ISSN 2047-3338 Designing Different Models of Robust IP/MPLS over DWDM Networks Marko Rožman University
More informationOverview. Audience profile. At course completion. Module Title : 20334A:Core Solutions of Skype for Business Course Outline :: 20334A::
Module Title : 20334A:Core Solutions of Skype for Business 2015 Duration : 5 days Overview This course teaches IT professionals how to plan, deploy, configure, and administer a Skype for Business 2015
More informationYou will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.
IDPS Effectiveness and Primary Takeaways You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary
More informationExperiences with practice-focused undergraduate security education
Experiences with practice-focused undergraduate security education Robert L. Fanelli and Terrence J. O Connor Department Electrical Engineering and Computer Science United States Military Academy, West
More informationCSC 4710 / CSC 6710 Database Systems. Rao Casturi
CSC 4710 / CSC 6710 Database Systems Rao Casturi Introduction About me Education B.E (Electronics & Communications) M.S (Computer Science) Working towards Ph.D. Professional work experience 25+ Years in
More informationWelcome to! 4DN4! Advanced Internet Communications"
Welcome to! 4DN4! Advanced Internet Communications" Mon. Jan. 5 Wed. April 8, 2015" Prof. Ted Szymanski! Department of ECE! McMaster University! Web-Page: Please go to Avenue-to-Learn." Email: teds@mcmaster.ca"
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 2301 - Windows Server 2008 Network Infrastructure Configuration Administering
More informationExperimental Networking ECSE-4963
Experimental Networking ECSE-4963 I hear and I forget. I see and I remember. I do and I understand. -- Chinese Proverb shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma/ 1 Who s Who Instructor:
More informationInformation Retrieval CS6200. Jesse Anderton College of Computer and Information Science Northeastern University
Information Retrieval CS6200 Jesse Anderton College of Computer and Information Science Northeastern University What is Information Retrieval? You have a collection of documents Books, web pages, journal
More informationECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationSimulations and QoS in Modern Mobile Networks. Dmitry Petrov,
Simulations and QoS in Modern Mobile Networks Dmitry Petrov, dmitty.petrov@magister.fi Essentially, all models are wrong, but some are useful [George E. P. Box and Norman R. Draper. Empirical Model-Building
More informationBusiness Data Communications And Networking Ebooks Free
Business Data Communications And Networking Ebooks Free Updated with the latest advances in the field,â Jerry FitzGerald, Alan Dennis, and Alexandra Durcikova's 12th Edition of Business Data Communications
More informationCS 540: Introduction to Artificial Intelligence
CS 540: Introduction to Artificial Intelligence Midterm Exam: 7:15-9:15 pm, October, 014 Room 140 CS Building CLOSED BOOK (one sheet of notes and a calculator allowed) Write your answers on these pages
More informationCSE 544 Principles of Database Management Systems
CSE 544 Principles of Database Management Systems Lecture 1 - Introduction and the Relational Model 1 Outline Introduction Class overview Why database management systems (DBMS)? The relational model 2
More informationCS268: Beyond TCP Congestion Control
TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s
More informationSeng 480b/CSC 586b Building Web Applications
Seng 480b/CSC 586b Building Web Applications Daniel M. German Department of Computer Science University of Victoria 1 SEng 480b dmgerman@uvic.ca What this course is and it is not about It is not about:
More informationCS 268: Graduate Computer Networks Spring Overview
CS 268: Graduate Computer s Spring 2006 Instructor: Ion Stoica (istoica@cs.berkeley.edu, 645 Soda Hall) Lecture time: MW, 1:00-2:30pm Place: 320 Soda Hall Office hour: W 2:30-4pm 1 Overview Administrative
More informationCSC 111 Introduction to Computer Science (Section C)
CSC 111 Introduction to Computer Science (Section C) Course Description: (4h) Lecture and laboratory. Rigorous introduction to the process of algorithmic problem solving and programming in a modern programming
More information2005 University of California Undergraduate Experience Survey
2005 University of California Undergraduate Experience Survey This year's survey has three parts: I. Time use and overall satisfaction II. Your background III. Rotating modules PART I: TIME USE and OVERALL
More informationPerformance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack
Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University
More informationTampere University of Technology Department of Electronics and Communications Engineering. W.I.N.T.E.R. Group
Tampere University of Technology Department of Electronics and Communications Engineering W.I.N.T.E.R. Group Wireless Intelligence for Networking Technology by Engineering and Research Compiled by Dr.
More information1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.
Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations
More informationCS415 Compilers Overview of the Course. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University
CS415 Compilers Overview of the Course These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University Critical Facts Welcome to CS415 Compilers Topics in the
More informationTLEN5560 Wireless Systems Lab Semester: Spring 2016
TLEN5560 Wireless Systems Lab Semester: Spring 2016 Instructors Jeff DiMaio, CCNP, CISSP, CWNE #65 Adjunct Lecturer, University of Colorado, Boulder jeffrey.dimaio@colorado.edu 408-894-7262 (M-F 8am-6pm)
More informationCongestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it
More informationA New Call Admission Control scheme for Real-time traffic in Wireless Networks
A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612
More informationUniversity At Buffalo COURSE OUTLINE. A. Course Title: CSE 487/587 Information Structures
University At Buffalo COURSE OUTLINE A. Course Title: CSE 487/587 Information Structures B. Curriculum: Computer Science and Engineering Offering Program: BS, BA, MS and Ph.D C. Catalog Description: 4
More informationFIFTH SEMESTER. 12CS52 Computer Networks-I CSE CS53 Microprocessor & Microcontroller CSE
R. V. COLLEGE OF ENGINEERING, BENGALURU 59. (An Autonomous Institution affiliated to VTU, Belgavi) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SCHEME OF TEACHING AND EXAMINATION FIFTH SEMESTER No. Course
More information