VT 2013 Period 4, IK1550 and IK1552 Internetworking

Fri May 3 12:02:39 CEST 2013


Announcements

Page is still under construction - contents may be inconsistent

Note: As the lectures and recitations have been completed, there will not be a course meeting on 7 and 8 May 2013.


IK1550 Internetworking is a 6 ECTS credits course designed for undergraduates.

IK1552 Internetworking is a 7.5 ECTS credits course designed for undergraduates.

Information is available on:


Aim

This course will give both practical and general knowledge on the protocols that are the basis of the Internet. After this course you should have a good knowledge about Internet protocols and internetworking architecture. You should have a general knowledge aiding you in reading research and standardization documents in the area.

Learning Outcomes

Following this course a student should be able to:


Prerequisites


Contents

The course consists of 14 hours of lectures, 14 hours of recitation (övningar) and 40-100 hours of written assignment.

Lectures will be given in English. Lecture notes will be available via the course web site in advance of the relevant lecture(s).

Recitations

Recitations will be based on exercises from the main literature. Some extra recitations may be made available via the course web site.

Topics


Examination Requirements

Exam Schedule

Oral exams will be scheduled individually (if necessary).

Written report

A sample paper is:
http://www.ibiblio.org/mdma-release/http-prob.html by Simon E Spero).

Each of the sample papers below appears here by permision of the authors - the copyright belongs to the respective authors.

From IK1550 - 2009:

From 2G1305 - 2006 (4 point papers):

Note that the papers below represent papers that were done for 1 point, rather than the 4 points which the current papers are to be worth.

From 2G1305 - 2005:

From 2G1305 - 2002:

Some useful informaiton for writing your reports

Some common flaws in reports

To cite the source of a figure that you have been inspired by you can say: "Figure xxx: yyyyyyyyyyy (adapted from figure zzz of [z])"
For examples slides: 1:43 (PDF page 86), 1:72 (PDF page 115), 6:19 (PDF page 401), and 13:62 (PDF page 841). of http://www.ict.kth.se/courses/IK1550/Internetworking-2013.pdf

It is also possible to directly include figures from others but on if they have given you permission, they you say what they required you to say when they gave you permission, for example:
Figure xxx: yyyyyyyyyyy (Appears here with the permission of ZZZZ. The figure originally appeared as figure xxx on page ww of [z].)

For creative commons works, see http://creativecommons.org.au/content/attributingccmaterials.pdf and (also http://wiki.creativecommons.org/FAQ#How_do_I_properly_attribute_a_Creative_Commons_licensed_work.3F)

To help track down where a figure appears see: http://howto.wired.com/wiki/Figure_Out_Where_a_Photo_Originated

Grading

A very good paper should be either a very good review or present a new idea, while an outstanding or excellent paper should be truely innovative.

ECTS grades

If your paper is close to passing, but not at the passing level, then you will be offered the opportunity for "komplettering", i.e., students whose written paper does not pass can submit a revised version of their paper (or a completely new paper) - which will be evaluated.

Code of Honor and Regulations

It is KTH policy that there is zero tolerance for cheating, plagiarism, etc. - for details see http://www.kth.se/dokument/student/student_rights.pdf See also the KTH Ethics Policies


Literature

Main Text-Book

The course will mainly be based on the book: James F. Kurose and Keith W. Ross, Computer Networking: A Top-Down Approach, Sixth Edition, Pearson Education, 2012, ISBN-13: 9780273768968, ISBN-10 0-27376-896-4

Available from Kårbokhandeln KTH campus or in Kista. Also available from internet booksellers.

Note that there is on-line material for the 6th edition of the textbook; this includes animations and other useful material. Additional material (access requires the code from your textbook).

Differences from the 2nd edition are list on page xxxi of the 3rd edition. The most significant for this course is that the 3rd edition covers: SCTP, more about security, and more examples (using ping, netstat, etc.).

Reading guide: read the entire book.

Additional Reference Books

Supplementary readings

Every student should read: R. Bush and D. Meyer, "Some Internet Architectural Guidelines and Philosophy", Internet Request for Comments, ISSN 2070-1721, RFC 3439 (Informational), RFC Editor, December 2002.

For socket programming see:

Useful URLs

Note that ethereal is now Wireshark. For an interesting BLOG which has excellent examples of using Wireshark for network care and maintenance see Chris Sander's Blog

Shawn Ostermann's tcptrace is a very useful tool for looking at the details of TCP traffic.

Seagull - multi-protocol traffic generator


Lecture Plan and Lecture Material (OH slides)

Schedule

Note that in the following "xx" means "xx:00", not "xx:15", i.e., the lectures and recitations begin on the hour (as noted in their schedules).

The lectures notes for 2013(~9MB). These lecture notes are in PDF format.

Schedule for Period 4 2013 (see https://www.kth.se/social/course/IK1552/calendar/):

WeekDay of weekDateTimeRoomNotes
12Tuesday19 March13:00-15:00Ka-C21Lecture 1
Thursday21 March10:00-12:00Ka-C21Lecture 2
13Tuesday26 March13:00-15:00Ka-C21Lecture 3
Thursday28 March10:00-12:00Ka-C21Lecture 4
16Tuesday16 April13:00-15:00Ka-SalDLecture 5
Wednesday17 April10:00-12:00Ka-438Lecture 6
Thursday18 April13:00-15:00Ka-438Lecture 7
17Tuesday23 April13:00-15:00Ka-438Lecture 8
Wednesday24 April13:00-15:00Ka-438Lecture 9
Thursday25 April13:00-15:00Ka-438Lecture 10
18Tuesday30 April13:00-15:00Ka-438Lecture 11
Thursday2 May13:00-15:00Ka-438Lecture 12

Note that the classroom for the spring session is in the Forum building on the Kista campus.
A set of make up lectures can potentially be given for students who have a difficult time attending the above sessions.

Note also that the lectures and recitations (Övningar) are intermixed


Staff Associated with the Course


Registering

Use the normal process for registering. For most students this means you should speak with your study advisor (studievägledare).

For Industrial Economics (I) students see the program for KSI (A), year 3.


Previous versions of the course

Other on-line Course Material


Sources for Further Information


Page History

DateUpdate
2013.05.03uppdated schedule and some notes about figure captions and citations
2013.04.15added link to Netkit, host networking with Virtual Box, and uperf
2013.03.18added lecture notes for 2013
2013.03.16added information about Zotero, updated due dates for the topic and final written paper
2013.02.20added links for two DNSSEC testing tools
2013.01.10added links regarding the 6th edition of the textbook
2013.01.09added information about the 6th edition of the textbook
2013.01.07added schedule for 2013
2012.11.28added reference on covert channels using TCP/IP
2012.07.08Added Netmap Framework references and link to the project's webpage
2012.06.04first version for 2013

© Copyright 2013 G.Q.Maguire Jr. (maguire@kth.se)
All Rights Reserved.
Last modified: Fri May 3 12:02:39 CEST 2013

Valid HTML 4.01!