Description: Description: Description: U:\Personnal_Page\images\Line2.gif

ELEC 6861 - FALL 2010
HIGHER LAYER TELECOMMUNICATION PROTOCOLS

Description: Description: Description: U:\Personnal_Page\images\Line2.gif

Description: Description: Description: U:\Personnal_Page\images\boule_violette.gif  News

Description: Description: Description: U:\Personnal_Page\images\boule_violette.gif  Outline

Description: Description: Description: U:\Personnal_Page\images\boule_violette.gif  Tentative schedule and lecture notes

Description: Description: Description: U:\Personnal_Page\images\boule_violette.gif  Academic code of conduct, student responsibilities and student resources

 

Description: Description: Description: U:\Personnal_Page\images\Line2.gif

News

The project specification is available.

 

Description: Description: Description: U:\Personnal_Page\images\Line2.gif

Outline  

Logistics


Roch H. Glitho
Office: EV006-227, Tel: 1-514-8482424 ext. 5846, Email: Glitho@ciise.concordia.ca
URL: http://www.ece.concordia.ca/~glitho/
Office hours: Monday: 3 pm – 5 pm

Time:
Monday, 17h45 - 20h15

Room
 H.459


Objective
The course aims at given students a good grasp of the concepts, rules and principles related to the higher layer telecommunication protocols. Higher layer protocols are defined as the protocols above the IP layer. 


Topics  


Part I: Background information

·         Layered protocol architectures

·         Cross layered protocol architectures

·         The IP layer (IPv4/IPv6, migration strategies, mobile IP, OSPF, BGP)


Part II: Transport layer protocols

·         TCP/UDP Basics and Socket Programming

·         Wireless  Transmission Control Protocol (TCP)

·         An overview of the other transport layer protocols (e.g. Data Congestion Control Protocol – DCCP, Stream Control Transmission Protocol – SCTP, Real Time Transport Protocol – RTP)


Part III: Selected application layer protocol architectures

·         Support Infrastructure for application layer: Domain Name System (DNS) and Peer-to-Peer (P2P) Overlays

·          Electronic Mail (E-Mail) and World Wide Web (WWW)

·         Signaling for multiparty sessions

·         Network management


Prerequisites


1. ELEC 6851: Introduction to Telecommunication Networks

2. A very good programming knowledge (Java, C++ or C)


References

 

Part I

·         A. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall, 2003 (Introduction and Chapter 5)

·         S. Shakkottai, Th Rappaport and P. Karlsson, Cross Layer Design for Wireless Networks, IEEE Communications Magazine, October 2003, pp 74 – pp 80

·          V. Strivasta and M. Montani, Cross Layer Design: A Survey and The Road Ahead, IEEE Communications Magazine, December 2005, Vol. 43, Issue 12,  pp. 112 – 119

·         V. Kawadia and P.R. Kumar, A Cautionary Perspective on Cross Layer Design, IEEE Wireless Communications, February 2005, Vol. 12, Issue 1, pp. 3 - 11

·         R. Winter and al, Cross-layer Feedback Architecture for Mobile Device Protocol Stack, IEEE Communications Magazine, January 2006, Vol. 44, Issue 1, pp. 85 – 92

·         M. Tatipamula and P. Gorssetete, IPv6 Integration and Coexistence Strategies for Next Generation Networks, IEEE Communications Magazine, January 2004

·         A. Salkintzis, editor, Mobile Internet – Enabling Technologies and Services, Chapter 5,CRC Press 2004



Part II 

·         A. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall, 2003 (Chapter 6)

·          K. Pentikousis, TCP in Wired-Cum-Wireless Environments, IEEE Communications Surveys and Tutorials, Vol.3, No4, Fourth Quarter 2000

·         K.-C Leung and V. O. Li, Transmission Control Protocol (TCP) in Wireless Networks: Issues, Approaches and Challenges, IEEE Communications Surveys and Tutorials, Fourth Quarter 2006

·         Y-C Lai, DCCP: Transport Protocol with Congestion Control and Unreliability, IEEE Internet Computing, September – October 2008, Vol. 12, Issue 5. pp. 78 – 83

·         A.L. Caro et al., SCTP : A Proposed Standard for Robust Internet Data Transfer, IEEE Computer, November 2003

·         S. Fu and M. Atiquzzaman, State of the Art in Research, Products and Technical Challenges, IEEE Communications Magazine, April 2004, Vol. 42, Issue 4, pp. 64 – 76

·         P. Natarajan et al., SCTP: What, Why and How, IEEE Internet Computing, September/October 2009


Part III

·         A. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall, 2003 (Chapters 7 and 8)

·         P.V. Mockapetris and K.J. Dunlap, Development of the Domain Name System (DNS), ACM SIGCOMM Computer Communication Review 1995

·         P.V. Mouckapetris, RFC 1034 and RFC 1035, November 1987

·         V. Ramasubramanian and E. G. Sirer, The Design and Implementation of a Next Generation Name Service for the Internet, SIGCOMM’04

·         E.K. Lua et al., A Survey and Comparison of Peer to Peer Overlay Networks, IEEE Communications Surveys & Tutorials, March 2004

·         I. Stoica et al., Chord: A scalable Peer to Peer Look Up Protocol for Internet Applications, IEEE/ACM Transactions On Networking, 2003

·         I. Clarke et al., Protecting Free Expression On-Line with Freenet, IEEE Internet Computing, January/February 2002

·         S. Baset and H. Schulzrinne, An Analysis of the Skype Peer to Peer Internet Telephony Protocol, IEEE Infocom 2006

·         L. Gong, JXTA: A Network Programming Environment, IEEE Internet Computing, 2001

·         A. R. Modarressi and S. Mohan, guest editors, Advanced Signaling and Control in Next Generation Networks, Special issue, IEEE Communications Magazine, October 2000, Vol.38, No10

·         Y Yemini, The OSI Network Management Model, IEEE Communications Magazine, May 1993, Vol. 31, Issue 5, pp 20-29

·         W. Stallings, SNMPv3: A Security Enhancement to SNMP, IEEE Communications Surveys and Tutorials, Vol. 1, No. 1, Fourth Quarter 2008

·         A. Pras and al., Key Research Challenges in Network Management, IEEE Communications Magazine, October 2007, Vol. 45, Issue 10, pp. 104 – 110

·         B. Jennings, Towards Autonomic Management of Communications Networks, Communications Magazine, October 2007, Vol. 45, Issue 10, pp. 112 – 121

Evaluation scheme

There will be two quizzes and a semester long project. The quizzes are closed book. The grading scheme is as follows.

·         Quiz #1: 30 % (Scheduled for week #7 – October 18)

·         Quiz #2: 30 % (Scheduled for week #14 – December 6)

·         Semester long project: 40% (Report and demos scheduled for Week #14 – December 9)

 

 Tentative schedule and lecture notes

Weeks

TOPICS / LECTURES NOTES

EVENTS

Week #1

(September  6 - 10)

 No lecture

University closed on Monday, September 6 (Labor day)

Week #2

(September 13 - 17)

Layered protocol architectures
Cross layered protocol architectures

Week #3

(September  20-24)

Network layer

 

 

Week #4

(September 27  – October 1)

TCP / UDP Basics

Socket programming



Week #5

(October 4 - 8)

 

Network layer (Continuation)

Socket programming (Continuation)

 



 

 

Project specification

Week #6

(October 11 - 15)

No lecture

 University closed on October 12 (Thanksgivings)

Week #7

October 18 - 22)

Quiz #1


Week 8

(October 25- 29)

Addendum to network layer

 

Wireless TCP

An Overview of the other Transport Protocols (e.g. DCCP, SCTP, RTP)

 

 



Week 9
 (November 1 - 5)

Support Infrastructure for Application Layer:

-          Domain Name System (DNS)

-           Peer to peer Overlays
 

Week #10
(November  8 - 12)

Session Initiation Protocol for Multimedia Session



 

 
 

Week 11

(November 15 - 19)

 
Electronic mail protocols

  

 

Week 12
(November 22 - 27)

World Wide Web

  

Weeks 13
(November 29  - December 3)

    Quiz 2

Week #14
(December 6 - 10)

     

     Project report + demos

No lecture

 

   

 

 

Description: Description: Description: U:\Personnal_Page\images\Line2.gif

Academic Code of Conduct, Student responsibilities and Student resources

Academic Code of Conduct

 

Academic Integrity

 

Any form of cheating, plagiarism, personation, falsification of a document as well as any other form of dishonest behaviour related to the obtention of academic gain or the avoidance of evaluative exercises committed by a student is an academic offence under the Academic Code of Conduct and may lead to severe penalties up to and including suspension and expulsion.

As examples only, you are not permitted to:

You are subject to the Academic Code of Conduct. Take the time to learn more at http://provost.concordia.ca/academicintegrity/

 Student’s Responsibilities

 

·         Students are expected to attend every class. Some material may only be covered in class and not made available on the course website. Students are expected to read the assigned material and to actively participate in class discussions.

·         Students are expected to be respectful of other people’s opinions and to express their own views in a calm and reasonable way. Disruptive behaviour will not be tolerated.

·         Students are expected to be familiar with the Code of Rights and Responsibilities: http://rights.concordia.ca

·         If you cannot attend class for any reason, unforeseen or not, you are to come and talk or write to me as soon as possible.

 

 

9. Student Services

 

·         Concordia Counselling and Development offers career services, psychological services, student learning services, etc.

       http://cdev.concordia.ca

·         The Concordia Library Citation and Cycle Guides:    http://library.concordia.ca/help/howto/citations.html

·         Advocacy and Support Services:

       http://supportservices.concordia.ca

·         Student Transition Centre:

      http://stc.concordia.ca

·         New Student Program:

      http://newstudent.concordia.ca

·         Office for Students with Disabilities:

      http://supportservices.concordia.ca/disabilities/

·         The Academic Integrity Website: 

      http://provost.concordia.ca/academicintegrity/