Projects DCC10e
Projects DCC10e
WILLIAM STALLINGS
-2-
TABLE OF CONTENTS
-3-
Unless otherwise noted, all the folders and documents referenced in this
manual are at the password-protected online Instructors Resource Center
(IRC) for this books.
-4-
• AnimationAssignments contains 17 documents, each containing the
instructions for the student for one of the animations.
• AnimationAnswers contains expected answers to be provided by the
student.
Chapter 8 Multiplexing
Multiplexing
Chapter 12 Ethernet
CSMA/CD
-5-
PART TWO PRACTICAL EXERCISES
The IRC includes Web pages that provide a set of practical exercises for an
introduction to the use of IP over a LAN. The exercises follow one another
naturally; each exercise builds on the experience of the previous exercises.
They do not however need to be attempted one after another. The four
exercises may more easily be done on four separate occasions. The practical
exercises are designed to help the student understand the operation of an
Ethernet LAN and an IP network. The exercises involve using simple network
commands available on most computers. About an hour is needed to
perform all four exercises. The exercises cover the following topics: your
own network connection, computers on your LAN, computers on remote
networks, and the Internet.
This set of exercises assumes that student has access to a computer
connected to an Ethernet LAN, which in turn is connected to the Internet.
The exercises are contained in the folder Practical-Exercises in the IRC. To
use, simply upload the entire folder to your Web site and provide students to
a link to the index.html page.
The exercises were developed by Gorry Fairhurst - Department of
Engineering, University of Aberdeen, Scotland. You can either load
-6-
PART THREE SOCKETS PROGRAMMING
PROJECTS
The book includes a description of Sockets programming in Chapter 2. The
IRC includes a set of programming projects. Sockets programming is an
"easy" topic and one that can result in very satisfying hands-on projects for
students. The folder SocketsProjects contains a list of programming
projects to be assigned, together with one possible C solution for each
project.
-7-
PART FOUR WIRESHARK PROGRAMMING
PROJECTS
Wireshark, formerly known as Ethereal, is used by network professionals
around the world for troubleshooting, analysis, software and protocol
development, and education. It has all of the standard features you would
expect in a protocol analyzer, and several features not seen in any other
product. Its open source license allows talented experts in the networking
community to add enhancements. It runs on all popular computing
platforms, including UNIX, Linux, Mac, and Windows.
Wireshark is ideal for allowing students to study the behavior of
protocols, not only because of its many features and multiplatform
capability, but also because students may subsequently use Wireshark in
their professional life.
The IRC includes a Student User's Manual and a set of project
assignments for Wireshark created specifically for use with Data and
Computer Communications. All files are in the folder
WiresharkExerciseSet.
There is also a very useful video tutorial that introduces the student to
the use of Wireshark. The tutorial is available in a variety of formats in the
folder WiresharkVideoTutorial.
-8-
PART FIVE SIMULATION PROJECTS
An excellent way to obtain a grasp of the operation of communication
protocols and network configurations, and to study and appreciate some of
the design tradeoffs and performance implications, is by simulating key
elements. A tool that is useful for this purpose is cnet.
Compared to actual hardware/software implementation, simulation
provides two advantages for both research and educational use:
-10-
PART SEVEN RESEARCH PROJECTS
A suggested project assignment form is available in the document
ProjectForm in the folder ResearchProjects. The form includes guidelines
for a final report and a set of slides. If the deliverable is slides, class time
should be set aside for each team to present its results.
If projects are assigned to teams rather than individuals, problems can
arise. A paper on this subject, in the document Team.doc included in the
folder ResearchProjects, might be useful to the instructor.
The research project will typically involve a web/library search and
analysis. It could also involve some implementation or measurement. Typical
questions that could be addressed with reference to technology X:
• What is X?
• What Standard governs X?
• How is X implemented?
• What is the cost of implementation?
• What companies are currently involved in this line of business?
-11-
Address Resolution (finding a path to Gigabit Token Ring
an address)
Analyzing the combination of TCP Group Work applied to Information
and ATM flow control. Systems
Asymmetric Digital Subscriber Lines HDTV
Audio transmission on a variable bit- High bit-rate applications - MPEG
rate channel. Echo control etc. encoding of video streams video
conferencing etc.
Automated Error Recovery Integrating Network Management
Information
Automated Network Management LAN Management
Systems
Broadband ISDN Mobile Computer Communication
Services
Call setup protocols Narrowband ISDN
Comparison of Rate-Based and EFCI Network Management - performance
flow control in ATM ABR schemes fault configuration accounting
security what needs to change for
higher bandwidths.
Congestion Control Network Management Protocols
Digital Voice Technologies Network Planning Modeling Computer
Networks
Encryption - fast hashing algorithms Performance Evaluation of High
adapt encryption to high bandwidth Speed Multiaccess Networks
Expert Systems in Network Real-Time Networks Embedded
Management Computer Systems and
Synchronizing real time flows (audio
and video)
Fiber Optics Technologies Traffic models - internal buffer size
requirements fractal modeling of data
traffic M/M/1 or M/D/1 queuing
models may not be sufficient for
data.
Firewalls Voice over IP
Gigabit Ethernet WWW filter/active agent
-12-
Group Course Project: There will be a group "research" project to examine the state of the art
and practice of major companies that provide services and products to the data communications,
networking and distributed processing application communities. Groups will be formed during
the first class session. You should attempt to form a "balanced" group consisting of technical as
well as management-oriented students. You will work together to research a company, determine
the company’s market niche, assess their strategic vision, evaluate their products as per the topics
to be discussed in this course, and present a short paper and PowerPoint presentation to the class.
Each group will establish a Home Page that will be linked to our course Web site.
Your group may take a technical focus of a particular technology and survey those companies
providing that technology, or you may focus on a particular company, such as: Nortel-Bay
Networks, CISCO, FORTH, 3COM, HP, Hughes Direct TV,
AT&T, MCI, Worldcom, Sprint, Microsoft, Netscape, Portals on the Web (AOL, Yahoo!, Lycos,
Snap), Internet-based Marketeers, Network and Communication Systems Integration Firms,
Application of Communication Technology in Business, Electronic Commerce, etc.
-13-
PART EIGHT READING/REPORT
ASSIGNMENTS
Many professors like to assign papers for the students to review; this helps
to keep them aware that data and computer communications is a changing
field, and that the now-accepted wisdom was once un-formulated. I've
suggested some papers organized chapter, but there are many more good
ones.
The following is a suggested assignment wording:
Read and report on the following papers from the research literature. Your
report should be one to two pages long; three-quarters of the report should
summarize the paper, and one-quarter of the report should be a critique.
Introduce your report with a formal citation of the paper, using the format
found in the References section of the textbook.
You might also suggest to your students that they follow a format
roughly similar to that found at the Treasure Trove of Paper Summaries.
There is a link from my Computer Science Student Resource Site at
http://www.computersciencestudent.com) under the Other Useful tab. Of
course, then you must check that they don't use one of the online
summaries!
The suggested papers are in the document DCC10eReading.doc included
in the IRC. All of the papers listed in this document are in the folder
DCC10ePapers at box.com/DCC10e.
-14-
PART NINE WRITING ASSIGNMENTS
Writing assignments can have a powerful multiplier effect in the learning
process in a technical discipline such as cryptography and network security.
Adherents of the Writing Across the Curriculum (WAC) movement
(http://wac.colostate.edu/) report substantial benefits of writing
assignments in facilitating learning. Writing assignments lead to more
detailed and complete thinking about a particular topic. In addition, writing
assignments help to overcome the tendency of students to pursue a subject
with a minimum of personal engagement, just learning facts and problem-
solving techniques without obtaining a deep understanding of the subject
matter.
The suggested assignments are in the document DCC10eWriting.doc,
organized by chapter. Instructors may ultimately find that this is the most
important part of their approach to teaching the material. I would greatly
appreciate any feedback on this area and any suggestions for additional
writing assignments.
The following suggestions for using a variety of writing assignments are
taken from "Writing Assignments: Pathways to Connections, Clarity,
Creativity", R. Brent and R. Felder, College Teaching, 40(1), 1992.
• Don’t set out to do it all at once. Start by trying one or two of the
suggested assignments that appeal to you; then gradually add new ones
to an extent that seems appropriate and comfortable.
• Clearly relate the assignments to the course content, and be sure
students understand the connections.
• When you decide to use a particular type of assignment (e.g.,
brainstorming, critical question generation, problem formulation), try it
-15-
at least three times. The first time that you ask students to do
something unfamiliar they are likely to ignore you, as though not
believing anyone could want them to do anything that bizarre. The
second time they will take the assignment seriously, but many will miss
the point. By the third time, you will start to see the sought-after
results.
• All of the given writing exercises may be completed in or out of class. In
either case, set aside class time for brief sharing and discussion of the
responses in groups of three to five. Such discussions expose the
students to a wider variety of ideas than most could have thought of
individually and reduce or eliminate the need for the instructor to read
and critique all the papers.
• Many of the suggested assignments require no feedback from the
instructor; the process is more important than the product. But for
those assignments that do result in a product (make up a problem,
develop critical questions), make sure that the students get constructive
feedback on their initial efforts, including suggestions on how they could
have done it better.
• The feedback may come from you (initially it will have to), but the
students may also provide it to one another after they have gained
some experience and understand the object of the exercise.
• Ask students to evaluate particular assignments and the writing
experience as a whole. Make changes in assignments that do not seem
to be accomplishing their objectives.
• Write articles about assignments that work particularly well so that
other teachers can get the benefit of your experience.
Some useful articles that give guidelines in this area are contained in the
folder WritingArticles.
-16-
PART TEN DISCUSSION TOPICS
One way to provide a collaborative experience is discussion topics. Each
topic relates to material in the book. The instructor can set it up so that
students can discuss a topic either in a class setting, an online chat room, or
a message board. Again, I would greatly appreciate any feedback on this
area and any suggestions for additional discussion topics.
The following are suggested discussion topics.
References:
-18-