个人介绍
《高级计算机网络》(研究生课程) 杭州电子科技大学

主讲教师:徐明

课程全面介绍了计算机网络技术领域中重要的理论和实践问题,主要内容围绕网络体系结构中的核心机制和算法展开,具体包括地址、交换与转发、路由、可靠性机制、流量与拥塞控制和网络安全等计算机网络工程领域的核心技术及其实现,还介绍了IP V6、P2P和SND新型网络形态以及新一代互联网的研究。 计算机网络是人类创造的最重要和最有影响力的技术之一。本课程将学生了解和掌握最新的计算机网络技术。了解计算机网络的发展现状和趋势,掌握构建高度健壮、高效、灵活、安全的计算机网络系统的理论和方法。结合算机网络原理和技术,注重难点和重点的讨论。使学生深刻理解计算机网络运行的机理,具备对计算机网络原理进行分析的基本能力,具备对应用层协议进行开发的基本能力,为后续网络空间安全领域的研究和实际工作打下良好的基础。同时,增强学生在网络空间中的法律意识,树立正确的网络道德观,增强学生的理论自信和文化自信,培养在网络空间输出中国文化的生力军,注重对学生在网络应用、网络创新等方面的正确引导,为我国网络空间竞争培养高级创新型型人才。
学校: 杭州电子科技大学
开课院系: 网络空间安全学院(浙江保密学院)
课程编号: Z127001

研究生《 高级计算机网络 》课程教学大纲

一、基本信息

1.课程中文名称:高级计算机网络

2.课程英文名称: Advanced Computer Network

3.课程编号: Z127001

4.课程类别: 学位课程  □公共学位课  专业学位课 

选修课程  □公共选修课  □专业选修课

5.开课单位:  网络空间安全学院

6.课程负责人:  徐明

7.开课学期: □春季    秋季    □全年

8.课程学分:  3

9.课内学时: 48

10.适用学生: □硕士  □博士  硕博          □ 非全日制    □ 留学生

11.适用学科/专业: 网络空间安全、计算机科学与技术

12.授课语言:  □中文    □全英文    双语

13.课程网址: https://mooc1.chaoxing.com/course/200162231.html

14.预修课程: 计算机网络


二、课程中文简介

课程全面介绍了计算机网络技术领域中重要的理论和实践问题,主要内容围绕网络体系结构中的核心机制和算法展开,具体包括地址、交换与转发、路由、可靠性机制、流量与拥塞控制和网络安全等计算机网络工程领域的核心技术及其实现,还介绍了IP V6、P2P和SND新型网络形态以及新一代互联网的研究。



三、课程英文简介

The course comprehensively introduces important theoretical and practical issues in the field of computer network technology. The main content focuses on the core mechanisms, algorithms, and realization in the field of computer network engineering, including addressing, switching and forwarding, routing, reliability and security mechanisms, flow and congestion control, also introduced the research of security IP V6, P2P and SND new network forms and the new generation of network.


四、课程目标

计算机网络是人类创造的最重要和最有影响力的技术之一。本课程将学生了解和掌握最新的计算机网络技术。了解计算机网络的发展现状和趋势,掌握构建高度健壮、高效、灵活、安全的计算机网络系统的理论和方法。结合算机网络原理和技术,注重难点和重点的讨论。使学生深刻理解计算机网络运行的机理,具备对计算机网络原理进行分析的基本能力,具备对应用层协议进行开发的基本能力,为后续网络空间安全领域的研究和实际工作打下良好的基础。同时,增强学生在网络空间中的法律意识,树立正确的网络道德观,增强学生的理论自信和文化自信,培养在网络空间输出中国文化的生力军,注重对学生在网络应用、网络创新等方面的正确引导,为我国网络空间竞争培养高级创新型型人才。


五、教学内容

第一章 Internet技术发展史

主要内容: Internet的历史和发展趋势,TCP/IP、包交换等技术产生的背景和要解决的核心问题。

教学方法与要求: 课堂教学与线上学习相结合的方式。要求了解Internet的历史和发展趋势,掌握Intenet中TCP/IP、包交换等技术产生的背景和要解决的核心问题。

重点内容:TCP/IP,包交换技术的发展史。

难点内容:TCP/IP,包交换技术出现的根源及其核心问题。

思政融入途径:在介绍因特网的现状时挖掘我国互联网时代的新四大发明这一体现中华先进文化的成功案例,增强学生的文化自信和理论自信。


第二章 网络框架和挑战

主要内容:计算机网络体系结构的分层思想、OSI模型和TCP/IP模型;计算机网络中面临的主要技术挑战和问题。

教学方法与要求: 课堂教学与线上学习相结合的方式。要求计算机网络体系结构的分层思想、OSI模型和TCP/IP模型;计算机网络中面临的主要技术挑战和问题。

重点内容:计算机网络体系结构的分层思想、TCP/IP模型。

难点内容:理解计算机网络中面临的主要技术挑战和问题。

第三章 拥塞控制

主要内容:拥塞控制的原理, TCP拥塞控制机制;拥塞控制新技术。

教学方法与要求: 课堂教学与线上学习相结合的方式。掌握拥塞控制的原理,掌握TCP拥塞控制机制;了解拥塞控制新技术。

重点内容:拥塞控制原理。

难点内容:TCP拥塞控制机制。

思政融入途径:在介绍网络拥塞的时候结合辨证唯物主义的普遍联系、质变和量变、矛盾等核心理念,加深学生对辨证唯物主义的认知。

第四章 可靠性

主要内容:协议的可靠性原理,TCP可靠性机制;可靠性的新技术。

教学方法与要求: 课堂教学与线上学习相结合的方式。掌握协议的可靠性原理,掌握TCP可靠性机制;了解可靠性的新技术。

重点内容:可靠性的基本原理。

难点内容:TCP可靠性机制。

第五章 路由

主要内容:路由基本的原理,IP路由机制;路由的新技术。

教学方法与要求: 课堂教学与线上学习相结合的方式。掌握路由基本的原理,掌握IP路由机制;了解路由的新技术。

重点内容:路由的基本原理。

难点内容:IP路由机制。

第六章 P2P

主要内容:P2P技术的原理,典型的P2P网络技术。

教学方法与要求: 课堂教学与线上学习相结合的方式。掌握P2P技术的原理,了解典型的P2P网络技术。

重点内容:P2P基本原理。

难点内容:NAT穿透技术、P2P分布式管理技术和P2P 流量优化技术等。

第七章 云计算

主要内容:云计算的基本原理,云计算服务形式和云安全技术。

教学方法与要求:课堂教学与线上学习相结合的方式。掌握云计算的基本原理,了解云计算服务形式和云安全技术。

重点内容:云计算的基本原理。

难点内容:虚拟化技术、用户隔离技术。

第八章 SDN

主要内容:SND产生背景、定义和架构,SND基本原理和OpenFlow协议。

教学方法与要求:课堂教学与线上学习相结合的方式。了解SND产生背景、定义和架构,掌握SND基本原理和OpenFlow协议。

重点内容:SND的基本原理。

难点内容:网络功能虚拟化。

思政融入途径:要求学生了解软件定义网络及项目开发案例,加深学生工程实践能力和创新思维、创新能力的培养。


第九章 CDN

主要内容:CDN产生背景、定义和架构,CND基本原理和OpenFlow协议。

教学方法与要求:课堂教学与线上学习相结合的方式。了解CDN产生背景、定义和架构,掌握CND基本原理和OpenFlow协议。

重点内容:CND的基本原理。

难点内容:OpenFlow协议。

第十章 区块链技术

主要内容:区块链技术产生背景、定义和架构,比特币的基本原理。

教学方法与要求:课堂教学与线上学习相结合的方式。了解区块链技术产生背景、定义和架构,掌握比特币的基本原理。

重点内容:比特币的基本原理。

难点内容:交易(Transaction)、区块(Block)和链的概念。

第十一章 网络安全

主要内容:DDoS、僵尸网络、隐私和匿名网络的概念和基本原理。

教学方法与要求:课堂教学与线上学习相结合的方式。了解并掌握DDoS、僵尸网络、隐私和匿名网络的概念和基本原理。

重点内容:DDoS、僵尸网络、隐私和匿名网络的基本原理。

难点内容:隐私和匿名的实现机制。

思政融入途径:在介绍网络安全的时候开展一个网络道德的主题讨论,通过以学生为中心的自我学习加强学生网络道德观的培养。 


2.学时分配表

教  学  内  容 讲课时数 实验时数 实践学时 课内上机时数 课外上机时数 自学时数 习题课 讨论时数

Internet技术发展史 3 1

网络技术框架和挑战 3 1

拥塞控制 3 3 2 1

可靠性 6 6 2 1

路由 3 3

P2P 3 3

云计算 3 3

SDN(Software Defined Networks)

3 3

CDN(Content Delivery Network)

3 3

区块链技术 3 3

网络安全 3 3 2 1

总            计 48+32


六、考核方式及成绩评定方法

1.考核方式

考试:  □√闭卷    □开卷    □笔试   □口试   □口试+笔试  

考查:  □课堂作业 □课程论文  □调研报告  □实践报告  其它              

注:学位课必须采用考试方式,采用百分制。


2.成绩评定方式

成绩评定为:□√百分制 五级记分制,其中平时成绩占30%,期末考核成绩占70%。

通过小组讨论、案例研讨等课堂活动,考查思政教育的教学效果,占平时成绩的20%。

注:学位课必须采用考试方式,采用百分制,且平时成绩至多占30%、期末考核成绩至少占70%。

七、教材、主要参考书目和资料

1. 教材:无

2. 参考书:

[1] Peterson and Davie, Computer Networks

[2] Tanenbaum, Computer Networks

[3] Kurose and Ross, Computer Networking: A Top-Down Approach

[4] R. Srikant and Lei Ying, Communication Networks An Optimization, Control and Stochastic Networks Perspective 

[5] S. Keshav, Mathematical Foundations of Computer Networking










撰写人:    徐明           

                                                  2017年09月 01日



                            学科/专业学位点负责人:             

年   月   日



Course Syllabus

Course Name:Advanced Computer Network  

Course Code:Z127001

Type: □ Common Degree Course     □√Specialized Degree Course   

       □Specialized Elective Course   □Common Elective Course

School:School of Cyberspace Security

Instructor:Ming XU, etc.

Credits: professor

Total Class Hours: professor

Specialty:cyberspace security,computer science and technology

Prerequisites:


I. Introduction:

The course comprehensively introduces important theoretical and practical issues in the field of computer network technology. The main content focuses on the core mechanisms, algorithms, and realization in the field of computer network engineering, including addressing, switching and forwarding, routing, reliability and security mechanisms, flow and congestion control, also introduced the research of security IP V6, P2P and SND new network forms and the new generation of network.

II. Objectives and Requirements:

Computer network is one of the most important and influential technologies created by mankind. This course will enable students to understand and master the latest computer network technology. Understand the development status and trends of computer networks, and master the theories and methods for constructing a highly robust, efficient, flexible and secure computer network system. Combining computer network principles and technology, focusing on the discussion of difficulties and key points make students have a deep understanding of the operation mechanism of computer networks, have the basic ability to analyze computer network principles, and have the basic ability to develop application layer protocols, and lay a good foundation for subsequent research and practical work in the field of cyberspace security. At the same time, strengthen students’ legal awareness in cyberspace, establish correct cyber ethics, enhance students’ theoretical and cultural confidence, cultivate new forces for exporting Chinese culture in cyberspace, and focus on students’ efforts in network applications and network innovation. Correct guidance to cultivate advanced innovative talents for the competition in my country's cyberspace.

.

III. Contents and Arrangements:

Chapter One: The History of Internet Technology Development

Main content: The history and development trend of the Internet, the background of TCP/IP, packet switching and other technologies and the core issues to be solved.

Teaching methods and requirements: a combination of classroom teaching and online learning. It is required to understand the history and development trend of the Internet, and master the background of TCP/IP, packet switching and other technologies in the Internet and the core problems to be solved.

Key content: TCP/IP, the development history of packet switching technology.

Difficulty content: TCP/IP, the root causes and core problems of packet switching technology.

Ideological and political integration approach: When introducing the current situation of the Internet, we will discover the four new inventions of the Internet era in my country, which are successful cases that reflect the advanced Chinese culture, and enhance the cultural and theoretical confidence of students.


Chapter 2: Network Framework and Challenges

Main content: The layered thinking of computer network architecture, OSI model and TCP/IP model; the main technical challenges and problems faced by computer networks.

Teaching methods and requirements: a combination of classroom teaching and online learning. The layered thinking, OSI model and TCP/IP model of computer network architecture are required; the main technical challenges and problems faced by computer networks.

Key content: layered thinking of computer network architecture, TCP/IP model.

Difficulty content: understand the main technical challenges and problems facing computer networks.


Chapter 3: Congestion Control 

Main content: the principle of congestion control, TCP congestion control mechanism; new technology of congestion control. 

Teaching methods and requirements: a combination of classroom teaching and online learning. Grasp the principles of congestion control, master TCP congestion control mechanism; understand new congestion control technologies. 

Key content: Principles of congestion control. 

Difficulty content: TCP congestion control mechanism. 

Ideological and political integration approach: When introducing network congestion, it combines the core concepts of dialectical materialism such as universal connection, qualitative change and quantitative change, and contradiction to deepen students' cognition of dialectical materialism.


Chapter 4: Reliability 

Main content: the reliability principle of the protocol, TCP reliability mechanism; new reliability technology. 

Teaching methods and requirements: a combination of classroom teaching and online learning. Master the reliability principle of the protocol, master the TCP reliability mechanism; understand the new reliability technology. 

Key content: the basic principles of reliability. 

Difficulty content: TCP reliability mechanism.



Chapter 5: Routing

Main content: basic principles of routing, IP routing mechanism; new routing technology.

Teaching methods and requirements: a combination of classroom teaching and online learning. Grasp the basic principles of routing, master the IP routing mechanism; understand the new routing technology.

Key content: the basic principles of routing.

Difficult content: IP routing mechanism.


Chapter 6: P2P

Main content: Principles of P2P technology, typical P2P network technology.

Teaching methods and requirements: a combination of classroom teaching and online learning. Grasp the principles of P2P technology and understand typical P2P network technology.

Key content: P2P basic principles.

Difficulties: NAT penetration technology, P2P distributed management technology and P2P traffic optimization technology, etc.


Chapter 7: Cloud Computing

Main content: basic principles of cloud computing, cloud computing service form and cloud security technology.

Teaching methods and requirements: a combination of classroom teaching and online learning. Grasp the basic principles of cloud computing, understand cloud computing service forms and cloud security technology.

Key content: the basic principles of cloud computing.

Difficulty content: virtualization technology, user isolation technology.


Chapter 8: SDN

Main content: SND generation background, definition and architecture, SND basic principles and OpenFlow protocol.

Teaching methods and requirements: a combination of classroom teaching and online learning. Understand the background, definition and architecture of SND, master the basic principles of SND and the OpenFlow protocol.

Key content: the basic principles of SND.

Difficulty content: network function virtualization.

Ideological and political integration approach: Students are required to understand software-defined networks and project development cases to deepen the cultivation of students' engineering practice ability, innovative thinking and innovative ability.


Chapter 9: CDN

Main content: CDN production background, definition and architecture, CND basic principles and OpenFlow protocol.

Teaching methods and requirements: a combination of classroom teaching and online learning. Understand the background, definition and architecture of CDN, and master the basic principles of CND and OpenFlow protocol.

Key content: the basic principles of CND.

Difficulty content: OpenFlow protocol.


Chapter 10: Blockchain Technology

Main content: The background, definition and structure of blockchain technology, and the basic principles of Bitcoin.

Teaching methods and requirements: a combination of classroom teaching and online learning. Understand the background, definition and architecture of blockchain technology, and master the basic principles of Bitcoin.

Key content: The basic principles of Bitcoin.

Difficulty content: the concepts of transaction, block and chain.


Chapter 11: Network Security

Main content: the concepts and basic principles of DDoS, botnets, privacy and anonymous networks.

Teaching methods and requirements: a combination of classroom teaching and online learning. Understand and master the concepts and basic principles of DDoS, botnets, privacy and anonymous networks.

Key content: the basic principles of DDoS, botnets, privacy and anonymous networks.

Difficult content: the realization mechanism of privacy and anonymity.

Ideological and political integration approach: When introducing network security, we will start a discussion on the topic of network ethics, and strengthen the cultivation of students' network ethics through student-centered self-study.


IV. Course Assessment 

Assessment methods: Closed book exam

Assessment criteria: The score evaluation is:√100-point system, in which 30% of the usual scores and 70% of the final assessment scores. 

Through group discussions, case studies and other classroom activities, the teaching effect of ideological and political education is tested, which accounts for 20% of the usual grades.

V. Teaching Materials and Reference Books:

There is no required textbook. If you haven't taken an undergraduate networking course, or if you need a refresher, you might take a look at standard books such as

[1] Peterson and Davie, Computer Networks

[2] Tanenbaum, Computer Networks

[3] Kurose and Ross, Computer Networking: A Top-Down Approach

There are two recent graduate-level books focusing on mathematical aspects of networking:

[4] R. Srikant and Lei Ying, Communication Networks An Optimization, Control and Stochastic Networks Perspective (draft available free online)

[5] S. Keshav, Mathematical Foundations of Computer Networking


Written by:Ming XU 

Reviewed by:   


提示框
取消 进入课程
提示框
确定要报名此课程吗?
确定取消

京ICP备10040544号-2

京公网安备 11010802021885号