/
http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm

http://www.cse.wustl.edu/~jain/talks/iucee11.htm - PDF document

faustina-dinatale
faustina-dinatale . @faustina-dinatale
Follow
389 views
Uploaded On 2016-02-04

http://www.cse.wustl.edu/~jain/talks/iucee11.htm - PPT Presentation

httpwwwcsewustledujaintalksiucee11htm OverviewOverviewWhy study Computer Networking2What are the key challenging research topics3What is our group working on4Goal This talk is design ID: 222875

http://www.cse.wustl.edu/~jain/talks/iucee11.htm OverviewOverviewWhy study Computer Networking?2.What are

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "http://www.cse.wustl.edu/~jain/talks/iuc..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm OverviewOverviewWhy study Computer Networking?2.What are the key challenging research topics?3.What is our group working on?4.Goal: This talk is designed to introduce undergraduate students to Computer networking, wireless, and network security research http://www.cse.wustl.edu/~jain/talks/iucee11.htmNetworking is the “plumbing”of computing http://www.cse.wustl.edu/~jain/talks/iucee11.htm Virtual reality will satisfy your needs forNo need to get out for http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm Internet Protocol (IP) Addresses, e.g., 128.23.45.56]Phishing: Enter personal information on fake websitesCyber warfare http://www.cse.wustl.edu/~jain/talks/iucee11.htm Emails from banks and financial services leading to fake websites, e.g., http://www.bankofamerica.com public wireless”service. Can grab passwords. http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm “Indian Cyber Army”attacked Pakistani Army”attacked Indian Central Bureau of http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htmet optimized for data centers http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm Telco Core Point to PointBase StationBase StationMobile Station Fixed Mobile Station (Rural Areas)Metropolitan HighMetropolitan High--Speed WirelessSpeed WirelessBest of WiFi + Cellular http://www.cse.wustl.edu/~jain/talks/iucee11.htm Up to 70 Mbps.Data rate vs Distance trade off w adaptive modulation. High rate near the tower. Lower as distance increases1 Gb/s in the next generation http://www.cse.wustl.edu/~jain/talks/iucee11.htm Cavemen of 2050Cavemen of 2050 http://www.cse.wustl.edu/~jain/talks/iucee11.htm http://www.cse.wustl.edu/~jain/talks/iucee11.htm“clean-slate”design http://www.cse.wustl.edu/~jain/talks/iucee11.htm SummarySummaryComputer networking is the backbone of all computing Cyber age2.Key Issues: Security, Mobility, Energy, datacenters3.Wireless is the major source of carrier revenue Significant growth in Wireless networking4.Working on gigabit wireless technologies, Aeronautical wireless, and next generation Internet http://www.cse.wustl.edu/~jain/talks/iucee11.htm CSE 571S: Network Security, http://www.cse.wustl.edu/~jain/cse571-09/index.html CSE 574S: Wireless Networks, http://www.cse.wustl.edu/~jain/cse574-10/index.html CSE 567: Computer Systems Analysishttp://www.cse.wustl.edu/~jain/cse567-11/index.html