CSCI 2110CSCI 2132STAT 2060
Apply the concept of Expected values to real world problems. [STAT 2060] Describe basic programming concepts, object orientation and procedural units. [INFX 1616] Describe the concept of variance and jitter. [STAT 2060] Describe the shapes and parameters of the following distributions: Poisson, exponential and uniform. [STAT 2060] Evaluate expressions of Modular arithmetics. [CSCI 2112] Describe the fundamental concepts in TCP/IP networks, including: the IP address scheme, subnets and net masks, routing, and ports. [INFX 2601] Write a reasonably-complex (200-250 line) modular procedural program. [CSCI 1100] Implement moderately complex programs in C. [CSCI 2132] Implement the map, dictionary, and set ADTs using lists, binary search trees, and hash tables. [CSCI 2110]
Explain and apply the mechanisms for reliable data transfer in the presence of non-malicious network errors.Explain network performance in terms of delay, throughput, and loss, as informed by M/M/1 queuing theory models of the network.Identify the elements of network infrastructure, both in the network edge and the network core.Estimate network delay and congestion using M/M/1 queuing theory equations.Explain the responsibilities of the layers in the OSI and TCP/IP stacks.Select an appropriate architecture for a network application, particularly from among client-server, peer-to-peer, and hybrid systems.Explain the operation of the HTTP, FTP, DNS, SMTP, POP3, IMAP, and MIME protocols.Explain the operation of UDP.Identify the structure in the address organization at each layer of the TCP/IP stack.Analyze pros and cons of packet switching and circuit switching technologies.Explain the operation of TCP relative to basic operations, reliable data transfer, flow control, and congestion control.Explain the steps and trade-offs involved in error detection.Recognize and integrate features of HTTP, FTP, SMTP, and DNS in other network interactions.Use sockets to establish exchange data between processes.Explain how peer-to-peer systems, particularly those based on distributed hash tables, locate and exchange resources.Select deployments of symmetric and asymmetric encryption to provide data confidentiality, data integrity, and non-repudiation in the presence of malicious network activity.Explain the operation of SSL.