SeminarTopic

Download Report

Transcript SeminarTopic

Seminar
Topics & Rules
Groups
• Total 20 groups
– Each group has 2 members
– Only 1 PPT needed for a group
– One report, others answer
– Report time: 20 minutes
– Q & A: 15 minutes
• Total 20 topics
• each topic for each group, no same topic between groups
• Apply by the group leader, first come, first get
Rules
• Application
• Select the topic and register to the teacher
• Prepare
• upload PPT to the lesson website one week in advance
• Presentation
– Selected & scheduled by the teacher
– Maybe all, maybe half
• Question
– Question: classmates or teacher
– Score
– According by the status of speech, answer & question
– According by the PPT
Topic 1A
• The Future of the Mobile Networks
– History (2G -> 3G -> 4G)
• 3G Standard: CDMA2000, WCDMA, TD-SCDMA
• 4G Standard: LTE
– Architecture
• Core Network: MSC, VLR, HLR
• Wireless : Base Station, FDMA, TDMA, CDMA
• How to Roam
– Service
• Voice, Data
– Application
– Location, Pay
Topic 1B
• The Future of the Wireless Network
– 802.11
– 802.16
– Wireless router
– Wireless security
– How to avoid collision
Topic 1C
• The Future of the Internet
– IPv6
– QoS
– High bandwidth
– Low delay
– Low jitter
Topic 1D
• The Future of the Mobile Internet
– Intelligent Cell Phone
– Operation System
• Android
• IOS
– Application Store
– Location Service
– Mobile Pay
Topic 2A
• The DNS System
–
–
–
–
–
Architecture
How to get IP from domain name
Name domain
Name server
Request & Reply packets
– Show with wireshark
– Record type
– A, MX, NS, CNAME
– Security
Topic 2B
• The ARP Protocol
– Goal of the ARP
– Procedure of the IP communication in the LAN
– The ARP packet format
• Show with the wireshark
– ARP Virus & Firewall
Topic 2C
• The P2P technology
– Overview
– Protocols
– Who use P2P
– Benefit of using P2P
– Problem caused by P2P
– How to manage the P2P stream
Topic 2D
• The CDN technology
– Overview
– How the CDN works
– Benefit of using CDN
– Realization of CDN
Topic 3A
• The IP Protocol
– Service provided by IP
– The IP packet format
• Show with the wireshark
– The CRC of the IP packet
– IP address assignment
– Special IP Address
Topic 3B
• The IP Routing Technology
– Routing concept
– Route table
– Subnet mask
– CIDR
– Super net
– NAT
– Different of Router and Switch
– IPv6
Topic 4A
• The TCP Protocol
– Three handshake of TCP
– Reading & writing buffer
– acknowledgment
– Timer
• How to calculate round-trip time out
– Congestion Control
– TCP Segment format
• Show with wireshark
Topic 4B
• The Socket Programming
– Socket API
– Thread safe programming
– Tips and Experiment
– Examples
• Show with your program
–
–
–
–
Goals
Design
Coding
Run
Topic 4C
• The RTP Protocol
– Overview
• Goals
• What transport protocol used
• Characters
– Packet Format & example
• show with wireshark
• Install media server or using MSN
• capture voice chat stream & save to file
Topic 5A
• The HTTP Protocol
– Overview
– Message Format:
• Headers
• Body
– Method
• Get, Put, Post
– Example
• With packets captured by WireShark
Topic 5B
• The FTP Protocol
– Overview
• 2 Connections: Control and Data
– Tools
• CuteFTP, FlashFXP, etc.
– Command and Response
•
•
•
•
logon
List directory
Get files
Put files
– Example
• With packets captured by WireShark
Topic 6A
• The POP3/IMAP Protocol
– Overview
– Request and Response
• Logon
• Receive Email
• Mailbox
– Examples
• Show packets captured by WireShark
– Comments
Topic 6B
• The SMTP/ESTMP Protocol
– Overview
– Request and Response
• Handshake
• Send Email
• Authentication
– Examples
• Show packets captured by WireShark
Topic 6C
• The Email Spam & Bomb
– Why spam happens
– How to detect
• Sender list
• Bayes
– How to protect
• Filter
• Organization
– Examples
– Future
Topic 7A
• The Website Security
– System Injector
– Privacy Protect
– Dos Attack
– Information disclose
– How to protect
– The online transaction security
• Certification using public key
• SSL
Topic 7B
• The HTTPS Protocol
– The weakness of the HTTP
– How the SSL work
• Public key & private key
• Certification tree
• Handshake
– How browser detect trusted website
– How the data is encrypted
– Example
• With packets captured by WireShark