<?xml version="1.0"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>JBake</title>
    <link>https://imada.sdu.dk/~jamik</link>
    <atom:link href="https://imada.sdu.dk/~jamik/feed.xml" rel="self" type="application/rss+xml" />
    <description>JBake Bootstrap Template</description>
    <language>en-gb</language>
    <pubDate>Sun, 15 Dec 2019 11:26:51 +0100</pubDate>
    <lastBuildDate>Sun, 15 Dec 2019 11:26:51 +0100</lastBuildDate>

    
    <item>
      <title>Weekly Note 14 - Week 50</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/14.html</link>
      <pubDate>Wed, 4 Dec 2019 00:00:00 +0100</pubDate>
      <guid isPermaLink="false">weeklynotes/14.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_monday_december_9th&quot;&gt;Lecture - Monday, December 9th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U170&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;exampleblock alert alert-danger&quot;&gt;
&lt;div class=&quot;content&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The lecture is MONDAY - not tuesday&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;This is the last week of classes, and in this lecture we will wrap up everything.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will start with covering WiFi security, which we will extend a bit beyond the book, which does not cover WPA2 in depth.
We will also study the KRACK vulnerabilities which targets WIFI.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Then, we will take a look at a few tools and methods for penetration testing/ethical hacking and security monitoring. This will include tools for&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Staying anonymous/hidden (Proxies, MAC address changer)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Password cracking&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DoS options&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Exploiting using Metaspoit&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security testing with Owasp Zap&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Please consider if something could be improved in the course. This year, there is no official evaluation, but I&amp;#8217;m always open to ideas and opinions, that can improve the experience. You are encouraged to email sugguestions to me.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;If there is time left, we will do a bit more pen-testing (either the last assignment), or for those that have handed it in, a different application.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;exampleblock alert alert-success&quot;&gt;
&lt;div class=&quot;content&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;If you have a preferred timeslot or day for the exam, you can signup for this at the class. If you do not sign up, I will assign one of the days. The official list will come from the secretary through blackboard.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Friday December 13th. 12-14 in U24&lt;/strong&gt; &lt;em&gt;or&lt;/em&gt; &lt;strong&gt;14-16 in U146&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Watch the video from the KRACK attack website.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Prepare a list of 10-15 keywords for the exam question: Mobility, Wireless networks and Wireless security.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Select one of the topics from this list, and prepare to give a 10 min. presentation to the class on the topic:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;olist arabic&quot;&gt;
&lt;ol class=&quot;arabic&quot;&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the application layer of the TCP/IP model and the functionality of DNS&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the transport layer of the TCP/IP model and the difference between UDP and TCP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the network layer of the TCP/IP model with focus on the data plane.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the network layer of the TCP/IP model with focus on the control plane.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the link layer of the TCP/IP model, including error detection and correction&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Symmetric and public key crypography, Key distribution and User authentication&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security: Transport- and Network-layer security&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security: Firewalls, intrusion detection&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Mobility, Wireless networks and Wireless security&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Penetration Testing: Planning and Methods&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the first part of class to work on this exercise and discuss the content of your keyword lists, and consider possible alternatives.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P24 - Streaming encryption, and IV&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;from Chapter 8 in the textbook.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the second part of the class to give and see a few presentations that you have prepared at home.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;This is &lt;em&gt;You&lt;/em&gt; that should make the presentations, the TA will not step in and do them for You!&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapter 8.8&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://www.krackattacks.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Information on the KRACK attack&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Available later&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-13a.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides on WIFI security&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-13b.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides on pen testing with kali linux&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-13c.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides on Security Testing Tools&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 13 - Week 49</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/13.html</link>
      <pubDate>Fri, 29 Nov 2019 00:00:00 +0100</pubDate>
      <guid isPermaLink="false">weeklynotes/13.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_december_3th&quot;&gt;Lecture - Tuesday, December 3th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U55&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The topic of this lecture is penetration testing. We will discuss how a penetration test is planned and executed. Some of the tools used will be discussed and demoed (and some will have to wait to next week).&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The last assignment will also be introduced.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Thursday December 6th. 12-14 in U24 or 14-16 in U146&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Prepare a list of 10-15 keywords for the exam question: &lt;strong&gt;Penetration Testing: Planning and Methods.&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Select one of the topics from this list that you have not chosen previously, and prepare to give a 10 min. presentation to the class on the topic:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;olist arabic&quot;&gt;
&lt;ol class=&quot;arabic&quot;&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the application layer of the TCP/IP model and the functionality of DNS&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the transport layer of the TCP/IP model and the difference between UDP and TCP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the network layer of the TCP/IP model with focus on the data plane.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the network layer of the TCP/IP model with focus on the control plane.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the link layer of the TCP/IP model, including error detection and correction&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Symmetric and public key crypography, Key distribution and User authentication&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security: Transport- and Network-layer security&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security: Firewalls, intrusion detection&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Start discussing your keyword lists, and discuss ways to present it as an the exam topic.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Spend the remaining of the first part of the class to give and see a few presentations that you have prepared at home. This is &lt;em&gt;You&lt;/em&gt; that should make the presentations, the TA will not step in and do them for You!&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;In the second half, use the time to complete the last assignment.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Penetration/penetration_pdf.pdf?__blob=publicationFile&amp;amp;v=1&quot;&gt;BSI - Study A Penetration Testing Model&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-12.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 12&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 12 - Week 48</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/12.html</link>
      <pubDate>Fri, 22 Nov 2019 00:00:00 +0100</pubDate>
      <guid isPermaLink="false">weeklynotes/12.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_november_26th&quot;&gt;Lecture - Tuesday, November 26th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U55&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;First, we will cover different types of firewalls and intrusion detection systems, this also includes mitigation/defence against DDoS.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Then we will cover the Owasp top 10 report, of the most serious problems in web-applications.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Finally, we  will discus how the exam is handled, and how to prepare for this type of exam.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Thursday November 28th. 8-10 in U24  &lt;em&gt;or&lt;/em&gt;  10-12 in U146&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Prepare a list of 10-15 keywords for the exam question: &lt;strong&gt;Security: Firewalls, intrusion detection.&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Select one (or more) of the topics from this list, and prepare to give a 10 min. presentation to the class on the topic:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;olist arabic&quot;&gt;
&lt;ol class=&quot;arabic&quot;&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the application layer of the TCP/IP model and the functionality of DNS&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the transport layer of the TCP/IP model and the difference between UDP and TCP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the network layer of the TCP/IP model with focus on the data plane.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the network layer of the TCP/IP model with focus on the control plane.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Functionality and interfaces for the link layer of the TCP/IP model, including error detection and correction&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Symmetric and public key crypography, Key distribution and User authentication&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security: Transport- and Network-layer security&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the first part of class to work on this exercise and discuss the content of your keyword lists, and consider possible alternatives.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P25 - Configuring ACL for a Firewall&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;from Chapter 8 in the textbook.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the second part of the class to give and see a few presentations that you have prepared at home.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;This is &lt;em&gt;You&lt;/em&gt; that should make the presentations, the TA will not step in and do them for You!&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapter 8.9&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf&quot;&gt;Owasp Top 10 - 2017&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-11a.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 11 On firewalls and ids&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-11b.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for 2FA&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-11c.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for Owasp Top 10&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 11 - Week 47</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/11.html</link>
      <pubDate>Thu, 14 Nov 2019 00:00:00 +0100</pubDate>
      <guid isPermaLink="false">weeklynotes/11.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_november_19th&quot;&gt;Lecture - Tuesday, November 19th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U55&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will continue our study of security, turning our attention to security in the transport layer and in the network layer.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The main topics will be SSL/TLS and IPsec used for VPN connections.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will also see an example on how to install am SSL/TLS certificate on a webserver, so it will use HTTPS.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Thursday November 21th. 8-10 in U146 &lt;em&gt;or&lt;/em&gt; 10-12 in U24&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;You should prepare these exercises for discussion from chapter 8 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P17 - PGP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P19 - Wireshark and SSL&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P22 - IPsec&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Prepare a list of 10-15 keywords for exam question number 7: Security: Transport- and Network-layer security.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the first part of class to work on this exercise&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P9 - Diffie Helmann (if not finished before the break)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P18 - Authentication and confidentiality&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P21 - Attacking link-state algorithm&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;from Chapter 8 in the textbook.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the second part of the class to discuss the content of your keyword lists, and consider possible alternatives, and all of the exercises prepared at home and in class.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapter 8.6 - 8.7&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Available later&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-10a.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 10&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-10b.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 10 - Recent attacks&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-10c.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 10 - Certificates for HTTPS&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 10 - Week 46</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/10.html</link>
      <pubDate>Sat, 9 Nov 2019 00:00:00 +0100</pubDate>
      <guid isPermaLink="false">weeklynotes/10.html</guid>
      <description>
      &lt;div class=&quot;exampleblock alert alert-danger&quot;&gt;
&lt;div class=&quot;content&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;There will be no classes in week 46. I&amp;#8217;m sorry for the inconvenience this may cause.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Currently the last week of classes will be week 50/last lecture will be December 11th.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;See you in week 47 where we will take a look at SSL/TLS and IPsec!&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Credit to &lt;a href=&quot;https://xkcd.com&quot; class=&quot;bare&quot;&gt;https://xkcd.com&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;imageblock&quot;&gt;
&lt;div class=&quot;content&quot;&gt;
&lt;img src=&quot;https://imgs.xkcd.com/comics/exploits_of_a_mom.png&quot; alt=&quot;exploits of a mom&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 9 - Week 45</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/09.html</link>
      <pubDate>Thu, 31 Oct 2019 00:00:00 +0100</pubDate>
      <guid isPermaLink="false">weeklynotes/09.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;week_46_is_without_classes_enjoy_your_break&quot;&gt;Week 46 is without classes - enjoy your break&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;This gives extra time to work on assignment 8. See you in week 47&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph alert alert-success&quot;&gt;
&lt;p&gt;Both lecture and tutorial classes are cancelled in week 46 - even if the schedule at mitsdu says they are there. See the &lt;strong&gt;Course plan&lt;/strong&gt; for more details on the rest of the lectures.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_november_5th&quot;&gt;Lecture - Tuesday, November 5th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U23&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will begin our study of security, by defining some of the targets we wish to accomplice: Confidentiality, integrity, authentication etc. We will also survey the different types of problems we can encounter in computer security today.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Then we will study basic principles of chryptography, and how we can establish message integrity and use digital signatures.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;With the machinery learned, we will study PGP for mail security, which provides a nice example on usage.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Thursday November 7th. 10-12 in U24 or 14-16 in U146&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;You should prepare these exercises for discussion from chapter 8 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P2 - Known plaintext attack. Note 109 should be 10 to the power 9, i.e. 1000000000&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P4 - Block cipher&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P13 - Protecting Torrent Distribution Protocol&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P16 - End-point authentication&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P3 - Chosen plaintext attack&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P1 - Caecar cipher (consider coding a small program, that can show the output of shifting 1-26 places).&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Prepare a list of 10-15 keywords for exam question number 6: Symmetric and public key crypography, Key distribution and User authentication .&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the first part of class to work on this exercise&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P9 - Diffie Helmann&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Discuss also how d) can be avoided.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;from Chapter 8 in the textbook.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the second part of the class to discuss the content of your keyword lists, and consider possible alternatives, and all of the exercises prepared at home and in class.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapter 8.1 - 8.5&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-09a.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 9 - Security Intro&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-09b.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 9 - Chapter 8.1-8.5&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 8 - Week 44</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/08.html</link>
      <pubDate>Sat, 26 Oct 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/08.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_october_30th&quot;&gt;Lecture - Tuesday, October 30th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U55&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;After we finished the trip down the network stack last week we will take a look at mobility, wireless links and networks in this week.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will start with looking at how a broadcast channel can be shared and multiple access coordinated.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will then look at mobility, wireless links and their characterics, before going into details with IEEE 802.11 (&quot;Wi-Fi&quot;) protocol.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Thursday October 31st. 10-12 in U24&lt;/strong&gt; &lt;em&gt;or&lt;/em&gt; &lt;strong&gt;14-16 in U146&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;You should prepare these exercises for discussion from chapter 7 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P1 - CDMA&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P3 - Wifi access to subnet&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P5 - Wifi access&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P6 - CSMA/CA&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the first part of class to work on these exercises&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P4 - CDMA coding&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P7 - Wifi effectivity&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P8 - Wifi effectivity&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P2 - CDMA&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;from Chapter 7 in the textbook.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Use the second part of the class to discuss all of the exercises P1-P8.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 6.3 and Chapter 7 (with primary focus on 7.1 - 7.3 + 7.5 - 7.6)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-08.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 8&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 7 - Week 43</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/07.html</link>
      <pubDate>Thu, 10 Oct 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/07.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;week_42_is_without_classes_enjoy_your_break&quot;&gt;Week 42 is without classes - enjoy your break&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;And remember assignment 6 :)&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_october_22nd&quot;&gt;Lecture - Tuesday, October 22nd.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U55&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will then cover most of chapter 6 on the link layer, skipping 6.3.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The focus will be on Error detection and correction, link-layer adressing and ARP, and VLANs.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;At the end of this, we have hopefully completed our journey down the protocol stack
- and will do a &quot;Putting-it-all-togeatger&quot; trip requesting a web-page. :)&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;6.3 covers  &quot;Multiple access links and protocols&quot;, that is a nice basis for wifi. We will cover that in the following lecture.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;October 24th. 8-10 in U32&lt;/strong&gt; &lt;em&gt;or&lt;/em&gt; &lt;strong&gt;October 10th. 14-16 in U24&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;You should prepare these exercises for discussion from chapter 6 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P5 - CRC&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P28 - VLAN&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P15 - Adressing, Subnets, ARP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P31 - Full protocol stack overview&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P14 - ARP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P2 - Error detection and correction&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try also to make a list of 10-15 keywords for a 10 minute presentation with the topic:
&quot;Functionality and interfaces for the link layer of the TCP/IP model, including error detection and correction.&quot;.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Spend the first half discussing the exercises prepared at home.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The second part of the session, start by discussing the keyword list, then you  will examine Ethernet and ARP using Wireshark.
Instructions can be found in the &lt;strong&gt;Instructions&lt;/strong&gt; menu &amp;#8594; &lt;strong&gt;Wireshark Ethernet and ARP&lt;/strong&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 6&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-07.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 7&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 6 - Week 41</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/06.html</link>
      <pubDate>Fri, 4 Oct 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/06.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_october_8th&quot;&gt;Lecture - Tuesday, October 8th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U45&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will continue and conclude our treatment of the network layer. This week focusing on the control plane.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The primary focus will be types of routing algorithms, and routing in the internet: OSPF and BGP, but we will also cover ICMP, and look a bit on SDN.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The goal is to cover the entire chapter 5.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;October 10th. 10-12 in U32&lt;/strong&gt; &lt;em&gt;or&lt;/em&gt; &lt;strong&gt;October 11th. 12-14 in U24&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;You should prepare these exercises for discussion from chapter 5 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P13 - BGP and AS-Path&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P14 - Routing protocols&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P20 - BGP and routing traffic&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P9 - Poisoned reverse and count-to-infinity problem&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P16 - BGP and ISP peering&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P5 - Distance Vector Algorithm&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try also to make a list of 10-15 keywords for a 10 minute presentation with the topic: &quot;Functionality and interfaces for the network layer of the TCP/IP model with focus on the control plane.&quot;.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Spend the first half discussing the exercises prepared at home.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The second part of the session, start by discussing the keyword list, then you will examine DHCP using Wireshark, Instructions can be found in the &lt;strong&gt;Instructions&lt;/strong&gt; menu &amp;#8594; &lt;strong&gt;Wireshark DHCP&lt;/strong&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 5&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-06.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 6&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 5 - Week 40</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/05.html</link>
      <pubDate>Sat, 28 Sep 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/05.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_october_1st&quot;&gt;Lecture - Tuesday, October 1st.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U45&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will start our treatment of the network layer.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will cover the data plane part of it. This includes an introduction to the network layer, studying whats inside a router, how it does the internal switching of datagrams, the IP protocol (IPv4 and IPv6), DHCP, addressing and Network Address Translation.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The goal is to cover the entire chapter 4 (it is half of the network layer, chapter 5 is also on the network layer)&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;I will also share and discus items from the mid-term evaluation.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;October 3rd. 14-16 in U24&lt;/strong&gt; &lt;em&gt;or&lt;/em&gt; &lt;strong&gt;October 4th. 12-14 in U24&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try to answer these exercises from chapter 4 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P1 - forwarding table&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P7 - Longest prefix matching and number of addresses&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P8 - CIDR notation&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P16 - NAT translation table&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P10 - NAT and P2P&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P14 - MTU and fragmentation&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P2 - Switch fabric&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try also to make a list of 10-15 keywords for a 10 minute presentation with the topic: &quot;Functionality and interfaces for the network layer of the TCP/IP model with focus on the data plane.&quot;.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Spend the first half discussing the exercises prepared at home.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The second part of the session, start by discussing the keyword list, then you  will examine Network Address Translation (NAT) using Wireshark, Instructions can be found in the &lt;strong&gt;Instructions&lt;/strong&gt; menu &amp;#8594; &lt;strong&gt;Wireshark NAT&lt;/strong&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 4&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-05.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 5&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 4 - Week 39</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/04.html</link>
      <pubDate>Fri, 20 Sep 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/04.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_september_24th&quot;&gt;Lecture - Tuesday, September 24th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U23&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;This week, we will cover TCP in details.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will also study the principles of conguestion control, and how TCP handles conguestion control.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;In the end of the session, we will do the mid-term evaluation, evaluating how the course goes, and if anything can be improved.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;September 26th. 8-10 in U155&lt;/strong&gt; &lt;em&gt;or&lt;/em&gt; &lt;strong&gt;14-16 in U24&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try to answer these exercises from chapter 3 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P28 - Flow control&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P36 - Duplicate acks&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P37 - Comparing GBN, SR, TCP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P43 - Flow+Conguestion control&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P26 - Large files and sequence numbers&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P55 - End-point auth&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try also to make a list of 10-15 keywords for a 10 minute presentation with the topic: &quot;Functionality and interfaces for the transport layer of the TCP/IP model and the difference between UDP and TCP&quot;.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Spend the first half discussing the exercises prepared at home.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The second part of the session, you will examine tcp, and some of the features in this protocol using Wireshark. Instructions can be found in the &lt;strong&gt;Instructions&lt;/strong&gt; menu &amp;#8594; &lt;strong&gt;Wireshark TCP&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 3.5-3.8&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-04.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 4&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 3 - Week 38</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/03.html</link>
      <pubDate>Sat, 14 Sep 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/03.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_september_17th&quot;&gt;Lecture - Tuesday, September 17th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U55&lt;/strong&gt; (Big auditorium time!)&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will start discussing CDN and streaming video, which we did not cover in lecture 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Then we will start the coverage of the transport layer, covering UDP,
elaborating a bit on the services provided by the transport layer,
multiplexing/demultiplexing and the principles of reliable data transfer.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;This will include the two pipelining protocols Go-Back-N and Selective-Repeat for making RDT efficient.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;September 19th. 12-14 in U156&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;em&gt;or&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;September 20th. 10-12 in U154&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try to answer these exercises from chapter 3 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P3  Checksums&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P5  Checksum i UDP&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P15 Window size cross country and utilization&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P19 Go back N&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P23 Go back N (performance if buffering)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;And consider:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;What are factors that can determine the window size in a pipelining protocol?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Describe good and bad properties of Go-Back-N and Selective Repeat respectively&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Spend the first half discussing the exercises prepared at home, and the Socket exercises from last week (if you did not do it last week).&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The second part of the session, you will work with DNS using Wireshark. Instructions can be found in the &lt;strong&gt;Instructions&lt;/strong&gt; menu &amp;#8594; &lt;strong&gt;Wireshark DNS&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 3.1-3.4&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-03.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 3&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 2 - Week 37</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/02.html</link>
      <pubDate>Wed, 4 Sep 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/02.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_september_10th&quot;&gt;Lecture - Tuesday, September 10th.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U23&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will start treating the application layer of the network stack and principles of network applications.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The protocols we will study are HTTP (and HTTP/2), FTP, SMTP, and DNS.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will also see how sockets can be used for network communication, and discuss Content Distribution Networks.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;September 13th. 10-12 in U154&lt;/strong&gt;  &lt;em&gt;or&lt;/em&gt; &lt;strong&gt;12-14 in U154&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;If you did not finish installing wireshark on your computer, you should do this. Then you should try to solve these exercises:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;olist arabic&quot;&gt;
&lt;ol class=&quot;arabic&quot;&gt;
&lt;li&gt;
&lt;p&gt;In Java, using the &lt;code&gt;Socket&lt;/code&gt; class create a port scanner, that on localhost scans the ports from 1-1024 and prints the open ports.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In Java, using the &lt;code&gt;ServerSocket&lt;/code&gt; class, write a port scanner, that on localhost scans the ports from 1-1024 and prints the open ports.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Describe the difference between the two implementations you have just made, from a network point of view.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Using the TimeServer demoed in class (Code here: &lt;a href=&quot;https://github.com/JacobAae/dm557-2017-socket-examples&quot; class=&quot;bare&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://github.com/JacobAae/dm557-2017-socket-examples&lt;/a&gt;), write a client using &lt;code&gt;DatagramSocket&lt;/code&gt; that can connect and print the time returned.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;These resources can be useful:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/JacobAae/dm557-2017-socket-examples&quot; class=&quot;bare&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://github.com/JacobAae/dm557-2017-socket-examples&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://docs.oracle.com/javase/tutorial/networking/sockets/index.html&quot; class=&quot;bare&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://docs.oracle.com/javase/tutorial/networking/sockets/index.html&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://docs.oracle.com/javase/tutorial/networking/datagrams/index.html&quot; class=&quot;bare&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://docs.oracle.com/javase/tutorial/networking/datagrams/index.html&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try also to make a list of 10-15 keywords for a 10 minute presentation with the topic:
&quot;Functionality and interfaces for the application layer of the TCP/IP model and the functionality of DNS&quot;.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In class:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Spend the first half on solving and discussing these exercises from chapter 2 of the book and your solution to the socket programming exercises:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P2&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P6 (&lt;a href=&quot;https://tools.ietf.org/html/rfc2616&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;RFC 2616&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P10&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P21&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P25&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P30&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Discus the keyword list you prepared at home. There is not a single right answer, as you could plan many great presentations with different &quot;red-threads&quot;.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The second part of the session, you will work on analyzing HTTP requests and responses using Wireshark.
Instructions can be found in the &lt;strong&gt;Instructions&lt;/strong&gt; menu &amp;#8594; &lt;strong&gt;Wireshark HTTP&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 2&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-02.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 2&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    
    <item>
      <title>Weekly Note 1 - Week 36</title>
      <link>https://imada.sdu.dk/~jamik/weeklynotes/01.html</link>
      <pubDate>Sat, 27 Jul 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="false">weeklynotes/01.html</guid>
      <description>
      &lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;lecture_tuesday_september_3rd&quot;&gt;Lecture - Tuesday, September 3rd.&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;16-19 in U23&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will start with an introduction to the course, and Jacob will give a short whoami intro, and present why this course
is highly relevant in the IT landscape. Then we will discus the format of the lectures and tutorials, and expectations.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;We will briefly study the history of computer networks, before we try to get an overview of the basic (and brief)
structure of the internet, and consider some of the services that the internet provides to us, and setting up the
first basic terminology for networks.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;tutorial_session&quot;&gt;Tutorial session&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;September 5th. 8-10-12 in U154 OR 10-12-10 in U154&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;Preparation:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;Try to answer these exercises from chapter 1 of the book:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;P2&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P4&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P6&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P13&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P25&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P29&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P31&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;&lt;strong&gt;In Class&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;You will spend half the session discussing the exercises prepared at home, and then try to solve this problem:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph well&quot;&gt;
&lt;p&gt;Suppose you would like to urgently deliver 300 terabytes of data from Boston to Los Angeles. You have available a 1 Gbps dedicated link for data transfer. Would you prefer to transmit the data via this link or instead use FedEx overnight delivery? &lt;strong&gt;Explain your answer.&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;paragraph&quot;&gt;
&lt;p&gt;The second half, you will install Wireshark, used for packet sniffing, and take a sneak peak. Instructions can be found in the &lt;strong&gt;Instructions&lt;/strong&gt; menu &amp;#8594; &lt;strong&gt;Wireshark Intro&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;recommended_reading&quot;&gt;Recommended Reading&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Chapters 1&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Please also refresh &lt;a href=&quot;https://www.sdu.dk/-/media/sidste_chance/files/om_sdu/faellesadministrationen/it+service/it-guidelines-students.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;IT Guidelines for students at SDU&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;sect1&quot;&gt;
&lt;h2 id=&quot;material_slides_etc&quot;&gt;Material (Slides, etc.)&lt;/h2&gt;
&lt;div class=&quot;sectionbody&quot;&gt;
&lt;div class=&quot;ulist&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-00.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Intro Slides&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;material/Lecture-01.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Slides for lecture 1&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
	  </description>
    </item>
    

  </channel> 
</rss>
