Recently covered links and exam links are highlighted.
<a href="http://ocelot.aul.fiu.edu:9999/filename.ext">Existent File</a>
<a href="http://ocelot.aul.fiu.edu:9999/nofilename.ext">Non-Existent File</a>
GET
, using the
If-modified-since
header. The web server only has to be able to
return one file, but it must be an actual file. If the browser already has the
file, only send the appropriate HTTP response to indicate that the browser
already has the file. Request a port
for your web server, so we can minimize the chance of students using the same port.chmod 701 ~
Video | Notes |
---|---|
HTML basics | web-basics |
Hypertext links and query string | web-basics (slide 13) |
Ajax and jQuery | web_ajax |
Video | Notes |
---|---|
5/10: Chapter 2 - Overview | ch2-intro |
5/10: Chapter 2 - Architectures, Applications and Transport Layer Features | ch2_2-1 |
5/10: Chapter 2 - Web, HTTP, Persistence | ch2_2-2_to_2-2-2 |
5/10: Chapter 2 - HTTP | ch2 (slide 20) |
5/10: Chapter 2 - HTTP Example | No notes |
Chapter 2 - Cookies | |
5/12: Chapter 2 - Cookies Example | No notes |
5/12: Chapter 2 - Caching | ch2 (slide 43) |
5/12: Chapter 2 - Caching Example | No notes |
5/12: Chapter 2 - FTP | ch2_2-3 |
5/12: Chapter 2 - Mail | ch2_2-4 |
5/12: Chapter 2 - Mail Example | No notes |
5/15: Chapter 2 - DNS | ch2_2-5 |
5/15: Chapter 2 - P2P Introduction | ch2_2-6-intro-p2p |
5/15: Chapter 2 - P2P | ch2_2-3-2-6 (slide 37) |
Video | Notes |
---|---|
5/17: Overview | ch3_intro |
5/17: Transport Layer Services | ch3_3-1_to_3-3 |
5/17: Connectionless Transport | ch3_3-1_to_3-3 (slide 10) |
5/17: Wireshark HTTP Demo | No notes |
5/19: rdt 2 | ch3_3-4_rdt2 |
5/19: rdt 3 | ch3 (slide 27) |
5/19: Go-Back-N | ch3 (slide 30) |
5/19: Selective Repeat | ch3 (slide 36) |
5/22: TCP Flow Control | ch3 (slide 4) |
5/22: TCP Handshake, Congestion Control | ch3 (slide 56) |
5/22: TCP Congestion Control | ch3 (slide 67) |
Video | Notes |
---|---|
5/24: Inside a router | ch4_4-3 |
5/24: IPv4 | ch4_4-4 |
5/24: DHCP, NAT, ICMP | ch4_4-4 (slide 9) |
5/26: Link State Algorithm | ch4_4-5 |
5/26: Distance Vector Algorithm | ch4_4-5 (slide 7) |
5/26: Count-to-infinity | ch4_4-5 (slide 12) |
Video | Notes |
---|---|
5/31: Routing Protocols | ch4_4-6 |
5/31: Routing Summary | ch4_4-6 (slide 15) |
5/31: Intro to Link Layer | ch5_5-1 |
5/31: Error Checking | ch5-5_2 |
6/1: Multple Access Protocols | ch5-5_3 |
6/1: CSMA, CSMA/CD, Taking Turns, DOCSIS | ch5-5_3 (slide 13) |
6/1: MAC addresses and ARP | ch5-5_4 |
Video | Notes |
---|---|
6/5: Symmetric Key Cryptography | ch8 |
6/5: Public Key Cryptography | ch8 (slide 19) |
6/5: RSA Example | ch8 (whiteboard 2 - near slide 25) |
6/5: RSA Example | ch8 (whiteboard 2 - near slide 25) |
6/7: Securing Email | ch8_8-5 |
6/7: Toy SSL | ch8_8-6_toy |
6/7: Real SSL | ch8_8-6_real |
Video | Notes |
---|---|
6/9: CDMA | ch6 |
6/9: WiFi Access | ch6 (slide 8) |
6/9: Mobility | ch6_6_4_to_6_5 (slide 15) |
Video | Notes |
---|---|
6/12: VoIP | ch7-7_1-7_3 (slide 28)/a> |
Video | Notes |
---|---|
6/12: Netwrok Management | ch9 |
6/12: ASN.1 | ch9 (slide 13) |
~downeyt/public_html/cnt4713/scripts
folder from your ocelot account.
You are visitor number to visit this page since [an error occurred while processing this directive].