INST 346
Technologies, Infrastructure and Architectures
Fall 2017
Required Readings
Page numbers are for the hardcover version of the texttbook.
Required Reading for Session 2 (The Internet)
- Sections 1.3 and 1.4 (pages 21-46)
Required Reading for Session 3 (Service model)
- Section 1.5 (pages 47-55)
- Section 2.1 (pages 83-97
Required Reading for Session 4 (The Web)
- Section 2.2 (pages 98-116)
Required Reading for Session 5 (Email)
- Section 2.3 (pages 116-126)
- Section 2.7 (pages 157-170)
Required Reading for Session 6 (Domain names)
- Section 2.4 (pages 126-140)
Required Reading for Session 7 (Streaming)
- Section 2.6 (pages 147-157)
Required Reading for Session 8 (UDP)
- Sections 3.3 and 3.4 to the end of 3.4.1 (pages 200-217)
Required Reading for Session 9 (TCP)
- The rest of Section 3.4 (pages 217-232)
Required Reading for Session 10 (TCP)
- Sections 3.5 (pages 233-261)
Required Reading for Session 11 (Exam 1)
- No readings for the exam!
Required Reading for Session 12 (Routers)
- Sections 4.1 and 4.2 (pages 306-329)
Required Reading for Session 13 (IP)
- Section 4.3 (pages 329-354)
Required Reading for Session 14 (Routing)
- Sections 5.1 and 5.2 (pages 324-391)
- Section 5.6 (pages 419-421)
Required Reading for Session 15 (Point-to-point)
- Sections 6.1, 6.2 and 6.3 through the end of 6.3.3 (pages 440-464)
Required Reading for Session 16 (Ethernet)
- Section 6.4 (pages 467-491)
Required Reading for Session 17 (WiFi)
- Section 7.3 (pages 532-551)
Required Reading for Session 18 (Mobile data)
- Sections 7.4 and 7.5 (551-570)
Required Reading for Session 19 (Hacking)
- Section 1.6 (pages 55-59)
- Timothy C. Summers, How Hackers Think: A Study of Cybersecurity
Experts and Their Mental Models (September 20, 2013). Third
Annual International Conference on Engaged Management
Scholarship, Atlanta, GA, September, 2013. Available at
SSRN: https://ssrn.com/abstract=2326634
Required Reading for Session 20 (Firewalls)
- Section 8.9 (pages 651-662)
Required Reading for Session 21 (Exam 2)
- No readings for the exam!
Required Reading for Session 22 (Encryption)
- Sections 8.2 and 8.3 (pages 596-620)
Required Reading for Session 23 (Authentication)
- Sections 8.4 and 8.5 (pages 621-631)
Required Reading for Session 24 (Appropriate use)
Required Reading for Session 25 (Privacy)
Read either:
- Privacy and Civil Liberties Oversight Board, Report on the
Surveillance Program Operated Pursuant to Section 702 of the Foreign
Intelligence Surveillance Act, July 2, 2014. Read only Section III
(Privacy and Civil Liberties Implications of the Section 702
Program, which is on pages 111-133). Available at https://pclob.gov/library/702-Report.pdf
- or both of the following:
Required Reading for Session 26 (Twitter)
- Watch Evan Henshaw-Plath, From TxtMob to Twitter: Activism,
Technology and Values, MIT CMS/Writing, October, 2015. Available at
https://vimeo.com/141437697
Required Reading for Session 27 (The Interplanetary Internet)
Required Reading for Session 28 (Global Internet access)
- Rahul Bhatia, The Inside Story of Facebook's Biggest Setback,
The Guardian, May 1, 2016. Available at https://www.theguardian.com/technology/2016/may/12/facebook-free-basics-india-zuckerberg
- Alex Petland, Richard Fletcher and Amir Hasson, DakNet:
Rethinking Connectivity in Developing Nations, IEEE Computer,
January, 2004. Available on campus at http://ieeexplore.ieee.org/document/1319279/.
Also available on ELMS.
- Ben Popper, Inside Project Loon, The Verge, March 2, 2015. https://www.theverge.com/2015/3/2/8129543/google-x-internet-balloon-project-loon-interview
Required Reading for Session 29 (Final exam review)
- No reading for the final exam review!
Doug Oard
Last modified: Tue Nov 21 09:26:52 2017