Computer Networking and Telecommunications

Course Description (revised description from catalog and different prerequisite for nontraditional program)

CSC3013 Computer Networks and Telecommunications [3]. A study of networking and telecommunication concepts, models, standards, addressing, and protocols. Topics include advances in wireline and wireless networks, Ethernet, optical networks, broadband including DSL and cable, cellular networks, and network security and management. Network management and administration is also discussed.

Prerequisite: CSC2013 Foundations of Computer Science 1 with a grade of C- or above.

Topic: Net Centric Computing Introduction

• Background and history of networking and the Internet
• Network architectures
• The range of specializations within net-centric computing
• Networks and protocols
• Networked multimedia systems
• Distributed computing
• Client/server and Peer to Peer paradigms
• Mobile and wireless computing

Learning Objectives:

1. Discuss the evolution of early networks and the Internet.
2. Demonstrate the ability to use effectively a range of common networked applications including e-mail, telnet,cFTP, wikis, and web browsers, online web courses, and instant messaging.
3. Explain the hierarchical, layered structure of a typical network architecture.
4. Describe emerging technologies in the net-centric computing area and assess their current capabilities,climitations, and near-term potential.

Topic: Network Communication

• Network standards and standardization bodies
• The ISO 7-layer reference model in general and its instantiation in TCP/IP
• Overview of Physical and Data Link layer concepts (framing, error control, flow control, protocols)
• Data Link layer access control concepts
• Internetworking and routing (routing algorithms, internetworking, congestion control)
• Transport layer services (connection establishment, performance issues, flow and error control)

Learning Objectives:

1. Discuss important network standards in their historical context.
2. Describe the responsibilities of the first (lowest) four layers of the ISO reference model.
3. Explain how a network can detect and correct transmission errors.
4. Explain how a packet is routed over the Internet.
5. Install a simple network with two clients and a single server using standard host configuration software tools such as DHCP.

Topic: Network Security

• Fundamentals of cryptography
o Secret-key algorithms
o Public-key algorithms
• Authentication protocols
• Digital signatures
o Examples
• Network attack types: Denial of service, flooding, sniffing and traffic redirection, message integrity attacks,
identity hijacking, exploit attacks (buffer overruns, Trojans, backdoors), inside attacks, infrastructure (DNS
hijacking, route blackholing, misbehaving routers that drop traffic), etc.)
• Use of passwords and access control mechanisms
• Basic network defense tools and strategies
o Intrusion Detection
o Firewalls
o Detection of malware
o Kerberos
o IPSec
o Virtual Private Networks
o Network Address Translation
• Network Resource Management policies
• Auditing and logging

Learning Objectives:

1. Describe the enhancements made to IPv4 by IPSec
2. Identify protocols used to enhance Internet communication, and choose the appropriate protocol for a particular case.
3. Understand Intrusions and intrusion detection
4. Discuss the fundamental ideas of public-key cryptography.
5. Describe how public-key cryptography works.
6. Distinguish between the use of private- and public-key algorithms.
7. Summarize common authentication protocols.
8. Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.
9. Summarize the capabilities and limitations of the means of cryptography that are conveniently available to the general public.
10. Describe and discuss recent successful security attacks.
11. Summarize the strengths and weaknesses associated with different approaches to security.
Topic revision: r3 - 2013-10-22 - RobertKasper
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback