IA Course

CPSC 4550: Computer Networks

Course Description

The theory, design, engineering, and installation of networks to connect digital computers. The course will prepare students to plan and implement a network. Also includes peer-to-peer networks, the client-server model, network operating systems, and an introduction to wide-area networks. The network and implementation tools may vary to meet current development trends. Prerequisites: CPSC 251 and 305 with grades of C or better.


Textbook

James F. Kurose and Keith W. Ross, Computer Networking, Edition 3, Addison and Wesley, ISBN: 0-312-22735-2Companion Website: http://wps.aw.com/aw_kurose_network_4/


Syllabus: Here


Lecture Notes

  • Chapter 1: Computer Networking and and the Internet

    • What is a protocol? access networks, physical media, packet switching, circuit switching, delay, loss, throughput, protocol layers, OSI model, encapsulation, network attacks (malware, botnet, viruses, worms, denial-of-service attacks, packet sniffer, IP spoofing, etc.), history of computer networking and the Internet.
  • Chapter 2.  Application Layer  Part 1, Part 2

    • Network application architectures, processes communicating, the Web and HTTP, FTP, SMTP, DNS, peer-to-peer applications, Distributed Hash Tables (DHTs), socket programming. 
  • Chapter 3. Transport Layer  Part 1, Part 2

    • Relationship between transport and network layers, multiplexing and demultiplexing, UDP, checksum, principles of reliable data transfer, TCP, flow control, principles of congestion control.  
  • Chapter 4. Network Layer  Part 1, Part 2

    • Forwarding and routing, virtual circuit and datagram networks, router, IP protocol, IPv4 addressing, ICMP, IPv6, routing algorithms, the Link-State (LS) routing algorithm, the Distance-Vector (DV) routing algorithm, hierarchical routing, Intra-AS routing (RIP and OSPF), inter-AS routing (BGP), broadcast and multicast routing.  
  • Chapter 5. Link Layer: Links, Access Networks, and LANs   Part 1, Part 2

    • Error-detection and correction techniques, parity checks, checksumming methods, cyclic redundancy check (CRC), multiple access links and protocols, channel partitioning protocols, random access protocols, taking-turns protocols, link-layer addressing and ARP, Ethernet, Link-Layer switches, virtual local area networks (VLANs), MPLS, data center networking. 
  • Chapter 6. Wireless and Mobile Networks

    • Wireless links and network characteristics, CDMA, 802.11 wireless LANs, Cellular Internet access, Mobility management (addressing, routing to a Mobile node), Mobile IP, GSM. 
  • Chapter 7. Multimedia Networking

    • Properties of video, properties of audio, UDP streaming, HTTP streaming, Adaptive streaming and DASH, Content distribution networks, Case studies (Netflix, YouTube, Kankan), Voice-over-IP, jitter, recovering from packet loss, RTP, SIP, Diffserv, QoS, Resource reservation, call admission. 
  • Chapter 8. Security in Computer Networks

    • Symmetric key cryptography, public key encryption, massage integrity and digital signatures, hash function, Message authentication code (MAC), end-point authentication, securing E-mail (PGP), security TCP connections (SSL), IPsec, Virtual Private Networks (VPN), Securing wiress LANs (WEP), firewalls, intrusion detection systems. 

Labs and Assignments


More IA Study Materials:

 Textbooks


IA Academic Links 


Resources

Secure Use

General Security Policy: Cyber Ethics

Cyber Ethics 

General Security Policy: Information Technology Security Evaluation Criteria (ITSEC)

ITSEC Definition 

General Procedures: Inference

Inference Definition 

General Procedures: Rainbow Series

Rainbow Series 

General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems

NSTISS Glossary 
TEMPEST 

General Countermeasures and Safeguards: Computer Law

Computer Law 

General Countermeasures and Safeguards: Computer Media

Computer Media 
Remanence 

General Countermeasures and Safeguards: Evaluate Security Testing Tools

Security Testing Tools 

Administrative Countermeasures/Safeguards: Control Management

Change Control 
Control Management 

Administrative Countermeasures/Safeguards: Privacy Act

Privacy Act of 1974 

Operations Policies/Procedures: Keystroke Monitoring

Keystroke Monitoring 

Operations Policies/Procedures: Disaster Recovery Planning

Disaster Recovery 

Incidents

Policy and Procedures: Incident Response

Incident Response 

Policy and Procedures: Witness Interrogation

Witness Interrogation 

Operations Countermeasures/Safeguard: Computer Attacks

Computer Attacks 
Computer Virus Timeline 

Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams

CERT 

Configuration

Administrative Policies/Procedures: Approval to Operate

Approval to Operate 

Administrative Policies/Procedures: Configuration/Change Control

Change Control 

Administrative Policies/Procedures: Copyright Protection

Copyright Protection 

Administrative Policies/Procedures: Patch Management

Patch Management 

Administrative Policies/Procedures: Records Management

Records Management 

Administrative Policies/Procedures: Wireless Use Policies

Wireless Use Policy 

Anomalies and Integrity

General Risk Management: Computer System Risk Management

Risk Management 

Access Control Safeguards: Computer System Access Control

Access Control 

Access Control Safeguards: Protected Distribution Systems

Protected Distribution System 

Access Control Safeguards: Information Systems Access Restrictions

Access Restrictions 

Administration

Access Control Mechanisms: KMI Applications

Key Management 

Access Control Mechanisms: Single Sign-on

Single Sign On


IA Sites