IA Course

CPSC 4550: Computer Networks

Course Description
The theory, design, engineering, and installation of networks to connect digital computers. The course will prepare students to plan and implement a network. Also includes peer-to-peer networks, the client-server model, network operating systems, and an introduction to wide-area networks. The network and implementation tools may vary to meet current development trends. Prerequisites: CPSC 251 and 305 with grades of C or better.
James F. Kurose and Keith W. Ross, Computer Networking, Edition 3, Addison and Wesley, ISBN: 0-312-22735-2Companion Website: http://wps.aw.com/aw_kurose_network_4/

Syllabus: Here

Lecture Notes

Chapter 1: Computer Networking and and the Internet

What is a protocol? access networks, physical media, packet switching, circuit switching, delay, loss, throughput, protocol layers, OSI model, encapsulation, network attacks (malware, botnet, viruses, worms, denial-of-service attacks, packet sniffer, IP spoofing, etc.), history of computer networking and the Internet. 

Chapter 2.  Application Layer  Part 1, Part 2

Network application architectures, processes communicating, the Web and HTTP, FTP, SMTP, DNS, peer-to-peer applications, Distributed Hash Tables (DHTs), socket programming. 

Chapter 3. Transport Layer  Part 1, Part 2

Relationship between transport and network layers, multiplexing and demultiplexing, UDP, checksum, principles of reliable data transfer, TCP, flow control, principles of congestion control.  

Chapter 4. Network Layer  Part 1, Part 2

Forwarding and routing, virtual circuit and datagram networks, router, IP protocol, IPv4 addressing, ICMP, IPv6, routing algorithms, the Link-State (LS) routing algorithm, the Distance-Vector (DV) routing algorithm, hierarchical routing, Intra-AS routing (RIP and OSPF), inter-AS routing (BGP), broadcast and multicast routing.  

Chapter 5. Link Layer: Links, Access Networks, and LANs   Part 1, Part 2

Error-detection and correction techniques, parity checks, checksumming methods, cyclic redundancy check (CRC), multiple access links and protocols, channel partitioning protocols, random access protocols, taking-turns protocols, link-layer addressing and ARP, Ethernet, Link-Layer switches, virtual local area networks (VLANs), MPLS, data center networking. 

Chapter 6. Wireless and Mobile Networks

Wireless links and network characteristics, CDMA, 802.11 wireless LANs, Cellular Internet access, Mobility management (addressing, routing to a Mobile node), Mobile IP, GSM. 

Chapter 7. Multimedia Networking

Properties of video, properties of audio, UDP streaming, HTTP streaming, Adaptive streaming and DASH, Content distribution networks, Case studies (Netflix, YouTube, Kankan), Voice-over-IP, jitter, recovering from packet loss, RTP, SIP, Diffserv, QoS, Resource reservation, call admission. 

Chapter 8. Security in Computer Networks

Symmetric key cryptography, public key encryption, massage integrity and digital signatures, hash function, Message authentication code (MAC), end-point authentication, securing E-mail (PGP), security TCP connections (SSL), IPsec, Virtual Private Networks (VPN), Securing wiress LANs (WEP), firewalls, intrusion detection systems. 
Labs and Assignments

More IA Study Materials:


IA Academic Links 


Secure Use

General Security Policy: Cyber Ethics

Cyber Ethics 

General Security Policy: Information Technology Security Evaluation Criteria (ITSEC)

ITSEC Definition 

General Procedures: Inference

Inference Definition 

General Procedures: Rainbow Series

Rainbow Series 

General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems

NSTISS Glossary 

General Countermeasures and Safeguards: Computer Law

Computer Law 

General Countermeasures and Safeguards: Computer Media

Computer Media 

General Countermeasures and Safeguards: Evaluate Security Testing Tools

Security Testing Tools 

Administrative Countermeasures/Safeguards: Control Management

Change Control 
Control Management 

Administrative Countermeasures/Safeguards: Privacy Act

Privacy Act of 1974 

Operations Policies/Procedures: Keystroke Monitoring

Keystroke Monitoring 

Operations Policies/Procedures: Disaster Recovery Planning

Disaster Recovery 


Policy and Procedures: Incident Response

Incident Response 

Policy and Procedures: Witness Interrogation

Witness Interrogation 

Operations Countermeasures/Safeguard: Computer Attacks

Computer Attacks 
Computer Virus Timeline 

Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams



Administrative Policies/Procedures: Approval to Operate

Approval to Operate 

Administrative Policies/Procedures: Configuration/Change Control

Change Control 

Administrative Policies/Procedures: Copyright Protection

Copyright Protection 

Administrative Policies/Procedures: Patch Management

Patch Management 

Administrative Policies/Procedures: Records Management

Records Management 

Administrative Policies/Procedures: Wireless Use Policies

Wireless Use Policy 

Anomolies and Integrity

General Risk Management: Computer System Risk Management

Risk Management 

Access Control Safeguards: Computer System Access Control

Access Control 

Access Control Safeguards: Protected Distribution Systems

Protected Distribution System 

Access Control Safeguards: Information Systems Access Restrictions

Access Restrictions 


Access Control Mechanisms: KMI Applications

Key Management 

Access Control Mechanisms: Single Sign-on

Single Sign On 


IA Sites