Networks and Communications MS216 - Course Outline -

Similar documents
Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

CompTIA Network+ Course

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

University of San Francisco Course Syllabus and Outline

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Unit 28 Website Production ASSIGNMENT 1

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

AccessEnforcer Version 4.0 Features List

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Faculty of Science & Information Technology

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Hands-On TCP/IP Networking

Cisco 1: Networking Fundamentals

Introduction to TCP/IP

INTE-C5O44 - Internet

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Network Security. Thierry Sans

ADVANCE DATA COMMUNICATION AND. B.Ed.(Secondary) - COMPUTER SCIENCE

CODE COURSE NAME DESCRIPTION SEM CS401 Communication Engineering & Coding Theory Knowledge of communication engineering & coding theory IV

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Ethical Hacking and Prevention

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

Chapter 4 The Internet

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

MLR Institute of Technology

programming exercises.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Chapter 2. Switch Concepts and Configuration. Part II

CS 356 Internet Security Protocols. Fall 2013

IT Foundations Networking Specialist Certification with Exam

IT4405 Computer Networks (Compulsory)

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

EEL DATA NETWORKS, SYSTEMS, AND SECURITY Fall 2016

CyberP3i Course Module Series

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

FIT5044 Network security. Unit Guide. Semester 1, 2010

Security+ SY0-501 Study Guide Table of Contents

Entry Level Assessment Blueprint Computer Networking Fundamentals

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

Computer Networking Fundamentals

Computer Networking Fundamentals

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Application of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA

MTA_98-366_Vindicator930

CompTIA Network+ N10-005

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

VoIP / RoIP for Technicians

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department

Strategic Infrastructure Security

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

The Administration Tab - Diagnostics

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

CompTIA Network+ Outcomes. Lab Outline. Course Code N Released March Skill Level Intermediate. Duration 26 hrs

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

PLEASE READ CAREFULLY BEFORE YOU START

Computer and Network Security

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

QUESTION BANK UNIT-I

Step-by-Step Configuration

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

Connecting the DI-804V Broadband Router to your network

Hands-On Ethical Hacking and Network Defense

Fundamentals of Network Security v1.1 Scope and Sequence

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Enterprise Network Design ITP 499 (3 Units)

Chapter 4: Networking and the Internet

Assignment - 1 Chap. 1 Wired LAN s

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Gigabit SSL VPN Security Router

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

Introduction and Overview. Why CSCI 454/554?

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CompTIA Security+ Certification

Faculty of Science and IT Course title. Pre-requisite/corequisite

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

On successful completion of this course students should:

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Systems and Network Security (NETW-1002)

Network Architecture I

Understanding Networking Fundamentals

Syllabus: The syllabus is broadly structured as follows:

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

Transcription:

Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the fundamentals of modern network and Internet technologies and to combine them with applications and practices related to a business environment. Dr. Anatoli Nachev ext: 3882 e-mail: anatoli.nachev@nuigalway.ie Lectures: Labs: Thursday, 10-12, BS242, Cairnes Building Tuesday, 11-1, BS242, Cairnes Building Upon completion of this course you will be able to: To describe the fundamentals of modern data communications, organisational interconnectivity, Internet technologies, and to relate them to a business environment. Recognise common Internet communication protocols and describe the services associated with them. Demonstrate understanding of manager role in developing a communication infrastructure. Present (in oral form) the relative advantages and limitations of network and communication technologies and configurations. Recognise security threats an organisation is exposed to and develop an understanding of security protection techniques and practices. The course comprises one weekly 2-hrs lecture across 12 weeks plus one weekly 2-hrs lab across 3 weeks. 3BF1 (3 rd year BIS) Course Material A course web is available at http://blackboard.nuigalway.ie Page 1 of 8

Assessment Workload 1. End of Year Examination 65% 2. Continuous Assessment 15%* 3. Mid-term group assignment 20% * Continuous assessment involves five MCQ tests. Credit weighting: 5 ECT Lecture hours: 24 Computer laboratory hours: 6 Independent assignment work: 25 Independent study: 55 Associated hours: 13 Examination: 2 Total Student Effort: 125 hours Core Text: (Students need their own copy) [1] MS216 Networks & Communications Course Pack. [2] Forouzan, B., 2003, Business Data Communications, McGraw-Hill, 1 ed., ISBN: 0-7- 112194-3. Supplementary Text(s): [3] Forouzan, B., Data Communications and Networking, 4 ed., McGraw-Hill, 2007. [4] Stallings, W., Business Data Communications, 6 ed., Prentice Hall, 2007. [5] Fitzgerald, J & Dennis, A. Business Data Communications and Networking, 10 ed., John Wiley & Sons, 2010. [6] Forouzan, B. TCP/IP Protocol Suite, McGraw-Hill, 3 rd ed., 2006. [7] Panko, R. Business Data Networks and Telecommunications, 7 ed. Prentice Hall, 2009. [8] Stallings, W., Cryptography and Network Security: Principles and Practice, 4 ed., Prentice Hall, 2006. [9] http://httpd.apache.org/docs/misc/faq.html [10] Conklin et al. Principles of Computer Security. Security+ and Beyond, McGraw-Hill, 2004. Page 2 of 8

Agenda Topic Week 1: Internet - Overview Computer networks - overview. The Internet history. Internet administration. Conceptual view of Internet. o ISPs. OSI overview. [1] Ch 1 [2] Ch 1, 13 [3] Ch 1,2, App. C [5] Ch 1 [6] Ch 1, 2 [7] Ch 6 Readings Week 1 Outcomes: You will be able to Distinguish between different types of networks. Describe the Internet evolution. Describe Internet authorities and their functions. Explain the Internet structure. Distinguish between network layers. Week 2: Internet Connectivity Internet infrastructure. Internet connectivity o Conventional modems. o ISDN. o DSL. o Cable modems. o Leased lines, packet switched WANs. o Fixed wireless Internet. o Satellite Internet. [1] Ch 2 [2] Ch 8, 9, 12 [3] Ch 9, 18, 20, 21 [5] Ch 7, 8, 9 [6] Ch 3 Week 2 Outcomes: You will be able to Distinguish between different technologies used for connection to the Internet. Identify the role of the manager in selecting correct connections. List advantages and limitations of those connections. Explain what equipment is required for each type of connection. To identify some new and emerging technologies for Internet connection. Weeks 3, 4: Internet Communication Model: Application Layer Services Communication models and protocol suites: TCP/IP, IPS/SPX, AppleTalk, SNA. TCP/IP protocols stack. E-mail components and functioning. o User agents and mail transfer agents. [1] Ch 3, 4 [2] Ch 2, 13 [3] Ch 26, 27 [4] Ch 4 [5] Ch 2 [6] Ch 18, 19, 20, 22, 23 Page 3 of 8

o E-mail delivery stages. o Push protocol - SMTP, MIME. o Access protocols POP3 and IMAP, proprietary protocols. o Mailing lists. o Spam and anti-spam techniques. FTP. Telnet. World Wide Web. o WWW components. o URL, URN, URI. o Search engines and Google - components and operation. o Browser architecture. o Hyper-Text Transfer Protocol (HTTP). o HTTP request and response messages. o Web documents. Weeks 3, 4 Outcomes: You will be able to Describe fundamentals of the Internet application layer services. Recognise communication protocols HTTP, SMTP, POP, IMAP, MIME, FTP, and Telnet and comment on their correct usage. Identify messages that clients and servers exchange. Take decision on building up an Internet server infrastructure. List anti-spam techniques and policies. Weeks 5, 6: Internet Communication Model: Web Servers Web server location, outsourcing, collocation. o Server OS Web server hardware requirements, fault tolerance. Web server software. Apache. IIS: setup and configuration, security settings. IIS administration tools. o Management Console. o User manager. o Server security. IIS: Fault tolerance and backup, backup policy. o IIS: Web server logging. [1] Ch 5 [9] Page 4 of 8

Weeks 5, 6 Outcomes: You will be able to Take decision on selection of o Server location o Hardware o Fault tolerance components o Software Recognise which server components are to be installed. Demonstrate techniques for remote administration. Demonstrate basic server administration activities. Set up intranet / extranet sites. Week 7: IP Addresses and Routing. Transport layer protocols: TCP and UDP. Network layer and IP. IP addresses o IP address classification o Subnetting and supernetting o Masks o Dynamic address configuration, DHCP o IP address registration Routing techniques. Static vs. dynamic routing, routing algorithms. [1] Ch 6 [2] Ch 4 [3] Ch 20, 21, 22, 25 [6] Ch 4, 5, 6 Week 7 Outcomes: You will be able to Describe the IP address distribution mechanism and recognise distribution organisations. Distinguish between different classes of IP addresses and their suitability to different sizes of organisations. Explain the DHCP service. Demonstrate work with IP utilities such as PING, TRACERT, IPCONFIG. Distinguish between different routing techniques. Week 8: Domain Name System (DNS) Domain name space. Distribution of name space, DNS servers, zones. DNS and Internet. DSN resolution, caching. Domain name registration. DNS utilities. [1] Ch 7 [3] Ch 25 [6] Ch 16 Page 5 of 8

Week 8 Outcomes: You will be able to Explain the role of the domain name system in a communication infrastructure and a necessity of a DNS server. Use FQDN and PQDN. Distinguish between different types of DNS resolution. Improve efficiency of services by caching. Work with DNS utilities. Week 9: Need for Security: Attacks and Malware Business needs for information security Denial-of-service attacks o SYN flooding o Ping of death o Distributed DoS Backdoors & trapdoors Sniffing IP spoofing Smurf attacks Man-in-the-middle attack Reply attack Password guessing and cracking Malware o Viruses o Trojans o Worms o Logic bombs [10] Ch 15, also available from http://highered.mcgrawhill.com/sites/dl/free/0072255099/ 172083/SampleChapter.pdf Week 9 Outcomes: You will be able to Recognise that organisations have business needs for information security Identify threats posed to information security Describe the most common attacks, including denial-of-service, spoofing, sniffing, password attacks, etc. Describe the different types of malicious software that exist, including viruses, worms, trojans, and logic bombs Weeks 10, 11: Network Security Techniques Security requirements. Secret key encryption o Block ciphers: DES, TDES, AES. Key management, session keys. o Diffie-Hellman protocol. o Key Distribution Center (KDC). o Kerberos. Public key encryption, RSA algorithm. Digital signature. [1] Ch 9 [2] Ch 14 [3] Ch 29, 30, 31 [4] Ch 20 [5] Ch 10 [7] Ch 9, module F [8] Ch 9, 10, 11 Page 6 of 8

Digital certificates. Security protocols: o IPsec. o TLS / SSL. o Application layer security. Networks & Communications MS216 Weeks 10, 11 Outcomes: You will be able to List security requirements for a secure system over the Internet. Distinguish between secret and private key encryption. Describe the role of digital signature and digital certificates in secure communications. Compare different classes of digital certificates and explain the application process. Describe the strengths and weaknesses of different encryption and key distribution techniques. Explain how a secure connection between browsers and servers is established. Weeks 12: Attack Prevention systems Firewalls o Packet filters. o Circuit-level gateways. o Application gateways. o Stateful multilayer inspection firewall. o Network address translation (NAT). Firewall architecture. Security holes. Virtual Private Networks (VPNs). [1] Ch 10 [2] Ch 10, 14 [3] Ch 30, 31 [7] Ch 9, module F [8] Ch 16, 18 Week 12 Outcomes: You will be able to Distinguish between different types of firewalls and their correct deployment. Discuss how NAT servers enhance security of an organisation. Describe how hacker attacks are usually launched. Explain how VPNs provide cheap solutions for secure connections between branches of a corporate network or between individuals and a network. Page 7 of 8

Lectures & Labs Schedule: Networks & Communications MS216 Semester 1 Week Lecture Lab 1 y 2 y 3 y 4 y 5 y 6 y 7 y y 8 y y 9 y y 10 y 11 y 12 y Other Information: Lab sessions will begin in week 7 and persist to week 9 inclusive, providing 3 sessions. Each session is of 2 hours duration. Labs use a LAN of servers based on MS Windows 2003 and IIS v.6.0. General: This course is available on the Blackboard in ppt format. Should you have a visual disability and require the document in another format, please contact me and I will oblige. Page 8 of 8