DE050 Computer Network and Security

Course Description

This course is an introductory course to computer networks and security. The emphasis will be on the transmission theory, network technologies and network management. The knowledge gained in this course will be used to understand and appraise computer networks. The areas of study include basic communication theory, network topologies, network devices, layered network architecture, networking protocols, security and management issues in computer networks and internet servers

Class schedule

Tuesday 2-5pm in room 808

Course Intended Learning Outcomes

By the end of the course, students should be able to:

  1. Illustrate the basic concepts of data communications.
  2. Appraise and evaluate the different topologies and hardware for implementing a simple local area networks.
  3. Explain different networking protocols and their use in real-world network applications.
  4. Explain the concepts in network development and networking applications.
  5. Experiment simple network security and management policies.

Assessment tasks/activities

Books

  1. Kurose, J. F. & Ross, K. W. (2017). Computer Networking: A Top-Down Approach. (7th ed.), Pearson.
  2. Wenliang Du (2019), Computer Security: A Hands-on Approach (2nd ed.), https://www.handsonsecurity.net/ .

Course materials

TOPICS Reading Part LECTURE NOTES
Download
000: Course logistics.

Network architecture


102: Network overview chapter 1 I
104: Network edge chapter 1 I
106: Network core chapter 1 I
108: Access network chapter 1 I
110: LAN topology
I
112: Physical media
I
114: Internet structure chapter 1 I
116: Performance chapter 1 I
118: Protocol model chapter 1 I
120: Internet, history chapter 1 I
Application Layer    
202: Application layer chapter 2 I
204: Web and HTTP chapter 2 I
206: ftp chapter 2 I
208: Secured Shell chapter 2 I
210: e-mail chapter 2 I
212: DNS chapter 2 I
214: Port numbers chapter 2 I
216: File sharing chapter 2 I
218: Socket chapter 2 I
L4 - Transport Layer    
302: Transport layer chapter 3 I
302: UDP chapter 3 II
304: TCP chapter 3 II
306: Congestion chapter 3 II
L3 - Network Layer    
402: Network layer chapter 4 I
404: Router chapter 4 I
406: IPv4 chapter 4 I
408: Routing chapter 4 I
408: ICMP, IPv6 chapter 4 II
410: Internet routing chapter 4 II
412: Broadcast and Multicast chapter 4 II
L2 - Link Layer    
502: Link layer: Services, Error detection and correction chapter 5 II
504: Multiple access protocols chapter 5 II
506: Link-layer addressing chapter 5 II
508: Ethernet chapter 5 II
510: Switch and Hub chapter 5 II
512: PPP chapter 5 II
514: Link virtualization; ATM and MPLS chapter 5 II
Wireless and Mobile Networks (How things you learned fit together)    
602: Wireless Networks 1 chapter 5
604: Wireless Networks 2 chapter 5
620: Wireless Access chapter 5
2300: Communication System
I
2302: Amplitude modulation
I
2302: Amplitude modulation reference Tutorial at www.radioelectronicschool.com I
2312: Frequency modulation
I
2312: Frequency modulation reference Tutorial at www.radioelectronicschool.com I
2400: Digital information
I
2402: Digital communication system
I
2404: Information theory and entropy
II
2406: Channel capacity
I
2408: Source coding
II
2502: Sampling
I
2504: Pulse modulation
I
2506: Quantization
I
2508: Pulse code modulation
I
2510: Probability of error and Eb/n performance
I
2512: Matched filter detection
II
2512: Matched filter detection reference Tutorial at www.complextoreal.com II
2514: ISI and pulse shaping
II
2514: ISI and pulse shaping reference Tutorial at www.complextoreal.com II
2516: Equalization
II
2602: Bandpass modulation schemes (ASK, FSK, PSK)
I
2604: Bandpass demodulation/detection schemes (ASK, FSK, PSK)
I
2606: PSK and ASK in vector representation
I
2608: Orthogonal frequency shift keying
I
2610: Probability of error with bandpass detection
II
2612: QPSK
I
2612: QPSK reference QPSK modulation demystified I
2614: MSK
II

Return to menu