EEL4782 Syllabus Final

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

EEL 4782

Data Networks, Systems and Security


3 credits
College of Engineering, Electrical Engineering

COURSE SYLLABUS

Semester: Fall 2022


Class Meeting Days: Online only
Class Meeting Time: NA
Class Meeting Location: NA
Instructor: Prof. Nasir Ghani
Office Location: ENB 374
Office Hours: Wednesday 3:00-4:00 pm
Phone Number: (813) 974-4772
Email: [email protected]

I. University Course Description


The objective of this course is to provide a technical and operational introduction to
data/computer communication networks, including network management and security.

II. Course Prerequisites


This course is open to students in all majors/disciplines. Basic familiarity with computers
and networking applications is expected.

III. Course Purpose


This course provides an introduction to data/computer networks along with related
security concerns. Students will form a basis for learning how to install, configure, maintain,
upgrade, and troubleshoot networks.

IV. How to Succeed in this Course


The video lectures and slides cover all course content in detail and it is recommended that
students review them carefully. Additional reading materials will also be provided from the
course text. In order to properly learn the subject matter, students should read the
assigned materials regularly and attempt all module quizzes and projects on their own.

V. Course Topics
1. Overview of Networking, Networked Media, Network Architectures and Topologies
2. IT System Components, Network Devices and Network Services

1
3. Network Technology and Protocols
4. Network Management
5. Overview of Network Security Issues

VI. Student Learning Outcomes


The objective of this course is to provide a technical and operational introduction to data/
computer communication networks. By the end of this course, students will be able to:
a. Demonstrate a basic understanding of networking components and explain how they
interact
b. Develop foundational knowledge on how to install, configure, maintain, upgrade, and
troubleshoot networks
c. Categorize layered network architectures and topologies and detail the main elements
in information technology networks (including routers, switches, gateways, servers,
workstations, and storage devices)
d. Identify and describe the higher-level protocols and monitoring tools used in packet
switching networks
e. Explain the role of network management and performance optimization techniques and
detail key troubleshooting and congestion control strategies
f. Identify and describe a range of security issues and topics, including encryption,
authentication, firewalls and intrusion detection, security management tools, and
threat scenarios

VII. Required Texts and/or Readings and Course Materials


• WireShark software tool (free, open source)

VIII. Supplementary (Optional) Texts and Materials


• J. Kurose, K. Ross, Computer Networking: A Top-Down Approach (6th Edition), Pearson
Publishers, Boston, MA, 2013 (ISBN: 0132856204, 978-0132856201)
• A. Tanenbaum, D. Wetherall, Computer Networks: 5th Edition, Prentice Hall Publishers,
New York, NY, 2010 (ISBN: 0132126958, 978-0132126953)
• Various online reading resources will also be provided with the course modules

IX. Grading Scale


Grading Scale (%)
90-100 A
80 - 89 B
70 - 79 C
60 - 69 D
0 - 59 F

Grades for quizzes and projects in this course will be posted on Canvas and can be
accessed using the “Grades” option.

2
X. Grade Categories and Weights
Quizzes (5 in total): 70%
Projects (2 in total): 30%
Students are expected to complete all 5 course modules (video lectures, slides, reading)
and attempt the associated quizzes for each. The 2 projects are to be done independently
and will be announced several weeks in advance. Late submissions will only be accepted
under special and valid circumstances.

XI. Project Assignments


Students will be required to complete 2 course projects individually. All projects will require
final report submission to be graded. The projects will involve downloading software
tool(s), conducting tests, gathering data, and writing reports. Projects will be evaluated
based upon their completeness, accuracy, and final presentation writeup.

XII. Grade Dissemination


Grades for quizzes and projects in this course will be posted on Canvas and can be accessed
using the “Grades” option.

XIII. Course Schedule

Week Finish This Homework Before Class Topics to be Discussed in Class


- Complete introduce yourself - Databases and Database
1
- Start Module 1 materials and videos Management Systems
- View Module 3 materials and videos - Overview of Networking,
- Reading: Kurose & Ross Networked Media, Network
- Ch. 1.1 - What is the Internet? What is a Architectures and Topologies
protocol?
1-2 - Ch. 1.2 - The network edge
- Ch. 1.5 - Protocol Layers and Their Service
Models
- Ch. 1.7 - History of Computer Networking and
the Internet
- View Module 4 materials and videos
- Reading: Kurose & Ross
- Ch. 4.3 - What’s Inside a Router, input
processing, switching, output processing and
where does queuing occur? - IT System Components, Network
2-3
- Ch. 5.6 - Data center networking Devices and Network Services
- Ch. 8.7.1 - IPsec and Virtual Private Networks
(VPNs)
- Ch. 8.9 - Operational security, firewalls and
intrusion detection systems
- View Module 5 materials and videos
- Reading: Kurose & Ross - Network Technology and
3-4
Protocols

3
- Ch. 1.3 - Packet switching and circuit
switching
- Ch. 1.4 - Delay, Loss, and Throughput in
Packet-Switched Networks
- Ch. 2.1 - Principles of network applications
- Ch. 2.2 - The Web and HTTP
- Ch. 2.5 - DNS—The Internet’s Directory
Service
- Ch. 2.7- Socket Programming: Creating
Network Applications
- Ch. 3.5- Connection-Oriented Transport: TCP
- Ch. 3.7 - TCP congestion control
- Ch. 4.1 - Forwarding and Routing
- Ch. 4.3 - What’s Inside a Router?
- Ch. 4.4 - The Internet Protocol (IP):
Forwarding and Addressing in the Internet
- Ch. 8.6 - Securing TCP Connections: SSL
- View Module 6 materials and videos
- Reading: Kurose & Ross
- Ch. 3.7 - TCP congestion control
- Ch. 4.5 - Routing algorithms, link stat,
distance vector
- Ch. 4.6 (re-read Ch. 1.4) - Internet routing,
OSPF, BGP
4-6 - Network Management
- Ch. 7.5.1 - Dimensioning best-effort networks
- Ch. 9.1 - What Is Network Management?
- Ch. 9.2 - The Infrastructure for Network
Management
- Ch. 9.3.1- 9.3.3 - Internet management
framework, SMI, MIB, SNMP
- Project 1 due (2/21)
- View Module 7 materials and videos
- Reading: Kurose & Ross
- Ch. 8.1- 8.4 - Network Security, Principles of
cryptography, message integrity and digital - Overview of Network Security
6-8
signals, end-point authentication Issues
- Ch. 8.6 - Securing TCP Connections: SSL
- Ch. 8.8 - Securing wireless LANs, WEP, 802.11i
- Project 2 due (3/1)

* Note: The schedule is subject to revision

XIV. Standard University Policies

Policies about disability access, religious observances, academic grievances, academic


integrity and misconduct, academic continuity, food insecurity, and sexual harassment are

4
governed by a central set of policies that apply to all classes at USF. These may be
accessed at: https://www.usf.edu/provost/faculty/core-syllabus-policy-statements.aspx

XV. Covid-19 Procedures

All students must comply with university policies and posted signs regarding COVID-19
mitigation measures, including wearing face coverings and maintaining social distancing.
Failure to do so may result in dismissal from class, referral to the Student Conduct Office,
and possible removal from campus.

Additional details are available on the University’s Core Syllabus Policy Statements page:
https://www.usf.edu/provost/faculty/core-syllabus-policy-statements.aspx

XVI. Course Policies: Grades (as applicable)

Late Work Policy: There is generally no make-up for missed project reports and quizzes
except under exceptional and valid circumstances. Projects turned in late will be assessed
a penalty of 10% for each late day.

Extra Credit Policy: Extra credit assignments will not be given except in special
circumstances. If extra credit is granted, the marks will be added to the final percentage.

Grades of "Incomplete": An “I” grade may be awarded to a student only when a small
portion of the student’s work is incomplete and only when the student is otherwise earning
a passing grade. The time limit for removing the “I” is to be set by the instructor of the
course. For undergraduate students, this time limit may not exceed two academic
semesters, whether or not the student is in residence, and/or graduation, whichever comes
first. For graduate students, this time limit may not exceed one academic semester. “I”
grades not removed by the end of the time limit will be changed to “IF” or “IU,” whichever
is appropriate.

Rewrite Policy: Project report rewrites are not allowed in this course.

Make-up Exams Policy: If a student cannot complete a module quiz for a valid reason
(validity to be determined by instructor), a make-up attempt will be given only if the student
has notified the instructor in advance. The make-up quiz time will be agreed upon with the
instructor.

Exam Retention Policy: Course materials will be kept online until the completion of the
course.

Group Work Policy: All students must complete their quizzes and projects individually.

5
Final Examinations Policy: All final exams are to be scheduled in accordance with the
University’s final examination policy.

XVII. Course Policies: Technology and Media

Email: Students can email the instructor or course TAs directly. Emails will usually be
replied with in 2-3 business days.

Canvas: This course will be offered via USF's learning management system (LMS), Canvas.
All assignments, supplemental/online reading materials, and course announcements will be
posted on Canvas, i.e., assignment and project deadlines, exam dates, etc. Hence students
should regularly check Canvas once a week for any updates. If you need help learning
Canvas, consult the Canvas help guides. You may also contact USF's IT department at (813)
974-1222 or [email protected].

Course Blog: There is no blog for this course.

XVIII. Course Policies: Student Expectations

Attendance Policy: Students are expected to log in and view the course videos and
complete the modules in a timely manner. The instructor should be notified if a student is
going to be absent for an extended period of time and for a valid reason so that
arrangements can be made to make up any missed work.

Academic Integrity: Academic integrity is the foundation of the University of South Florida
System’s commitment to the academic honesty and personal integrity of its university
community. Academic integrity is grounded in certain fundamental values, which include
honesty, respect, and fairness. Broadly defined, academic honesty is the completion of all
academic endeavors and claims of scholarly knowledge as representative of one’s own
efforts. The final decision on an academic integrity violation and related academic sanction
at any USF System institution shall affect and be applied to the academic status of the
student throughout the USF System, unless otherwise determined by the independently
accredited institution. The process for faculty reporting of academic misconduct, as well as
the student’s options for appeal, are outlined in detail in USF System Regulation 3.027.

Disruption to Academic Progress: Disruptive students in the academic setting hinder the
educational process. Disruption of the academic process is defined as the act, words, or
general conduct of a student in a classroom or other academic environment which in the
reasonable estimation of the instructor: (a) directs attention away from the academic
matters at hand, such as noisy distractions, persistent, disrespectful or abusive interruption
of lecture, exam, academic discussion, or general University operations, or (b) presents a
danger to the health, safety, or well-being of self or other persons.

6
Professionalism Policy: Students are expected to conduct their online discourse in a
respectful manner. Per university policy and classroom etiquette; mobile phones, iPods,
etc. must be silenced during lectures.

Course Hero Policy: The USF Policy on Academic Integrity specifies that students may not
use websites that enable cheating, such as by uploading or downloading material for this
purpose. This does apply specifically to CourseHero.com and Chegg.com – any use of these
websites (including uploading materials) constitutes a violation of the academic integrity
policy.
Turnitin.com: This course uses Turnitin, an automated system which can compare each
student's assignment with billions of web sites, as well as an enormous database of student
papers that grows with each submission. Accordingly, you will be expected to submit all
assignments in both hard copy and electronic format. After the assignment is processed,
the instructor receives a report from turnitin.com that states if and how another author’s
work was used in the assignment. For a more detailed look at this process visit
http://www.turnitin.com. Essays are due at turnitin.com the same day as in class.

End of Semester Student Evaluations: All classes at USF make use of an online system for
students to provide feedback to the University regarding the course. These surveys will be
made available at the end of the semester, and the University will notify you by email when
the response window opens. Your participation is highly encouraged and valued.

You might also like