FALL 2005

CSUDH COMPUTER SCIENCE DEPARTMENT

COMPUTER NETWORKS

CSC 451


Professor: Kazimierz Kowalski, Ph.D.
Phone-number: (310)243-2034 / (310)243-3398
E-Mail:kkowalski@csudh.edu
WWW: http://mieszko.csudh.edu/csc451.html
Class Materials: http://mieszko.csudh.edu/csc451
Office: NSM E-115
Office-hours: MW 1:00PM - 3:00PM
Meetings: MW 11:30am - 12:45pm in WH A-118 NOTE THE ROOM CHANGE
Prerequisites: CSC 311, CSC321, CSC 331, CSC 341, and CSC353

Genius is the ability to avoid work by doing it right the first time


Text /[References]:

Computer Networks by Andrew S. Tanenbaum, Prentice Hall, Inc., 4th Edition, 2003 ISBN: 0-13-066102-3

Course goals and objectives: The goal of the course is to provide techniques for the design, analysis, and implementation of computer networks. The focus is on the principles that should underline the development of computer networks, and on relevant design and implementation techniques. The specific topics covered include: layered protocols, topology of a network, layer models and layers (physical, data link, network layer, transport and application layer), WWW elements (HTML and Java). The students will be given computer programming projects to cover these areas.
The objective of the course is to know the TCP/IP reference model as a system of analysis applied to the problem of computer network.

Learning outcomes: Succesfull students will learn WAN topologies (star, tree, full, irregular), LAN protocols (collision-free protocols, ALOHA protocols), routing algorithms (shortest path, distance vector routing), congestion control algorithms (leaky bucket, choke packets), three-way handshake algorithm, cryptography (substitution cipher, transposition cipher).

Course requirements:

There will be two midterm and an in-class final exams .
You will be required to submit research paper

Grading:


Completion of all exams and all projects is required to pass the course.

The following grading table will be used:

Score
94-100
91-93
88-90
84-87
81-83
78-80
74-77
71-73
68-70
64-67
61-63
0-60
Grade
A
A-
B+
B
B-
C+
C
C-
D+
D
D-
F

Academic Integrity: Academic integrity is of central importance in this and every other course at CSUDH. You are obliged to consult appropriate sections of University Catalog and obey all rules and regulations imposed by the university relevant to its lawful missions, processes, and functions.

Projects: Unless stated otherwise, all projects are individual assignments and are expected to be the student's own work. You may engage in general discussions concerning the solutions, but giving and receiving major portions is considered cheating. Projects must be handed in by "class's meeting time" on their assigned due date. Late projects will be penalized 5% per 24 hour period of lateness, up to 50%. No projects will be accepted 2 weeks after the due date.

All work turned in is to be typed.
Attendance and drop policy: Students are expected to attend lectures, study text, and contribute to discussions.
No man has a right to his opinion until he makes himself acquainted with the facts.
Prof. George Kittredge of Harvard
It is the student's responsibility to contact the instructor in the event a midterm exam is missed and to make arrangements before returning to class. Drops after (Consult CSUDH Class Schedule) will reflect the students average. The student must initiate all withdrawal procedures. Non-attendance does not constitute withdrawal and could result in an unearned F.

**You will be notified in class of any and all changes to this syllabus**


Tentative weekly schedule:
Week
Topic
Reading
Assignment
1
Introduction Ch 1
2
Physical Layer: Theory, Guided Transmission Media Ch 2: 2.1-2.2
3
Physical Layer: Wireless and Satellite Transmission Ch 2: 2.3-2.7
4
Data Link Layer: Codes, Elementary Protocols Ch 3: 3.1-3.3
5
Data Link Layer: Protocols and their Verification _ Ch 3: 3.4-3.6
6
The Medium Access Sublayer_Midterm Exam 1 Ch 4
7
Network Layer: Routing and Congestion Ch 5: 5.1-5.3
8
Network Layer: Internetworking, IP Protocol Ch 5: 5.4-5.6
9
Transport Layer: Elements Transport of Protocols Ch 6: 6.1-6.3
10
Transport Layer: TCP Protocol_Midterm Exam 2 Ch 6: 6.4-6.6
11
Application Layer: DNS Ch 7: 7.1-7.2
12
Application Layer: WWW, Multimedia _ Ch 7: 7.3-7.4
13
Network Security: Cryptograpy, Symmetric-Key Ch 8: 8.1-8.2
14
Network Security: Public Key, Digital Signature _due date Ch 8: 8.3-8.10 Research Paper
15
Review; Papers Presentations Ch "all"

FINAL EXAM Wednesday, December 14, 2005 @ 11:30am - 1:30pm


References
Larry Peterson and Bruce Davie, "Computer Networks: A Systems Approach, Second Edition," Morgan Kaufmann, 2000
ISBN: 1-55860-514-2


If you think I am tough, wait until you get a boss

Research Paper

Do the research and write 20-pages (or more) long research paper on one of the following topics:
1. Spyware and Adware programs and their removal
2. User authentication methods
3. Load balancing among multiple web servers
4. Intrusion Detection Methods
5. Visual Sensor Networks
6. Security related topic-TBA
7. Security related topic - TBD
8. Security issues - TBD
9. Firewall's Logs Data Mining
10........ TBA