COMP 3825 Networking and Information Assurance - sp2020

Course Description

This course will introduce the principles of computer networks, including: Layers of Networking, Applications (World-Wide Web, Email, DNS), and Network Management, etc. It will also introduce the basic concepts of information assurance, including Threat Model, Basic Cryptography (Symmetric Cryptography, Public-key Cryptography, Message Authentication), Security Policies and Cyberethics. (The content and syllabus are subject to adjustment during the semester.)

Prerequisites: MATH4614

Lecture

Monday/Wednesday, 12:40 pm - 2:05 pm, Psychology Building 204

TA

Saurab Dulal (sdulal@memphis.edu)

Khan AI Farabi (kfarabi@memphis.edu)

Office Hours

Instructor Office Hours: by appointment

TA Office Hours:

Monday 4:00 - 5:00 pm (Saurab Dulal, DH221)

Wednesday 4:00 - 5:00 pm (Khan AI Frabi, DH314)

Required Textbook

  • Computer Networking: A Top-Down Approach, 7th Edition, James F. Kurose and Keith W. Ross, Pearson, 2017 (ISBN: 0133594149)
  • Computer Networking: A Top-Down Approach, 6th Edition, James F. Kurose and Keith W. Ross. Free PDF!

Evaluation

Grading: Your final grade will come from the following sources:

  • 10% Class participation
  • 25% Homework
  • 20% Term Project
  • 15% Mid-term Exam
  • 30% Final Exam

Grading Scale: A+: 94, A: 90, A-: 87, B+: 84, B: 81, B-: 79, C+: 75, C: 72, C-: 68, D+: 64, D: 60, F: below 60

Course Policy

  • Late Policy: Without prior request, no late work will be accepted. All late submission maybe accepted at a penalty of 15% per day for no more than THREE days.
  • Testing Policy: The exam given is closed book/note/laptop/neighbor. But students are allowed to bring one cheat sheet (letter-sized 8.5-by-11) for quick reference. There will NOT be any makeup exams unless there is a documented emergency.
  • Homework Assignment and Project Report Policy: It is recommended that students use a word processing software (e.g., Word or LaTeX) to type their homework solutions or project report, then submit well-formatted PDF files.

DOD Cyber Scholarship Program (CySP)

Scholarship Description, Due: Feb 19th 2020

Homework

  • Homework 1 (PDF, WORD, Due: Feb 17th 23:59pm)
  • Homework 2 (PDF, WORD, Due: March 2nd 23:59pm)
  • Homework 3
  • Homework 4

Term Project

Course Schedule

  • Week 01:
    • Jan 22 - Lecture 1: Introduction (Slide 1)
  • Week 02:
    • Jan 27 - Lecture 2: Networking Overview (Slide 2)
    • Jan 29 - Lecture 3: Network Core and Quality of Service (Slide 3)
  • Week 03:
    • Feb 03 - Lecture 4: Network Layering and Security Overview (Slide 4)
    • Feb 05 - Lecture 5: Network Applications - Principles, Web and Http (Slide 5)
  • Week 04:
    • Feb 10 - Lecture 6: Network Applications - Email and DNS (Slide 6)
    • Feb 12 - Lecture 7: Socket Programming (Slide 7)
  • Week 05:
    • Feb 17 - Lecture 8: Transport Layer (Slide 8)
    • Feb 19 - Lecture 9: Principles of Reliable Data Transfer (Slide 9)
  • Week 06:
    • Feb 24 - Lecture 10: Transmission Control Protocol (TCP) (Slide 10)
    • Feb 26 - Lecture 11: TCP Congestion Control (Slide 11)
  • Week 07:
    • Mar 02 - Lecture 12: Midterm Review (Slide 12)
    • Mar 04 - Lecture 13: Midterm
  • Week 08:
    • Spring Break
  • Week 09:
    • Mar 16 - Lecture 14: Network Layer and IP
    • Mar 18 - Lecture 15: NAT, ICMP, SNMP and IPv6
  • Week 10:
    • Mar 23 - Lecture 16: Routing Algorithm
    • Mar 25 - Lecture 17: Routing in the Internet
  • Week 11:
    • Mar 30 - Lecture 18: Network Security Overview
    • Apr 01 - Lecture 19: Symmetric Key Cryptography I
  • Week 12:
    • Apr 06 - Lecture 20: Symmetric Key Cryptography II
    • Apr 08 - Lecture 21: Public Key Cryptography
  • Week 13:
    • Apr 13 - Lecture 22: TLS/SSL
    • Apr 15 - Lecture 23: Ethics in Computer Networking and Security
  • Week 14:
    • Apr 20 - Project Presentation 1
    • Apr 22 - Project Presentation 2
  • Week 15:
    • Apr 27 - Final Review
    • Apr 29 - Final Exam (in class exam)
Acknowledgment: Thanks all the authors for the textbook and slides. The copyright belongs to the original authors.