Syllabus - CYBR 230: Advanced Computer Networking - Fall 2018

Instructor

Name Jeff Shafer
Office Anderson Hall 205
Phone (209) 946-2302
Email jshafer at pacific dot edu
Office Hours Tue/Thur 1-3 pm, and by e-mail appointment.
Please email to request alternate meeting times outside of scheduled office hours.

Course Basics

Class Hours Tuesday, Thursday, 5:00-6:20pm in CTC 214
Prerequisites COMP 053 or completion of “Data Structures” with a “C” or better
COMP 177, ECPE 177 or completion of “Computer Networking” with a “C” or better.
Textbook No textbook is required for this course.
Optional reference books may be suggested throughout the semester, and I welcome feedback on any online/print references you find useful!
Credits 3

Course Description

The modern Internet is a communications system of global scale and high complexity. In this course, students will study the technological underpinnings that enable modern network communication, including routing, network, and application-layer protocols. Wired, wireless, and cellular networks will be examined. The course will include a laboratory, with emphasis placed on determining the current state of a network through network mapping, traffic analysis, and protocol analysis.

Course Learning Objectives

Upon completion of the course, students will be able to:

  • Describe how networks work at the infrastructure, network and applications layers
  • Describe how network protocols work to enable communication, including a thorough knowledge of all the major network protocols
  • Describe how lower-level network layers support the upper layers
  • Describe user associations and routing in a cellular/mobile network
  • Describe the interaction of elements within the cellular/mobile network core
  • Describe the end-to-end delivery of a packet or signal and what happens with the hand-off at each step along the communications path
  • Describe differences in core architecture between different generations of cellular and mobile network technologies
  • Use industry-standard tools to map a network and analyze the network traffic flowing over it at both a protocol and application level
  • Integrate knowledge of infrastructure, network, and application layer protocols in large-scale network programming projects

Program Learning Outcomes

The MS in Cybersecurity program has identified eleven program learning outcomes that are satisfied by required courses. These program learning outcomes, and the level at which each course satisfies them, is identified in the following table:

Course

CYBR 200

CYBR 210

CYBR 220

CYBR 230

CYBR 240

CYBR 250

CYBR 280

Low Level Programming Languages

D

 

M

M

 

 

 

Software Reverse Engineering

 

 

M

 

 

 

 

Operating System Theory

D

 

 

 

 

M

 

Networking

 

 

 

M

 

 

 

Cellular and Mobile Technologies

 

 

 

M

 

 

 

Discrete Math and Algorithms

M

 

 

 

 

 

 

Cyber Defense

D

 

 

 

M

 

 

Security Fundamental Principles

D

 

 

 

M

 

 

Vulnerabilities

 

M

 

 

 

 

 

Cybersecurity Law

 

 

 

 

 

M

 

Communication Skills

 

D

 

 

 

M

 

D = Developed (learning outcome developed through multiple assignments with extensive feedback)
M = Mastered (learning outcome mastered through a robust assignment; appropriate for graduation)

Note: CYBR 280 (Cyber Security Capstone Project): This student project must demonstrate mastery in at least five different cybersecurity competencies (including cybersecurity law and communication skills)

Course Topics

The topics covered in this course include:

  • Routing, network, and application protocols:
  • Network architectures
  • Network security
  • Wireless network technologies
  • Network traffic analysis
  • Network protocol analysis
  • Network mapping techniques
  • Overview of smart phone technologies
  • Overview of embedded operating systems (e.g., iOS, Android)
  • Wireless technologies (mobile: GSM, WCDMA, CDMA2000, LTE; and Internet: 802.11b/g/n)
  • Infrastructure components (e.g., fiber optic network, evolved packet core, PLMN)
  • Mobile protocols (SS7, RR, MM, CC)
  • Mobile logical channel descriptions (BCCH, SDCCH, RACH, AGCH, etc.)
  • Mobile registration procedures
  • Mobile encryption standards
  • Mobile identifiers (IMSI, IMEI, MSISDN, ESN, Global Title, E.164)
  • Mobile and Location-based Services

Assignments and Examinations

This course will be composed of the following elements:

  • Projects (which will include hands-on laboratory elements using the network testbed in the Chambers Technology Center.)

Attendance Policy

Regular class attendance is strongly encouraged.  Students who miss class meetings are responsible for keeping up with the class.  The course Canvas site will be used to assist in instruction. You are responsible for keeping up with projects, labs, lecture notes, announcements, and other materials that may be posted there.

Grading Policy

Grades for the course are assigned on the scale below:

Grade A A- B+ B B- C+ C C- D+ D F
Points > 93 93-90 < 90-87 < 87-83 < 83-80 < 80-77 < 77-73 < 73-70 < 70-67 < 67-60 60

Your course grade is based on the following items:

  • Projects (worth 100%)

Student Work

Please note that copies of student work may be retained by the instructor to assess how the learning objectives of the course are met. Further, the MOSS (Measure of Software Similarity) system may be used to compare student submissions in an automated fashion.

Honor Code

The Honor Code at the University of the Pacific calls upon each student to exhibit a high degree of maturity, responsibility, and personal integrity. Students are expected to:

  • Act honestly in all matters
  • Actively encourage academic integrity
  • Discourage any form of cheating or dishonesty by others
  • Inform the instructor and appropriate university administrator if she or he has a reasonable and good faith belief and substantial evidence that a violation of the Academic Honesty Policy has occurred.

Violations will be referred to and investigated by the Office of Student Conduct and Community Standards. If a student is found responsible, it will be documented as part of her or his permanent academic record. A student may receive a range of penalties, including failure of an assignment, failure of the course, suspension, or dismissal from the University. The Academic Honesty Policy is located in Tiger Lore and online at http://www.pacific.edu/Campus-Life/Safety-and-Conduct/Student-Conduct/Tiger-Lore-Student-Handbook-.html

Accommodations for Students with Disabilities

If you are a student with a disability who requires accommodations, please contact the Director of the Office of Services for Students with Disabilities (SSD) for information on how to obtain an Accommodations Request Letter.

3-Step Accommodation Process:

  1. Student meets with the SSD Director and provides documentation and completes registration forms.
  2. Student requests accommodation(s) each semester by completing the Request for Accommodations Form.
  3. Student arranges to meet with his/her professors to discuss the accommodation(s) and to sign the Accommodation Request Letter

To ensure timeliness of services, it is preferable that you obtain the accommodation letter(s) from the Office of SSD during the first week of class. After the instructor receives the accommodation letter, please schedule a meeting with the instructor during office hours or some other mutually convenient time to arrange the accommodation(s).

The Office of Services for Students with Disabilities is located in the McCaffrey Center, Rm. 137.  Phone: 209-946-3221 Email: ssd@pacific.edu Online: http://www.pacific.edu/disabilities  

Nondiscrimination Policy

The University of the Pacific does not discriminate in the administration of any of its educational programs, admissions, scholarships, loans, athletics, or other University activities or programs on the basis of race, color, national and ethnic origin, handicap, sexual orientation or preference, sex or age.