Syllabus - CYBR 230: Advanced Computer Networking - Fall 2018
Instructor
Name | Jeff Shafer |
Office | Anderson Hall 205 |
Phone | (209) 946-2302 |
jshafer at pacific dot edu | |
Office Hours | Tue/Thur 1-3 pm, and by e-mail appointment. Please email to request alternate meeting times outside of scheduled office hours. |
Course Basics
Class Hours | Tuesday, Thursday, 5:00-6:20pm in CTC 214 |
Prerequisites | COMP 053 or completion of “Data Structures” with a “C” or better COMP 177, ECPE 177 or completion of “Computer Networking” with a “C” or better. |
Textbook | No textbook is required for this course. Optional reference books may be suggested throughout the semester, and I welcome feedback on any online/print references you find useful! |
Credits | 3 |
Course Description
The modern Internet is a communications system of global scale and high complexity. In this course, students will study the technological underpinnings that enable modern network communication, including routing, network, and application-layer protocols. Wired, wireless, and cellular networks will be examined. The course will include a laboratory, with emphasis placed on determining the current state of a network through network mapping, traffic analysis, and protocol analysis.
Course Learning Objectives
Upon completion of the course, students will be able to:
- Describe how networks work at the infrastructure, network and applications layers
- Describe how network protocols work to enable communication, including a thorough knowledge of all the major network protocols
- Describe how lower-level network layers support the upper layers
- Describe user associations and routing in a cellular/mobile network
- Describe the interaction of elements within the cellular/mobile network core
- Describe the end-to-end delivery of a packet or signal and what happens with the hand-off at each step along the communications path
- Describe differences in core architecture between different generations of cellular and mobile network technologies
- Use industry-standard tools to map a network and analyze the network traffic flowing over it at both a protocol and application level
- Integrate knowledge of infrastructure, network, and application layer protocols in large-scale network programming projects
Program Learning Outcomes
The MS in Cybersecurity program has identified eleven program learning outcomes that are satisfied by required courses. These program learning outcomes, and the level at which each course satisfies them, is identified in the following table:
Course |
CYBR 200 |
CYBR 210 |
CYBR 220 |
CYBR 230 |
CYBR 240 |
CYBR 250 |
CYBR 280 |
---|---|---|---|---|---|---|---|
Low Level Programming Languages |
D |
|
M |
M |
|
|
|
Software Reverse Engineering |
|
|
M |
|
|
|
|
Operating System Theory |
D |
|
|
|
|
M |
|
Networking |
|
|
|
M |
|
|
|
Cellular and Mobile Technologies |
|
|
|
M |
|
|
|
Discrete Math and Algorithms |
M |
|
|
|
|
|
|
Cyber Defense |
D |
|
|
|
M |
|
|
Security Fundamental Principles |
D |
|
|
|
M |
|
|
Vulnerabilities |
|
M |
|
|
|
|
|
Cybersecurity Law |
|
|
|
|
|
M |
|
Communication Skills |
|
D |
|
|
|
M |
|
D = Developed (learning outcome developed through multiple assignments with extensive feedback)
M = Mastered (learning outcome mastered through a robust assignment; appropriate for graduation)
Note: CYBR 280 (Cyber Security Capstone Project): This student project must demonstrate mastery in at least five different cybersecurity competencies (including cybersecurity law and communication skills)
Course Topics
The topics covered in this course include:
- Routing, network, and application protocols:
- Network architectures
- Network security
- Wireless network technologies
- Network traffic analysis
- Network protocol analysis
- Network mapping techniques
- Overview of smart phone technologies
- Overview of embedded operating systems (e.g., iOS, Android)
- Wireless technologies (mobile: GSM, WCDMA, CDMA2000, LTE; and Internet: 802.11b/g/n)
- Infrastructure components (e.g., fiber optic network, evolved packet core, PLMN)
- Mobile protocols (SS7, RR, MM, CC)
- Mobile logical channel descriptions (BCCH, SDCCH, RACH, AGCH, etc.)
- Mobile registration procedures
- Mobile encryption standards
- Mobile identifiers (IMSI, IMEI, MSISDN, ESN, Global Title, E.164)
- Mobile and Location-based Services
Assignments and Examinations
This course will be composed of the following elements:
- Projects (which will include hands-on laboratory elements using the network testbed in the Chambers Technology Center.)
Attendance Policy
Regular class attendance is strongly encouraged. Students who miss class meetings are responsible for keeping up with the class. The course Canvas site will be used to assist in instruction. You are responsible for keeping up with projects, labs, lecture notes, announcements, and other materials that may be posted there.
Grading Policy
Grades for the course are assigned on the scale below:
Grade | A | A- | B+ | B | B- | C+ | C | C- | D+ | D | F |
---|---|---|---|---|---|---|---|---|---|---|---|
Points | > 93 | 93-90 | < 90-87 | < 87-83 | < 83-80 | < 80-77 | < 77-73 | < 73-70 | < 70-67 | < 67-60 | 60 |
Your course grade is based on the following items:
- Projects (worth 100%)
Student Work
Please note that copies of student work may be retained by the instructor to assess how the learning objectives of the course are met. Further, the MOSS (Measure of Software Similarity) system may be used to compare student submissions in an automated fashion.
Honor Code
The Honor Code at the University of the Pacific calls upon each student to exhibit a high degree of maturity, responsibility, and personal integrity. Students are expected to:
- Act honestly in all matters
- Actively encourage academic integrity
- Discourage any form of cheating or dishonesty by others
- Inform the instructor and appropriate university administrator if she or he has a reasonable and good faith belief and substantial evidence that a violation of the Academic Honesty Policy has occurred.
Violations will be referred to and investigated by the Office of Student Conduct and Community Standards. If a student is found responsible, it will be documented as part of her or his permanent academic record. A student may receive a range of penalties, including failure of an assignment, failure of the course, suspension, or dismissal from the University. The Academic Honesty Policy is located in Tiger Lore and online at http://www.pacific.edu/Campus-Life/Safety-and-Conduct/Student-Conduct/Tiger-Lore-Student-Handbook-.html
Accommodations for Students with Disabilities
If you are a student with a disability who requires accommodations, please contact the Director of the Office of Services for Students with Disabilities (SSD) for information on how to obtain an Accommodations Request Letter.
3-Step Accommodation Process:
- Student meets with the SSD Director and provides documentation and completes registration forms.
- Student requests accommodation(s) each semester by completing the Request for Accommodations Form.
- Student arranges to meet with his/her professors to discuss the accommodation(s) and to sign the Accommodation Request Letter
To ensure timeliness of services, it is preferable that you obtain the accommodation letter(s) from the Office of SSD during the first week of class. After the instructor receives the accommodation letter, please schedule a meeting with the instructor during office hours or some other mutually convenient time to arrange the accommodation(s).
The Office of Services for Students with Disabilities is located in the McCaffrey Center, Rm. 137. Phone: 209-946-3221 Email: ssd@pacific.edu Online: http://www.pacific.edu/disabilities
Nondiscrimination Policy
The University of the Pacific does not discriminate in the administration of any of its educational programs, admissions, scholarships, loans, athletics, or other University activities or programs on the basis of race, color, national and ethnic origin, handicap, sexual orientation or preference, sex or age.