Computer Networks


🏫 Air University
📆 2024–2025
👨‍🎓 120

Introduction

The “Computer Networks” course (CS‑360) provides a deep dive into the principles, architectures, and protocols that underpin modern data communications. Over 2 lecture + 1 lab credit hours, students explore layered models (OSI & TCP/IP), switching and routing mechanisms, addressing schemes (IPv4, IPv6, subnetting, CIDR), transport‐layer services, and application‐layer protocols. Emphasis is placed on both theory and hands‑on practice, using industry‐standard tools (Wireshark, Tcpdump, Netstat, Cisco Packet Tracer) to analyze, configure, and secure network environments.

  • Course Code: CS‑360
  • Credit Hours: 2 Lecture + 1 Lab
  • Prerequisites: None
  • Grading Policy: Relative grading; missed midterm/final retakes require committee approval
  • Plagiarism Policy: Zero on assignment/quiz category for plagiarism; F grade for project/exam plagiarism

Required Texts & References

  • Computer Networking: A Top‑Down Approach (6th ed.) – Kurose & Ross
  • Data Communication and Computer Networks (5th ed.) – Forouzan
  • Computer Networks (5th ed.) – Tanenbaum
  • CISA Study Guide – (latest edition)
  • Network Basics for Hackers – Version 1.0

Course Learning Outcomes (CLOs)

  • CLO 1: Describe key terminologies, devices, and topologies of computer networks.
  • CLO 2: Explain services, functions, and standards (RFCs) at each layer of the Internet stack.
  • CLO 3: Identify and analyze internetworking devices, protocols, and their roles in communication.
  • CLO 4: Evaluate performance of algorithms and protocols (e.g., routing, congestion control).
  • CLO 5: Design simple network protocols and applications conforming to RFCs.

Topics & Weekly Breakdown (15 weeks, 48 contact hours)

  1. Weeks 1–2 (6 hrs): Introduction, OSI & TCP/IP models; IP addressing (classes, public/private, DHCP, NAT), ports, sockets, TCP three‑way handshake, UDP, network topologies. (CLO 1,2)
  2. Week 3 (3 hrs): Subnetting & CIDR notation, subnet masks, variable‑length prefixes. (CLO 1,2)
  3. Weeks 4–5 (6 hrs): Network analysis tools: Ping, Netstat, Tcpdump, Wireshark; introduction to 802.11 security and wireless adapters. (CLO 3,4)
  4. Week 6 (3 hrs): Linux firewalls (iptables basics); overview of wireless frame anatomy and common Wi‑Fi attacks (Evil Twin, DoS). (CLO 3,4)
  5. Week 7 (3 hrs): Bluetooth networking fundamentals and security; common Bluetooth exploits. (CLO 3,4)
  6. Week 8: Midterm Exam
  7. Week 9 (3 hrs): ARP protocol mechanics, ARP cache poisoning, Linux command‑line tools. (CLO 3,4)
  8. Week 10 (6 hrs): DNS architecture: FQDN, name resolution internals, DNS security vulnerabilities; SMTP protocol overview and attack vectors. (CLO 2,3,4)
  9. Week 11 (3 hrs): HTTP/HTTPS: request/response structure, methods, headers, use of proxies. (CLO 2,3)
  10. Weeks 12–13 (6 hrs): SCADA/ICS networks: communication protocols (Modbus, DNP3), security challenges, hands‑on with Linux tools. (CLO 2,3,5)
  11. Week 14 (3 hrs): Network performance: flow control, congestion control algorithms (TCP Reno, Tahoe, Vegas). (CLO 4)
  12. Week 15 (3 hrs): Emerging trends: IPv6 addressing, software‑defined networking (SDN) overview, course wrap‑up & review. (CLO 1–5)

Laboratory & Experiments

Lab sessions reinforce lecture topics through practical exercises: basic network commands (ping, tracert, netstat, arp), Cisco Packet Tracer simulations (peer‑to‑peer, switch and router configurations), traffic capture/analysis (Wireshark, Tcpdump, Nmap), socket programming in C/C++, wireless attacks (Evil Twin, ARP poisoning, TCP hijacking), and SIEM integration (Wazuh, Splunk, QRadar).

Assessment & Grading Breakdown

  • Lecture Component (2 credits):
    • Quizzes: 4 × 2.5% = 10%
    • Assignments: 4 × 2.5% = 10%
    • Class Participation: 5%
    • Semester Project: 5%
    • Midterm Exam: 25%
    • Final Exam: 45%
  • Lab Component (1 credit):
    • Lab Exercises & Assignments: 6 tasks
    • Lab Quizzes: 4
    • Sessional Assessment: 1
    • Lab Project: 1
    • Final Lab Exam: practical proficiency evaluation