16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

As a result of this format, there are actually only 12 hours of direct student/faculty contact. The hours shown for<br />

various areas in the “Body of Knowledge” section below are therefore out of 10 hours rather than the 36 or so hours<br />

available in a typical lecture-based course.<br />

How are students assessed<br />

Students complete weekly written assignments, one significant programming project, and take two open-book takehome<br />

examinations.<br />

Course textbooks and materials<br />

The course uses Peterson and Davie, Computer Networks: A Systems Approach as a text. Other readings can be<br />

found on the course web site.<br />

Why do you teach the course this way<br />

The course was developed shortly after our institution initiated the tutorial format. The motivation for the format<br />

was to strengthen each student’s ability to learn independently and to engage in an intellectual discussion<br />

effectively. As a result, the course design places relatively little emphasis on programming projects and much more<br />

emphasis on analytical problems. This also shifted the topics covered and the emphasis placed on various topics. In<br />

particular, areas that are well suited to mathematical analysis (contention-resolution protocols, error-correcting<br />

codes, etc.) receive more attention than they might if the course were offered in a more traditional lecture/lab format.<br />

Body of Knowledge coverage<br />

KA Knowledge Unit Topics Covered Hours<br />

AR Interfacing and Communication Compare common network organizations 1<br />

CN Fundamentals Modelling and abstraction, simulation as dynamic<br />

modelling, create a formal mathematical model and use<br />

for simulation<br />

DS Discrete Probability Finite probability space, events<br />

Axioms of probability and probability measures<br />

independence<br />

1<br />

1<br />

IAS Network Security Network specific threats and attack types (e.g., denial of<br />

service, spoofing, sniffing and traffic redirection, man-inthe-middle,<br />

0.5<br />

message integrity attacks, routing attacks, and<br />

traffic analysis); Use of cryptography for data and<br />

network security; Security for wireless<br />

IAS Cryptography The Basic Cryptography Terminology covers notions<br />

pertaining to the different (communication) partners,<br />

secure/unsecure channel, attackers and their capabilities,<br />

encryption, decryption, keys and their characteristics,<br />

signatures, etc.; Overview of Mathematical Preliminaries<br />

where essential for Cryptography; includes topics in<br />

linear algebra, number theory, probability theory, and<br />

statistics.; Public Key Infrastructure support for digital<br />

signature and encryption and its challenges.<br />

0.5<br />

- 324 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!