Capt B.C. Shust
|Monday (Section 1)||1340-1430||1440-1630|
|Monday (Section 2)||0800-0850||0900-1050|
All important course information will be published on my web site http://shust.segfaults.net Access to course content is password protected. You will receive the login credentials via email, or on the first day of class.
Pro tip: when printing pages from the course site, you’ll get best results using Google Chrome.
I have an open-door policy; my office is in room S3213*. You can drop by any time, but it’s probably best to arrange a meeting in advance.
This course deals with networking, or computer communications through a network. The specific course objectives will allow you to:
- understand the factors that influence the building of computer networks
- to learn to apply simple computer network design
- to understand the computer network operations environment
- to study computer network implementation topics including: layers 2-4 of the OSI Reference Model, circuit and packet switching, network topology, queuing and its applications to networks, routing and flow control, networking equipment including bridges, hubs and switches and the security implication of network protocols
- investigate how networks behave under cyber attack, and
- participate in a significant laboratory component in which students will design, build and analyze networks.
At the end of the course, students will be able to analyze the requirements for small-medium network operations environments, and to design and implement computer network systems to meet the requirement.
Material will be presented to students through readings in the course reference texts, during lectures augmented by assignments and through exercises and laboratory sessions. The course will cover many topics in a short period of time. It is therefore imperative that students read the material in the reference text before lectures; those who chose not to do so will be seriously disadvantaged.
Students will have access to the instructor’s slides before lectures through the Lectures section of the course Web page. Slides are provided to minimize note taking during lectures to enable students to devote all their attention to understanding the material being presented. We expect students to be ready for each lecture with paper, pencil and copy of the course notes.
Assignments and Quizzes
Students will be required to complete assignments. Those will not be graded by the instructor, but they will be very good examples of questions that will be asked on weekly quizzes. Quizzes will be marked in a binary fashion: those students who demonstrate understanding will receive 1, while those who do not will receive 0. Details will be available under the Labs and Assignments section of the course Web page.
Students will complete a number of laboratories in order to assimilate the material discussed in class. Details will be available under the Labs and Assignments portion of the course Web page. All laboratory work will be done in groups of 2 students; students may team up with a student from the GEF330 section.
You must submit quality engineering laboratory reports in PDF format. The report must be well formatted and the information therein must be well presented, as must be any submitted source code. We expect you to provide a description of the configuration, provide source code and present a general discussion of the laboratory conduct. You must also tell us what you discovered, along with answers to any questions specifically asked. The discussion is the most important part of the report; it demonstrates what you have learned and why it is important.
Submit your report by email, inside a ZIP Laboratory reports are due at the beginning of the following laboratory period. archive following this naming convention : EEE330_Student1Name_Student2Name_LabNumber.zip.Lab reports are due at the beginning of the following lab period.
Some things to consider:
You are working in a virtualized environment; do not change the configuration of the host computers. You will lose marks for late submissions but students must submit a quality report for each lab in order to be allowed to write the final exam. No food or drink are allowed in the Computer Network Security Laboratory (CNSL - 4112).
The course textbooks are:
Tanenbaum A.S., Wetherall D.J., Computer Networks (5th Ed), Prentice Hall, 2010, ISBN-13: 978-0132126953
Sanders C., Practical Packet Analysis (3rd Edition), No Starch press, 2017, ISBN-13: 978-1-59327-802-1
Course work and exams will be weighted as follows, out of 100 marks:
You must achieve a passing mark (40 out of 80) on invigilated work to pass this course. Unauthorized absences or lateness may be penalized against the laboratory mark.
Academic misconduct, including plagiarism, cheating, and other violations of academic ethics, is a serious academic infraction for which penalties may range from a recorded caution to expulsion from the College. The RMCC Academic Regulations Section 23 defines plagiarism as: “Using the work of others and attempting to present it as original thought, prose or work. This includes failure to appropriately acknowledge a source, misrepresentation of cited work, and misuse of quotation marks or attribution. It also includes the failure to acknowledge that work has been submitted for credit elsewhere. All students should consult the published statements on Academic Misconduct contained in the Royal Military College of Canada Undergraduate Calendar, Section 23.
Work submitted late will receive a mark of zero, unless permission for late submission has been received in advance. However, you must submit all course work to be eligible to write the final examination.
I expect you to arrive in class and in the lab promptly and appropriately prepared. This includes having paper and pens or pencils with you for in-class work and notes! While in the class or the lab I expect you to be focused on the subject at hand, not work for other courses or… other things. You give me your full attention, I’ll do my best to help you learn the material.