Computer Networks

Lectures are in room MU011 on Tuesday from 15.15 to 17.15. The practicals are in rooms MF124 (Group 1) from 09.15 to 11:05 & MF124 (Group 2) from 11.15 to 13:05 The Syllabus lists some of the core texts and finer details of this module from an administrative viewpoint.

The philosophy of this module is not to confuse you with ‘spagetti code’ for low level network device handling but rather to provide you with a theoretical underlying knowledge of networking and within the practicals to demonstrate the relative ease with which modern networks can be programmed to send information.

Notes

Lecture 1: Introduction to Networks
Optional additional reading: A Short History of the Internet by Bruce Sterling.
Optional video clip History of the Internet in 8 minutes

Lecture 2: Physical Layer
Optional additional reading: Physical Layer Overview By Rowan Davies.
Optional video clip: Physical Layer

Lecture 3: Data Link Layer
Optional additional reading: An Architectural Framework for Data Link Layer Security with Security Interlayering By Altunbasak et al.
Optional video clip: Data Link Layer

Lecture 4: Medium Access Control Sub Layer
Optional additional reading: MAC Layer Dynamic Backoff Scheme for Message Delivery Reliability in Wireless Sensor Networks by CBadi et al.
Optional video clip: OSI Model Demystified

Lecture 5: Network Layer
Optional additional reading: Congestion Control in TCP.
Optional video clip: Network Layer

Lecture 6: Transport Layer
Optional additional reading: Transport Layer by Tang et al.
Optional video clip: Transport Layer

Lecture 7: Application Layer
Optional additional reading: A Survey of P2P in various networks by Anita et al.
Optional video clip: The Convergence of Blockchain, Machine Learning, and the Cloud – Steve Lund, TEDx Talk

Lecture 8: Network Security
Optional additional reading: A Survey on Security for Mobile Devices by La Polla et al.
Optional video clip: A gift for the hackers documentary

Lecture 9: Operating & Computer Systems Overview
Optional additional reading: Can we make operating systems reliable and secure by Tanenbaum et al.
Optional video clip: Principles of Operating Systems

Lecture 10: OS – Concurrency/Memory/Scheduling
Optional additional reading: The Google File System by Ghemawat et al.
Optional video clip: Understanding Operating Systems

Lecture 11: Wireless Networks
Optional additional reading: A Study of a Site-Specific Indoor Wireless Models by Al Bado et al.
Optional video clip: Hacking WPA/WPA2 Wireless Security

Lecture 12: Blockchain
Optional additional reading Bitcoin: A Peer-to-Peer Electronic Cash System
Optional video clip: The blockchain explained simply

LAB TUTORIALS

Week 1

Protocol Layers – Wireshark Network Packet Sniffing Word version
Command Line Tools – Ping, IPconfig, NSlookup and more.

Week 1 Supplementary Tutorials
Web Page Load Test – Run a diagnostic on www.ulster.ac.uk to see resource loading waterfall charts, Page Speed optimization checks and suggestions for improvements.
Web Page Load Comparison – Compare 2 sites such as www.ulster.ac.uk and www.qub.ac.uk to see how optimised they are.
Mobile Web Page Load Test – This mobile page load test needs to be conducted on your mobile phone. Visit Googles TestMySite and load a site. It will give you the loading time and estimated visitor loss.

Week 1 Online Tutorials (These only now work in Microsoft Edge Browser)
OSI Layer Names – Arrange the OSI Layers
OSI Layer Activity – Arrange the OSI Layers by function
Layers video – Short tutorial on network layer communication

Week 2

Ethernet – Wireshark Network Packet Sniffing Word version
Netstat – Command line tool which presents information on active network connections and overall statistics.
NetInfo – Using Netinfo to Collect Computer and Network Information

Week 2 Supplementary Tutorials
How well are you protected against non-consensual Web tracking?
Email Route Map (online) – Trace the path your email message took as it passed through various servers using Google maps. To retrieve your message headers e.g.in outlook, right click on message and choose ‘Message Options’. Here are some samples to try 1,2, 3

Week 2 Online Tutorials (These only now work in Microsoft Edge Browser)
Data Frame – Build a data frame
VLANs video – Short tutorial on how switches use trunk ports with VLANs

Week 3

DHCP – Wireshark Network Packet Sniffing Word version
DHCP – Viewing DHCP Client and DNS Client Status
Packet Sniffing – This packet sniffer simulator shows direct path, real path, promiscuous mode, packet sniffer and Telnet Over TCP/IP demos.

Week 3 Supplementary Tutorials
HTTP vs HTTPS Test – Compare load times of the unsecure HTTP and encrypted HTTPS versions on a page
WayBackMachine – Check out sites such as Ulster, BBC and Hotmail to see how they have progressed (click bar graph at top to get quick views).
Google Data Centers – Short video exploring a Google data center with Street View.

Week 3 Online Tutorials 
Mac Spoofing – Change your network adaptors Medium Access Control (MAC) Address
Wireless Attacks – Visualisation of eavesdropping, evil twin, mitm, ARP poisoning and ARP request replay attacks

Week 4

ARP – Wireshark Network Packet Sniffing Word version

Week 4 Supplementary Tutorials
Bandwidth – Measure your Internet Connection upload & download speeds
Online Network Tools – An easy way to ping, traceroute, resolve names, check countries of origin and ports open.

Week 4 Online Tutorials (These only now work in Microsoft Edge Browser)
Switch video – Short tutorial on basic operation of a switch
Hub video – Short tutorial on basic operation of a hub
CSMA/CD video – Short tutorial on CSMA/CD

Week 5

UDP & TCP – Wireshark Network Packet Sniffing Word version
Routing – Viewing Your Computer’s Routing Table.

Week 5 Supplementary Tutorials
Internet Traffic Reports
Bandwidth Speeds – Compare speed of your Internet Connection on another speedtester

Week 5 Online Tutorials (These only now work in Microsoft Edge Browser)
Communications video – Short tutorial on communication between 2 computers

Week 6

Class Test 1

HTTP – Wireshark Network Packet Sniffing Word version
Examining the HTTP protocol request in detail

Week 6 Supplementary Tutorials
Phishing IQ Test – Take a test to see if you tell the difference between a legitimate and phishing email?
Think you can Outsmart Internet Scammers? – Take a test to tell the difference between a legitimate website and one that is a phishing attempt
Can you spot a fake email? – Another phishing email IQ test

Week 6 Online Tutorials (These only now work in Microsoft Edge Browser)
NAT/PAT video – Short tutorial demonstrating NAT/PAT
Syn flood Attacks – Visualisation of Syn flood attacks and prevention measures

Week 7

HTML & Javascript – Create HTML Pages & Javascript to validate forms (PDF)
Exposed Amazon S3 buckets. – Search S3 buckets for personal information exposed. First read S3 buckets overview & how to search open Amazon buckets.

Week 7 Online Tutorials (These only now work in Microsoft Edge Browser) for home
NIC video – Short tutorial on how a network interface card works
Router video – Short tutorial on how a router works

Week 8

SSL/TLS – Wireshark Network Packet Sniffing Word version
RSA, DEP, Browser Security, Hash Generation & Digital Certificates – Practical examples of implementing security Word version

Week 8 Supplementary Tutorials
How long to hack my password – Find out how long your sacred password would take to bruteforce
Digital Signatures – View Certificate Authorities
Live Visualisation of Real-Time Worldwide Attacks. More from Fireeye, Kaspersky and Arbor Networks
Netcraft – Useful site for hackers to see what kind of server a site is running and time since last reboot.
HTTP Delay Estimation – “back-of-the-envelope” visualizations and calculations for Web response times.

Week 8 Online Tutorials
Cryptography – Interact with this dynamic substitution cipher form.
Cryptography – Interact with the symbolic pigpen substitution cipher.

Week 9

DNS – Wireshark Network Packet Sniffing Word version
DNS 2 – Modifying DNS on a local computer and working with the hosts file

Week 9 Supplementary Tutorials
Firewalls – Firewall Visualisation Tool
Shields Up – Test your machines network defenses online

Week 9 Online Tutorials
ClickJacking – View Credential theft animation to see how malicious techniques trick users into clicking on something different
Cryptography – Scroll down and enter text into form to see frequency analysis. The more text entered – the truer the overall frequency count.
P2P video – Short tutorial on peer communication with the OSI model
Kerberos Authentication – visualisation of Distributed and Centralised authentication & Kerberos

Week 10

ICMP – Wireshark Network Packet Sniffing Word version
Operating Systems – Examine system processes in detail

Week 10 Supplementary Tutorials
Internet Speeds and Costs Worldwide
Steganography

Week 10 Online Tutorials (These only now work in Microsoft Edge Browser)
Wireless video – Short tutorial on wireless communications

Week 11

802.11 – Wireshark Network Packet Sniffing Word version

Week 11 Supplementary Tutorials
Browser Market share & other Internet Technologies statistics
Network Performance Monitoring – Visit Orion, click Login box on top left of page. Browse all data.

Week 11 Online Tutorials (These only now work in Microsoft Edge Browser)
STP video – Short tutorial on how STP prevents switching loops
Email video – Short tutorial on how email works
Multiple paths video – Short tutorial on how routers use multiple paths

Week 12

Class test 2

Class Tests

Please note that the first class test will ONLY examine you on what we did in lab class from weeks 1 to 5 inclusive. The final class test will examine you on content in labs from week 6 to week 11 inclusive.

CLASS Test 1 – 50% (Week 6)
Class test during lab session on material covered in labs from weeks 1 to 5.

CLASS Test 2 – 50% (Week 12)
Class test during lab session on material covered in labs from weeks 6 to 11.

Supplementary Videos
From Nand to Tetris in 14 steps – Noam Nisan presents his approach to teaching the how to build a simple computer system end-to-end
Human Computation – Excellent talk by MacArthur Fellow Prof Luis von Ahn.
15 Years Linux: Past and Future
Sun Solaris: Does the OS really matter – part 1
Sun Solaris: Does the OS really matter – part 2
Visualising Social Networks
Accelerating Innovation: People, Processes, & Technology
Network Security from CISCO.
Galileo – European Satellite Navigation System
How To Break Web Software – A look at security vulnerabilities in web software by Mike Andrews (Google TechTalk)
Google I/O 2012 – SQL vs NoSQL: Battle of the Backends
Human Engine Optimization: Natural Strategies for High Ranking Health
Building Brains to Understand the World’s Data

Other Material
World’s Biggest Data Breaches, Information is Beautiful
11 Steps Attackers Took to Crack Target, CIO.com
Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid, Wired
The Security Mindset, Schneier on Security
Cybersecurity unemployment rate at zero, SC Media
Network live IP video cameras directory, Insecam.org
Hackers Remotely Kill a Jeep on the Highway—With Me in It, Andy Greenberg, Wired
Florida man wins over 1 million miles for hacking United Airlines, Jack Corrigan, WGN TV
Computer hackers can now hijack toilets, Sarah Griffiths, Daily Mail
Baby monitor hacker delivers creepy message to child, CBS News
It’s Insanely Easy to Hack Hospital Equipment, Kim Zeller, Wired
Here’s What We Know About the Massive Cyber Attack That Took Down the Internet on Friday, Peter Dockrill, Science Alert
How the Dyn DDoS attack unfolded, Tim Greene, Network World
MEECES to pieces, Deborah Radcliff, Network World
Flight Radar – See flights in the air around the world

Comments are closed.