Lectures are in room MU011 on Tuesday from 15.15 to 17.15. The practicals are in rooms MF124 (Group 1) from 09.15 to 12:05 & MF124 (Group 2) from 12.15 to 15:05 The Syllabus lists some of the core texts and finer details of this module from an administrative viewpoint.
The philosophy of this module is not to confuse you with ‘spagetti code’ for low level network device handling but rather to provide you with a theoretical underlying knowledge of networking and within the practicals to demonstrate the relative ease with which modern networks can be programmed to send information.
Lecture 3: Data Link Layer
Optional additional reading: An Architectural Framework for Data Link Layer Security with Security Interlayering By Altunbasak et al.
Optional video clip: Data Link Layer
Lecture 4: Medium Access Control Sub Layer
Optional additional reading: MAC Layer Dynamic Backoff Scheme for Message Delivery Reliability in Wireless Sensor Networks by CBadi et al.
Optional video clip: OSI Model Demystified
Lecture 7: Application Layer
Optional additional reading: A Survey of P2P in various networks by Anita et al.
Optional video clip: The Convergence of Blockchain, Machine Learning, and the Cloud – Steve Lund, TEDx Talk
Lecture 9: Operating & Computer Systems Overview
Optional additional reading: Can we make operating systems reliable and secure by Tanenbaum et al.
Optional video clip: Principles of Operating Systems
Week 1 Supplementary Tutorials
Web Page Load Test – Run a diagnostic on www.ulster.ac.uk to see resource loading waterfall charts, Page Speed optimization checks and suggestions for improvements.
Web Page Load Comparison – Compare 2 sites such as www.ulster.ac.uk and www.qub.ac.uk to see how optimised they are.
Mobile Web Page Load Test – This mobile page load test needs to be conducted on your mobile phone. Visit Googles TestMySite and load a site. It will give you the loading time and estimated visitor loss.
Week 1 Online Tutorials (These only now work in Microsoft Edge Browser)
OSI Layer Names – Arrange the OSI Layers
OSI Layer Activity – Arrange the OSI Layers by function
Layers video – Short tutorial on network layer communication
Ethernet – Wireshark Network Packet Sniffing Word version
Netstat – Command line tool which presents information on active network connections and overall statistics.
NetInfo – Using Netinfo to Collect Computer and Network Information
Week 2 Supplementary Tutorials
How well are you protected against non-consensual Web tracking?
Email Route Map – Trace the path your email message took as it passed through various servers using Google maps. To retrieve your message headers e.g.in outlook, right click on message and choose ‘Message Options’. Here are some samples to try 1,2, 3. Further instructions here for email clients.
Check to see if you have been exposed in a data breach
Week 3 Supplementary Tutorials
HTTP vs HTTPS Test – Compare load times of the unsecure HTTP and encrypted HTTPS versions on a page
WayBackMachine – Check out sites such as Ulster, BBC and Hotmail to see how they have progressed (click bar graph at top to get quick views).
Google Data Centers – Short video exploring a Google data center with Street View.
Week 3 Online Tutorials
Mac Spoofing – Change your network adaptors Medium Access Control (MAC) Address
Week 4 Supplementary Tutorials
Bandwidth – Measure your Internet Connection upload & download speeds
Online Network Tools – An easy way to ping, traceroute, resolve names, check countries of origin and ports open.
Week 4 Online Tutorials (These only now work in Microsoft Edge Browser)
Switch video – Short tutorial on basic operation of a switch
Hub video – Short tutorial on basic operation of a hub
CSMA/CD video – Short tutorial on CSMA/CD
Week 5 Online Tutorials (These only now work in Microsoft Edge Browser)
Communications video – Short tutorial on communication between 2 computers
Class Test 1
Week 6 Supplementary Tutorials
Phishing IQ Test – Take a test to see if you tell the difference between a legitimate and phishing email?
Think you can Outsmart Internet Scammers? – Take a test to tell the difference between a legitimate website and one that is a phishing attempt
Can you spot a fake email? – Another phishing email IQ test
Week 6 Online Tutorials (These only now work in Microsoft Edge Browser)
NAT/PAT video – Short tutorial demonstrating NAT/PAT
Exposed Amazon S3 buckets. – Search S3 buckets for personal information exposed. First read S3 buckets overview & how to search open Amazon buckets.
SSL/TLS – Wireshark Network Packet Sniffing Word version
RSA, DEP, Browser Security, Hash Generation & Digital Certificates – Practical examples of implementing security Word version
Week 8 Supplementary Tutorials
How long to hack my password – Find out how long your sacred password would take to bruteforce
Digital Signatures – View Certificate Authorities
Live Visualisation of Real-Time Worldwide Attacks. More from Fireeye, Kaspersky and Arbor Networks
Netcraft – Useful site for hackers to see what kind of server a site is running and time since last reboot.
HTTP Delay Estimation – “back-of-the-envelope” visualizations and calculations for Web response times.
Week 9 Online Tutorials
ClickJacking – View Credential theft animation to see how malicious techniques trick users into clicking on something different
Cryptography – Scroll down and enter text into form to see frequency analysis. The more text entered – the truer the overall frequency count.
P2P video – Short tutorial on peer communication with the OSI model
Week 10 Online Tutorials (These only now work in Microsoft Edge Browser)
Wireless video – Short tutorial on wireless communications
Week 11 Supplementary Tutorials
Browser Market share & other Internet Technologies statistics
Network Performance Monitoring – Visit Orion, click Login box on top left of page. Browse all data.
Check to see if you or a colleague is running an exposed local web server
Week 11 Online Tutorials (These only now work in Microsoft Edge Browser)
STP video – Short tutorial on how STP prevents switching loops
Email video – Short tutorial on how email works
Multiple paths video – Short tutorial on how routers use multiple paths
Class test 2
Please note that the first class test will ONLY examine you on what we did in lab class from weeks 1 to 5 inclusive. The final class test will examine you on content in labs from week 6 to week 11 inclusive.
CLASS Test 1 – 50% (Week 6)
Class test during lab session on material covered in labs from weeks 1 to 5.
CLASS Test 2 – 50% (Week 12)
Class test during lab session on material covered in labs from weeks 6 to 11.
From Nand to Tetris in 14 steps – Noam Nisan presents his approach to teaching the how to build a simple computer system end-to-end
Human Computation – Excellent talk by MacArthur Fellow Prof Luis von Ahn.
15 Years Linux: Past and Future
Sun Solaris: Does the OS really matter – part 1
Sun Solaris: Does the OS really matter – part 2
Visualising Social Networks
Accelerating Innovation: People, Processes, & Technology
Network Security from CISCO.
Galileo – European Satellite Navigation System
How To Break Web Software – A look at security vulnerabilities in web software by Mike Andrews (Google TechTalk)
Google I/O 2012 – SQL vs NoSQL: Battle of the Backends
Human Engine Optimization: Natural Strategies for High Ranking Health
Building Brains to Understand the World’s Data
World’s Biggest Data Breaches, Information is Beautiful
11 Steps Attackers Took to Crack Target, CIO.com
Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid, Wired
The Security Mindset, Schneier on Security
Cybersecurity unemployment rate at zero, SC Media
Network live IP video cameras directory, Insecam.org
Hackers Remotely Kill a Jeep on the Highway—With Me in It, Andy Greenberg, Wired
Florida man wins over 1 million miles for hacking United Airlines, Jack Corrigan, WGN TV
Computer hackers can now hijack toilets, Sarah Griffiths, Daily Mail
Baby monitor hacker delivers creepy message to child, CBS News
It’s Insanely Easy to Hack Hospital Equipment, Kim Zeller, Wired
Here’s What We Know About the Massive Cyber Attack That Took Down the Internet on Friday, Peter Dockrill, Science Alert
How the Dyn DDoS attack unfolded, Tim Greene, Network World
MEECES to pieces, Deborah Radcliff, Network World
Flight Radar – See flights in the air around the world