Security and Network Architectural Management Tutorial
|
|
|
- Beryl Snow
- 5 years ago
- Views:
Transcription
1 YACINE CHALLAL, PH.D. Royallieu Research Center - UTC Dep. GI. PoBox: 20529, 60205, Compiegne, France 'DWHRIELUWKFeb. 24th, &HOOSKRQH ([email protected] or [email protected] :HE 5(6($5&+,17(5(676 My research interests are in the area of network security. I am particularly interested in group communication security (group key management, multicast data origin authentication and nonrepudiation ), media-streaming security over wired and wireless packet networks and routing security issues. In each of these areas, I identify and solve practical design problems, related to network architecture, protocol design and algorithms for network components. I analyse the performance of the proposed solutions through simulations (NS-2) and theory (using techniques from probability and stochastic processes, optimization and algorithms). Recently, I started investigating security issues and solutions in embedded systems. ('8&$7,21 0D\ 6HSWHPEHU 2FWREHU &RPSLHJQH8QLYHUVLW\RI7HFKQRORJ\805&156± )UDQFH Ph.D. in Information Technology. Dissertation: 6HFXUHPXOWLFDVWFRPPXQLFDWLRQVª Mention: Très Honorable Advisor: Prof. Abdelmadjid Bouabdallah. Reviewers: Prof. Serge Fdida (Lip6-France), and Prof. J.W. Atwood (Concordia University-Canada). &RPSLHJQH8QLYHUVLW\RI7HFKQRORJ\87&)UDQFH Master s Degree in Information Technology Area of focus: ³0XOWLFDVW6HFXULW\. 1DWLRQDO&RPSXWHU6FLHQFH,QVWLWXWH,1,$OJHULD Computer Engineering Diploma. Option : ³&RPSXWHU6\VWHPV. Ranked always 1 st since my entrance: Summa Cum Laude $1'',67,1&7,216 French-Algerian Scholarship for preparing a Ph.D. in Information Technology in France. Duration : 48 months. (from 2001 to 2005) Oct 2001 Computer Engineering Diploma with First Honor (Summa Cum Laude) at the National Computer Science Institute (INI-Algeria). RESEARCH & WORK EXPERIENCE Positions Currently, I am occupying a temporary position (Research and Teaching) at the Compiègne University of Technology (ATER). I am involved in teaching Operating Systems, Computer Networks, Web Services, Data bases Besides, I work on: routing security in wired and ad hoc networks, multicast routing with delay constraints, and embedded networks security.
2 &RPSLHJQH8QLYHUVLW\RI7HFKQRORJ\87&)UDQFHOct May Ph.D Student. Member of the Networking Group in the Heudiasyc lab. (UMR-CNRS 6599). Dissertation on *URXS&RPPXQLFDWLRQ6HFXULW\Proposed different protocols for key management and multicast data origin authentication with non-repudiation. Performance evaluation of the proposed protocols carried out using NS-2 simulator. Theoretic modelization of group dynamics and packet loss is done using stochastic processes. Member of the National Project (RNRT): SafeCast (while Ph.D. Candidate): This project deals with group communication security and aims to build a framework for secure communications for security corps (police, fire fighters, soldiers) in disastrous circumstances where no network infrastructure can be envisioned. The consortium of this project includes: EADS Telecom, INRIA/Loria, ENST, LAAS, in addition to our CNRS-Heudiasyc lab. Internships 1DWLRQDO6FLHQWLILF5HVHDUFK&HQWHU805&156)UDQFHFeb Sep 'XUDWLRQPRQWKV Research Intern in the frame of the Master s degree preparation. Evaluation and comparison of key management protocols in secure group communications. A new key management protocol has been proposed: AKMP (IEEE-ICCCN02). 5HVHDUFK&HQWHURQ7HFKQLFDODQG6FLHQWLILF,QIRUPDWLRQ&(5,67$OJHULD2000/2001 'XUDWLRQPRQWKV Engineering Intern in the frame of the Engineering Diploma preparation. Design and implementation of an intelligent multi-agent system for automatic network and service management. UML specification, Java developpement, distributed object communication using ORBacus (a CORBA implementation), agents inference using Java Expert System Shell (Jess). Research Advising %HMDLD8QLYHUVLW\$OJHULD Research Co-Supervision. I m currently working with Omar Mawloud (a master student) on Trust Models in Heterogeneous Networks. We are investigating the most suitable mechanisms and infrastructures for heterogeneous network architectures involving wired, ad hoc, and mobile IP interconnected subnets. 867+%8QLYHUVLW\$OJHULD I m currently working with Djalel Maftouh and Khaled Kadi on Multicast routing with QoS; We are investigating using Ant Colony System heuristics to calculate a delay constraint spanning multicast tree. &RPSLHJQH8QLYHUVLW\RI7HFKQRORJ\87&)UDQFH Research Co-Supervision. I have co-supervised (with Prof. Bouabdallah) the research of two master students: In Spring 2004, I worked with the master student Yoann Hinard on Pricing and Security in Multicasting, which resulted in IEEE-LCN and Computer Communications Journal papers. I also, worked with the master student Hani Ragab Hassan on securing group wireless communications in the frame of the SafeCast project, which resulted in IEEE-INFOCOM poster and IFIP-WOCN, IEEE-SecureCom papers. %HMDLD8QLYHUVLW\$OJHULD Research Co-Supervision. I have co-supervised with Prof. Bouabdallah two master students (2004/2005): I worked with Said Gharout on designing scalable and delay-constrained group key management for secure multimedia applications. I work also with Abdelaziz Babakhouya on routing security with a special focus on reputation based approches.
3 38%/,&$7,216 International Journal Publications 1. Y. Challal, A. Bouabdallah, Y. Hinard; ³5/+5HFHLYHUGULYHQ/D\HUHG+DVKFKDLQLQJIRUPXOWLFDVW GDWDRULJLQDXWKHQWLFDWLRQ (OVHYLHU&RPSXWHU&RPPXQLFDWLRQV-RXUQDOVolume 28(7), pages: Y. Challal, A. Bouabdallah, H. Bettahar; ³+$ +\EULG +DVKFKDLQLQJ VFKHPH IRU $GDSWLYH PXOWLFDVWVRXUFHDXWKHQWLFDWLRQRIPHGLDVWUHDPLQJ (OVHYLHU&RPSXWHUVDQG6HFXULW\-RXUQDO, Volume 24, issue (1), pages: 57-68, Feb Y. Challal, H. Seba; ³*URXS.H\ 0DQDJHPHQW 3URWRFROV $ 1RYHO 7D[RQRP\,,QWHUQDWLRQDO -RXUQDORI,QIRUPDWLRQ7HFKQRORJ\, Volume (2), Number (1), pages: , Y. Challal, H. Bettahar, A. Bouabdallah; ³$ 7D[RQRP\ RI 0XOWLFDVW 'DWD 2ULJLQ $XWKHQWLFDWLRQ,VVXHV DQG 6ROXWLRQV,((( &RPPXQLFDWLRQV 6XUYH\V DQG 7XWRULDOV -RXUQDO, Volume (6), number (3), pages: 34-57, Oct Y. Challal, H. Bettahar, A. Bouabdallah; ³6$.0 D 6FDODEOH DQG $GDSWLYH.H\ 0DQDJHPHQW $SSURDFK IRU 0XOWLFDVW &RPPXQLFDWLRQV $&06,*&200 &RPSXWHU &RPPXQLFDWLRQV 5HYLHZ, Volume (34), number (2), pages: 55-70, April International Conference Publications 1. H.R. Hassan, A. Bouabdallah, H. Bettahar, Y. Challal; ³+L.' $Q (IILFLHQW.H\ 0DQDJHPHQW $OJRULWKPIRU+LHUDUFKLFDO*URXS,(((6HFXUH&RP *UHHFH 2. Y. Challal,A. Boubdallah; Authenticast: A Source Authentication Protocol for Multicast Flows and Streams, :(&,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\,VWDQEXO 3. H. Ragab Hassan, A. Bouabdallah, H. Bettahar, Y. Challal +L.'+DVKEDVHGKLHUDUFKLFDO.H\ 'LVWULEXWLRQIRU*URXS&RPPXQLFDWLRQ",,(((,1)2&20 (poster)(miami-usa). 4. H. Ragab Hassan, Y. Challal; (QKDQFHG:(3DQHZVROXWLRQWR:(3WKUHDWV,),3:LUHOHVVDQG 2SWLFDO&RPPXQLFDWLRQ1HWZRUNV:2&1 (Dubai-UAE). 5. Y. Challal, A. Bouabdallah, Y. Hinard; (IILFLHQWPXOWLFDVWVRXUFHDXWKHQWLFDWLRQXVLQJOD\HUHGKDVK FKDLQLQJVFKHPH,,(((/RFDO&RPSXWHU1HWZRUNV/&1 (poster)(florida-usa): Y. Challal, H. Bettahar, A. Bouabdallah; +\EULG DQG $GDSWLYH +DVKFKDLQLQJ VFKHPH IRU GDWD VWUHDPLQJ VRXUFH DXWKHQWLFDWLRQ, +LJK 6SHHG 1HWZRUNV DQG 0XOWLPHGLD &RPPXQLFDWLRQV +610& (Toulouse-France), Lecture Notes in Computer Science (3079): Y. Challal, H. Bettahar, A. Bouabdallah; $&DVWDQ$GDSWLYHVRXUFH$XWKHQWLFDWLRQSURWRFROIRU PXOWL&DVW VWUHDPV,,(((,QWHUQDWLRQDO 6\PSRVLXP RQ &RPSXWHU &RPPXQLFDWLRQV,6&& (Alexandria-Egypt): Y. Khaled, H. Menouar, Y. Challal; 5HDFWLYH DQG $GDSWLYH 3URWRFRO IRU,QWHUYHKLFOH &RPPXQLFDWLRQV,,(((,QWHUQDWLRQDO &RQIHUHQFH RQ,QIRUPDWLRQ &RPPXQLFDWLRQ 7HFKQRORJLHVIURP7KHRU\WR$SSOLFDWLRQV,&&7$ (Damascus-Syria), pages: Y. Challal, H. Bettahar, A. Bouabdallah; $6FDODEOHDQG$GDSWLYH.H\0DQDJHPHQW3URWRFRO IRU *URXS&RPPXQLFDWLRQ :LUHG:LUHOHVV,QWHUQHW&RPPXQLFDWLRQV::,&Lecture Notes in Computer Sience (2957): , February 2004.
4 10. H. Bettahar, A. Bouabdallah, Y. Challal ; $.03 DQ $GDSWLYH.H\ 0DQDJHPHQW 3URWRFRO IRU VHFXUH PXOWLFDVWª,,(((,QWHUQDWLRQDO &RQIHUHQFH RQ &RPSXWHU &RPPXQLFDWLRQV DQG 1HWZRUNV,&&&1 : , Miami October 14 th -16 th National Conference Publications with proceedings and TPC 1. H.R.Hassan, A. Bouabdallah, H. Bettahar, and Y. Challal; *HVWLRQGHFOpVGDQVODFRPPXQLFDWLRQGH JURXSHVKLpUDUFKLTXHVª6HFXULW\DQG1HWZRUN$UFKLWHFWXUHV&RQIHUHQFH6$5, Batz sur Mer- France June Y. Challal, H. Bettahar, A. Bouabdallah; $6FDODEOHDQG$GDSWLYH.H\0DQDJHPHQW$SSURDFKIRU *URXS &RPPXQLFDWLRQª 6HFXULW\ DQG 1HWZRUN $UFKLWHFWXUHV &RQIHUHQFH 6$5, Nancy- France Jul H. Bettahar, A. Bouabdallah, Y. Challal ; 0XOWLFDVWVpFXULVpXQHDSSURFKHDGDSWDWLYHª, 6ecurity DQG1HWZRUN$UFKLWHFWXUHV&RQIHUHQFH6$5.Marrakeche (Moroco), July 08th-12th Submitted papers Y. Challal, S. Gharout, A. Bouabdallah, H. Bettahar; Adaptive clustering for Scalable Group Key Management, VXEPLWWHGWR$&0,(((7UDQVDFWLRQVRQ1HWZRUNLQJ
5 7($&+,1*(;3(5,(1&( &RPSLHJQH8QLYHUVLW\RI7HFKQRORJ\87&)UDQFH Teaching Assistant (While Ph.D. Student/Candidate): Teaching at the UTC of different courses to different level audience. Particularly, I gave tutorials in networking, web services, databases, operating systems, operational research, data structures and Pascal and C programmaing. I give some details about the given tutorials in what follows: <HDU &RXUVH7'73 9ROXPHK 6WXGHQWV NF01: Programming Fundamentals : Pascal Programming-TP NF16: Data Structures and Files : C Programming-TP NF17: Databases Design and Practice-TP RO03: Operational Research: Combinatorial Optimization-TD 14+1TP 25 NF01: Programming Fundamentals : Pascal Programming-TP NF16: Data Structures and Files : C Programming-TP SR02: Operating Systems: UNIX, C API-TD NF16: Data Structures and Files : C Programming-TP NF17: Databases Design and Practice-TD NF17: Databases Design and Practice-TP NF01: Programming Fundamentals : Pascal Programming-TD SR04 : Networking: TCP/IP, LANs, Interconnection-TD SR02 : Operating Systems: UNIX, C API-TD NF17 : Databases Design and Practice-TP NF17 : Databases Design and Practice-TD NF26 : Data warehouse-td Web Services - Course Web Services - TD Networking - TD UNIX/C Relational Data bases (e-learning) $/ K&K7'K73 K7' & &RXUVH7' 7XWRULDO73 /DE 7$/.6 Invited Talks Y. Challal, ³6HFXULW\ LQ *URXS &RPPXQLFDWLRQ &KDOOHQJHV DQG 6ROXWLRQV, WEC 05: International Conference on Information Security (Istanbul). Y. Challal, ³'DWDRULJLQ$XWKHQWLFDWLRQLQ0XOWLFDVW0HGLDVWUHDPLQJ WEC 05: International Conference on Information Security (Istanbul). Conference Talks (IILFLHQW PXOWLFDVW VRXUFH DXWKHQWLFDWLRQ XVLQJ OD\HUHG KDVKFKDLQLQJ VFKHPH IEEE-LCN, Nov. 2004, FL, USA. $&DVWDQ$GDSWLYHVRXUFH$XWKHQWLFDWLRQSURWRFROIRUPXOWL&DVWVWUHDPV, IEEE-ISCC, Jul. 2004, Alexandria, Egypt. $6FDODEOHDQG$GDSWLYH.H\0DQDJHPHQW3URWRFROIRU*URXS&RPPXQLFDWLRQWWIC, Feb. 2003, Frankfurt(Oder), Germany. $6FDODEOHDQG$GDSWLYH.H\0DQDJHPHQW$SSURDFKIRU*URXS&RPPXQLFDWLRQªSAR, Jul. 2003, Nancy, France. ³$GDSWLYHDSSURDFKIRUVHFXUHPXOWLFDVWFRPPXQLFDWLRQ, SAR, Jul. 2002, Marrakech, Moroco.
6 6&,(17,),& 352)(66,21$/$&7,9,7,(6 Member of the RUJDQL]LQJFRPPLWWHH of SAR 05: The fourth conference on Security and Network Architectures 2005 (Batz sur Mer-France). Member of the RUJDQL]LQJ FRPPLWWHH of SAR 04: The third conference on Security and Network Architectures 2004 (La Londe-France). :HEPDVWHU of SAR 04: The third conference on Security and Network Architectures 2004 (La Londe-France). 5HYLHZHU for IEEE Communications Letters, Elsevier Computer Communications. 5HYLHZHUfor: WSTI 03, TIW 04, SAR 04, IFIP-Networking 04, Co-Next 05, SAR 05. 3UHVLGHQW of the INI Students Committee: CEINI, a cultural and scientific association at the National Computer Science Institute (INI-Algeria), 1998/ ()(5(1&(6 $EGHOPDGMLG%RXDEGDOODK Professor, [email protected]. +DWHP%HWWDKDU [email protected]. $KPHG6HUKURXFKQL ENST (Paris-France) [email protected].,vdehooh&kulvphqw LORIA INRIA-Lorraine, France [email protected] -DFTXHV&DUOLHU Professor, [email protected]. 6WpSKDQH&UR]DW / post [email protected]
How To Write A Network Protocol For A Cell Phone Network
CURRICULUM VITAE OF BOUDOUR Ghalem LIG - Grenoble Institute of Technology 681, rue de la passerelle Domaine universitaire - BP 72-38402 Grenoble Phone: +33 6 25 61 69 43 E-mail: [email protected]
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION
Ming-Hsing Chiu Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 Mandeville, LA 70471 e-mail: [email protected] EDUCATION Ph.D. in Computer Science, University of Central Florida, May 99. Dissertation
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Advanced Mobile Communication Networks
Advanced Mobile Communication Networks (replaces previous courses Advanced Networking for MSCSP, Mobile Comm. Networks for RCSE and Wireless Internet for II & IN) Course Description and Introduction Integrated
Damiano Carra EMPLOYMENT HISTORY EDUCATION
Damiano Carra Computer Science Department University of Verona Strada le Grazie 15 I-37134 Verona (Italy) Phone: +39 045 802 7059 Fax: +39 045 802 7068 Email: [email protected] EMPLOYMENT HISTORY
IEEE 2015-2016 JAVA TITLES
ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:
Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)
Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs) 2-Interconnecting Cisco Networking Devices Part 2 (40 Hs) 1-Interconnecting
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
FACULTY OF COMPUTER SCIENCE AND ENGINEERING CURRICULUM FOR POSTGRADUATE PROGRAMMES. (Master in Information Technology)
FACULTY OF COMPUTER SCIENCE AND ENGINEERING CURRICULUM FOR POSTGRADUATE PROGRAMMES (Master in Information Technology) MASTER IN INFORMATION TECHNOLOGY (MIT) CURRICULUM 1.1 Introduction This programme is
Opportunities after graduation: Master s degree?
Computer Science Club Seminar Opportunities after graduation: Master s degree? Dr. Vasil Hnatyshin Fall 2010 Introduction Briefly about myself Life of a graduate student Computer Science Graduate Program
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
Analysis of EU PhD Education and Research. Prof. Dr. Hans G. Sonntag, MF Heidelberg
Analysis of EU PhD Education and Research Prof. Dr. Hans G. Sonntag, MF Heidelberg History of Doctoral Degrees Doctoral degrees as old as universities Universities had the permission to award doctoral
Ryerson University Phone: (416) 979-5000 ext: 4920
Haleh Khojasteh Last update: January 21, 2016 CONTACT INFORMATION RESEARCH INTERESTS Ryerson University Phone: (416) 979-5000 ext: 4920 Department of Computer Science E-mail: [email protected]
Computer Networks I Introduction
Computer Networks I Introduction Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Malin Bornhager Instructor: CCNA, CCNP, Wireless LANs and Fundamentals of Unix
ISOM3380 Advanced Network Management. Spring 2014 15. Course Description
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)
What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and
M.Sc. Program in Informatics and Telecommunications
M.Sc. Program in Informatics and Telecommunications at UoA-DIT Prof. Ioannis Stavrakakis Deputy Dept Chair, Director of Graduate Studies 1 Overview of Graduate Studies Initiated in 1993 Modified in 2000
Master of Science in Computer Science Degree Requirements, Policies, and Procedures
Master of Science in Computer Science Degree Requirements, Policies, and Procedures Summary of Procedures for M.S. Students Complete every deficiency course with a B or higher within the first two terms
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,
CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273
CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273 Course Admin Details Prof Mario Gerla: BH 3732 F [email protected] Office Hrs: MW
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
Juan (Jenn) Du. Homepage: www4.ncsu.edu/ jdu/ Co-advisors: Dr. Xiaohui (Helen) Gu and Dr. Douglas Reeves
Juan (Jenn) Du CONTACT INFORMATION Juan (Jenn) Du Cell: (919) 645-7772 1015 Katie Ln E-mail: [email protected] Cary, NC 27519 Homepage: www4.ncsu.edu/ jdu/ RESEARCH INTERESTS EDUCATION My general research
Masters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site
Resume Dr. Vedat COSKUN Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site [email protected] [email protected] www.vedatcoskun.com www.nfclab.com Dr. Vedat Coskun is
Masters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
Cisco Certified Network Professional (CCNP Routing & Switching)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Professional (CCNP Routing & Switching) Program Summary This instructor-led
Communication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Richardson, TX 75080 Email: [email protected] Education: The University of Texas, Austin, TX, USA Jun. 2003 May 2006 Ph.D.,
Masters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
Masters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science
MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Troubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
CSE 3214: Computer Network Protocols and Applications
CSE 3214: Computer Network Protocols and Applications 1 Course Web-Page: Instructor: http://www.eecs.yorku.ca/course/3214/ (all lecture notes will be posted on this page) Natalija Vlajic ([email protected])
Quality of Service in Industrial Ethernet Networks
György Kálmán, ABB Corporate Research Norway, [email protected] Quality of Service in Industrial Ethernet Networks February 10, 2013 Slide 1 Can we provide appropriate Quality of Service for industrial
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
Communication Networks MAP-TELE 2012/13
Communication Networks MAP-TELE 2012/13 Objective of the course The main objective of the course is to present the fundamentals of modern communication systems and networks and allow students to consolidate
4.1 CD 301 - BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time)
4.1 CD 301 - BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time) 1. OBJECTIVES This Programme is geared towards producing computer professionals, with a thorough understanding
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Evaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks
Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks Updated 7/12/2013 Faculty Member Proposed Project Title Research Interests Dr. Abdullah M. Almuhaideb Email:
Cisco Certified Network Professional - Routing & Switching
Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:
Deliverable D7.1. Project Website and Project Presentation
Enriched Network aware Video Services over Internet Overlay Networks www.envision project.org Deliverable D7.1 Project Website and Project Presentation Public report, Final Version, 29 January 2010 Authors
MASTER S DEGREE IN ENGINEERING
The adds to the uniqueness of the ECE curriculum since our school is one of the only graduate schools of engineering to offer full academic training in this field. The embedded systems domain is currently
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model
WEI CHEN Rady School of Management University of California, San Diego 9500 Gilman Drive, MC 0553 La Jolla, CA 92093-0553 +1(858)337-5951 +1(858)534-0862 [email protected] www.mrweichen.info RESEARCH
EURECOM Double Degree M.S. Diploma. Prof. Pietro Michiardi [email protected]
EURECOM Double Degree M.S. Diploma Prof. Pietro Michiardi [email protected] What is EURECOM? Graduate School and Research Lab Founded in 1991 by EPFL and TELECOM Paris PolyTech CAMPUS EURECOM
Industrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
SUDARSAN RANGAN. Page 1 of 6
Page 1 of 6 EDUCATION SUDARSAN RANGAN Department of Information and Operations Management Mays Business School, Texas A&M University College Station, TX 77843-4217 Phone: 205-393-9404 Email: [email protected]
Doctorate of Philosophy Candidate, Information and Communication Technologies, January 2013 - March 2015.
Antonio Petitti Contact Information Mobile Robotics Laboratory Institute of Intelligent Systems for Automation Via Amendola, 122/D-O, 70126 Bari, Italy Phone: +39 080 592 9423 Email: [email protected]
Resume of Hanan H. Elazhary
Resume of Hanan H. Elazhary Home Phone: 35853017, 35853986 Cell Phone: 0112302019 E-mail: [email protected], [email protected] Nationality: Egyptian Gender: Female EDUCATION Ph.D. in Computer Science
Advanced Internetworking
Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,
IRATI - Investigating RINA as an Alternative to TCP/IP
Títol de la presentació de powerpoint IRATI - Investigating RINA as an Alternative to TCP/IP FIRE Engineering Workshop, Ghent, Belgium November 6th, 2012 Sergi Figuerola Project coordinator Director @
CS 5480 Computer Networks
CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
Rebeca Estrada Pico [email protected], [email protected] 963 Tait, Ville St. Laurent, QC, Canada, H4M2L3 5143360608
Rebeca Estrada Pico [email protected], [email protected] 963 Tait, Ville St. Laurent, QC, Canada, H4M2L3 5143360608 Citizenship: Ecuadorian Age: 42 Marital Status: Married Education Graduate studies
CAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
Discover Viterbi: New Programs in Computer Science
Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx
Yu-Han Chang. USC Information Sciences Institute 4676 Admiralty Way (617) 678-2486 Marina del Rey, CA 90292
Yu-Han Chang USC Information Sciences Institute [email protected] 4676 Admiralty Way (617) 678-2486 Marina del Rey, CA 90292 Research Interests My research centers on learning in rich multi-agent environments.
Graduate Programs. Dept of Computer Science. Dr. Weining Zhang
Graduate in Dept of Computer Science Univ. of Texas at San Antonio Dr. Weining Zhang Overview Two graduate degrees: Master of Science (MS) in Computer Science PhD in Computer Science Currently, there are
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
Programme name Computer Science with Artificial Intelligence
PROGRAMME SPECIFICATION KEY FACTS Programme name Computer Science with Artificial Intelligence Award BSc (Hons) School School of Informatics Department or equivalent School of Informatics UCAS Code G4G7
Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum:
ITP PH.D. PROGRAM CONTENTS Overview... 2 Course Requirements... 3 Core Course Requirement... 4 Technology Course Requirement... 5 Business/Economic/Policy Course Requirement... 6 Preliminary Exam... 7
Keumseok Kang. EMPLOYMENT August 2011 current: Visiting Assistant Professor, College of Business Administration, Florida International University
Keumseok Kang Decision Sciences and Information Systems, College of Business Administration Florida International University, Modesto A. Maidique Campus 11200 S.W. 8th Street, Miami, Florida 33199-0001
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
Please consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina
Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5 Victoria Kostina Department of Electrical Engineering www.caltech.edu/~vkostina California Institute of Technology, CA 91125 [email protected]
imtech Curriculum Presentation
imtech Curriculum Presentation Effective from Batch 2015 Onwards April, 2015 Course Structure Every course has a fixed number of credits associated with it (e.g., 4 credits) One has to earn 200 credits
Discover Viterbi: Computer Science
Discover Viterbi: Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan Balding Graduate & Professional Programs November 2, 2015 WebEx Quick Facts Will I be
Memo: August 27, 2015. To: new or prospective students entering our PhD or MS program who are interested in computer networking.
Memo: August 27, 2015 To: new or prospective students entering our PhD or MS program who are interested in computer networking. So you want to study networking.congratulations!! In this memo, I identify
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
Explicit Multicast Routing
Explicit Multicast Routing Malik Mubashir HASSAN Stagiaire, ARMOR 2 IRISA Supervisors: Bernad Cousin Miklos Molnar 1 Plan Introduction of Group Communications Various types of Group Communications Multicast
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days
CCNA The Cisco Certified Network Associate (CCNA) course consists of days 1 to 5 of the Cisco Networking Academy Programme. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included)
Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)
Curriculum Vitae EDUCATION Monica N. Nicolescu Assistant Professor Department of Computer Science University of Nevada, Reno [email protected] http://www.cs.unr.edu/ monica June 1998 - May 2003: University
