Gujarat University Syllabus M.Tech (Networking & Communications) II



Similar documents
Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Cryptography and network security CNET4523

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

CS 5490/6490: Network Security Fall 2015

Network Security Essentials:

CRYPTOG NETWORK SECURITY

CS 356 Lecture 28 Internet Authentication. Spring 2013

Weighted Total Mark. Weighted Exam Mark

Standards and Products. Computer Security. Kerberos. Kerberos

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

IT4405 Computer Networks (Compulsory)

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

ICTTEN8195B Evaluate and apply network security

CSCI 454/554 Computer and Network Security. Final Exam Review

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. January 11 CMSC417 Set 1 1

Network Access Security. Lesson 10

Chapter 10. Network Security

Lecture 9 - Network Security TDTS (ht1)

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Questions for Mobile Communications 2 nd ed.

Network System Design Lesson Objectives

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CS 4803 Computer and Network Security

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

How To Understand And Understand The Security Of A Key Infrastructure

Network Security. Lecture 3

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Chapter 9. IP Secure

Chapter 32 Internet Security

CRYPTOGRAPHY AND NETWORK SECURITY

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Network Security Fundamentals

Cornerstones of Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

NETWORK ADMINISTRATION AND SECURITY

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

EXAM questions for the course TTM Information Security May Part 1

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

How To Protect Your Data From Attack

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Network Security Administrator

CompTIA Network+ (Exam N10-005)

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

Fundamentals of a Windows Server Infrastructure MOC 10967

Mobile Office Security Requirements for the Mobile Office

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Chapter 8. Network Security

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

NETWORK SECURITY (W/LAB) Course Syllabus

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Securing an IP SAN. Application Brief

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Internetwork Security

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Communication Networks MAP-TELE 2012/13

Introduction to Cyber Security / Information Security

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Lecture 10: Communications Security

Network Security - ISA 656 Review

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

T Cryptography and Data Security

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

COSC 472 Network Security

Content Teaching Academy at James Madison University

IT Data Communication and Networks (Optional)

Taxonomy of Security Protocol

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Transcription:

Gujarat University M.Tech (Networking & Communications) II Subject Name: Network Security Subject Code: MTNT 121 Objectives: To enable students to learn The various security standards set by the global industry The various security applications that are being used by the industry Prerequisites: Fundamentals of Networking Fundamentals of Cryptography Fundamentals of Operating Systems Contents: 1. Kerberos a. Kerberos v4 Introduction, Tickets and Ticket-Granting Tickets, Configuration, Logging into the Network, Replicated KDC s, Realms, Interrealm Authentication, Key Version Numbers, Encryption for Privacy and Integrity, Encryption for Integrity only, Network Layer Addresses in Tickets b. Kerberos v5 ASN.1, Names, Delegation of Rights, Ticket Lifetimes, Key Versions, Making Master Keys in Different Realms, Different Optimizations in Cryptographic Algorithms, Hierarchy of Realms, Evading Password- Guessing Attacks, Key Inside Authenticator, Double TGT Authentication, PKINIT: Public Keys for Users, KDC Database, Kerberos V5 Messages 2. Public Key Infrastructure (PKI) Introduction, Some Terminology, PKI Trust Models, Revocation, Directories and PKI, PKIX and X.509, X.509 and PKIX Certificates, Authorization Futures 3. IPSec Overview of IPsec, IP and IPv6, AH (Authentication Header), ESP (Encapsulating Security Payload), Comparison of Encodings, Photuris, SKIP, History of IKE, IKE Phases, Phase 1 IKE, Phase-2 IKE: Setting up IPsec SAs, ISAKMP/IKE Encoding M.Tech (NT) II 1

4. SSL/TLS Introduction, Using TCP, SSL/TLS Basic Protocol, Resumption, Computing the Keys, Client Authentication, PKI as Deployed by SSL, Version Numbers, Cipher Suites, Negotiating Compression Method, Attacks Fixed in v3, Exportability, Encoding 5. Email Security Distribution Lists, Store and Forward, Security Services for Electronic Mail, Establishing Keys, Privacy, Authentication of the Source, Message Integrity, Non-Repudiation, Proof of Submission, of Delivery, Message Flow Confidentiality, Anonymity, Containment, Annoying Text Format Issues, Names and Addresses, Verifying When a Message was Really Sent 6. PEM & S/MIME Introduction, Structure of a PEM Message, Establishing Keys,Some PEM History, PEM Certificate Hierarchy,Certificate Revocation Lists (CRLs), Reformatting Data to Get Through Mailers, General Structure of a PEM Message, Encryption, Source Authentication and Integrity Protection, Multiple Recipients, Bracketing PEM Messages, Forwarding and Enclosures, Unprotected Information, Message Formats, DES-CBC as MIC Doesn't Work, Differences in S/MIME, S/MIME Certificate Hierarchy 7. PGP (Pretty Good Privacy) Introduction, Overview, Key Distribution, Efficient Encoding, Certificate an Key Revocation, Signature Types, Your Private Key, Key Rings, Anomalie Object Formats. 8. Malicious Software Viruses and Related Threats, Virus Countermeasures, Distributed Denial Services Attacks 9. Firewalls Firewall Design Principles, Trusted Systems, Common Criteria for Informatio Technology Security Evaluation 10. Intrusion Detection Intruders, Intrusion Detection, Password Management References: 1) Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall India. 2) William Stallings, Network Security Essentials:- Applications and Standards, Pearson Education. Accomplishments of the student after completing the Course: Understand and appreciate the importance of Network Security in today s world. Understand and use good Network Security applications and standards in various applications. --------------------------------- M.Tech (NT) II 2

Subject Name: Network Analysis and Design Subject Code: MTNT 122 Objectives: To introduce the principles of Network Design To understand the process of Network Deployments To gain basic insight of Network Operations and Maintenance Prerequisites: Fundamentals of Networking Contents: 1. Introduction: Overview of Analysis, Architecture and Design Process, Systems Methodology, System Description, Service Characteristics, Performance Characteristics, Network Supportability 2. Requirement Analysis Concepts & Process: Need for Requirement Analysis, User Requirements, Application Requirements, Device Requirements, Network Requirements, Other Requirements, Requirement Specification and Map Gathering & Listing Requirements, Developing Service Metrics, Characterizing Behavior, Developing RMA Requirements, Developing Delay Requirements, Developing Capacity Requirements, Developing Supplemental Performance Requirements, Environment-Specific: Performance Requirements, Thresholds and Limits, Requirements for Predictable and Guaranteed Performance 3. Flow Analysis: Overview and types of Flows, Identifying and Developing Flows, Data Sources and Sinks, Flow Models, Flow Prioritization and Specification, Applications of Flow Analysis 4. Network Architecture: Introduction, Component Architecture, Reference Architecture, Architectural Models, Systems and Network Architecture 5. Addressing and Routing Architecture: Addressing Mechanisms, Routing Mechanisms, Addressing Strategies, Routing Strategies, Architectural Considerations 6. Network Management Architecture & Security Architecture: Defining Network Management, Network Management Mechanisms, Architectural Considerations, Security and Privacy Administration, Security Architectural Considerations M.Tech (NT) II 3

7. Network Design: Design Concepts, Design Process, Vendor, Equipment and Service-Provider Evaluations, Network Layout, Design Traceability, Design Metrics, Testing Network Design, Optimizing Network Design, Documenting Network Design References: 1) McCabe James, Network Analysis, Architecture, and Design, Morgan Kaufmann Publishers. 2) Priscilla Oppenheimer, Top-Down Network Design, Pearson Education India Accomplishments of the student after completing the course: At the end of the study, student will be able to Capability to make efficient Network Engineering decisions. Ability to Design Networks Ability to Test, Optimize and Document Networks --------------------------------- M.Tech (NT) II 4

Subject Name: Advanced Networking Subject Code: MTNT 123 Objectives: To understand the state-of-the-art in network protocols, architectures and applications. To study the functionality of various layers of the OSI model / TCP/IP model and understand the interactions between them. To develop strong analysis, design, implementation, testing and troubleshooting skills regarding TCP/IP based networks and services. Design and implement customized TCP/IP based application layer services. Prerequisites: Fundamentals of Networking, C Programming, Linux OS Contents: 1. Introduction: Overview of Internetworking Principles and Underlying Network Technologies, Internetworking Concept and Architectural Model 2. The Network Layer: Classful IP Addresses, IPv6, Classless and Subnet Address Extensions, Address Resolution Protocol, Internet Protocol, Forwarding IP Datagrams, Internet Control Message Protocol, Mobile IP, Private Network Interconnection 3. The Transport Layer: User Datagram Protocol, Reliable Stream Transport Service, Client-Server Model of Interaction, Unix Socket Interface 4. The Application Layer: Bootstrap and Auto-Configuration, Domain Name System, Remote Login and Desktop, File Transfer and Access, Electronic mail, World Wide Web 5. TCP/IP Networks: Performance Measurement and related tools, Network Simulation, Overview of TCP Modelling, Tools provided by the Operating Systems M.Tech (NT) II 5

References: 1) Comer D. Internetworking with TCP/IP, Volume 1: Principles, Protocols and Architecture, Prentice Hall India (PHI) 2) Hassan M, Jain R., High Performance TCP/IP Networking: Concepts, Issues and Solution, Prentice Hall India (PHI) 3) Stevens R. TCP/IP Illustrated, Volume 1: The Protocols, Pearson India 4) Forouzan B.A., TCP/IP protocol suite, Tata McGraw-Hill (TMH) 5) Goralski Walter, The Illustrated Network, Morgan Kauffman 6) Kurose J., Ross K., Computer Networking A Top Down Approach, Pearson Education 7) Donahoo M., Calvert K., TCP/IP Sockets in C Practical Guide for Programmers, Morgan Kauffman 8) Stevens R., Unix Network Programming, Pearson Education 9) Tanenbaum, A.S., Computer Networks, Prentice Hall India (PHI) 10) Stallings W., Computer Networking with Internet Protocols and Technology, Pearson Education 11) Snader J., Effective TCP/IP Programming, Addison-Wesley 12) Ekram et. al., Introduction to Network Simulator NS2, Springer Verlag 13) Aboelela E., Network Simulation Experiments Manual, Morgan Kauffman Accomplishments of the student after completing the Course: Analyze and develop solutions to solve networking problems. Have thorough understanding of TCP/IP based systems, services and related tools and technologies Effectively use various tools and utilities for TCP/IP networking. --------------------------------- M.Tech (NT) II 6

Subject Name: Wireless Communication and Mobile Technology Subject Code: MTNT 124 Objectives: This course is introduction to wireless communication with focus on digital mobile communication system and digital data transfer from computer science point of view. It shows integration of services and applications from fixed networks into networks supporting mobility of end user and wireless access. It emphasizes both on technology and standards of mobile communication and shows merging of classical data transmission technologies and extension of today s Internet applications onto mobile and wireless devices. Prerequisites: Knowledge of signals, transmission media, protocols and standards of Internet and networking. Contents: 1. Introduction: [10%] Definition, types, applications and history of wireless communication systems. Wireless Transmission: frequencies for radio transmission, signals, antennas, signal propagation, multiplexing, modulation, spread spectrum, introduction to cellular systems. 2. Medium Access Control: [10%] Motivation for specialized MAC: hidden and exposed terminals, near and far terminals. SDMA, FDMA, TDMA: Fixed TDM, DAMA, PRMA, Reservation TDMA, MACA, Polling, ISMA. Introduction to CDMA systems, Spread spectrum in CDMA systems (DSSS and FHSS),coding methods in CDMA. 3. Telecommunication systems: [20%] GSM: Mobile services, system architecture, radio interface, protocols, localization and calling, handover, Security, GSM, GPRS 4. Wireless networks and Wireless LANs: [20%] Types of wireless networks (WLAN, WMAN, WWAN, WPAN and assisting technologies).wireless LAN: Infrastructure vs Adhoc LAN- IEEE 802.11, HIPERLAN, Bluetooth. 5. Mobile network layer: [10%] Mobile IP, Dynamic host configuration protocol, mobile adhoc networks, Wireless sensor networks. 6. Mobile Transport layer: [10%] M.Tech (NT) II 7

Traditional TCP, Classical TCP improvements, TCP over 2.5/3G wireless networks 7. Mobile Internet connectivity: [10%] WAP1.1, Layers of WAP, WAE, WML and WML script, WTA, PUSH architecture, PUSH/PULL services References: 1) Jochen Schiller, Mobile Communications, Pearson Education. 2) Theodore S. Rappaport, Wireless communications, principles and practices Pearson Education. 3) William C.Y.Lee, Mobile cellular Telecommunication Analog and digital System, Mcgraw Hill 4) Rajpandya, Mobile and Personal Communication system and services by 5) Dr. Kamilo Feher, Wireless communication 6) Asoke K Talukder, Roopa R Yavgal, Mobile Computing, TMH Accomplishments of the student after completing the course: At the end of the work student will be able to understand terminologies of wireless communication systems, technical background of wireless transmission media, functioning of mobile phone, technologies in Wireless Networks and Wireless LANs, Mobile Computing, influence of mobility on applications, security or IP networks, higher layers of communication like WAP and current trends in wireless communications and cellular technology --------------------------------- M.Tech (NT) II 8