[go: up one dir, main page]

0% found this document useful (0 votes)
53 views76 pages

WU M.SC Computer Networks - Draft Version Curriculum

The document outlines a draft curriculum for a Master's program in Computer Networks. It provides background on the university and college, rationale for the program, objectives, graduate profile, program requirements and structure, courses, and resources. The program aims to provide trained professionals in computer networks and prepare students for research.

Uploaded by

atakilti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views76 pages

WU M.SC Computer Networks - Draft Version Curriculum

The document outlines a draft curriculum for a Master's program in Computer Networks. It provides background on the university and college, rationale for the program, objectives, graduate profile, program requirements and structure, courses, and resources. The program aims to provide trained professionals in computer networks and prepare students for research.

Uploaded by

atakilti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

M.Sc.

in Computer Networks
[Draft Version Curriculum]
July 2015

College of Informatics
Kombolcha Institute of Technology

Wollo University
Kombolcha, ETHIOPIA
M.Sc. in Computer Networks 2015

Table of Contents

1. Background of the Program ................................................................................2


2. Rationale of the Curriculum ................................................................................3
3. Objective of the Program ....................................................................................5
4. Graduate Profile ..................................................................................................6
5. Program Requirements .......................................................................................9
5.1. Structure General Course Content Areas ....................................................9
5.2. Admission Requirement ..............................................................................10
5.3. Graduation Requirement ............................................................................11
5.4. Duration of Study .........................................................................................12
6. Degree Nomenclature .........................................................................................13
7. Structure of the Program ....................................................................................13
8. Teaching-Learning Strategies ..............................................................................13
9. Resources ............................................................................................................15
9.1. Staff Profile ..................................................................................................15
9.2. Material Resources ......................................................................................15
10. Quality Assurance and Curriculum Review .........................................................16
11. Course Profile ......................................................................................................17
11.1. Course Numbering .....................................................................................17
11.2. Course Sequence ........................................................................................18
11.3. Course Map for Graduate Profile ...............................................................21
11.4. Course Descriptions ...................................................................................22
12. Appendix ..............................................................................................................66
12.1. NetLab Student Manual .............................................................................66
12.2. List of Important & Top Journals/Conferences...........................................71
12.3. NetLab Masters Research Proposal Template ...........................................73

1
M.Sc. in Computer Networks 2015

1. Background of the Program

Wollo University is one of the federal universities built among a group of 2 nd generation
Universities in Ethiopia. Being located in the South Wollo Zone of the Amhara State, the
University is designed to be a center of learning and research in a wide range of fields to meet
the growing demand of trained manpower of the country. The University is at the center of an
area characterized by archaeological, anthropological and historical achievements and diverse
ethnic and religious groups known for their harmonious coexistence. The area has also featured
rich cultural and literary traditions and accomplishments as, for instance, four of the country’s
musical notes found their origin therein and many name worthy people of letters, the
performing arts and philosophy emerged. Dessie, having a population of no less than 300,000
and tucked in the Ethiopian highlands of some 2,500 meters in height, is a commercial hub
serving a catchment of some seven million people. Kombolcha is an evolving city and has
recently been designated as one of the industrial zones of the country. It has a population of
no less than 90,000. It, being in the midlands of lower altitude, is served by a modern airport
and is 450 kilometers away from the seaport of Djibouti along the Red Sea Coast. Soon
Kombolcha will be served by a cross country railway chain connecting it to Djibouti.

The University has two campuses, the main campus is located at Dessie and the Kombolcha
Campus is located in the City of Kombolcha, some 26 kilometers south east of the Dessie
Campus. Since 2011, the Kombolcha Campus has developed its own uniqueness, complexity
and potential beginning to play its strategic role in the evolving industrialization of the city and
of the area. Owing to this standing, the Ministry of Education designated it as the Kombolcha
Institute of Technology. As this niche increasingly became a source of strength, an increasing
number of students began to enroll in the institute posing increasing demands for changes in
leadership, managerial attention and structure.

The Kombolcha Institute of Technology (KIoT) consists of two colleges namely Informatics and
Engineering. The College of Informatics currently consists of Computer Science, Information
Technology and Information Systems departments. College of Informatics is proposing the

2
M.Sc. in Computer Networks 2015

launching of M.Sc. program in Computer Networks in order to provide an ever-green


opportunity to generate trained professionals and to lift-up the studies to the International
standards of research and development. This will in turn help to achieve Growth and
Transformation Plan (GTP) of the country.

2. Rationale of the Curriculum

The basic rationale for the program is the prevailing conditions in the Country with respect to
the needs for professionals in computer networks and the future trends that are developing in
the demands for the profession. The College has been keenly following the developments in
this regard both within the country and internationally and the following provide some of the
major facts and observations on which this program premised.

We live in an era which has been and will continue to be profoundly influenced by advances in
digital technology. These advances are having a dramatic impact in the field of education,
business, entertainment, and other service providing agencies, where a growing number of
educators are exploring ways of taking advantage of interactive multimedia and
telecommunications technologies in order to expand the repertoire of engineering practice and
enhance development means.

The number of Computer Science, Information Technology, Information Systems, Software


Engineering and Computer Engineering graduates graduating from all public and private
Universities in Ethiopia is increasing rapidly every year. Many Bachelor degree graduates have a
need to update their training and/or develop expertise in network management, system
administration, network security and network related fields. For many of these students, it is
both necessary to prepare them for doctoral level education and also to achieve their
professional goals which may be concerned with practice in changing trends in technology.
Hence, the College of Informatics was convinced that it is necessary to offer graduate programs
in order to provide opportunity to the eligible under graduate professionals to upgrade them to
higher level and make them available for the development of the country. Profound changes in
Ethiopian society are requiring that students, in addition to learning the basic curriculum of

3
M.Sc. in Computer Networks 2015

basic engineering disciplines, also gain critical thinking and advanced skills in order to succeed
M.Sc. education, offered in conducive learning environments which include more advanced
courses for research and development, presents an excellent opportunity for students to
develop these skills.

Need Assessment Survey Result


Candidates rating the importance of M.Sc.
70%
Computer Networks as very high
Candidates willing to join M.Sc. Computer 48%
Networks immediately
Non-academicians (Programmers, Network
Admins, ICT officials, System admins, Database 46%
Admins, Consultancy, etc.
Academicians 64%
Computer Science, IT, Information Systems
74%
Graduates (Graduate/Post-Graduate)
Software Engineering, Management Information
12%
Systems, Electrical Engineering and Communication
Graduates of other Disciplines 4%

Non-governmental Candidates 27%

Government or Civil Servants 73%

Female Candidates 22%

Male Candidates 78%

Mode of Program (Full-time) 19%


Mode of Program (Extension) 81%

Project-based 38%

Research-based 41%

Course-based 21%

0 10 20 30 40 50 60 70 80 90
Fig: The requirement of M.Sc. in Computer Networks program based on need assessment

Nowadays, the number of manufacturing industries, commercial centres, governmental and


nongovernmental organizations that use network and network applications dramatically

4
M.Sc. in Computer Networks 2015

increasing and those organizations need network experts to handle their sophisticated systems.
The requirement of the M.Sc. Computer Networks program identified through need assessment
has been reflected in terms of a chart displayed above. In addition to that, research and
academic institutes need young researchers and academicians to look into and contribute their
problem solving solutions in the network related state of the art technologies so that the gap in
scholarly communication among different regions to be filled. Hence, these and some other
related but not mentioned facts necessitated the lunching of M.Sc. program in Computer
Networks.

3. Objective of the Program

Networking is a fundamental part of numerous everyday products, and related applications are
involved in nearly all the fields, from design to the control and administering functions. A
master's degree in Computer Networks is highly respected and graduates from this degree
program embark to solve real problems and enjoy an excellent employment rate.

The objective of the M.Sc. award in Computer Networks is to equip and provide the students
with:

 A rigorous theoretical knowledge and understanding of current research issues as well


as detailed practical experience of network design, development, implementation,
operations, applications, systems and services.
 Skills that will enable students to contribute to future developments in the field of
system administration, network design, management and implementation.
 The ability to make a critical evaluation of the theories, techniques and systems used in
planning, design, implementation, security and disaster recovery of modern
communication networks as well as the services they support.
 Skills to embark students in consultancy, developing research as well as problem-solving
techniques through practical project experience. By extending students’ knowledge and
skills in a specialized area they will be prepared for careers in advanced research and/or
industry.

5
M.Sc. in Computer Networks 2015

 The ability to involve both management and user in the process of awareness, decision
and implementation with regard to computer networks as well as evaluating the
security risks.
 The ability to evaluate the performance of wired and wireless computer networks using
analytical and/or simulation tools; and manage the implementation of a complete
communication design project.
 Knowledge and understanding of the legal, social, ethical and professional issues related
to network design and development.

4. Graduate Profile

After successful completion of this program, graduates will acquire lessons about computing-
related cognitive abilities, practical abilities and additional transferable skills. Thus, the program
expects graduates to exhibit the following traits:

4.1. Computing-related Cognitive Abilities (C)

On completion of this program the successful student will be able to:

 C1: Critically evaluate the communication needs of an organisation and apply both
formal and informal methods to the design of a computer network to meet the
requirement specification.
 C2: Understand, design and evaluate the performance of a communication network
using modeling and simulation techniques.
 C3: Apply network management concepts to real world systems.
 C4: Analyze and formulate solutions to the security threats of complex distributed
networks.
 C5: Provide a critical analysis and understanding of key concepts in the operation and
deployment of network systems and services.
 C6: Understand and use advanced routing protocols and route optimization
techniques.

6
M.Sc. in Computer Networks 2015

 C7: Critically evaluate the legal, social, ethical and professional implications of
network design and development in general and in specific context.
 C8: Use a combination of general and specialist computer communications
knowledge and understanding to apply an existing or emerging technology to the
solution of a practical problem through the completion of an individual project.

4.2. Computing-related Practical Abilities (P)

On completion of this program the successful student will be able to:

 P1: Design, implement and configure computer networks.


 P2: Draw up system level agreements for computer networks.
 P3: Critically evaluate computer communication networks/systems performance and
recommend improvements supported with evidence/arguments.
 P4: Simulate an existing/proposed computer communication system and propose
improvements.
 P5: Design and build usable computer communication networks/systems using a
methodological approach.
 P6: Develop security plans and policies and deploy appropriate safeguards for
networked systems.

4.3. Other Transferable Skills (T)

On completion of this program the successful student will be able to:

 T1: Understand and apply mathematical techniques and models in relevant context.
 T2: Analyze a problem systematically and implement an effective solution both
individually and within a group.
 T3: Communicate effectively (in writing, verbally and through graphical notations).
 T4: Effectively manage resources and time.
 T5: Learn independently in familiar and unfamiliar situations with open- mindedness

7
M.Sc. in Computer Networks 2015

and in the spirit of critical enquiry.


 T6: Learn effectively for the purpose of continuing professional development in a
wider context throughout their career.
 T7: Take personal responsibility for a range of activities and make decisions within an
individual or group task context.
 T8: Understand the legal, social, ethical and professional issues related to network
design and development.

4.4. Excellent Career Prospects

Graduates can be employed as network administrators, designers, engineer, analysts,


scientists and researchers in multi-national networking companies; e.g. governmental
organizations such as INSA (Information Network Security Agency) and Ministry of Defense,
NGOs and so on. Graduates can also be good assets for Universities and Research
organizations.

4.5. Educational Outcomes

Students graduating from Computer Networks program will be able to choose many
different roles: network consultants, project planners, project managers, interface
designers, researchers and analysts.

Some of the general tasks that a networking specialist is likely to perform include:

 Understand and apply holistic approach to computer networks.


 Evaluating engineering methodologies and where appropriate proposing new
hypotheses.
 Apply knowledge of computing and mathematics appropriate to the discipline.

 Analyzing a problem, and identify and define the requirements appropriate to its
solution.
 Design, implement and evaluate a system, process, component, or program to meet

8
M.Sc. in Computer Networks 2015

desired needs.
 An ability to function effectively on teams to accomplish a common goal.
 Understanding and applying professional, ethical, legal, security and social issues and
responsibilities.
 Communicate effectively with a range of audiences.
 Leading ICT tools in computer network and business management.
 Analyze the local and global impact of networking on individuals, organizations, and
society.
 Recognition of the need for and an ability to engage in continuing professional
development.
 Use current techniques, skills, and tools necessary for computing-related practices.
 Understanding processes that support the delivery and management of distributed
and networked systems within a specific application environment.
 Use and apply current technical concepts and practices in the core network
technologies.

5. Program Requirements

5.1. General Course Content Areas

The course program will comprise of core (compulsory)1, elective2 courses and thesis. Core
courses include: computing research methods; advanced networking; distributed systems;
systems administration; wireless and mobile computing; network management and
security; network design, modeling and simulation; mobile broadband and multimedia
networks; and selected topics in networking. Elective courses include: social network
analysis; virtualization and cloud computing; and web engineering.

1
Compulsory courses are those that must be taken, that is, the qualification cannot be awarded unless these
courses have been successfully completed. Each of these courses makes a unique contribution to the learning
objectives of the program.
2
Elective courses are those from which a specified minimum number must be taken, that is, the qualification
cannot be awarded unless this specified minimum number of elective courses has been successfully completed.
Each of the possible combinations of elective courses will make a similarly unique contribution to the achievement
of the learning objectives of the program.
9
M.Sc. in Computer Networks 2015

5.2. Admission Requirement

The criterion for admission is based on the basic qualification criterion set by the Ministry of
Education. The program requires participants to have a minimum of first degree in
Computer Science, Information Technology, Information Systems, Software Engineering,
and Computer Engineering or a degree deemed by the University (represented by
responsible sections such as the graduation committee) to be equivalent.

Based on the above necessary requirements, the admission requirements are:

 A completed academic requirements for the Bachelor’s degree in Computer Science,


Information Technology, Information Systems, Software Engineering, Computer
Engineering or other relevant or equivalent fields of study with a Cumulative Grade
Point Average (CGPA) of 2.00 from any recognized institution of higher education3
and approval of the graduation committee.
 The graduation committee in consultation with potential area experts and
supervisors decides the criteria based on the applications received. Entrance
examination (written, practical and oral) will be prepared and candidates are
required to pass the exam. Selection will be based on entrance examination, CGPA,
and relevant work experience of the candidate.
 Academic achievements and appropriate work experiences must be evidenced by
two letters of recommendation from the respective academicians, employers or
professional associates.
 Applicant must fully satisfy the entire requirement as laid down in academic rule and
regulations of Wollo University4.
 Present a letter of recommendation indicating sponsorship for their education,
research work and the related expenses or sign an agreement, if, self-sponsored.

3
Foreign applicants must earn their undergraduate degree from institutions of higher education recognized by the
Ethiopian Ministry of Education and they may be required to submit results of GRE/TOEFL/IELTS.
4
Wollo University Senate Legislation (New Version – July 2015), Chapter 17.
10
M.Sc. in Computer Networks 2015

 The maximum number of graduate students to be admitted annually to each program


is determined by the M.Sc. in Computer Networks program council in consultation
with the council of graduate studies, based upon the availability of resources and
considering its cost effectiveness. However, in any case, the minimum number of
students per class shall not be less than five students. Considering limitations of
space, facilities and resources such as academic supervisors; admission is highly
competitive.
 Admission shall take place one time in a year for the fall Semester beginning on
September or January.
 Anyone who wants to join the graduate program can apply. For pedagogical reasons
or special requirements of field of study, the College Academic Commission in
consultation with the M.Sc. Computer Networks Program Council may set
appropriate age limits subjects to the approval of the Council of Graduate Studies as
per rules and regulation of the Wollo University; the maximum age limit an applicant
to be admitted to the master’s program shall not exceed 35 years.
 To begin the application process, the prospective student must first apply to the
Postgraduate Office or college of Informatics of Wollo University or she/he should be
placed to the program by an appropriate government authority.

5.3. Graduation Requirement

To complete the course program and graduate, a candidate should fulfill mainly:

 The graduation requirement set by the Senate Legislation of Wollo University.


 A successful completion of a total of 38 credit hours coursework.
 All candidates must satisfactorily fulfill the general graduation requirements as laid
down as in academic rules and regulations of the University School of Graduate
Studies.
 Pass all assessments in the courses offered in the program with minimum CGPA of
3.00 or more and with not more than one “C” grade in all subject.

11
M.Sc. in Computer Networks 2015

 A graduate student may apply to the College Graduate Council to repeat a course in
which he/she obtained a “C” grade; however, no such course may be repeated more
than once.
 If a graduate student repeating a course in which he/she obtained “C”, the last grade
will be final. Pervious grade of “C” should be shown as canceled on the top of the
transcript indicating that the course has been repeated, and the new grade is
maintained which can exceed “B”; this shall be included in the computation of the
CGPA in the new reporting period.
 Graduate students repeating courses in which they scored “C” grades must register
for the courses and carry out all academic activities pertaining to the courses.
 Letter of approval from the College Graduation Council; and
 Successfully defend the graduate dissertation (thesis)5; thesis supervisor might have
additional requirements related to publication such as journals and conferences.

5.4. Duration of Study

The total duration of the study is 2 years, with three semesters for course work and the 4th
semester devoted fully to thesis work in the case of regular program and 2 and half years,
with four semesters for course work and the 5th(summer) and 6th semesters devoted fully
to thesis work in the case of extension program. A student is allowed to do the thesis
component as a partial fulfillment of the graduate program upon successful completion of
the course work.

5
Wollo University Senate Legislation (New Version – July 2015), Chapter 18, Section 119.4.
12
M.Sc. in Computer Networks 2015

6. Degree Nomenclature

A degree will be awarded for a student after successfully completing all the courses and
dissertation/thesis components. The name of the degree will be;

In English

“Master of Science in Computer Networks”

In Amharic

“የሳይንስ ማስተርስ ድግሪ በኮምፒውተር ኔትወርክስ”

7. Structure of the Program

The Master of Science in Computer Networks degree program prepares graduate students
for career-oriented jobs in the rapidly-growing computer networking industry and
research/academic institutes, or gaining admission into competitive PhD programs around
the world. This curriculum is designed to ensure that students can study theoretical
foundations of computer networks as well as modern research trends in courses taught by
active researchers and academicians having national and international recognition.

8. Teaching-Learning Strategies

Teaching-learning strategies for graduates profiles (computing-related cognitive, practical


abilities and other transferable skills) are detailed with the corresponding assessment
method or methodology as follows:

 Computing-related Cognitive Abilities: Students learn knowledge, gain understanding


and develop cognitive skills and abilities through self-directed study, resource based
learning, small group discussions, small group and individual exercises, laboratory
sessions, demonstration software and tools, on-line examples and research thesis.
Weekly seminar sessions that provide students with the opportunity to address
questions, queries and problems are also part of gaining this ability.

13
M.Sc. in Computer Networks 2015

 Traditional lecture delivery (C1-C7),


 Group and individual research, presentations and written reports (C1-C8),
 Laboratory sessions (C2, C5 & C6),
 Individual and group design work (C3, C4, C5, and C8),
 Individual project: Throughout the program, students are encouraged to
undertake independent reading both to supplement and consolidate what is
being taught or learned and to broaden their individual knowledge and
understanding of the subject (C1-C8).

Assessment of Computing-related Cognitive Abilities: Group and individual coursework,


presentations, group and individual reports, and the unseen examination and the
research thesis assess students’ knowledge and understanding.

 Computing-related Practical Abilities: Students gain practical skills through;


 Group and individual research, presentations and written reports (P1-P6),
 Small group and individual exercises (P1-P6),
 Laboratory sessions (P1, P4 & P5),
 Individual research thesis (P1-P6: depending on thesis title).
 Analysis, design and problem solving skills are further developed through various
design activities as well as case studies, internships and extensive computer
laboratory sessions. Feedback is given to students on all assessed coursework as
well as written exams (in the form of exam reports produced each term).

Assessment of Computing-related Practical Abilities: Students’ practical abilities are


assessed through group and individual coursework, laboratory tests, the unseen
examination, and the research thesis.

 Transferable skills: Students gain transferable skills through the aforementioned


teaching and learning program. These skills are also nurtured through;
 Small group and individual presentations and exercises (T3-T8),

14
M.Sc. in Computer Networks 2015

 Laboratory sessions (T1, T4, & T7),


 Individual research thesis (T1-T8: depending on thesis title).

Assessment of Transferable Skills: Students’ transferable skills are generally assessed


through coursework reports and the thesis report.

9. Resources

9.1. Staff Profile

Currently, the program is equipped with the following proportion of qualified people:

No Academic Status Quantity Remark


1 Professors -
2 Associate Professors -
2 Expatriates starting
3 Assistant Professor 1
September 2015
4 Lecturers 19 One of PhD Study Leave
Assistant Lecturers and
5 22 Eight on Masters Study Leave
Graduate Assistants
6 Technical Assistants 6

9.2. Material Resources – Laboratory and Other Resources

As to the resource and materials, computer hardware and software resources such as
simulation, experimental, visualization and analysis tools, laboratories with local area
network and online access facilities, bibliographic laboratory equipped with appropriate
information resources and information retrieval tools, laboratory and office rooms
equipped with appropriate ICT resources and facilities are available. In addition to the
aforementioned resources, there will be full access to digital libraries such as IEEE and ACM
in the coming few months.

15
M.Sc. in Computer Networks 2015

Currently, the college has 11 computer labs (on average 30 computers/per lab). In addition
to this, one Lab room is expected to be organized and reserved (named as “NetLab6”) in
order to meet the requirements due to the introduction of the M.Sc. program in Computer
Networks. Besides, this lab is equipped with white boards, LCD projectors, audio-visual tools
as well as e-Learning resources such as smart boards. Moreover, the program will use the
ICT Office labs and network equipment’s (i.e. servers, switch, routers, firewalls and so on).

10. Quality Assurance and Curriculum Review

Reviewing this curriculum and developing a revised and enhanced version that will match
the latest developments in the discipline is the major issue related to quality assurance and
have lasting impact. It is essential to engage the broad computing community to review and
critique periodically7. Moreover, the remaining part of this section lists some of the quality
assurance and curriculum review methods.

 Comprehensive examinations and peer assessment of examination papers and teaching


methods;
 Periodical workshops (with stakeholders, teachers and graduates);
 Assessments by using survey project works (researches), internships, and link programs;
 Graduates' evaluation of the program;
 Standardization of course offerings through preparation of general course outlines,
exam contents, and external audits;
 Annual assessment of the program by the teaching staff;
 Establishing Alumni of Graduates as a mechanism to assess their career development;
 Working closely with the relevant professional associations to assess graduates'
performance.

6
NetLab is the name given for the laboratory (M.Sc. Computer Networks Students’ Lab) and the general name of
the research team in the program.
7
Computing Curricula 2013, Ironman Draft (Version 0.8), The Joint Taskforce on Computing Curricula (ACM and
IEEE), November 2012.
16
M.Sc. in Computer Networks 2015

11. Course Profile

11.1. Course Numbering

Significance of Letters

Alphabet I M NW
Significance Informatics Masters Networking
Stands For Name of College Name of Degree Name of Program

Significance of Digits
Digit I II III IV
Semester Number Course Number of
Significance M.Sc. Course Year of Program
of Respective Year Respective Semester
Numeric Number 6 1 or 2 1 or 2 1,2,3, …

17
M.Sc. in Computer Networks 2015

11.2. Course Sequence

Regular Program
Year I Semester II
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6111 Computing Research Methods 3 6 48 0
2 IMNW 6112 Advanced Computer Networking 3 6 32 48
3 IMNW 6113 Distributed Systems 3 6 32 48
4 IMNW 6114 Systems Administration 3 6 32 48
Total Credit Hour and ECTS 12 24
Year I Semester II
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6121 Wireless Communication and Mobile Computing 3 6 32 48
2 IMNW 6122 Network Design, Modeling and Simulation 4 8 48 48
3 IMNW 6123 Network Management and Security 4 8 48 48
Total Credit Hour and ECTS 11 22
Year II Semester I
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6211 Mobile Broadband and Multimedia Networks 3 6 32 48
2-4 IMNW 621(2,3 or 4) Elective 3 6 32 48
5 IMNW 6215 Selected Topics in Computer Networking 3 6 48 0
Total Credit Hour and ECTS 9 18

18
M.Sc. in Computer Networks 2015

Year II Semester II
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6221 M.Sc. Thesis in Computer Networking 6 30 - -
Total Credit Hour and ECTS 6 30
Electives
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
2 IMNW 6212 Social Network Analysis 3 6 32 48
3 IMNW 6213 Virtualization and Cloud Computing 3 6 32 48
4 IMNW 6214 Web Engineering 3 6 32 48
Extension Program
Year I Semester I
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6111 Computing Research Methods 3 6 48 0
2 IMNW 6112 Advanced Computer Networking 3 6 32 48
3 IMNW 6113 Distributed Systems 3 6 32 48
Total Credit Hour and ECTS 9 18
Year I Semester II
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6114 Systems Administration 3 6 32 48
2 IMNW 6121 Wireless Communication and Mobile Computing 3 6 32 48
3 IMNW 6211 Mobile Broadband and Multimedia Networks 3 6 32 48
Total Credit Hour and ECTS 9 18

19
M.Sc. in Computer Networks 2015

Year II Semester I (Summer)


S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6122 Network Design, Modeling and Simulation 4 8 48 48
2-4 IMNW 621(2,3 or 4) Elective 3 6 32 48
Total Credit Hour and ECTS 7 14
Year II Semester II
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6123 Network Management and Security 4 8 48 48
2 IMNW 6215 Selected Topics in Computer Networking 3 6 48 0
Total Credit Hour and ECTS 7 14
Year III Semester I (Summer) and Semester II
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6221 M.Sc. Thesis in Computer Networking 6 30 - -
Total Credit Hour and ECTS 6 30
Electives
S.No. Course Code Course Name Credit Hour ECTS Lecture Hour Lab Hour
1 IMNW 6212 Social Network Analysis 3 6 32 48
2 IMNW 6213 Virtualization and Cloud Computing 3 6 32 48
3 IMNW 6214 Web Engineering 3 6 32 48

20
M.Sc. in Computer Networks 2015

11.3. Course Map for Graduate Profile

Cognitive Abilities Practical Abilities Transferrable Skills


S.No. Course Code
C1 C2 C3 C4 C5 C6 C7 C8 P1 P2 P3 P4 P5 P6 T1 T2 T3 T4 T5 T6 T7 T8

1 IMNW6111 □ □ □ □ □ □ □ □

2 IMNW 6112 □ □ □ □ □ □ □ □ □

3 IMNW 6113 □ □ □ □

4 IMNW 6114 □ □ □ □ □ □ □

5 IMNW 6121 □ □ □ □ □ □ □

6 IMNW 6122 □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □

7 IMNW 6123 □ □ □ □ □ □ □ □ □ □ □

8 IMNW 6211 □ □ □ □ □

9 IMNW 6215 □ □ □ □ □ □ □

10 IMNW 6212 □ □ □ □

11 IMNW 6213 □ □ □

12 IMNW 6214 □ □

13 IMNW 6221 □ □ □ □ □ □ □ □ □

21
M.Sc. in Computer Networks 2015

11.4. Course Descriptions

Course Title: Computing Research Methods


Course Code: IMNW 6111
Credit Hour: 3
Contact Hour per Week: 3Lecture Hours
Course Status: Compulsory
Pre-requisite: None
------------------------------------------------------------------------------------------------------------------
Course Description: A study of current methods and techniques in computing research, including
writing research proposals, conducting research, technical writing and presentations. The major
topics includes research in computing, proposal preparation, using resources to conduct research,
writing research papers and making presentations, ethical issues. The instructional methods and
techniques include traditional lectures with some assignments, student presentations and group
problem solving.
------------------------------------------------------------------------------------------------------------------
Course Objective: Upon completion of the course, the students will be able to describe computing
research methods; develop effective research proposal; conduct research effectively in computer-
related fields; use resources to conduct research; organize and prepare technical papers, thesis and
presentations; work and cooperate effectively with other research workers on a computing research;
aware of the research ethics and other related issues.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Introduction and Overview of Research


1.1. What is Research and not Research?
1.2. Scientific Research
1.3. Objectives, Motivations and Significance of Research
1.4. Requirements and Characteristics of Research
1.5. Types and Approaches of Research

22
M.Sc. in Computer Networks 2015

1.6. Research Methods and Problem Solving


1.7. Effective Report Writing Principles and Criteria for Good Research
1.8. Evaluating and Reviewing Research Results
1.9. What is Research in Computing?
2. Processes in Conducting Research
2.1. Overview of Current State of the Art Areas and Techniques in Computing
2.2. Actors, Roles and Relationship
2.2.1. The Student
2.2.2. The Supervisor
2.2.3. The Examiner/Evaluator
2.3. The Process
2.3.1. Developing Research Proposal
2.3.2. Developing Problem Description
2.3.3. Following the Objectives
2.3.4. Presenting and Analyzing the Data
2.3.5. Drawing Conclusion and Identifying Future Work
2.3.6. Presenting and Defending Orally
2.3.7. Preparing Final Research Documentation (Thesis)
2.4. Proposal Preparation
2.4.1. Choosing a Subject Area
2.4.2. Choosing a Problem within the Subject Area
2.4.3. Quality Assurance of Initial Ideas
2.4.4. Write Research Proposal
2.4.5. Sample and More Acceptable Research Proposal Structure
2.4.6. Research Proposal Check-list
2.5. Literature Reviews
2.5.1. Importance and Roles of Literature Review
2.5.2. Skills and Keys to Effective Literature Review
2.5.3. Literature Sources (Journals, Conference Proceedings, Books, Reports, Thesis, etc. )

23
M.Sc. in Computer Networks 2015

2.5.4. Literature Review Writing


2.6. Assessment Criteria
3. Resources to Conduct Research
3.1. Digital Libraries (IEEE, ACM, Science Direct, Springer, etc.)
3.2. Documentation Tools (Ex: Latex) and Language Skill
3.3. Team Work
3.4. Datasets
3.5. Simulation, Experimental or Visualization Tools
4. Writing Research Papers and Making Presentations
4.1. Structure of Good Quality Papers, Citations and References
4.2. Making Excellent Presentation
4.3. How to Write Good Quality Thesis and Papers (Journal and Conferences)
5. Research Ethics
5.1. Ethical Issues in Research
5.2. Plagiarism, Falsification, Fabrication
5.3. Academic Honesty Related Issues – Ex. Misleading Authorship
5.4. Other Ethical Issues in Computing
6. Data Collection and Analysis (Presentation of Research Results such as Data Figures)

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Report Writing Assignment – Using Latex (15%)


 Critical Assessment of Relevant Articles (15%)
 Hypothesis Development – Presentation (20%)
 Proposal Writing – Using Latex (20%)
 Review Paper (Survey Paper) – Using IEEE/ACM Latex Standard (30%)
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------

24
M.Sc. in Computer Networks 2015

Textbook and References:


General textbooks are not suitable for this course, but there are a growing number of research
papers research published in quality journals such as IEEE and ACM that explore models, frameworks
as well as contents in Computing Research Methods to help students to become an expert in
computing.
======================================================================

25
M.Sc. in Computer Networks 2015

Course Title: Advanced Computer Networking


Course Code: IMNW 6112
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Compulsory
Pre-requisite: A basic Undergraduate or equivalent course in Computer Networks/ing
------------------------------------------------------------------------------------------------------------------
Course Description: This course introduces the students to the world of internetworking. There are
in-depth discussions about the application, transport, network and link layers and associated
protocols, issues in multimedia networking, overlay networks and peer-to-peer networks, and how
quality of service is delivered in an IP network. The course wraps up with a case study, which the
students work in groups to discuss, design and present their solutions. Moreover, the course aims to
get a strong understanding of fundamental concepts and to get a flavor of more recent research and
recent developments in the area.
------------------------------------------------------------------------------------------------------------------
Course Objective: Up on successful completion of the course, the students will be able to identify the
component of an internetworking; describe the functionality of internetworking components;
articulate how the internet protocol is implemented in a network; describe how routers and routing
protocols operate; describe multimedia networking applications and QoS; describe how real-time
interactive application protocols such as RTP, RTCP, etc. works.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Introduction to Computer Networks


1.1. Overview and History of the Internet
1.2. Network Edge and Core
1.2.1. End Systems, Access Networks and Links
1.2.2. Circuit Switching, Packet Switching, Network Structures and Architectures
1.2.3. Delay, Loss and Throughput in Packet-Switched Networks

26
M.Sc. in Computer Networks 2015

1.3. Overview of OSI and TCP/IP Layer Protocols


2. Application Layer
2.1. Principles of Network Applications
2.2. Web and HTTP
2.2.1. Web server redirection and caching
2.3. FTP, SMTP, POP3, IMAP, DNS
2.4. Socket Programming with TCP/UDP
2.5. Applications Level Issues and Problem: Applications Need their Own Protocols
2.5.1. Name Service and Traditional Applications
2.5.2. Multimedia Applications
2.5.3. Overlay Networks and P2P Networks
2.5.4. Web Server Systems
3. Transport Layer
3.1. Transport Layer Services
3.2. Multiplexing and Demultiplexing
3.3. User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)
3.3.1. Segment Structure
3.3.2. Reliable Data Transfer
3.3.3. Flow Control
3.3.4. Connection Management
3.4. Scheduling, Congestion Control and Avoidance
3.5. TCP Flavors (Prominent Protocols): RENO, NEWRENO, TAHOE, VEGAS, etc.
4. Network Layer
4.1. Introduction to Network Layer
4.2. Virtual Circuit and Datagram Networks
4.3. What’s Inside a Router?
4.4. Internet Protocol (IP)
4.4.1. Datagram Format
4.4.2. IPv4 and IPv6 Addressing

27
M.Sc. in Computer Networks 2015

4.4.3. Internet Control Message Protocol (ICMP)


4.5. Routing algorithms (Link State, Distance Vector, Hierarchical Routing, etc.)
4.6. Routing in the Internet (RIP, OSPF, BGP, etc.)
4.7. Unicast, Broadcast and Multicast Routing
5. Link Layer
5.1. Introduction, Services, Error Detection and Correction
5.2. Multiple Access Protocols and Link Layer Addressing
5.3. Ethernet and Link Layer Switches
5.4. Point-to-Point Protocol (PPP) and Link Virtualization: ATM, MPLS
6. Multimedia Networking
6.1. Multimedia Networking Applications
6.2. Streaming Stored Audio and Video
6.3. Making the Best Out of Best Effort Service
6.4. Protocols for Real-time Interactive Applications (RTP, RTCP, SIP, etc.)
6.5. VoIP Fundamentals
6.5.1. How Packetized Voice Works and Voice Quality
6.5.2. SIP, Soft Switches and Gateways
6.5.3. PBX Replacement
6.6. Providing Multiple Classes of Service
6.7. Providing QoS Guarantees
7. Next Generation Networking
7.1. Motivation and Challenges
7.2. Self-organizing Networks: (Ad-hoc, Sensors and Mesh Networks; Applications;
Communication Support: Information Dissemination, Medium Access Mechanisms; Self-
organizing Concepts in Infrastructure-based Networks.)
7.3. New Trends in Computer Networking (PAN, Pervasive Computing, Grid computing, Cloud
Computing, etc.)

------------------------------------------------------------------------------------------------------------------

28
M.Sc. in Computer Networks 2015

Assessment and Grading System:

 Case Study (Group Task) – 25%


 Individual Assignment(s) – 15%
 Project (Practical/Lab) – 20%
 Final Written Examination – 40%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 J. F. Kurose, and K. W. Ross, “Computer Networking: A Top-Down Approach”, Addison-Wesley,


Fourth Edition, 2008.
 A. S. Tannenbaum, “Computer Networks”, Prentice Hall, Fourth Edition, 2003.
 B. A. Forouzan, “Data Communications and Networking”, McGraw Hill, Third Edition, 2003.
 W. Stallings, “Data and Computer Communications”, Prentice Hall, Seventh Edition, 2004.
 W. Stallings, “High-Speed Networks and Internets: Performance and Quality of Service”,
Prentice Hall, Second Edition, 2002.

======================================================================

29
M.Sc. in Computer Networks 2015

Course Title: Distributed Systems


Course Code: IMNW 6113
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Compulsory
Pre-requisite: None
------------------------------------------------------------------------------------------------------------------
Course Description: The course introduces the main principles underlying distributed systems:
processes, communication, naming, synchronization, consistency and fault tolerance. Furthermore,
students will be familiar with some of the main paradigms in distributed systems: Object-based
systems, MapReduce and file systems. Class will be run seminar-style; each student will read
research papers that will be discussed in class. They will read papers that cover the theory of
distributed systems as well as the implementation of systems to support distributed computing.
------------------------------------------------------------------------------------------------------------------
Course Objective: On the completion of the course, students will be able to understand the
fundamentals of distributed computing and be able to design and develop distributed systems and
applications; explain how communication is handled in distributed systems; realize issues and
difficulties in clock synchronization over several machines; learn the different methods and
frameworks such as MapReduce that are used in handling consistency and replication and how fault
tolerant systems are built.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Introduction to Distributed Systems


1.1. Introduction and Goals of Distributed Systems
1.2. Types of Distributed Systems
2. Architectures and Processes in Distributed Systems
2.1. Architectural Styles and System Architectures
2.2. Threads and Their Implementation

30
M.Sc. in Computer Networks 2015

2.3. Anatomy of Clients, Servers and Design Issues


2.4. Process Migration and Scheduling
3. Communication and System Design
3.1. Network Protocols and Standards
3.2. Remote Procedure Call
3.3. Message-Oriented Communication
3.4. Stream-Oriented Communication
3.5. Multicast Communication
4. Naming and Synchronization
4.1. Names, Identifiers, and Addresses
4.2. Flat, Structured and Attributed-based Naming
4.3. Clock Synchronization and Logical Clocks
4.4. Mutual Exclusion
4.5. Election Algorithms
5. Consistency Management and Replication
5.1. Overview of Consistency Management and Replication
5.2. Data-Centric Consistency Models
5.3. Client-Centric Consistency Models
5.4. Replica Management and Prominent Replication Protocols
5.5. Consistency Protocols
6. Fault Tolerance and Grid Computing
6.1. Introduction to Fault Tolerance
6.2. Process Resilience
6.3. Reliable Client-Server and Group Communications
6.4. Distributed Commit and Recovery
7. Distributed Object-based Systems
7.1. Distributed Objects and Object Servers
7.2. CORBA Object References
7.3. Globe Object References

31
M.Sc. in Computer Networks 2015

7.4. MapReduce
8. Cluster Computing and Distributed File Systems
8.1. Cluster-Based Distributed File Systems
8.2. Remote Procedure Calls in Network File System
8.3. File-Oriented Communication

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Lab Assignment(s) – 25%


 Seminar(s) – 25%
 Final Written Examination – 50%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 A. S. Tanenbaum, and M. V. Steen, “Distributed Systems, Principles and Paradigms”, Second


Edition, Prentice Hall, 2007.
 A. S. Tannenbaum, “Computer Networks”, Prentice Hall, Fourth Edition, 2003.
 S. Mullender, “Distributed Systems”, Second Edition, Addison-Wesley, 1993.
 G. Coulouris, J. Dollimore, and T. Kindberg, “Distributed Systems: Concepts and Design”, Third
Edition, Addison-Wesley, ISBN: 0201619180, 2000.

======================================================================

32
M.Sc. in Computer Networks 2015

Course Title: Systems Administration


Course Code: IMNW 6114
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Compulsory
Pre-requisite: A basic Undergraduate or equivalent course in Operating Systems and Networking
------------------------------------------------------------------------------------------------------------------
Course Description: This course instructs students how to administer and manage a modern network
by properly planning and implementing various functions of a Network OS. Key components include
how to plan server deployment, server monitoring and maintenance, application and data
provisioning, and providing business continuity and availability by proper use of security
configuration and backup policies. The course material is designed to provide extensive hands-on
experience. Topics include: installation and configuration; the boot process; user and group
administration; filesystem administration, including quotas, FACLs, RAID and LVM; task automation;
client networking; software management; log files; troubleshooting; Emphasis is also given on
storage, file management system, connectivity, security, troubleshooting, archiving, backing up,
directory services, remote administration, access control lists.
------------------------------------------------------------------------------------------------------------------
Course Objective: At the end of the course, students will be able to demonstrate an understanding of
the principles, practices and goals of systems administration; perform installation of NOSs and
configure the server environment; perform user accounts management and implement security
groups; demonstrate an understanding of the configuration and management of data storage;
perform network services installation and management; use server and network monitoring software
tools; describe the elements of an effective troubleshooting methodology and use a variety of
software and hardware tools to diagnose problems; managing user and group account information,
software packages, system services, basic network services (ftp, telnet, ssh etc); troubleshoot and
respond to boot problems.
------------------------------------------------------------------------------------------------------------------

33
M.Sc. in Computer Networks 2015

Course Content:

1. Introduction to Systems Administration


1.1. Goals, Philosophy, Challenges and Common Practices
1.2. Overview of the NOSs
1.3. Unix-like Systems Vs Windows Systems
1.4. Linux Distributions and UIs
1.5. Linux Operations Review
1.5.1. Filesystem Hierarchy and Standard
1.5.1.1. Single-rooted hierarchy, Seamless and Extensible Filesystems
1.5.1.2. Mounting Additional Filesystems
1.5.1.3. Filesystem Object Oriented Design and Filesystem Standard
1.5.1.4. Unix File and Directory Permissions
1.5.2. Essential Shell Commands
1.5.2.1. Basic File Manipulation Commands and Directory Navigation Commands
1.5.2.2. Advanced File Manipulation Commands (Init, Processes, and Threads)
1.5.3. Advanced Shell Features
2. Account and Security Administration, and Access Control (DAC, RBAC)
2.1. Account and security Administration
2.1.1. User and Group Concepts, and User Private Group Scheme
2.1.2. User Administration, Modifying Accounts and Group Administration
2.1.3. Password Aging and Default User Files
2.2. Managing files and folder permission
2.2.1. Managing File Ownership
2.2.2. Controlling Access to files
2.2.3. Managing Disk Quotas
3. File Systems and Management of Data Storages
3.1. File system Administration
3.1.1. Partitioning Disks with fdisk and parted

34
M.Sc. in Computer Networks 2015

3.1.2. Creating, Mounting and Maintaining File systems


3.1.3. Swap
3.1.4. Determining Disk Usage With df and du
3.1.5. Configuring Disk Quotas
3.2. Logical Volume Management (LVM) and RAID
3.2.1. Implementing LVM, Creating Logical Volumes (LVs), Manipulating VGs & LVs
3.2.2. Advanced LVM Concepts (i.e. system-config-lvm)
3.2.3. RAID Concepts (Creating and Managing a RAID-5 Array)
4. Software Package Management
4.1. Managing Software
4.2. RPM Features, Architecture and Package Files
4.3. Working With RPMs (Querying, Verifying and Updating)
4.4. Managing Software Dependencies
5. Basic Networking
5.1. Network Configuration (IP Networking and Linux Network Configuration)
5.2. Network Services
5.2.1. RPC-Based Services and INET Super Server
5.2.2. Network Time Services and Sharing Desktops with VNC
5.2.3. Dynamic Host Control Protocol (DHCP)
5.3. Remote Administration with SSH and SCP
5.3.1. Configuration, Telnet Replacement, Secure Copy and Rsync
5.3.2. RSA and DSA Authentication (Password-less Logins)
5.3.3. Remote Command Execution and Port Forwarding
6. Installation of Application Server and Management
6.1. DHCP, DNS, Telnet server; compare with other NOS setup of corresponding network services
6.2. Open SSH: Secure Network Communication
6.3. FTP and Setting-up Mail Servers and Client
6.4. Network Information Service (NIS) and Sharing File systems (NFS)
6.5. SAMBA: Linux and Windows File and Printer Sharing

35
M.Sc. in Computer Networks 2015

6.6. DNS/BIND: Tracking Domain Names and Address


6.7. Setting up a Firewall and a Webserver
7. Managing Network Services
7.1. Maintenance Troubleshooting: Common System and Network Problems
7.2. Developing General Strategies
7.3. Resolve Boot Problems, Backup and Restore Data and System Volume
7.4. Using Event Viewer and Troubleshoot Connectivity
8. Systems Security
8.1. Overview, Application Security and Login Security
8.2. Boot Loader Security (LILO and GRUB)
8.3. TCP Wrappers Configuration
8.4. Iptables Firewalling: Preliminaries
8.5. Iptables Scenarios
8.5.1. Packet Filtering
8.5.2. Port-Forwarding/Redirection and NAT/IP Masquerading
8.6. Packet-Processing Model
8.7. Intrusion Detection and Mandatory Access Control (MAC) with LIDS

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Assignment(s) – 15%
 Seminar(s) – 25%
 Project(s) – 30% (Practical/Laboratory)
 Final Written Examination – 30%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 Mark Burgess, “Principles of Network and System Administration”, Second Edition, Wiley and

36
M.Sc. in Computer Networks 2015

Sons, ISBN 0470868074, 2004.


 Michael Palmer, “Hands-On Microsoft Windows Server 2003”, Course Technology, Cengage
Learning, ISBN-13: 9781423902348, 2003.
 Thomas A. Limoncelli, Christina J. Hogan, and Strata R. Chalup, “The Practice of System and
Network Administration”, Second Edition, Addison Wesley, ISBN: 0.321-49266.8, 2007.

======================================================================

37
M.Sc. in Computer Networks 2015

Course Title: Wireless Communication and Mobile Computing


Course Code: IMNW 6121
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Compulsory
Pre-requisite: Advanced Computer Networking (IMNW 6112)
------------------------------------------------------------------------------------------------------------------
Course Description: Required laboratory tools include mobile programming languages (such as
Objective C, Java Script, Java, etc.)
------------------------------------------------------------------------------------------------------------------
Course Objective: At the end of the course, students will be able to know the advanced concepts of
wireless communication and mobile computing; explore the architecture of wireless systems; design
wireless communication protocols; know the principles of Telecommunication systems and pervasive
computing; identify the research topics and conduct researches in the wireless communication and
computing areas; develop mobile applications using current mobile programming tools.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Wireless and Mobile Technology


1.1. Overview of Wireless and Mobile Technologies
1.2. Radio Technologies and Platforms
1.3. Wireless Communication Algorithms
1.3.1. Multiple Input Multiple Output (MIMO)
1.3.2. Cooperative Communications
1.3.3. Dynamic Spectrum Access (DSA)
1.3.4. Network Coding
2. Wireless Communication and Mobile Computing Environments
2.1. Applications, Architectures and Protocol Design Issues
2.2. Mobility, Disconnection and Scale

38
M.Sc. in Computer Networks 2015

2.3. Data Management


2.4. Limitations and Research Challenges
3. Telecommunication Systems
3.1. Fundamentals of Telecom Technologies
3.1.1. Introductory Topics in Telecom
3.1.2. Network Topologies
3.1.3. Quality of Service (QoS) and Standardization
3.1.4. Models of Telecom Channels
3.2. Telecom Standards and Advanced Technologies
3.2.1. Telecom Standards, PSTN and ISDN
3.2.2. Intelligent Telecom Technologies
3.2.3. Analysis of Telecom Management Technologies
3.2.4. Application of Big Data Technologies to Telecom Architecture
3.2.5. Security in Telecom Technologies
4. Emerging Wireless and Mobile Networks
4.1. WLANs and Satellite-based Networks
4.2. Mobile Phone Sensing and Mobile Crowdsensing
4.3. Socially-aware Networks
4.4. Mobile Cloud Computing
4.5. Bio-Inspired Networking
4.6. Security in Wireless and Mobile Networks
5. Pervasive Computing
5.1. Overview of Pervasive Computing
5.2. Current State of the Art Technologies
5.3. Context Adaptation
5.4. Intelligent Environments
5.5. Security, Privacy and Management

------------------------------------------------------------------------------------------------------------------

39
M.Sc. in Computer Networks 2015

Assessment and Grading System:

 Mobile Application Development Project Report (20%) and Presentation (10%)


 Assignment(s) – 20%
 Final Written Examination – 50%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 M. Guizani, “Wireless Communications and Mobile Computing”, Wiley Online Library, Issues:
2006-2015, ISSN: 1530-8677.
 A. Umar, “Mobile Computing and Wireless Communications: Applications, Networks,
Platforms, Architectures, and Security”, NGE Solutions, 2004.
 Y-K. R. Kwok, and V. K .N. Lau, “Wireless Internet and Mobile Computing: Interoperability and
Performance”, IEEE Press, 2007.
 “Mobile Computing Principles: Designing and Developing Mobile Applications”, Cambridge
University Press, 2004.
 A. Boukerche, “Handbook of Algorithms for Wireless Networking and Mobile Computing”, CRC
Press, 2005.
 M. Schwartz, “Mobile Wireless Communications”, Cambridge University Press, 2005.
 I. Stojmenovic, “Handbook of Wireless Networks and Mobile Computing”, Wiley Publishing,
2003.
 Recent Research Articles from Top Journals such as IEEE Communication Surveys and Tutorials,
Proceedings of the IEEE, International Journal of Wireless Communication and Mobile
Computing (WCMC), IEEE Transactions on Mobile Computing, etc.

======================================================================

40
M.Sc. in Computer Networks 2015

Course Title: Network Design, Modeling and Simulation


Course Code: IMNW 6122
Credit Hour: 4
Contact Hour per Week: 3 Lecture Hours and 3 Lab Hours
Course Status: Compulsory
Pre-requisite: Advanced Computer Networking (IMNW 6112)
------------------------------------------------------------------------------------------------------------------
Course Description: This course is designed to give students an understanding of types of computer
networks: LANs, VLANs, and WANs; prominent and recent routing algorithms and routing protocols;
the network development life cycle; network analysis and design methodology; network design
issues: manageability, node placement and sizing; link topology and sizing; routing, forwarding and
data dissemination; reliability; data in support of network design; structured enterprise network
design; hierarchical tree network design: terminal assignment; concentrator location; mesh topology
optimization; traffic flow analysis; analysis of loss and delay in networks; network reliability issues.
------------------------------------------------------------------------------------------------------------------
Course Objective: Upon successful completion of the course, the students should be able to describe
and develop a network model using analysis and simulation; design a new network model to meet
requirements for new and existing networks; use quantitative and qualitative techniques to design or
upgrade a network; make decisions on the proper network technologies, routing protocols, network
topologies, node placement, etc.; troubleshoot and diagnose network problems; identify network
issues, risks, bottlenecks, etc.; proficient in using simulation tools such as The ONE, NS2, OPNET,
OMNET++, NetLogo management and measurement tools, etc.; learn how to be a good team player
by working on a semester-long project; write a technical report, technical essay describing a subject
briefly or elaborately as required; communicate design content, risk assessment, security issues and
budgetary considerations to upper-management.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Introduction to Network Design, Modeling and Simulation

41
M.Sc. in Computer Networks 2015

1.1. Network Design


1.1.1. Overview of Network Design
1.1.2. Design Considerations of Cellular, Radio and Transmission Networks
1.1.3. Design Models of Data Networks
1.2. Overview of Modeling and Simulation Tools
1.2.1. The ONE
1.2.2. NS2
1.2.3. OPNET
1.2.4. OMNET++
1.2.5. NetLogo
2. The Science of Network Design
2.1. Network Analysis (Delay, Throughput, Probability Loss, etc.)
2.2. Network Simulation and NS2
2.3. Traffic Measurement and Monitoring Tools and Applications
3. The Art of Network Design
3.1. Making Technology Choices (Ethernet vs. ATM)
3.2. Ethernet Switching, VLAN and Layer 3 Switching
3.3. Cabling, Network Components
3.4. Deployment and Migration
3.5. Node Placement, Reliability, Redundancy and Routing
3.6. Case Studies of LAN Network Design
4. Mobility Models and Traces
4.1. Mobility Models
4.1.1. Definition and Taxonomy of Mobility Models
4.1.2. Entity Mobility Models
4.1.3. Correlated/Group-based Mobility Models
4.1.4. Human or Sociality-based Mobility Models
4.1.5. Vehicular Mobility Models
4.1.6. Artificial Mobility Models

42
M.Sc. in Computer Networks 2015

4.2. Mobility Traces


4.2.1. Overview of Mobility Traces
4.2.2. Trace Collection
4.2.3. Trace Formats
4.2.4. Modeling Contacts from Traces
4.3. Impact of Mobility on Routing Algorithms
4.4. Challenges and Open Issues
5. WAN Network Design
5.1. Centralized and Distributed Network Design
5.2. Star and Tree Topology Networks
5.3. Backbone Networks
5.4. Mesh Networks
6. Network Performance Analysis
6.1. Review of Probability Theory and Graph Theory
6.2. Queuing Theory and Networks of Queues
6.3. Flow and Congestion Control
6.4. Routing-flow Allocation
6.5. Controlled and Random Access techniques in Data Networks
6.6. Performance Analysis of Circuit Switching.

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Assignment(s) – 10%
 Case Studies: Seminar(s) – 25%
 Project(s) – 35% (Practical/Laboratory)
 Final Written Examination – 30%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------

43
M.Sc. in Computer Networks 2015

Textbook and References:

 A-B. Hussein, “Simulation in Computer Network Design and Modeling”, Springer, 2012.
 M. Guizani, A. Rayes, B. Khan, and A. Al-Fuqaha, “Network Modeling and Simulation: A
Practical Perspective”, Wiley Publishing, 2010.
 J. L. Burbank, W. Kasch, and J. Ward, “An Introduction to Network Modeling and Simulation for
the Practicing Engineer”, IEEE Communications Society, 2011.
 K. Wehrle, M. Günes, and J. Gross “Modeling and Tools for Network Simulation”, Springer,
2010.
 S. Karris, “Networks: Design and Management”, Orchard Publications, 2006.
 J. McCabe, “Practical Computer Network - Analysis and Design”, Morgan Kaufmann Publishers,
1998.
 T. Mann-Rubinson, and K. Terplan, “Network Design: Management and Technical
Perspectives”, CRC Publisher, 1988.
 R. Breyer, and S. Riley, “Switched, Fast, and Gigabit Ethernet”, Macmillan Technical Publishing,
Third Edition, 1999.
 P. Oppenheimer, “Top-Down Network Design”, Cisco Press, 2001.

======================================================================

44
M.Sc. in Computer Networks 2015

Course Title: Network Management and Security


Course Code: IMNW 6123
Credit Hour: 4
Contact Hour per Week: 3 Lecture Hours and 3 Lab Hours
Course Status: Compulsory
Pre-requisite: Advanced Computer Networking (IMNW 6112)
------------------------------------------------------------------------------------------------------------------
Course Description: This course is designed to give students an understanding of how to plan, and
manage components of a network such as resources. It further helps the students understand
network security in detail. Specifically, this course examines how managers can strategically use
network management and security to capture, assess and deliver reliable knowledge more efficiently
and to create a competitive advantage regardless of protecting the network resources. Most
importantly, it provides a fundamental understanding of the various components of network security
architecture and to demonstrate how each component can be implemented to achieve best results.
It also introduces topics on how to show the features, mechanics, and functionality of various
network security devices. Required laboratory tools include programming languages such as VB.net,
Java, and network equipment’s such as routers.
------------------------------------------------------------------------------------------------------------------
Course Objective: Upon successful completion of the course, the students should be able to
introduce terms and concepts and laying the foundation of a solid network management and security
structure that focuses on design weaknesses and vulnerabilities along with an overview of the
traditional defenses used to thwart attacks; describe the basics of enterprise networks and
telecommunications management network; examine SNMP and CMIP; describe the management of
broadband networks and the tools or applications used for network management; examine the
components of security-cryptography and security policies; critically evaluate the various security
components such as web security, router security, firewalls, intrusion detection systems (IDS),
remote access security, virtual private networks (VPN), public key infrastructure (PKI), and wireless
security.
------------------------------------------------------------------------------------------------------------------

45
M.Sc. in Computer Networks 2015

Course Content:

1. Basics of Network Management and Security


1.1. Network Management
1.1.1. Overview of Network Design and Management
1.1.2. Network Management Model
1.1.3. Traffic Engineering on a Telephone Network
1.2. Basic Concepts of Network Security
1.2.1. Trust, Weaknesses, Risk and Vulnerabilities
1.2.2. TCP/IP Suit Weaknesses and Buffer Overflows
1.2.3. Spoofing Techniques and Social Engineering
1.2.4. Responsibilities for Network Security and Security Objectives
2. Telecommunications and Broadband Network Management
2.1. Network Management Protocols (SNMP, CMIP, CORBA, etc.)
2.2. Telecommunication Management Network (TMN) Models and Architecture Styles
2.3. ATM and Broadband Access Network Management
2.4. Network Management Tools and Applications
3. Understanding Defenses, Cryptography and Public Key Infrastructure (PKI)
3.1. Defense Systems
3.1.1. Digital IDs, Intrusion Detection Systems and PC Card System Solutions
3.1.2. Encrypted Login, Reusable Passwords and Antivirus Software
3.1.3. Encrypted Files and Biometrics
3.1.4. Physical Security
3.2. Cryptography
3.2.1. Cryptography and Cryptanalysis
3.2.2. Symmetric and Asymmetric Key Algorithms
3.2.3. Hashing Algorithms and Key Management
3.3. Public Key Infrastructure
3.3.1. Public Key Distribution

46
M.Sc. in Computer Networks 2015

3.3.2. Trusted Third Party


3.3.3. PKI Topology
3.3.4. Enrollment and Revocation Procedures
4. Security Policies and Secure Design
4.1. Security Policies
4.1.1. Definition, Importance and Development Process of a Security Policy
4.1.2. Incident Handling Process, Security Wheel and Sample Security Policy
4.2. Secure Network Design Principles and Methodologies
5. Web and Router Management and Security
5.1. Hardening
5.2. Router Management and Security
5.3. Firewalls
6. Intrusion Detection Systems, Remote Access and Virtual Private Networks
6.1. Intrusion Detection Systems (IDSs)
6.1.1. Introduction to Intrusion Detection
6.1.2. Host-based and Network-based IDSs
6.1.3. IDS Management Communications and Sensor Maintenance
6.2. Remote Access
6.2.1. AAA Model and Servers
6.2.2. Lock-and-Key Feature and Two-Factor Identification
6.3. Virtual Private Networks
6.3.1. Generic Routing Encapsulation Tunnels
6.3.2. IP Security and VPNs with IPSec
7. Wireless Security
7.1. WLAN Definition, Configurations and Architecture (How Wireless Works)
7.2. Risks of Wireless Open Ports
7.3. War-Driving and War-Chalking
7.4. SAFE WLAN Design Techniques and Considerations

47
M.Sc. in Computer Networks 2015

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Assignment(s) – 10%
 Case Studies: Seminar(s) – 25%
 Project(s) – 25% (Practical/Laboratory)
 Final Written Examination – 40%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 B. Singh, “Network Security and Management”, Eastern Economy Edition, Third Edition, 2011.
 M. Rozenblit, “Security for Telecommunications Network Management”, IEEE Communications
Society, 2000.
 S. Jacobs, “Security Management of Next Generation Telecommunications Networks and
Services”, Wiley, 2013.
 D. C. Kar, and M. R. Syed, “Network Security, Administration and Management: Advanced
Technology and Practice”, Information Science Reference, 2011.
 R. S. Cahn, “Wide Area Network Design: Concepts and Tools for Optimization” Morgan
Kaufmann, ISBN 1558604588, 1998.
 S. Karris, “Networks: Design and Management”, Orchard Publications, 2006.
 Recent Research Articles from Top Journals such as IEEE Transactions in Network Systems
Management and others.

======================================================================

48
M.Sc. in Computer Networks 2015

Course Title: Mobile Broadband and Multimedia Networks


Course Code: IMNW 6211
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Compulsory
Pre-requisite: Wireless Communication and Mobile Computing (IMNW 6121)
------------------------------------------------------------------------------------------------------------------
Course Description: This course is designed to give students an understanding of mobile broadband
communication systems, their evolution, key technological issues and the convergence; transmission
techniques and signal processing; MIMO channel modeling and MIMO systems; various broadband
wireless multimedia systems; routing and cross-layer design issue of multimedia communication over
multi-hop wireless ad-hoc/sensor networks and WLANs; latest advances in QoS provisioning,
middleware, mobility management, scheduling and power control.
------------------------------------------------------------------------------------------------------------------
Course Objective: Upon successful completion of the course, the students should be able to
introduce terms and concepts and laying the foundation of a mobile broadband communication
system and multimedia systems; describe the basics of multimedia systems such as voice and video;
examine multimedia systems over different networking environments such as ad-hoc networks,
sensor networks, wireless local area networks, etc.; describe the communication systems and
algorithms of broadband multimedia networks and the tools or applications used for high data rates
streaming; critically evaluate the various broadband and multimedia components in terms of quality
of service metrics.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Mobile Broadband Communication


1.1. Introduction and Evolution
1.2. Future Trends
1.3. Key Technological Issues and Ongoing Activities

49
M.Sc. in Computer Networks 2015

1.4. Mobile Broadband Convergence Network


2. Transmission Techniques and Signal Processing
2.1. Transmission Techniques
2.1.1. Introduction
2.1.2. OFDM Systems
2.1.3. CDMA Systems
2.2. Signal Processing
2.2.1. Introduction
2.2.2. Modulation and Coding
2.2.3. Equalisation
2.2.4. Synchronization and Channel State Estimation
2.2.5. Multi-User Systems and Multi-User Detection
2.2.6. Link Adaptation and Rate-Adaptive Systems
3. MIMO Channel Modeling and Systems
3.1. MIMO Channel Modeling
3.2. MIMO Systems
4. Multimedia Systems
4.1. Design Challenges for Wireless Multimedia Sensor Networks
4.2. Design Challenges for Wireless Multimedia Sensor Networks
4.3. Performance Analysis of Multimedia Traffic over HSDPA
4.4. Interactive Mobile TV Technologies: An Overview
4.5. Multiparty Audio conferencing on Wireless Networks
5. Multimedia Over Ad-hoc, Sensor Networks and WLANs
5.1. Routing for Video Communications over Wireless Ad Hoc Networks
5.2. Unicast and Multicast Video Communication Over Wireless Ad-hoc Networks
5.3. Video Communications Over Wireless Sensor Networks
5.4. Multimedia QoS Support in IEEE 802.11 Standards
5.5. Peer-Assisted Video Streaming Over WLANs
5.6. Multimedia Services Over Broadband WLAN

50
M.Sc. in Computer Networks 2015

6. Quality of Service and Enabling Technologies


6.1. End-to-End QoS Support for Video Delivery Over Wireless Internet
6.2. Handoff Management of Wireless Multimedia Services
6.3. Packet Scheduling in Broadband Wireless Multimedia Networks
6.4. Orthogonal Frequency Division Multiplexing Wireless Communication Systems

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Assignment(s) – 20%
 Project(s) – 30% (Practical/Laboratory)
 Final Written Examination – 50%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 L. M. Correia, “Mobile Broadband Multimedia Networks: Techniques, Models and Tools for
4G”, Elsevier Ltd, 2006.
 Y. Zhang, S. Mao, L. T. Yang, and T. M. Chen, “Broadband Mobile Multimedia: Techniques and
Applications”, CRC Press, Taylor and Francis Group, 2008.
 B. Bing, “Broadband Wireless Multimedia Networks”, Wiley Publishing, 2012.
 S. Paul, “Digital Video Distribution in Broadband, Television, Mobile and Converged”, Wiley
Publishing, 2011.

======================================================================

51
M.Sc. in Computer Networks 2015

Course Title: Social Network Analysis


Course Code: IMNW 6212
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Elective
Pre-requisite: A basic Undergraduate or equivalent course in Computer Networks
------------------------------------------------------------------------------------------------------------------
Course Description: This course will use social network analysis; both its theory and computational
tools, to make sense of the social and information networks that have been fueled and rendered
accessible by the internet. Everything is connected: people, information, events and places, all the
more so with the advent of online social media. A practical way of making sense of the tangle of
connections is to analyze them as networks. In this course students will learn about the structure and
evolution of networks, drawing on knowledge from disciplines as diverse as sociology, mathematics,
computer science, economics, and physics. Online interactive demonstrations and hands-on analysis
of real-world data sets will focus on a range of tasks: from identifying important nodes in the
network, to detecting communities, to tracing information diffusion and opinion formation. Gephi
and Pajek are free software tools required for the course.
------------------------------------------------------------------------------------------------------------------
Course Objective: Upon the successful completion of the course, the students will be able to
understand the theoretical and computational tools on social and information networks; apply
different tools on online social medias such as Facebook and Twitter to mine and analyze information
for decision making; understand the structure and evolution of networks; utilize real-world and
synthetic data sets for different tasks such as identifying popular users, detecting communities,
tracing data diffusion and opinion formation.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Introduction to Social Network Analysis


1.1. Why Social Network Analysis

52
M.Sc. in Computer Networks 2015

1.2. Software Tools (Gephi and Pajek)


1.3. Degree and Connected Components
2. Random Graph Models
2.1. Introduction to Random Graph Models
2.2. Random Graphs and Alternative Models
2.3. Models of Network Growth
3. Centrality
3.1. Degree Betweenness and Closeness
3.2. Eigen Vector Directed
3.3. Centrality Applications
3.4. Power Laws and Data Science
4. Community Structure
4.1. Community Structure and Detection
4.2. Heuristics for Finding Communities
4.3. Community Finding
5. Small World Networks
5.1. Small World Experiments
5.2. Clustering and Motifs
5.3. Small World Models and Origins of Small Worlds
6. Processed on Networks
6.1. Network Topology and Diffusion
6.2. Complex Contagion
6.3. Innovation and Coordination
6.4. Cool and Unusual Applications
7. Network Resilience
7.1. Introduction to Network Resilience
7.2. Resilience and Assortativity, and Resilience and the Power Grid

------------------------------------------------------------------------------------------------------------------

53
M.Sc. in Computer Networks 2015

Assessment and Grading System:

 Assignment(s) – 20%
 Project(s) – 40% (Practical/Laboratory)
 Final Written Examination – 40%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 D. Easley, and J. Kleinberg, “Networks, Crowds, and Markets: Reasoning About a Highly
Connected World”, Cambridge University Press, 2010.
 J. Scott, “Social Network Analysis”, SAGE Publication, 2012.
 C. Prell, “Social Network Analysis: History, Theory and Methodology”, SAGE Publication, 2012.
 K. Cherven, “Network Graph Analysis and Visualization with Gephi”, Packt Publishing, 2013.
 W. de Nooy, A. Mrvar, and V. Batagelj, “Exploratory Social Network Analysis with Pajek”,
Cambridge University Press, Second Edition, 2011.

======================================================================

54
M.Sc. in Computer Networks 2015

Course Title: Virtualization and Cloud Computing


Course Code: IMNW 6213
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Elective
Pre-requisite: Wireless Communication and Mobile Computing (IMNW 6121)
------------------------------------------------------------------------------------------------------------------
Course Description: This course instructs students how to administer and manage a modern network
by properly planning and implementing various functions of a Network OS. Key components include
how to plan server deployment, server monitoring and maintenance, application and data
provisioning, and providing business continuity and availability by proper use of security
configuration and backup policies. The course material is designed to provide extensive hands-on
experience. Topics include: installation and configuration; the boot process; user and group
administration; filesystem administration, including quotas, FACLs, RAID and LVM; task automation;
client networking; software management; log files; troubleshooting; Emphasis is also given on
storage, file management system, connectivity, security, troubleshooting, archiving, backing up,
directory services, remote administration, access control lists.
------------------------------------------------------------------------------------------------------------------
Course Objective: Upon the accomplishment of this course, students will be able to know the basic
concepts of Cloud Computing and current trends; know the differences among three cloud
technologies; know what information needs to be collected from the clients before deciding to place
an application into the cloud; know the basic concepts of virtualization and current trends; explain
procedures, problems and concepts of the three most common virtualization products; list the
physical requirements for a physical virtualization server to meet a company’s specific virtualization
needs; list, discuss and compare the advantages and disadvantages of each of the three most popular
VM products; analyze the TCO and change-over costs for a potential VM installation; determine a
working quantity of configurable resources for the initial creation of a virtualized operating system
such as XP or Win7 or Win8 (RAM, storage, etc.).
------------------------------------------------------------------------------------------------------------------

55
M.Sc. in Computer Networks 2015

Course Content:

1. Introduction to Cloud Computing


1.1. Cloud Computing Definition and Characteristics (elasticity, multi-tenant, on-demand,
ubiquitous, access, usage metering, self-service, sla-monitoring, etc.)
1.2. Basic Concepts of Cloud Computing and Current Trends
1.3. Three Cloud Technologies
1.4. What Does the Client Really Want to Accomplish? (Should everything be in the Cloud?)
1.5. Cloud Support Software-commercial Products and Vendors: methods, pricing, licensing and
maintenance contracts
1.6. SharePoint
2. Cloud Service Models
2.1. Infrastructure as a Service (IaaS)
2.2. Platform as a Service (PaaS)
2.3. Software as a Service (SaaS)
3. Basics of Virtualization
3.1. Virtualization Defined and What should/should not be Virtualized?
3.2. Versions and Licensing, Is it Economical? (TCO, setup costs; long term costs/savings)
3.3. Disaster Potentials and Recovery Strategies
3.4. Comparing Virtualization Technologies
3.5. VMware Server - (version, costs of product, creating VM)
3.6. Citrix: Products list, Xen Server, and Xen Center (create and customize virtual machines)
3.7. Microsoft Virtual PC (VPC console- create and customize virtual machines)
3.8. Microsoft Hyper-V (using Win 2008 r2 create and customize virtual machines)
3.9. Virtual Box- (create and customize virtual machines)
4. Applying Virtualization
4.1. Managing the Virtualization Server
4.2. Server backup methods
4.3. Migrations

56
M.Sc. in Computer Networks 2015

4.4. Desktop Virtualization (strong hands-on component)


4.5. Network and Storage Virtualization
5. Building the Virtual Infrastructure
5.1. Form-factor and Hardware Architecture Choices
5.2. Vendor Choices
5.3. Planning
5.4. Deployment
5.5. Maintenance
6. Cloud Security
6.1. DHCP, DNS, Telnet server; compare with other NOS setup of corresponding network services
6.2. Cloud Security Challenges
6.3. Cloud Security Approaches: Encryption, Tokenization/Obfuscation, Cloud Security Alliance
Standards, Cloud Security Models and Related Patterns
6.4. Cloud Security in Mainstream Vendor Solutions
6.5. Mainstream Cloud Security Offerings: Security Assessment, Secure Cloud architecture Design

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Assignment(s) – 15%
 Seminar(s) – 25%
 Project(s) – 30% (Practical/Laboratory)
 Final Written Examination – 30%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 B. Furht, A. Escalante, “Handbook of Cloud Computing”, Springer, 2010.


 N. Benmessaoud, C. J. Williams, U. M. Mudigonda, “Network Virtualization and Cloud
Computing”, Mitch Tulloch - Series Editor, 2014.

57
M.Sc. in Computer Networks 2015

 M. Portney, “Virtualization Essentials”, John Wiley & Sons, 2012.


 Recent Research Articles from Top Journals such as IEEE Transaction on Cloud Computing, and
others.

======================================================================

58
M.Sc. in Computer Networks 2015

Course Title: Web Engineering


Course Code: IMNW 6214
Credit Hour: 3
Contact Hour per Week: 2 Lecture Hours and 3 Lab Hours
Course Status: Elective
Pre-requisite: None
------------------------------------------------------------------------------------------------------------------
Course Description: This course is designed to provide students with a solid understanding of a
pragmatic process for engineering Web-based applications. Web applications are complex systems
that deliver a plethora of features to a large number of users (including developers), and also exhibit
unique behaviors and demands in terms of performance, scalability, usability, and security. This
course will discuss the limits of current web technologies, information and service architectures, and
content management. Covering every important aspect of a WebApp development, the course
presents proven methods for requirements gathering and analysis, design, testing, project planning,
change and content management.
------------------------------------------------------------------------------------------------------------------
Course Objective: Upon completion of this course, students will be able to identify the challenges
with the existing web technologies and predict features of next generation web-based systems;
understand an agile and adaptable approach to the development of next generation WebApps—
systems that are more complex, more functional, and more significant than any that exist today;
communicate, formulate and plan the web engineering process; analyze and model WebApps,
identify and apply the different approaches to web design; construct and deploy web-based systems
and WebApps; understand and use design patterns, technologies, tools and testing mechanisms;
implement content management systems and some other evolving web technologies.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Web-Based Systems and Web Engineering


1.1. The Web and Web Applications

59
M.Sc. in Computer Networks 2015

1.2. Evolution and Attributes of WebApps


1.3. Overview of Web Engineering
1.4. Agile and WebE Framework
1.5. Components of Web Engineering
1.6. Web Engineering Best Practices
2. Web Engineering Process
2.1. Defining the Framework
2.2. Incremental Process Flow
2.3. Generic Actions and Tasks for the WebE Framework
2.4. Umbrella Activities
3. Communication and Planning
3.1. Communication
3.1.1. The Communication Activity and Formulation
3.1.2. Elicitation
3.1.3. Identifying WebApp Increments and Negotiation
3.2. Planning
3.2.1. Understanding Scope and Refining Framework Activities
3.2.2. Building a WebE Team
3.2.3. Managing Risk and Developing a Schedule
3.2.4. Managing Quality and Change
3.2.5. Tracking the Project and Outsourcing WebE Work
4. Modeling Activity and Analysis Modeling for WebApps
4.1. Modeling Frameworks and Languages
4.2. Understanding Analysis Modeling for WebApps and Users
4.3. Content, Interaction, Functional and Configuration Models
4.4. Relationship/Navigation Analysis
5. WebApp, Interaction, Information and Functional Design
5.1. Design Goals and WebApp Quality
5.2. Design Process

60
M.Sc. in Computer Networks 2015

5.3. Interaction Design


5.3.1. Interface Design Principles and Guidelines
5.3.2. Interface Design Workflow, Preliminaries and Steps
5.3.3. Aesthetic Design
5.3.4. Usability
5.3.5. Design Issues
5.4. Information Design
5.4.1. Information Architecture and Organizing Contents
5.4.2. Structuring the Information Space
5.4.3. Accessing Information and Navigation Design
5.5. Functional Design
5.5.1. WebApp Functionality
5.5.2. Functional Design and State Modeling
6. Construction and Deployment
6.1. Construction and Deployment in the WebE Process
6.2. Construction Principles and Concepts
6.3. Deployment
6.4. Construction and the Use of Components
6.5. Component Design Guidelines and Steps
7. Design Patterns, Technologies, Tools and Testing WebApps
7.1. Overview of Patterns
7.2. Design Focus and Granularity
7.3. Pattern Repositories and Example Patterns
7.4. Implementation Tools and Technologies
7.5. Development Tools and Technologies
7.6. Testing Concepts and Process
7.6.1. Content and User Interface Testing
7.6.2. Usability, Compatibility and Component Level Testing
7.6.3. Navigation and Configuration Testing

61
M.Sc. in Computer Networks 2015

7.6.4. Security and Performance Testing


8. Change and Content Management
8.1. Overview and Attributes of Change
8.2. Change Management for Web Engineering
8.3. Content Management System (CMS)
8.4. Criteria for Implementing CMS
9. Future Directions
9.1. The Changing Nature of the Web and WebApps
9.2. Evolving Web Technologies and Web 2.0
9.3. The Future and Changing Nature of Web Engineering

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Assignment(s) – 15%
 Seminar(s) – 25%
 Project(s) – 30% (Practical/Laboratory)
 Final Written Examination – 30%
 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 R. Pressman, and D. Lowe, “Web Engineering: A Practitioner’s Approach”, McGraw-Hill


Education, 2008.
 W. Suh, “Web Engineering: Principles and Techniques”, Idea Group Inc., 2005.
 R. Sebesta, “Programming the World Wide Web”, 2009.

======================================================================

62
M.Sc. in Computer Networks 2015

Course Title: Selected Topics in Computer Networking


Course Code: IMNW 6215
Credit Hour: 3
Contact Hour per Week: 3 Lecture Hours
Course Status: Compulsory
Pre-requisite: None
------------------------------------------------------------------------------------------------------------------
Course Description: The motivation for this course lies in the interest in providing a broad viewpoint
on Computer Networks by surveying recent developments, major results, and hot topics in today’s
leading-edge research in Computer Networks. The main focus of this course is on topics of current
interest in Computer Networking. The course will cover topics such as pervasive, mobile and social
computing, Internet of Things, cloud computing, Big data, state of the art networking paradigms such
as Vehicular Social Networks, etc.
------------------------------------------------------------------------------------------------------------------
Course Objective: On successful completion of the course, students will be able to identify current
research topics in Computer Networks and critically discuss research topics in Computer Networks.
------------------------------------------------------------------------------------------------------------------
Course Content:

1. Analyze Latest Topics in Computer Networks such as ad-hoc networks, socially-aware networks,
wireless sensor networks (i.e. mobile crowdsensing), vehicular social networks, cloud computing,
big data, Internet of Things, etc.
2. Identify Tools and Techniques for Use in Recent Research Topics in Computer Networks

------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Classroom activities – 10%


 Project – 50%
 Examination – 40%

63
M.Sc. in Computer Networks 2015

 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 There is no single text book for the course. It is, thus, recommended that the students read
appropriate articles and chapters from the given reading materials (high-quality publications)
in addition to their own reading materials.
 Check Appendix 12.2 for details about research articles.

======================================================================

64
M.Sc. in Computer Networks 2015

Course Title: Thesis in Computer Networking


Course Code: IMNW 6221
Credit Hour: 6
Course Status: Compulsory
Pre-requisite: Completion of the Two-Semester Core Courses [Read the Student Manual – 12.1]
------------------------------------------------------------------------------------------------------------------
Course Description: This course is intended to provide a practical skill in carrying out research and
documenting and presenting the findings in a selected area of Computer Networks.
------------------------------------------------------------------------------------------------------------------
Course Objective: At the end of this thesis students will be able to know how to read and understand
published papers and other materials related to the thesis title; understand and apply issues related
to research in Computer Networks; write technical reports in the form of journal, conference and
workshop papers and thesis; present and defend research findings.
------------------------------------------------------------------------------------------------------------------
Course Content:
The student investigates an original work including a study of its possible implications, potential
applications, and its relationship to previous related works reported in the literature. Contributions
and results from this investigation are synthesized and compiled into a thesis presenting the new
idea and presented to an examining committee, to be organized by the College.
------------------------------------------------------------------------------------------------------------------
Assessment and Grading System:

 Grades will be determined according to the University post-graduate rules and regulations.

------------------------------------------------------------------------------------------------------------------
Textbook and References:

 Articles published in high quality journals and conference proceedings related to the area of
the title of the thesis, books, reading materials from the Web, etc.

======================================================================

65
M.Sc. in Computer Networks 2015

12. Appendix
12.1. NetLab Student Manual

12.1.1. Basic Information

Welcome to the Networking Lab (NetLab) based in College of Informatics, Kombolcha Institute of
Technology, Wollo University, Kombolcha, Ethiopia.
The mission of NetLab is to create innovation through conducting interdisciplinary, application-
driven academic research in networking. The laboratory is interested in a broad spectrum of
cutting-edge research into social computing, big data, wireless communication, mobile
computing, cyber-physical systems, and relevant areas, from theoretical foundations, through
design and implementation, to real-world applications, as well as education.

 Full name of the Lab: Networking Lab, College of Informatics, KIoT, Wollo University,
Kombolcha, Ethiopia.
 Short name of the Lab: NetLab
 URL (website): http://wu/kiot/coi/netlab.edu.et (to be deployed soon!)
 Address: The first floor, Building #1, KIoT Campus, Wollo University, Kombolcha, Ethiopia
 Supervisor(s): Ahmedin Mohammed Ahmed (PhD)

12.1.2. Daily Management

 The lab will have its own Directors, one of the masters’ supervisors.
 All lab members are one family, and hence should take care of each other in everyday
life.
 The Director Assistant (among the Masters Students) will help the Supervisor to handle
everyday management issues, including e.g. equipments and social activities.
 Normally, study and work facilities will be provided by the Supervisor. Send your request
to Director Assistant if you need something (for study/work). Valuable equipments (e.g.
computers) bought by the lab are property of the Institute, and must be returned by the
time of graduation.

66
M.Sc. in Computer Networks 2015

 Every lab member is encouraged to establish a homepage on the website of the lab. It is
free.
 Anytime you leave Kombolcha, ask for permission from the Supervisor in advance.
 The lab will have an FTP server to store various materials for study and work. There will
be an FTP Manager (among the Masters Students). Every lab member can get a
unique/private account from the FTP Manager.
 All electronic materials (including e.g. full papers, e-books, thesis, datasets, software
tools, etc) collected by any lab member should be shared with others. Upload useful
materials to the FTP server.
 Distribution of internal materials of the lab without permission is forbidden.
 All research outcomes (e.g. papers, data, source codes, software/tools, relevant
documents, etc) must be archived onto the FTP server.

12.1.3. Literature (Research Article) Search

The Institute (KIoT) will provide access portals to two major academic databases in the world
(IEEE and ACM digital libraries), from where full texts of scientific papers can be downloaded (on
campus) for free.
Very important databases (search and read papers from these databases, especially papers
published in TOP journals and TOP conferences in recent 5 years):

 Nature, Scientific Reports: http://www.nature.com


 Science: http://www.sciencemag.org/
 PNAS: http://www.pnas.org/
 PLoS One (Open Access): http://www.plosone.org/
 Physical Review X (Open Access): http://prx.aps.org/
 IEEE Xplore: http://ieeexplore.ieee.org
 ACM Portal: http://portal.acm.org/portal.cfm
 Google and Google Scholar: http://www.google.com/; http://scholar.google.com/
 Microsoft Academic Search: http://academic.research.microsoft.com/

67
M.Sc. in Computer Networks 2015

 Springer Link: http://www.springerlink.com


 Elsevier: http://www.sciencedirect.com/

12.1.4. Research Activities

In the first year of your enrollment:

 Download materials from the Lab FTP server; Learn how to do good research, and how to
write good papers, etc (more materials are available on the Internet);
 Report to the Lab Supervisor about what you have read;
 Enhance your capability of reading and writing (in English) as much as possible;
 Search relevant papers (some will be available on the FTP server).
 Read A LOT (of papers on certain topics)! Normally over 100 papers in total should be
read, among which at least 40 should be read very carefully (intensive reading). The
focus must be on high-quality papers published in TOP/Important journals and TOP
conferences in recent 5 years.
 By the end of the first year (August), upload all papers you have read to the FTP server
(the name the folder will be specified later). The Supervisor will check with you to ensure
that you have read a lot as instructed.
 Write a SURVEY paper to summarize the state of the art of an emerging topic. This could
be a long survey paper or a short tutorial. Good papers might be considered for
submission to journals.
 Discuss with lab members about your Masters research topics, and identify the research
issue you will work on.
 Write your RESEARCH PROPOSAL using the template (12.3) and send it to the Supervisor
via email by the end of September.
 Give a presentation on your research proposal. You may need to defense it.

In the second year of your enrollment:

 Work on specific research issue (according to research proposal) and obtain original

68
M.Sc. in Computer Networks 2015

innovative research result/outcome;


 Discover/identify NEW problem, propose NEW solution (e.g. a theory, an algorithm, a
protocol, a method, a tool, etc) for the problem, and get NEW data (e.g. simulation or
experiment results) to evaluate the performance of the solution;
 Enhance your capability of doing research independently, of leading a team, of writing
high-quality thesis, of writing research/project proposal, etc;
 Write your Master’s THESIS using the template that will be provided by the Lab;
 Apply for graduation given that all Program Requirements (see Section 5) are satisfied
and approved by the Supervisor;
 Send your thesis to your Supervisor; In case of failure in this phase, revise your thesis and
do it again until success. You have to pass your supervisor and pre-defense (committee
organized by the College) at least a month before the time of graduation.
 Your thesis will be sent out (by the College) for peer-review after you pass the pre-
defense. The review process takes about a month in most cases.
 If you pass the peer-review, prepare for the (final) official defense of your M.Sc. thesis. In
case of success, congratulations! Revise your thesis and send it to the Supervisor for
approval. Submit the final version to the College, and wait for your Masters.
 Pay special attention to the quality of the papers you read and cite (in your thesis). The
majority of them should be from TOP/Important journals/conferences and be published
in the past 5 years.
 Any forms of plagiarism and self-plagiarism are forbidden, under any circumstances.
Any forms of other scientific misconduct (e.g. fabrication and falsification) are also
forbidden.
 As a general rule, EVERY sentence of a paper should/must be written by the student;
EVERY figure/table should/must also be produced by the students.
 It is not allowed to copy any content (including e.g. text/sentences, figures, tables, data,
etc.) (directly) from others (even you put citations there)!
 Cite references properly wherever necessary, but don’t cite useless references (which are

69
M.Sc. in Computer Networks 2015

not really referred to).


 Students who are found to have engaged in scientific misconduct will be punished
seriously and might be kicked out of the Lab and the University.
 Lab members are encouraged to attend various academic activities such as academic
day, group meeting, weekly progress report, semi-annual research plan and progress
report (templates will be available).
 Each year, the Outstanding Contribution Award (a certificate plus a certain amount of
money) will be granted (by the Lab) to one student (of the Lab) with most outstanding
performance in research and service. Students who have ever violated rules stated in this
document in the year are not eligible for this Award. To become a candidate, send (via
email) an application statement along with an outline of your contributions and
outcomes in research of the year to the Director of the lab by the end of December.
Normally the recipient/s will be announced in early January, and the bonus and
certificate will be presented in the next semester.

12.1.5. Others

 The Service Bus for academic and administrative staffs of KIoT is also free for M.Sc. in
Computer Networks students (check the schedule from the facility office of KIoT).
 Any suggestions/comments (on any related issues) are welcome.
 This manual is revised and compiled by Ahmedin Mohammed (PhD) with permission
from the producer and copyright holder Prof. Feng Xia (Dalian University of Technology).
It is not for distribution. Don’t use any content of this manual anywhere else without
permission by the copyright owner.

70
M.Sc. in Computer Networks 2015

12.2. List of Important & Top Journals/Conferences

Students are encourages to read related papers recently published in these important & top
journals and conferences. List of Important and Top Journals include:

 Nature (World BEST)


 Science (World BEST)
 PNAS: Proceedings of the National Academy of Sciences
 Nature Communications
 Science Advances
 Proceedings of the IEEE
 Scientific Reports (Nature)
 ACM Computing Surveys
 IEEE Communications Surveys and Tutorials
 ACM Transactions on Information Systems
 IEEE Transactions on Knowledge and Data Engineering
 IEEE Transactions on Mobile Computing
 IEEE Transactions on Parallel and Distributed Systems
 IEEE Transactions on Computers
 IEEE/ACM Transactions on Networking
 IEEE Transactions on Computational Social Systems
 IEEE Transactions on Big Data
 IEEE Transactions on Systems, Man, and Cybernetics: Systems
 IEEE Transactions on Human-Machine Systems
 IEEE Transactions on Cybernetics
 IEEE Transactions on Network Science and Engineering
 IEEE Transactions on Learning Technologies
 IEEE Transactions on Vehicular Technology
 IEEE Transactions on Intelligent Transportation Systems

71
M.Sc. in Computer Networks 2015

 IEEE Transactions on Emerging Topics in Computing


 ACM Transactions on Intelligent Systems and Technology
 ACM Transactions on the Web
 ACM Transactions on Internet Technology
 Journal of the Association for Information Science and Technology (Wiley)
 Information Systems (Elsevier)
 Information Sciences (Elsevier)
 The Computer Journal (Oxford)
 Nature Physics
 Communications of the ACM
 IEEE Computer
 Any other IEEE/ACM Transactions/Journals/Magazines
 Any other Journals with IF (Impact Factor) >= 2.0

List of Top Conferences include:

 International Joint Conference on Artificial Intelligence (IJCAI)


 ACM Joint Conference on Digital Libraries (JCDL)
 ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)
 ACM Conference on Information and Knowledge Management (CIKM)
 IEEE International Conference on Computer Communications (INFOCOM)
 AAAI Conference on Artificial Intelligence (AAAI)
 International World Wide Web Conference (WWW)

72
M.Sc. in Computer Networks 2015

12.3. NetLab Masters Research Proposal Template

NetLab Masters RESEARCH PROPOSAL


Your Full Name
Month, Year

1. Research/Thesis Title

Should be descriptive of focus, concise, eye-catching

2. Research Summary

A short abstract of research; about 300 words summarizing What? Why? and How? you are
proposing to undertake this research.

3. Research Background and Motivation

To provide background information relating to the social/technical (etc) context of the study;
follows from background to persuade the reader that the study will be useful/interesting; this
may include reference to a 'gap' in the research literature, to the need to apply certain ideas
in a new context, or to the significance of your particular topic (i.e. research problem);
address why this topic is still a problem warranting your research (this leads you to stating
your research questions)

4. Research Goals and Research Questions/Issues

To state clearly and succinctly the purpose of the study (should logically follow from the
above research problem statement); to outline the SMART objectives and key research
questions; the purpose is expressed in terms of the broader context of the study; the research
question(s) (usually What, How, Why, or What if) should be few, so that the focus is
manageable;

5. Review of the Literature

To show that you are aware of significant writers/researchers in the field, and to indicate
which issues/topics you will focus on in your review (this may change later); to show that you

73
M.Sc. in Computer Networks 2015

can be judicious in your selection of issues to focus on and take an approach of critical
inquiry; how this project relates to prior work in the area (including your own, if relevant)

6. Research Design/Methodology and Proposed Solution

Detail (as much as possible) your proposed approach/solution (idea) for the research
question/issue.

description of the work you'd like to do; describe the research plans; What approach will be
proposed to address the research question/issue? How the anticipated objectives will be
accomplished; a thoroughly detailed plan is preferable; includes your understandings of the
nature of knowledge and how this affects your choice of research approach; How to evaluate
the performance of your approach?

Will you be doing this research on your own or with others?

7. Outline of Contributions

What are the major contributions? these may relate closely to Research Goals

8. Expected Outcomes

Predict the expected outcomes and innovations; what you will deliver by the end of the
research: what new algorithm/protocol/method/architecture? prototype? real
application/system (with documents)?

9. Timetable

Divide the research into discrete tasks, milestones, or phases; depict the tasks and the
stages/times for their completion; this may take the form of a chart, timeline or flowchart (or
any other)

10. Proposed Thesis Structure (if available)

Describe the focus of each proposed chapter; each chapter's proposed content is described in
a few lines or a small paragraph, or a proposed table of contents is presented

74
M.Sc. in Computer Networks 2015

11. References (include only highly related ones, rather than all)

List of works that have been consulted thus far and appear to be useful; most of them should
be good (SCI-indexed) journal or (IEEE/ACM) conference papers published in recent years.

Note:

1. The purpose of the proposal is to help you (as Masters Student) to focus and define your
research plans. These plans are not binding, in that they may well change substantially as
you progress in the research. However, they are an indication of your direction and
discipline as a researcher. They also help you to obtain your M.Sc. as expected.
2. There is no requirement on the length of the proposal, as long as you can address the
issues clearly.
3. Rename the file: researchProposal-YourFirstName-Year.doc/x

75

You might also like