2016/17 - Quartile 4
Fraud is strictly forbidden. See TU/e code for scientific conduct for reference. Examples of fraud: copying from your peers, others, the Internet etc. allowing your peers to copy from you, sharing your solutions publicly. Incidents caught will be handed off to the examination committee at once.
At the end of the course, students are expected to be able to
Forms of education:
The course consists of regular lectures, instructions and lab sessions. See the slide set 00 to find out more about the course organization.
The assessment is through
|•||Final examination including lab question(s) - 60% of the final result|
|•||Weekly homeworks - 20% of the final result|
|•||Essay (for information click here) - 20% of the final result|
There are a total of 6 lab sessions. These exercises will not be graded. However, you may expect some question(s) about lab sessions in the exam.
A selection of 2 exercises in each homework set will be graded. However, we won't tell the students in advance which exercises will be graded. When computing the final homework average we will discard the worst assignment score of the student.
More details on the essay will be here shortly. Each student in an essay group must fill in the peer assessment form. This will be used for identifying free-riders. Free-riding results in getting zero from the essay. Not all members of the essay group will necessarily get the same grade. There can be a maximum of 3 points (out of 10) difference between any two group members based on the peer review; i.e. other than in case of free-riding as noted above.
1. Lecture notes (mandatory reading):
Lecture notes will be may be updated (for improvements on top of the initial version).Changes will be announced here.
If you want all chapters that are written in a single bundle, download below (official release, maintained regularly:download again after each change that is announced!).
If you want to read the lecture notes on your e-book reader, download below the version with narrower margins and larger fonts. Even though it is very close to the original release above, note that this e-book release may have formatting issues (e.g. figures not fiting in page, captions sticking out etc). Use it at your own risk.
2. Recommended supplementary reading:
Note that we changed the order of the lectures on link layer (ch6) and authentication (ch7) due to scheduling issues (Ozcelebi is abroad for a conference). We keep the "natural" order in the lecture notes (the notes cover the protocol layers in consecutive chapters 3, 4, 5 and 6).
|Wk||Date||Time||Activity||Slides / reading|
|1||25/4||13:45-15:30||Course Organization + Introduction to Networks & Security||(S00) (S01) (Ch1)|
|25/4||15:45-17:30||Explanation of instruction / lab sessions: setting up the software|
|27/4||8:45-10:30||TU/e is closed.|
|27/4||10:45-12:30||TU/e is closed.|
|2||02/5||13:45-15:30||Lecture: Protocol Layering||(S02) (Ch2)|
|02/5||15:45-17:30||Lab1: Exploration (Wireshark+Virtualbox)||Lab1|
|04/5||8:45-10:30||Instruction (HW1 solutions)|
|04/5||10:45-12:30||Lecture: Application Layer||(S03) (Ch3)|
|3||09/5||13:45-15:30||Lecture: Transport Layer||(S04) (Ch4)|
|09/5||15:45-17:30||Lab2: Wireshark (exploring UDP, TCP)||Lab2|
|11/5||8:45-10:30||Instruction (HW2 solutions)|
|11/5||10:45-12:30||Lecture: Network Layer||(S05) (Ch5)|
|4||16/5||13:45-15:30||Lecture: The example of Intelligent Transport Systems||Slides|
|16/5||15:45-17:30||Lab3: Java socket programming||Lab3|
|18/5||10:45-12:30||No lecture (Office Hour: Jerry den Hartog, MF6.063)|
|5||23/5||13:45-15:30||Lecture: Authentication, Access Control||(S07) (Ch7)|
|23/5||15:45-17:30||Instruction (HW3 solutions)|
|25/5||8:45-10:30||TU/e is closed.|
|25/5||10:45-12:30||TU/e is closed.|
|6||30/5||13:45-15:30||Lecture: Link Layer (wired/wireless)||(S06) (Ch6)|
|30/5||15:45-17:30||Instruction (HW4 solutions)|
|01/6||8:45-10:30||Lab4: Wireshark: Forensics||Lab4|
|01/6||10:45-12:30||Lecture: Network Security||(S08a) (Ch8)|
|7||06/6||13:45-15:30||Lecture: Web Security||(S08b) (Ch8)|
|06/6||15:45-17:30||Lab5: Web security||Lab5|
|08/6||8:45-10:30||Instruction (HW5 solutions)|
|08/6||10:45-12:30||Lecture: Cryptography||(S09) (Ch9)|
|8||13/6||13:45-15:30||Lecture: Security Protocols||(S10) (Ch10)|
|13/6||15:45-17:30||Lab6: Public Key Encryption||Lab6|
|15/6||8:45-10:30||Instruction (HW6 solutions)|
|22/6||10:45-12:30||Office Hour: Jerry den Hartog, MF6.063|