Computer Networks and Security (2IC60)

2016/17 - Quartile 4





  • Dr. Tanir Ozcelebi - MF 6.066 - tel: 4426 - t.ozcelebi (@SPAM) tue. nl
  • Dr. Jerry den Hartog - MF 6.063 - tel: 2800 - j.d.hartog (@SPAM) tue. nl


  • Theo Huberts - t.huberts (@SPAM) fontys. nl
  • Alessandro Amadori, MSc. - a.amadori (@SPAM) tue. nl
  • Sila Ozen - s.ozen (@SPAM) tue. nl
  • Daan Leermakers - d.leermakers.1 (@SPAM) tue. nl


Fraud is strictly forbidden. See TU/e code for scientific conduct for reference. Examples of fraud: copying from your peers, others, the Internet etc. allowing your peers to copy from you, sharing your solutions publicly. Incidents caught will be handed off to the examination committee at once.

Learning Goals:

At the end of the course, students are expected to be able to 

Forms of education:

The course consists of regular lectures, instructions and lab sessions. See the slide set 00 to find out more about the course organization.


The assessment is through

Final examination including lab question(s) - 60% of the final result
Weekly homeworks - 20% of the final result
Essay (for information click here) - 20% of the final result


Lab sessions:

There are a total of 6 lab sessions. These exercises will not be graded. However, you may expect some question(s) about lab sessions in the exam.



A selection of 2 exercises in each homework set will be graded. However, we won't tell the students in advance which exercises will be graded. When computing the final homework average we will discard the worst assignment score of the student.


More details on the essay will be here shortly. Each student in an essay group must fill in the peer assessment form. This will be used for identifying free-riders. Free-riding results in getting zero from the essay. Not all members of the essay group will necessarily get the same grade. There can be a maximum of 3 points (out of 10) difference between any two group members based on the peer review; i.e. other than in case of free-riding as noted above.


Study material:

1. Lecture notes (mandatory reading):

Lecture notes will be may be updated (for improvements on top of the initial version).Changes will be announced here.

If you want all chapters that are written in a single bundle, download below (official release, maintained regularly:download again after each change that is announced!).


If you want to read the lecture notes on your e-book reader, download below the version with narrower margins and larger fonts. Even though it is very close to the original release above, note that this e-book release may have formatting issues (e.g. figures not fiting in page, captions sticking out etc). Use it at your own risk.



2. Recommended supplementary reading:

Computer Networking: A Top-Down Approach, 6th Edition by James F. Kurose and Keith W. Ross. ISBN-13: 978-0132856201. Other recent editions of this book are fine too. The 7th Edition has been released.

Programme (tentative):

Note that we changed the order of the lectures on link layer (ch6) and authentication (ch7) due to scheduling issues (Ozcelebi is abroad for a conference). We keep the "natural" order in the lecture notes (the notes cover the protocol layers in consecutive chapters 3, 4, 5 and 6).


Wk Date Time Activity Slides / reading
1 25/4 13:45-15:30 Course Organization + Introduction to Networks & Security (S00) (S01) (Ch1)
  25/4 15:45-17:30 Explanation of instruction / lab sessions: setting up the software  
  27/4 8:45-10:30 TU/e is closed.  
  27/4 10:45-12:30 TU/e is closed.  
2 02/5 13:45-15:30 Lecture: Protocol Layering (S02) (Ch2)
  02/5 15:45-17:30 Lab1: Exploration (Wireshark+Virtualbox) Lab1
  04/5 8:45-10:30 Instruction (HW1 solutions)  
  04/5 10:45-12:30 Lecture: Application Layer (S03) (Ch3)
3 09/5 13:45-15:30 Lecture: Transport Layer (S04) (Ch4)
  09/5 15:45-17:30 Lab2: Wireshark (exploring UDP, TCP) Lab2
  11/5 8:45-10:30 Instruction (HW2 solutions)  
  11/5 10:45-12:30 Lecture: Network Layer (S05) (Ch5)
4 16/5 13:45-15:30 Lecture: The example of Intelligent Transport Systems Slides
  16/5 15:45-17:30 Lab3: Java socket programming Lab3
  18/5 8:45-10:30 No instruction  
  18/5 10:45-12:30 No lecture (Office Hour: Jerry den Hartog, MF6.063)  
5 23/5 13:45-15:30 Lecture: Authentication, Access Control (S07) (Ch7)
  23/5 15:45-17:30 Instruction (HW3 solutions)  
  25/5 8:45-10:30 TU/e is closed.  
  25/5 10:45-12:30 TU/e is closed.  
6 30/5 13:45-15:30 Lecture: Link Layer (wired/wireless) (S06) (Ch6)
  30/5 15:45-17:30 Instruction (HW4 solutions)  
  01/6 8:45-10:30 Lab4: Wireshark: Forensics Lab4
  01/6 10:45-12:30 Lecture: Network Security (S08a) (Ch8)
7 06/6 13:45-15:30 Lecture: Web Security (S08b) (Ch8)
  06/6 15:45-17:30 Lab5: Web security Lab5
  08/6 8:45-10:30 Instruction (HW5 solutions)  
  08/6 10:45-12:30 Lecture: Cryptography (S09) (Ch9)
8 13/6 13:45-15:30 Lecture: Security Protocols (S10) (Ch10)
  13/6 15:45-17:30 Lab6: Public Key Encryption Lab6
  15/6 8:45-10:30 Instruction (HW6 solutions)  
  15/6 10:45-12:30 Back up  
9 20/6 13:45-17:30 Back up  
  22/6 10:45-12:30 Office Hour: Jerry den Hartog, MF6.063  

Past exam: