Quick Links


General

• Home
• Teachers
• Module Organiser
• Timetable
• Exams
• Activities (Weekly)
• Activities
• Ask a Question
• Index


Emulators
• Router
• Switch
• UNIX
• Wireless
• 5-router
• Modem
• Host

Material
• Notes
• Presentations
• Tutorials
• Challenge
• Worksheets

Sockets
• VB Sockets
• Java Sockets
• VB Code
• Java Code

Quizzes
• Pub Challenge
• OSI Model  
• Bits, bytes and frames
• Hangman
• Subnetting
• IQ Test

Free Updates

Network Emulators
CNDS site

cnds for Pocket PC 
Back Pocket PC - CNDS Lectures

This site will soon contain information of the new provision for Pocket PC's. As much as possible the site will contain the main information for the site including: Tests; Exam Results, Registration, and so on.

The growth of mobile computing will continue over the next few years, thus it is important for the CNDS module to keep up with these trends. The module is currently being revised so that there is an increasing the amount of wireless and mobile computing. If you're interested, here is the new content:

Network elements. Topologies, networking elements (switches, routers, bridges, and so on), firewalls, ARP, network infrastructure, network modeling, Ethernet, ATM, vLANs, tied architectures, VPNs,
Network addressing. IP format, IP addressing, routing, subnetting, subnet design, subnet masks, IPv6, NAT.
Transport protocols. TCP; UDP; Three-way handshaking; WinSock; Event-driven and object-oriented network programming; client/server programming; peer-to-peer programming.
Router programming and routing protocols. IOS programming, routing protocols types, routing problems.
Mobile networks and devices. Ah-hoc and infrastructure networks, broadband wireless, wireless security, GSM networks.

Figure 1: CNDS@napier

Along with this we have developed a new Level 4 (Hons. level, in Scotland) module named Advanced Security and Mobile Networks. The content for this is:

Principles: Protecting data at different layers of the OSI model, Public-key and private-key encryption, AAA (authentication, authorization, and accounting) methods.

System attacks and security policies: Risk management/assessment, network attacks, finger-printing, forensic computing, distributed security policies, tiered security, secure network architecture, security assessments, fall-back systems, data recovery.

Mobile Networks: Wireless networks, MANET, Modelling of wireless networks, WEP, GPRS, Spread spectrum, Military systems, Agent-based systems, Mobile Agents, Security over VPNs, Ad-hoc networks, Routing over ad-hoc networks, Transport protocols for wireless networks.

Implementation: Secure software design, Intrusion Detection systems, IPSec Security, Crypto Access Lists, Secure Sockets, Anti-replay methods, Internet Key Exchange, IOS Firewalls, Context-based Access Control, IOS Intrusion Detection, RADIUS/ TACACS+/ Kerberos, PPP/CHAP.