Quick Links


General

 Home
 Teachers
 Module Organiser
 Exams
 Activities
 Ask a Question
 Index


Emulators
 Router
 Switch
 UNIX
 Wireless
 5-router
 Modem
 Host

Material
 Notes
 Presentations
 Tutorials
 Challenge
 Worksheets

Sockets
 VB Sockets
 Java Sockets
 VB Code
 Java Code

Quizzes
 Pub Challenge
 OSI Model  
 Bits, bytes and frames
 Hangman
 Subnetting
 IQ Test

Free Updates

Network Emulators
CNDS site

cnds for Pocket PC 
Back Pocket PC - CNDS Lectures

This site will soon contain information of the new provision for Pocket PC's. As much as possible the site will contain the main information for the site including: Tests; Exam Results, Registration, and so on.

The growth of mobile computing will continue over the next few years, thus it is important for the CNDS module to keep up with these trends. The module is currently being revised so that there is an increasing the amount of wireless and mobile computing. If you're interested, here is the new content:

Network elements. Topologies, networking elements (switches, routers, bridges, and so on), firewalls, ARP, network infrastructure, network modeling, Ethernet, ATM, vLANs, tied architectures, VPNs,
Network addressing. IP format, IP addressing, routing, subnetting, subnet design, subnet masks, IPv6, NAT.
Transport protocols. TCP; UDP; Three-way handshaking; WinSock; Event-driven and object-oriented network programming; client/server programming; peer-to-peer programming.
Router programming and routing protocols. IOS programming, routing protocols types, routing problems.
Mobile networks and devices. Ah-hoc and infrastructure networks, broadband wireless, wireless security, GSM networks.

Figure 1: CNDS@napier

Along with this we have developed a new Level 4 (Hons. level, in Scotland) module named Advanced Security and Mobile Networks. The content for this is:

Principles: Protecting data at different layers of the OSI model, Public-key and private-key encryption, AAA (authentication, authorization, and accounting) methods.

System attacks and security policies: Risk management/assessment, network attacks, finger-printing, forensic computing, distributed security policies, tiered security, secure network architecture, security assessments, fall-back systems, data recovery.

Mobile Networks: Wireless networks, MANET, Modelling of wireless networks, WEP, GPRS, Spread spectrum, Military systems, Agent-based systems, Mobile Agents, Security over VPNs, Ad-hoc networks, Routing over ad-hoc networks, Transport protocols for wireless networks.

Implementation: Secure software design, Intrusion Detection systems, IPSec Security, Crypto Access Lists, Secure Sockets, Anti-replay methods, Internet Key Exchange, IOS Firewalls, Context-based Access Control, IOS Intrusion Detection, RADIUS/ TACACS+/ Kerberos, PPP/CHAP.