REFERENCE ETHERNET FRAME

Posted on 7:19 PM | By MOHD NOOR RIZAL BIN ARBAIN | In

1. http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/enet-calc.html
2.http://www.infocellar.com/networks/ethernet/frame.htm
3.http://www.cpe.ku.ac.th/~nguan/presentations/datacom/ethernet.pdf
4.http://www.bostontech.net/assets/files/TechBrief1_P1.pdf
5.http://en.wikipedia.org/wiki/Ethernet
6.http://www.eecs.wsu.edu/~hauser/teaching/CS455-F01/LectureNotes/4-10-4up.pdf
7.http://www.2000trainers.com/cisco-ccna-02/ccna-ethernet-frame-types
8.http://technet.microsoft.com/en-us/library/cc976887.aspx
9.http://www.wordiq.com/definition/Ethernet
10.http://sit.iitkgp.ernet.in/archive/teaching/internetTech/tcp/www.geocities.com/SiliconValley/Vista/8672/network/ethernet.html

BOOK PRICE

Posted on 1:38 AM | By MOHD NOOR RIZAL BIN ARBAIN | In

Cengage - Networking & Security Instructor Product Details Page - Computer Networking for LANs to WANs: Hardware, Software and Security (1423903161)

RM :65.00

ASSIGNMENT

Posted on 10:33 PM | By MOHD NOOR RIZAL BIN ARBAIN | In

FACULTY OF INFORMATION TECHNOLOGY INDUSTRY

COMPUTER NETWORK & SECURITY

ASSIGNMENTS (15 %)

Select ANY one category of the following question:

  1. Create One (1) Magazine about NEW COMPUTER NETWORK & SECURITY TECHNOLOGY, your magazine must be have the following characteristic;

i. Cover page

ii. Table of Content (TOC)

iii. Put page Number

iv. Interesting (Picture/Table/Figure/Free Style Font)

v. Minimum pages are 20-30 pages

vi. By Group

(15% MARKS)

  1. Find and Photostat articles/journal are related NEW COMPUTER NETWORK & SECURITY TECHNOLOGY and combine as a magazine.

i. Cover page

ii. Table of Content (TOC)

iii. Separate paper for each of article

iv. Minimum article are 15-25 title.

v. By Group

(15% MARKS)

  1. Write One (1) Essay/Article about any ISSUES COMPUTER NETWORK & SECURITY IN MALAYSIA.

i. No need cover page

ii. Submit in Softcopy only

iii. Interesting (Picture/Table/Figure/Free Style Font)

iv. Maximum 4-5 page only.

v. Insert your Name and Matric No. on last page

vi. By Individual

vii. References

(15% MARKS)

NOTE

* Member group maximum 4 persons only in 1 group

* Project must be present in your class.

* Due date for submit Assignment is after semester breaks (1-5 March 2010)

* Please attach/prepare your softcopy all Assignment & Lab Exercise in a CD with cover before Final Exam

LECTURE PLAN

Posted on 10:19 PM | By MOHD NOOR RIZAL BIN ARBAIN | In

FACULTY OF INDUSTRIAL INFORMATION TECHNOLOGY (FIIT)

LECTURE PLAN

IAD2153 COMPUTER NETWORK AND SECURITY

Learning Outcome:

After completing the subject, students will be able to:

  • Understand the network concept and architecture.
  • Understand the different layers in networks.
  • Understand important components related to Computer and Networks Security.
  • Explain the importance of security policy and user awareness on a secure network operation, and its positive impacts to the organization.
  • Explain on the strategies to secure the networking environment.


Class Schedule:

DAY

TIME

VENUE

NOTE

Wednesday

11.30-1.30pm

BK10

Lecture

Thursday

8.30-10.30am

GL208

Lab

Consultation Schedule:

DAY

TIME

Course Planning:

WEEK

TOPIC

TASK

1

Chp 1: Introduction Computer Network

LECTURE/QUIZ 1

2

Chp 2: Network Topology.

LECTURE

3

Chp 3: Networking Hardware.

LECTURE/QUIZ 2

4

Chp 4: Ethernet Technology.

LECTURE

MIDTERM TEST 1

1-12/2/2010

5

Chp 5: Token Ring, Fddi, And Other Lan Technologies.

LECTURE/QUIZ 3

6

Chp 6: Network Design And Troubleshooting Scenarios.

LECTURE (P)

7

Chp 8: The Tcp/Ip Protocols.

LECTURE (P)

8

Chp 9: Ipx/Spx, Appletalk, And Other Network Protocols.

LECTURE

9

Chp 17: An Introduction To Networking With Windows (NOS)

LECTURE (P)

10

Chp 11: Network Management And Security.

LECTURE/QUIZ 4

11

Chp 21: Cryptography And Security.

LECTURE

12

Chp 22: Security Hardware.

LECTURE (P)

13

Chp 23: Security Software.

LECTURE (P)

14

Chp 24: Forensic Techniques.

LECTURE/QUIZ 5

PRACTICAL TEST/ MIDTERM TEST 2

PROJECT/ TUTORIAL / EXERCISE / PRESENTATION

REVISON CHAPTER

20-24/4/2010

(END OF CLASS)

FINAL EXAM

3-23/5/2010

Assessment:

Assessment Type

Weight

Frequency

Quiz

10%

5

Assignment

15%

1

Lab

15%

5

Mid Term Examination

20%

2

Final Exam

40%

1

Main References:

Kenneth C. Mansfield, James L. Antonakos , Computer Networking for LANs to WANs: Hardware, Software and Security, 1st Edition, Course Technology Incorporated, 2010.

Mark Ciampa, Security+ Guide to Network Security Fundamentals, Third Edition. Course Technology Incorporated, 2009

Additional References:

1- Charles P. Pfleeger, "Security in Computing 3rd. Ed.", Prentice Hall, 2003.

Important Notes:

1. If you do not submit an item of coursework, or you do not attend the examination, you will receive zero mark for that component of the assessment. If you submit neither, you will receive no grade for the unit. If you are unable to attend the final exam, you should apply to the faculty for the deferred exam. The faculty has established procedures for this (further information is available from the Faculty Office). No excuse is accepted for not attending any quiz(s) or test(s) conducted during the course. Students are not allowed to re-sit or defer any quiz(s) or mid term examination.

2. Students who are absent for than 80% of the prescribed classes can be barred from final exam which will result into receiving no grade for the paper.

3. Using information from other sources and not citing the source is plagiarism, a form of CHEATING. When you are working with other students, please remember that failing to contribute adequately to the project but taking full credit for others efforts is also a form of cheating. If you are caught CHEATING or TRYING TO CHEAT in your assignment(s), quiz(s) or final exam, you can and will be punished accordingly.

4. Student attending the class must follow and adhere to the University’s dress code. Any student caught not adhering to said dress code can and will be prohibited from attending my class(s) and any loss resulted from his/her absentee regarding this matter will be his/her own liability.

5. Students at all time should maintain good manners with lectures and other university’s staff.

6. Respect lecture and other student’s times and rights. No paging, messaging (SMS) or telephoning is allowed during class.