Asee peer logo

A Course On Computer Networks Based On Cc2001

Download Paper |


2004 Annual Conference


Salt Lake City, Utah

Publication Date

June 20, 2004

Start Date

June 20, 2004

End Date

June 23, 2004



Conference Session

Course and Curriculum Innovations in ECE

Page Count


Page Numbers

9.31.1 - 9.31.8

Permanent URL

Download Count


Request a correction

Paper Authors

author page

Shakil Akhtar

author page

Alaa Aly

Download Paper |

NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract

A Course on Computer Networks Based on CC2001 Shakil Akhtar and Alaaeldin A. Aly College of Information Technology UAE University {s.akhtar, aly}

Abstract cryptographic algorithms and security protocols. It is This paper presents the laboratory contents of an updated noted that because of the difficulty of both cryptographic computer networks course offered at the undergraduate algorithms and security protocols and also the need for junior or senior level. The design is based upon the special mathematics background, most IT/computer recommended computing curriculum by IEEE Computer science departments in major universities offer the course Society/ACM Task Force, also referred to as CC2001. A for graduate students. However, we have designed the set of lab activity experiments have been presented that course to be offered for junior/senior level undergraduate can be adopted very easily in a traditional fifteen week IT students [4]. semester offering. Unlike the IT program at UAE University, most CS programs require only one course in networks, and there I. Introduction are already numerous topics to be covered in that course. The importance of offering an undergraduate It has always been a challenge to offer a single course networks course that includes cryptography and network considering the new trends in computing [5]. The current security is becoming obvious as we see the rising rate of trends suggest inclusion of additional topics on security computer crime and its effect on the society [1]. Security with hands-on activities. In this paper, we propose a in networks is an important topic. The foundation of course on networks based upon the implementation of two security is in cryptology, which is a mathematical hard separate courses at College of Information Technology at core of information security, since many of the UAE University. We feel that the contents of two courses information security problems (e.g. confidentiality, may be combined carefully to offer a single course in integrity, authenticity of information) can be solved by networking that conforms to the CC-2001 suggestions and means of cryptographical tools/algorithms. Due to this meets the current demands. reason the related courses are usually taught at the graduate level [2]. The paper presents the curricular outline for a networks course following a laboratory based approach to Despite the difficulties of including security related support an active learning environment. The suggested topics at the undergraduate level, the recent trends suggest methodologies for delivering the course are engaged that undergraduate programs in computing include learning, project-based learning, cooperative learning, and security related topics. The CS volume of the Year 2001 problem-based learning. However, in this paper we only Model Curricula for Computing (CC-2001 [3]) contains emphasize on the developed labs. The specific several modules with area descriptions. Some of these are tools/technologies used for this course delivery are Java identified as core; others are identified as elective. The applets, animation, and Blackboard as a web delivery and coverage in net-centric module includes security related class management tool. We noted that the students at topics. Other modules also contain security related topics sophomore/junior level are able to grasp complex in addition to the other recommended material. The mathematical concepts and algorithmic details by recommended topics from security are network security, following the active learning methodology as applied to security and protection, cryptographic algorithms, and this course. computer crime. II. Recommended Course Outline Undergraduate IT students at UAE University We propose to effectively integrate content and seeking specialization in either network engineering technology and suggest the course delivery method to program or information security program are required to change from a traditional lecture format to a studio format take a two course sequence, first in fundamentals of that consists of a lecture followed by a collaborative and networking and communications and the second on the cooperative learning experience. For instance, a 3 credit hour course on Computer Networks may be offered as

Akhtar, S., & Aly, A. (2004, June), A Course On Computer Networks Based On Cc2001 Paper presented at 2004 Annual Conference, Salt Lake City, Utah.

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2004 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015