Principles of Information and Technology Systems
Text book or
1. “Foundation of computer science” , by
Behrouz Forouzan and Firouz Mosharraf.
2. “Fundamentals of Information
Technology”, Third Edition, ISBN: 978-81-7446 481-1,2010
This course Develop an understanding of the components of computing and their
relationships, significant impacts of IT disciplines on society, fundamentals
of programming structures, basic modules and functions of operating system,
enterprise and Internet business applications, and the basics of network
architectures, protocols and security, basics on AI and expert systems.
Prerequisites or co-requisites
required, elective, or selected elective
By the completion of this course, the student will
be able to:
1. Recognize the basics of the
components of computing and their relationships.
2. Recognize the fundamentals of
programming structures, basic modules and functions of operating system
3. Recognize the basic modules and
functions of operating system
4. Explain the basics of network
architectures, protocols and security and the idea of cloud computing.
5. Explain the basics of AI and expert
6. State the enterprise and Internet
7. State the basics of Mobile
computing and Data warehousing.
8. Describe multimedia data, its representation.
Introduction to the course content, text book(s), reference(s) and
Manipulation and CPU Architecture.
representation and storage
and the Internet + cloud computing
and Programming Languages.
and enterprise information
Intelligence + expert systems
Computers Network Fundamentals
Behrouz A. Forouzan “ Data Communications and
Networking”, McGrew-Hill, fourth edition,2007
This course provides an overview of basic networking
concepts, including network architecture, design, the layering concept in
networking and how data transferring between devices.
By the completion of this course, the student will
be able to:
1.Compare between the OSI and TCP/IP model
2.Describe the layering concept
3.Understand the network topology
4.Calculate the throughput and network capacity.
5.Idetifiy the different types of medium with their
6.Calculate the error checking (CRC, Checksum)
7.Understand the protocol of flow control
8.Identify the IPV4 address space
9.Identify the difference between the classful and
10.Performing the subnetting
11.Understanding the routing protocols (shortest
13.Idetifing the connection establishment
14.Idetifying connection establishment and
15.Implemeitng the error control
16.Defining the multiplexing
Introduction to the course content, text book(s), reference(s) and course
Give a brief definition of computer networks.
Introduction to Computer Networks: uses of computer Networks, types of
connections, physical topology, PAN, LAN, MAN, WAN, network software.
Physical layer: analog and digital signals, bandwidth and throughput,
Fourier Analysis, twisted pair, coaxial cable, fiber optic, wireless
transmission, baseband and passband transmissions.
Data link layer: functions of the data link layer, framing, error
detection (parity check, CRC, checksum), flow control (noisy and noiseless
OSI versus TCP/IP model: OSI layers and their functions, TCP layers,
TCP versus UDP, comparison between OSI and TCP/IP models.
Network layer: logical addressing, classful and classless addressing,
IPV4, network routing algorithms: sink tree, shortest path, flooding,
distance vector routing.
Transport layer: elements of the transport layer (connection
establishment, connection release, error control, multiplexing), UDP (ports,
checksum, UDP operation), TCP(service, segment, TCP connection, TCP flow
control, TCP error control, TCP congestion control).
Application Layer: Brief introduction about the main protocols such as
( HTTP, DNS, SMTP)
NET 222 D
Communications and Networks fundamentals
“Data and Computer Communications", by William
Stalling, Prentice-Hall, The Latest Edition.
Introduction to signals and systems; time &
frequency domains; spectrum, bandwidth, data rate; transmission media &
impairment constraints; modulation and encoding techniques; Multiplexing;
Switching and routing; Ethernet technologies; Internet Protocol (IP).
Prerequisites or co-requisites :
Students who successfully complete this course will
be able to:
1- Understand the fundamentals of communication and
2- Apply concepts and techniques from coding, and
3- Understand the sources of noise in a
4- Having knowledge of various network protocols.
Types of Signals & its Properties. Continuous-Time &
Analog & Digital Signals, Periodic Signals, Even & Odd
Signals, Real & Complex Signals, Exponential & Sinusoidal Signals
Time Shift Transformation, Unit Step and Unit Impulse Functions
Systems and Classifications of Systems Linear-Time-Invariant
Systems Convolution Sum
Types of communications, Time domain and frequency domain, Spectrum,
Bandwidth and Data Rate Transfer, and relations between them
Transmission Impairments: Attenuation, delay distortion, noise,
Channel capacity, Nyquist Bandwidth, Shannon capacity Formula
o Guided media (twisted-pair, coaxial
and optical fiber cables)
o Unguided media (wireless)
Modulation and Encoding Techniques:
o Digital Data to Analog Signals
o Digital Data to Digital Signals
(NRZI, NRZL,AMI, Manchester)
o Analog Data to Digital Signals,
Nyquest Theory for Sampling
Data Multiplexing (TDM, FDM)
Transmission Types: Serial, and Parallel
o Communication Types: FDX, HDX
o Communication Methods: Synchronous
and Asynchronous, Forwarding
Error Control: Error Detection, Error Correction Retransmission
Network Models Wired LANs and Wireless LANs Internetworking and
Cryptography and Network Security: Principles and
practice’, William Stallings Fifth edition, 2011.
Develop an understanding of information assurance
as practiced in computer operating systems, software and web applications,
gain familiarity with common attacking techniques such as virus, Trojan,
worms and memory exploits defenses against them, develop a basic
understanding of cryptography, how it has evolved, and two key encryption
techniques used today(DEA, RSA).
NET 221 D
1. Describe Computer security concepts.
2. Describe OSI security architecture.
3. Explain information assurance as practiced in
software and web applications.
4. Describe cryptography and how it has evolved.
5. Apply two key encryption techniques used
6. Develop a basic understanding of Message
7. Apply Message Integrity (Secure Hash Algorithms:
8. Apply Digital signatures (ELGamal digital
signature scheme and Digital Signature
9. explain of malicious software, viruses, viruses
10. study ways of attaching a virus to a program.
11. explain the sources of viruses and how to
12. List types of security policies, high and low
level policy languages, operational issues.
13. explain security feature in Linux.
14. apply security feature in windows.
15. explain the vulnerabilities in programs.
16. explain Buffer Overflow ,Cross-site Scripting
(XSS) and SQL Injection.
17. study cybercrime and computer crime,
intellectual property (copyright).
18. explain the problem of intrusion (behavior and
19. classify intrusion detection techniques
(statistical and rule-based)
20. explain password management.
Computer security concepts,
OSI security architecture, security attacks, security services, security
techniques, block ciphers and Data Encryption Standard (DES), public key
cryptography (RSA and ELGamal algorithms), cryptographic data integrity (SHA
algorithm), digital signatures (ELGamal digital signature scheme and Digital
Types of malicious
software, viruses, viruses countermeasures, worms
Definition, types of
security policies, high and low level policy languages, operational issues
Operating system security:
(layering, abstraction, data hiding, process isolation, hardware
segmentation), policy mechanisms (principles of least privileges,
accountability), security models (state machine model, information flow
model, Bell-Lapadula model, non-interference model, access control matrix,
Clarck Wilson model)
control flow integrity
cybercrime and computer
crime, intellectual property (copyright, patent) hacking and intrusion
NET 323 D
“Data Communication and Networking", by Behrouz
A Forouzan, McGraw Hill, 2006 or the Latest Edition.
“TCP/IP guide ", by Charles M. Kozierok, McGraw
Hill, 2005 or the Latest Edition
"Computer Networks", by Tanenbaum,
Prentice-Hall, The Latest Edition.
This course demonstrates the basics of Class-full
addressing, classless addressing, and sub-netting; Delivery and routing of IP
packets; Address resolution: ARP and RARP; IP
protocol; Network troubleshooting: ICMP; Network design and
performance; User datagram protocol (UDP); Transmission control
protocol (TCP); Routing
protocols: RIP, OSPF,
and BGP. BOOTP, DHCP,DNS, and FTP.
Prerequisites or co-requisites
1-Explain the difference between
classful addressing and classless addressing
2-Compare the difference between
the subnetting and suppernetting
3-Explain the attributes of IPv4
4-Explain mapping Logical to
physical Address: ARP
5-Exemplify the ARP Packet
6-Enumerate the different cases of the services of ARP
7-Explain the proxy ARP technique
8-Explain the RARP and its problems
Introduction to the course content, text book(s), reference(s) and
Classfull addressing, classless addressing, and Sub-netting
Delivery and routing of IP packets
Routing protocols: RIP, OSPF, and BGP
Address resolution: ARP, RARP, BOOTP, and DHCP
IP protocol (IP)
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
Domain Name System (DNS)
• File Transfer Protocol
Networks Management and Analysis
Network Management: Accounting and Performance
Strategies" Benoit Claise, Cisco Press, ISBN-10: 1-58705-198-2, 2007
Course Description :
The course covers in detail the methodology of
network analysis, architecture. The course addresses Network management and
protocols such as SNPM, CMIP and RMON as well as traffic analysis and network
performance evaluation software systems; Reliability concepts; Architectures
for system observation and control; System utilization and traffic
classification; Network management tools.
1. Understand the methodology of network analysis.
2. Understand Network management and protocols such
as SNMP, CMIP
3. know the SNMP structure
4. know the SNMP versions
5. know the SNMP SIM data coding format
6. encode data using SIM rules
7. know CMIP advantages
8. compare between SNMP and CMIP
9. Plan for security management
10. Know the security management steps
11. Analyze the results for security reasons
12. use ping command
13. understand the wireless concepts
14. understand the mobile fundamental
15. Understand the wired concepts.
16. Understand the main concept for security
Network Management Principles
Simple Network Management Protocol (SNMP)
Management paradigms and protocols
Wireless & mobile
Wireless Networks and Mobile Communication Systems
Communication and Networks" , by William Stalling , Prentice-Hall, The
Communications: Principle and Practice", by T. S. Rappaport,
Prentice-Hall, The Latest Edition.
The course covers
underlying and fundamental computer communication concepts which support
modern mobile and wireless communication systems and networks. Some of these
concepts deal with propagation effects, including loss, fading, mobile
systems, including design principles of base units and mobile units; micro
cells and pico-cells; cell division, including frequency use and reuse;
concepts of FDMA, TDMA, and CDMA. The focus for wireless networks is on the
physical and medium access layers of the network protocol stack. Wireless
systems include satellite and cellular networks, wireless LANs (IEEE 802.11)
and personal area networks (Bluetooth and Zigbee).
1. Identify Wireless Networks and its elements.
2. Classification of Networks based on different criterion
3. Compare and Classify wired and Wireless Network
4. Plan ways to study a network
5. Study the network/Protocol architecture of networks
6. Study the Electromagnetic Waves and Spectrum
7. Understand Antenna fundamentals
8. Interpret/Recognize basic specifications from antenna spec sheets
9. Understand some of the attributes of analog and digital signals
Time Period, Frequency, Wavelength and Bandwidth, Bit rate, Bit length.
10. Understand/Explain the
key Factors/Parameters and tradeoffs for wireless system design(Bandwidth,
Data Rate, Noise, Channel impairments, acceptable error rate.
11. Understand the
different types of impairments present in wireless networks and analyze their
impact on communication system performance.
definition, radiation patterns,
antennas types. Antenna characteristics: gain, effective
area, attenuation, free space loss, noise, Eb/N0, fading.
parameters, satellite versus terrestrial
communications, orbits, LEO,MEO,
GEO, frequency bands,
Spread spectrum Systems
Cellular Wireless Networks: Organization, frequency reuse, operations,
power control, TDMA, GSM
IEEE802.11 Standard: architecture, Mac format, LLC,
components, services, Mac protocols, physical layer, dynamic spread spectrum,
Bluetooth: applications, piconet, radio layer,
baseband layer, L2Cap layer.
IEEE 802.15:Bluetooth versus Zigbee, components of
Zigbee, Zigbee network topology, device
architecture, physical layer
functionalities, network setup, beacon and non becon opeartions, mac
"Wireless network devices: wireless network
interface cards, access point, bridge, gateway Mobile Networks Fundamentals: Generations,
Topologies, and Components
Programming and Applications
Behrouz A.Forouzan, Data Communications and Networking 5th Edition
341D is an introduction to developing networks applications and programs.
From the application view, this course explains the basic application
protocols that are required to develop an application: HTTP, FTP, SMTP, POP,
and DNS. From a programming point of view, this course is intended to explain
how to write a code at the client and the server sides. NET 341D exploits
JAVA which offers many networks libraries.
Remember computer networks basics.
2. Describe HTTP.
3. Describe FTP.
4. Describe SMTP.
5. Describe POP.
6. Describe DNS.
7. Compare HTTP, FTP, SMTP,
8. Explain HTTP persistent
9. Explain HTTP
10. Explain FTP commands.
11. Explain a SMTP session.
12. Explain DNS resolution
13. Describe sockets.
14. Use Java to write simple
Use Java to write a UDP application
16. Use Java sockets for
networks and to write a TCP application
17. Describe TCP socket
18. Use Java sockets for
19. Describe JavaMail
20. Use Java to send an
21. Use Java to check an
22. Use Java to send an
23. Explain a servlet
24. Use Java servlets to generate
HTML code .
25. Use Java servlets to
generate an HTTP request and response.
Use Java servlets to read and send cookies.
1. Introduction to the course content
text book(s), reference(s) and course plan
2. Internet Applications: HTTP, FTP,
SMTP, POP, DNS 3
3. Network programming basics: socket
4. Java Overview: IO, Threads, streams
5. UDP programming 1
6. TCP programming 2
7. Mail programming 2
8. Web programming using servlets
‘Cryptography and Network
Security: Principles and practice’, William Stallings Fifth edition, 2011
An introductory course,
intended to cover the fundamental concepts and techniques of Networks
Security Protocols. The student is expected to develop number of applications
that demonstrate an understanding of the course.
the completion of this course, the student will be able to:
Use the different methods of attack. Understand and apply selected
technologies used to ensure security.
2- Evaluate existing Network
Security attacks Programs
3- use new types to prevent
4- Describe the
architectural models for TCP/IP Stack
5- evaluate different methods
for Attacks through TCP/IP
6- Explain the Security
7- use Security through
8- Describe VPN
9- Describe the main
architecture for IPSec
10- use different models for
11- use Combining Security
12- Describe DNS protocol
13- use the different types
attach for DNS
14- explain the intrusion
15- Explain types of
intrusion detection systems
16- Describe current
challenges of intrusion detection systems
17- use Secure Multipurpose
Describe Internet security Mail Exchange using S/MIME
Explain models for Secure socket layer (SSL)
Explain transport layer security (TLS).
Foundation of Network Security: what network security is? goals of
network security, secure network architecture, network security policies,
network security components
Overview of TCP/IP: TCP/IP architectural models, TCP/IP possible
attacks(packet sniffing, spoofing, process table attack).
TCP/IP security components: Firewall protection, types of firewalls
(packet filter, proxy server, stateful filter), Firewall architectures
(dual-homed host, screened host), VPN, advantages of VPNs, types VPNs,
architecture of VPNs (point to point tunneling protocol, layer 2 forwarding
), VPN models (Nas-initiated VPN, client-initiated VPN).
IPSec: architecture, authentication header, encapsulating security
payload, combining security association, key management, benefits,
DNS: protocol stack (spoofing, ID hacking, cache poisoning),
Intrusion detection: definition, intrusion process, intrusion
detection system, types of intrusion detection systems, challenges of
intrusion detection systems, intrusion detection systems.
Application and transport layers security: (Pretty Good Privacy (PGP),
Secure Multipurpose Internet security Mail Exchange (S/MIME), Secure HTTP,
Secure socket layer (SSL), transport layer security (TLS).
Data Communication and Networking", by Behrouz
A Forouzan, McGraw Hill, 2006, The Latest Edition
Outline some traditional networks services (DNS,
HTTP, DHCP).Understand multimedia services, Understand real time services.
Understand mobility services.
1. Recognize the principles
2. Stating the operation of
3. Explain the addressing
4. Describe IPv4 protocol.
5. Describe IPv6 protocol
6. Differentiate between
Unicast, Unicast, and Multicast addressing in IPv6
7. Describe Flow Control in
8. Describe Error control in
9. Stating Routing Protocol
10. Differentiate between
Connection Oriented and Connectionless protocols
11. Describe TCP protocol
12. Describe UDP protocol
13. Stating Virtual Private
14. Describe IPSec protocol.
15. State different
applications of IPSec
16. State the benefits of
17. Describe the funcions of
18. Describe Steaming.
Explain the digitization of Audio signals
20. Explain the digitization
of Video signals
21. Explain Audio
22. Differentiate between
predictive encoding and perceptual encoding.
23. Explain Video
24. Describe JPEG
25. Describe MPEG
26. Stating Approaches for
Streaming Stored Audio/Video
27. Describe Streaming Live
28. Describe Real-Time
29. Differentiate between
Jitter, Ordering, and Mixing
30. Describe Real-time
31. Describe Real-time
Transport Control Protocol(RTCP)
32. Describe Session
Initiation Protocol (SIP)
33. Stating SIP messages
34. Describe Caller Tracking
35. DescribeH.323 protocol
36. Recognizing Mobility
37. Describe the operation
of Mobile IP protocol
38. Stating the Components
of Mobile IP Networks.
39. Describe Agent Discovery
40. Describe ICMP Router
Discovery Protocol (IRDP)
41. Describe Registration
42. Describe Tunneling
Describe Mobile IP Encapsulation
Graduation Project -I
1- Handbook of wireless networks
and mobile computing’, Ivan Stojmonovic, ISBN-0-471-41902-8, John Wiley
Essential References Materials (Journals, Reports, etc.)
Data Communications and Networking’ Bahrouz A.Forouz , McGraw Hil , 2007
Cryptography and Network Security: Principles and practice William Stallings
Prentice Hall 2011
Data and Computer Communications, William Stalling, Prentice-Hall, 2007.
course provides teamwork of students with a thorough guideline for survey and
research to design, develop, and implement different fields covering the IT
Passing successfully at least 90 credit hours and IS
Provide the necessary background or context for the project and its
Outline the problem they are working on, why it is interesting and what the challenges are.
Propose an appropriate solution for the project problem.
Conduct a related work survey.
Outline new information technologies such as mobile computing, and Data warehouses
Develop illustrative examples and programs to explain different IT systems
Operate a simple IT system.
Provide the requirements determination and analysis.
Provide system design, including the system architecture, implementation requirements and user interface design.
Operate a simple IT system.
Write a small project in a teamwork.
Demonstrate basics of an IT system
Registering and selecting topics.
Registering and selecting topics.
Providing the problem statement & significance and propose a solution.
Providing the necessary background and related work survey.
Providing requirements determination and analysis.
Designing the system architecture.
Providing the implementation requirements (software and hardware that will be
Designing the user interface of the system by prototyping.
10- Finishing the proposal
writing and submission
Graduation Project II
The choice of the books depends upon the project
type, domain, and characterization.
The aim of this module is to provide students with
experience and appreciation of the process of performing projects in one of
the streams of networks and communications associated with information
technology, including the specification, design and development, and
reporting processes. Students work together in teams under the supervision of
a supervisor, and learn about the processes of teamwork. This involves a scientific project in an
area (in Networking and Communications) which deals with the scientific
challenges in the following or related areas:
Quality of Service
Secure network solutions
Mobility and energy related issues in wireless networks
1. Identify proper work procedures or approaches for
2. Apply technical and scientific knowledge to a
3. Choose between technical alternatives.
4. Analyze, schedule and resource the task.
5. Convert the conceptual schema (relational tables
into physical schema).
6. Translate functional requirements into functions
7. Engage in design and Implementation.
8. Develop the capacity to undertake lifelong
9. Devise and carry out tests where necessary
10. Provide a test plan, test cases and test
11. Organize, compile and record all test results in
an efficient manner.
12. Analyze data.
13. Evaluate and discuss the outcome of the project
14. Function effectively as an individual and as a
15. Present the project outcome effectively using
good presentation skills.
16. Compile and present the project carried out in
the form of a report.
17. Communicate technical results, information and
conclusions to others by means of poster and scientific paper.
Developing the system based on the design and method proposed in the
Graduation Project I.
Implementing the system.
Testing the system.
Submission of project documentation and poster.
“Practicum and Internship: Textbook and Resource Guide for Counseling and
Psychotherapy”, by John Boylan, Judith Scoot, Routledge, 2008.
course is an important component of the IT-Networks and Communication systems
program. This course is designed to provide students’ opportunity to gain a
supervised practical experience in computer environment of an approved
department, firm or agency in KSA. The students will gain a valuable on-site
working experience. It further allows the students to develop skills like:
communication, team work and problem solving, which will enable them in
joining a competitive job market in their fields. Cooperative Training Office
(CTO) should coordinate with students to apply internship. The student and
CTO should also submit a written plan for approval before taking-up the
internship. All internships are subject to approval by the Internship
Coordinator of the college.
maximum number of students 35 per class.
Passing successfully at least 90 credit hours
By the completion of this course,
the student will be able to:
Understand professional organizational culture
Develop relevant professional competencies and
professional relation ship
Use existing knowledge to solve some technical
Apply Classroom Theory
Prepare written report about the internship
experience 6. Construct
experience and confidence in expressing ideas.
7. Communicate in
a professional manner.
network of acquaintances to increase employment opportunities.
9. Understand the
practices and protocols of the particular company and industry in which they
professional demands (such as behavior, attitude, appearance, and
punctuality) of the workplace.
11. Apply academic
knowledge in a professional setting.
effectively in verbal and written forms.
13. Explain current
trends and issues specific to the topic of her internship program
3- Integrated services.
4- High availability
5- Quality of service
6- Secure network solutions.
7- Mobility and energy issues for wireless networks.
NET 302 D
Selected topics (1)
1. Mark Aakhus, James E. Katz,
Perpetual Contact: Mobile Communication, Private Talk, Public Performance,
Cambridge University Press, 2002.
By the end of this course, the students should be
1. Understanding the basic principles of mobile
2. Knowing the different Cellular structures and
mobile radio network.
3. Understanding the basics of Diversity and
4. Having acquired a good knowledge of Modulation
Techniques and Multiple Access Techniques.
1. Stating Frequency bands.
2. Stating Mobile Radio Frequencies
3. Stating the fundamentals of VHF Propagation
4. Describe the signal propagation in Free Space
5. Describe the signal propagation over reflecting
6. Describe the signal propagation over Irregular
7. Describe the signal propagation in Built-up Area
8. Describe Diversity reception
9. Describe Source coding
10. Describe channel coding.
11. Describe digital modulations.
12. Stating the basic functions of mobile
13. Describe multiple access systems
14. Stating transmission modes
15. Stating the utilization of frequency bands
16. Describe the organization of Cellular Networks.
17. Recognize the cell structure.
18. Stating the geographical coverage area.
19. Explain TDMA.
20. Explain FDMA.
21. Explain CDMA.
22. Stating GSM.
23. Stating 2G CDMA
24. Stating 2.5G Networks.
25. Describe 3G Networks
26. Recognize the main driver for 3G Networks.
27. Stating the difference between IEEE 802.11 and
28. Describe the Multimedia Message Service.
29. Stating the MMS applications.
30. Recognize 4G Networks.
31. Stating 4G wireless technologies.
32. Stating the difference between 3G and 4G
Fundamentals of mobile radio
Structure of cellular network: cells and frequency reuse
Mobile radio propagation channels
Channel allocation techniques :
TDMA, FDMA, CDMA
3RD and 4th generation
NET 351 D
Network Operating Systems: Making the Right Choices
Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
This course aims to explain how to install a secure,
multi-user, client-based network operating system , Implement and administer
operating system resources, Implement, share and NTFS permissions, Configure
and troubleshoot workstation performance, Monitor a network, Implement,
monitor, and troubleshoot operating system security and Configure,
troubleshoot network connectivity.
221D - NET 340D
1. Describe the network operating
Describe the Mechanisms for Network Operating Systems.
Describe how NOS provides the LAN with access to other networks
Describe the services and applications of NOS.
Describe the role of the NOS in network computing.
Describe How is the NOS likely to evolve.
Describe What is client/server computing.
Describe how to Install and deploy Windows 7
Describe how to Install Windows 2008 server on networking hardware
Explain terms associated with installing and configuring an NOS
Describe how to work with Disks and Devices.
Apply the Windows 2008 Registry.
Explain how to install and configure a TCP/IP protocol stack.
Apply Windows 2008 Server DHCP.
Apply Exercises on Windows 2008 Domain Name Service.
Apply exercises on Internet Information Server (web services).
Describe the process of monitoring a network server.
Explain the importance of backing up systems and data.
Describe procedures for backing up systems and data.
Describe the processes for updating network operating systems
Describe terms associated with administering server resources.
Explain IP Addressing.
Apply Initial Network setup.
Explain Linux System Administration.
25. Explain how to install
Describe concepts associated with file system security.
27. Describe procedures for
sharing and securing server resources.
Basics of network operating system NOS.
How does the NOS provide the LAN with access to other networks and
What is the role of NOS in network management?
What are application-programming interfaces (APIs) and how are they
supported in the NOS?
What is network computing and what is the role of the NOS in it? How
is the NOS likely to evolve? What is client/server computing?
Introducing Windows 7 and Windows 2008 architecture concepts.
Installing and deploying Windows 7.
Install Windows 2008 server on networking hardware, under VMWare
Working with Disks and Devices, explore and exercise the Windows 2008
Install and configure a TCP/IP protocol stack.
Explore Windows 2008 Server DHCP.
Exercise Windows 2008 Domain Name Service.
Exercise Internet Information Server (web services).
Managing and Monitoring Windows 7 Performance
Linux Installation, IP Addressing, Initial Network setup, Linux System
Administration, Software installation
Credit hours :
Real time and embedded
Dr. Amina Saleem
Real-time flow systems, Jane W.S.Liu, ISBN -10:0130996513, 2000
Real-Time Systems: Design Principles for Embedded Applications, Second
Edition, ISBN 978-1-4419-8236-0, Springer,
PIC Microcontroller: A Introduction to Software & Hardware Interfacing”,
Huang, Delmar Cengage Learning, 2007. ISBN 978-1-4018-3967-3
course covers the concepts, fundamental problems, and approaches in the design
and analysis of real-time and embedded systems inherent in many hardware
platforms. It addresses the issues related to the design and analysis of
systems with real-time constraints (Synchronization and communication;
Real Time systems; Advanced scheduling; Simulation of a Real Time system).
The students also learn the fundamentals of embedded system hardware, micro
controller and microprocessor architecture and assembly language programming
for the PIC Micro controller.
Describe embedded systems and embedded systems with real time applications.
Understand technical, economic factors characterizing a real-time application
to interpret demands that the system designer must cope with.
Understand the key characteristics of real time embedded systems: logical,
functional and timing correctness and resource scheduling.
Classify real time systems.
Compare hard and soft real time systems.
Understand the functional and temporal requirements of real time systems.
Differentiate between real-time applications based on their timing
Study some typical real time embedded systems and their current and future
Describes the general model of real-time systems.
Understand the real time system model (workload model, a resource model and
Define the basic component of any real-time application system.
Describe the parameters that characterize application systems.
Study parameters that characterize the processors
Understand the concept of scheduling in real time systems.
Study the scheduling approaches for real time systems: clock-driven, weighted
round robin and priority-driven.
Analyze the advantages and disadvantages of clock driven scheduling.
Analyze the merits and limitations of the priority driven scheduling
Compare scheduling methods.
Classify priority-driven algorithms for scheduling periodic tasks on a
processor. fixed priority and dynamic priority
Describe algorithms for Scheduling aperiodic and sporadic jobs.
Describe what is meant by real time networks
Enumerate key goals of Real-time Communication
Describe Hard and soft real time communication systems
Understand Real time network architecture
Study the Real time transport and internet protocol
Study Flow control for real time communication systems
Classify the flow control protocol. Explicit and Implicit flow control
Assess real time communication system needs
Understand scheduling in real time communications
Define Embedded systems
Understand the architecture of embedded systems
Analyze the design goals of embedded systems (Performance, cost, power
Describe some functional and non-functional requirements of embedded systems.
Study the key components of embedded system hardware.
Understand micro- processors and micro-controllers.
Understand the Key design requirements of micro-processors (energy
efficiency, code density)
Differentiate between microprocessors and micro-controllers.
Enumerate the components of a micro-controller
Describe the architectural characteristics of the Pic family of micro-controllers.
Describe the peripherals devices of the PIC micro-controllers (Digital I/O,
Study Instruction set for PIC Micro-controller
Understand the PIC Interrupts, Interrupt processing, management and
Understand the difference between High-level languages and machine language.
Explain the Assembly language program structure (directives, instructions
Use assembler directives to allocate memory blocks.
Write programs loops to perform repetitive operations.
Write assembly programs to perform simple arithmetic operations.
Understand the concept of IDE (Integrated development environment).
Study the MPLAB IDE development tool.
Write; assemble some basic assembly programs for PIC.
Use MPLAB IDE to enter programs and build executable codes and
real-time applications: digital control, optimal control, tracking, and multimedia
Reference model of real-time systems: workload model, resource model, and
Hardware real-time systems scheduling: clock driven scheduling, priority
driven scheduling, scheduling aperiodic tasks.
Real-time communication: real-time flow control, scheduling for switched networks,
internet and transport protocols for real-time applications.
to embedded systems: definition and examples of embedded systems, design
Introduction to embedded systems: microcontroller and microprocessor architecture,
memory (RAM, ROM, EPROM, EEROM, Flash memory), I/O, interruptions
Introduction to the assembly language: labels, instructions, operands, directives.
8. Assembly programming for
PIC microcontroller: programming interfaces.
Fundamentals of parallel computer architectures: multichip and multicore
systems”, Yan Solihin, ISBN-13-978-0-9841630-0-7, 2009.
Parallel Computer Architecture: A hardware/software approach, David E. Culler, Jaswinder Pal Singh, Anoop Gupta,
Morgan Kaufmann publishers, 1999, ISBN: 1-55860-343-3.
John Hennessy and David Patterson, Computer Architecture: A Quantitative
Approach, Morgan Kauffman Publisher.
course covers fundamental and comprehensive concepts related to the design of
parallel computer systems (including modern parallel architectures and
alternatives), architecture for shared memory multi processors and multicore
architectures. Topics include program issues with shared memory
multiprocessors, memory hierarchy, cache coherence, synchronization, multicore
organization choices and cache.
CS 340D, CS 206D
Define parallel architectures.
the technological, architectural trends, economic and application requirements
that dictate the growth of parallel systems.
State some of the motivations behind the development of parallel systems
Understand some of the fundamental design issues of the parallel computer
Systems such as Resource allocation, data access, performance and
Understand and Classify Parallelism. ILP, task level and program level
Understand and illustrate the Taxonomy of Parallel computers and the Flynn
Study the different types of Parallel architectures such as SIMD, MISD, MIMD
Understand the concept of memory hierarchies and its big impact on the
Performance of applications.
Study the operation of memory hierarchy and analyze the range of Performance
issues influencing its design.
Classify the components/levels of memory hierarchy such as register, Cache
(SRAM), Memory (DRAM), Disk etc.
Understand the Cache memory, its organizations (Direct Mapped, Set
associative and fully associative), and addressing and performance metrics.
Understand the concept of prefetching in multiprocessor systems and how it is
used to improve the cache performance.
Understand the concept of shared memory, its advantages and disadvantages.
Classify the Shared Memory Multiprocessors Variations. Uniform and
Non-Uniform Memory Access (UMA) Multiprocessors
Study the shared memory multi-processor organization. (Shared cache, shared
bus and distributed shared memory).
Understand the type of hardware support required to construct a shared Memory
Assess the key technical challenges in the design of such machines (such as
organization and implementation of the shared memory subsystem).
Understand issues for a shared memory architecture (Cache coherence, Memory
consistency models, synchronization support)
Explain the cache coherence problem, cache coherence protocols,
Implementations (snooping, directory) and assessing their behavior)
List and compare key characteristics of the bus based and shared cache Multi
Understand cache coherence in bus-based multiprocessors.
Study the Bus-Snooping cache coherence protocol.
Analyze the impact of the cache design on Cache coherence performance.
Understand the different types of synchronization in parallel architectures such as (event and group synchronization)
List the components of a synchronization event.
Study some synchronization operations such as locks and barriers, their Performance
criteria, implementation, illustration and drawbacks.
Compare different synchronization operations.
Understand the limitations of the Symmetric shared multi processors.
Understand the concept of scalable-shared memory systems.
Study the implementation of distributed shared memory coherence protocols.
Describe the advantages (reduce bandwidth demands) limitations and the
Performance criterion of directory based protocol.
Define the inter connection networks
Describe the network characteristics such as topology, routing algorithm,
Switching strategy, and flow control.
Compare between different network topologies
Analyze the impact of network characteristics on the performance and
functionality of the communication system.
Study the organizational structure of parallel computer networks.
Describes the different classes of routing algorithms used in modern
Understand key properties of good routing algorithms (producing deadlock-free
routes, maintaining low latency, spreading load evenly, and
Understand the multi core processors.
Contrast single core and multi-core processors
List some of the advantages and applications of multi-core processors.
Study the multi-core memory hierarchy, issues, design space and constraints.
Multi core memory hierarchy issues design space and constraints
Cache coherence problem and its solution in multi-core architectures.
45. Compare SMT
(Simultaneous Multi-threading) and Multi-core systems
to parallel architectures: evolution, definition, motivation, Flynn’s taxonomy
of MIMD parallel computers, examples.
to memory hierarchy organization: motivation for memory hierarchy, basic architectures
of a cache, cache performance, prefetching.
memory multiprocessors: cache coherence problem, memory Consistency problem, synchronization.
memory multiprocessors: cache coherence problem, memory Consistency problem, synchronization.
based coherent multiprocessors: basic support for bus-based multiprocessors, cache
coherence in bus-based multiprocessors, impact of cache design on Cache
support for synchronization: lock implementation, barrier implementation.
shared memory multiprocessors: approaches to large-scale multiprocessors, building
a directory-based coherence protocol, basic DSM cache coherence protocol,
implementation correctness and performance.
network architecture: link and channel, network topology, Routing policies and algorithms,
multicore architectures: multicore architecture, multicore Memory hierarchy organization,
Ralf Steinmetz & Klara
Nahrstedt, Multimedia Systems, Springer-Verlag, (ISBN:3540408673)
Introductory course in
multimedia computing and networking. Explores the interaction between
multimedia data and the systems that need to support multimedia data such as
audio and video. Topics that will be covered in the course include: compression
technologies, multimedia formats such as JPEG and MPEG, multimedia streaming
over reservation-based and best-effort networks, multicasting of multimedia
data, and systems support for multimedia computing
1. Describe Audio Signals.
2. Describe Video Signals.
3. Stating Huffman
4. Stating Run-Length
5. Stating LZW Compression
6. Describe G.711.
7. Describe A-law.
8. Describe U-law.
9. Describe MP3.
10. Explain GIF.
11. Explain JPEG
13. Explain M-JPEG.
14. Explain MPEG-1.
15. Explain MPEG-2.
16. Explain H.261.
17. Explain H.263.
18. Stating TCP/IP
19. Stating HTTP
20. Describe SIP
21. Describe H.323
22. Stating reservation
23. Stating best effort
24. Stating Features of
Multimedia Operating System.
25. Describe the real time
Stating Multimedia Disk Scheduling
• Sound, image, and video signals
• Lossless data compression techniques: Huffman,
Run-Length Encoding, LZW
• Audio compression techniques: G.711, A-law, U-law,
compression techniques : GIF, JPEG, PPM 2 Video compression techniques :
M-JPEG, MPEG-1, MPEG-2, H.261, H.263
protocol review: TCP/IP, HTTP
integration technologies: SIP, H.323
• Multimedia streaming:
reservation based networks, best effort
NET 425 D
“Timothy Pratt, Charles W. Bostian,
Jeremy E. Allnutt, “Satellite
Communication Systems”, John Wiley
& Sons, The Latest Edition
The course is intending to cover
the fundamental concepts of satellite communications and orbital concepts.
The student is expected to understand the basics of satellite communications,
satellite system elements, key issues of satellite, handle error control for
digital satellites, and grasp the propagation effects on satellite-earth
2. Explain Kepler's three lows
3. Compute orbital Period
4. Classify different orbital
5. Recognizing coordination
elevation and azimuth angles
6. Describing orbital size, shape,
orientation, and satellite location
7. Compare the role of different
8. Compare between different
9. Solve problems on antenna gain
10. Design link budget for
11. Differentiate between different
frequency bands used by satellite
12. Differentiate between
satellites in different altitudes
13. Recalling basic transmission
14. Classify different propagation
effects (gases, rain, ionosphere, scintillations)
15. Compare between rain types
16. Compute rain attenuation
17. Recognize contour maps for rain
18. Explain digital transmission
19. Describe QPSK modulation
20. Recognize different multiple
21. Stating errors occurred and
22. Classify different satellite applications
• Introduction to satellite -
communications and its applications
• Satellite systems elements
• Satellite signal coding
• Satellite link design
• Orbits and launching methods
• Beam angle and directivity
• Altitude control
• Frequency distribution
• Radiation Pattern
• Error control for digital satellite
• Modulation and Multiplexing
• Multiple access
• Propagation effects and their
impact on satellite-earth link
• Exploration of some applications of
satellite systems (GPS, Mobile communication, WEB communications)
Selected Topics (3)
Designing Networks and Services for the Cloud: Delivering
business-grade cloud applications and services”, By Huseni Saboowala,
Muhammad Abid, Sudhir Modali , Published May 16, 2013 by Cisco Press
This course focuses on selected research topics in
networks and communication systems. The course is structured as group of
lectures to discuss one or more of the hot topics in the field plus a
research seminar where students present research papers to their peers.
Topics may include advanced concepts in data communication, networks, networks
security, network protocols, wireless sensors networks, satellite networks,
optical networks, distributed networks, mobile computing, cloud computing.
1- Acquire many of the skills in the
2- Acquire a solid foundation about
architectural concepts of data communications and computer networking
3- master the knowledge about data
communications and computer networking in the context of real-life
4- Understanding, evaluating
critically, and assimilating new knowledge and emerging technology about
5- Follow-up the scientific research
in the area of specialization.
Introduction to the course content, text book(s), reference(s) and
Introduction to Cloud Computing
History of Cloud Computing
o Infrastructure as a service (IaaS)
o Platform as a service (PaaS)
o Software as a service (SaaS)
o Cloud management challenges
o Aspects of cloud management systems
o Private cloud
o Public cloud
o Community cloud
o Hybrid cloud
o Distributed cloud
o The Intercloud
o Cloud engineering
Security in cloud computing
Applications of Cloud Computing
NET 433 D
Networks Design and Implementation
Network Design (3ed Edition) by Priscilla Oppenheimer, 2010
The course is intending to cover
modern integrated networks, the types of traffic generated and their quality
of service requirements. It provides an appreciation of performance issues in
networks, and competence in the use of techniques to analyze and optimize
business goals and constrains.
technical goals and different tradeoffs.
differences for existing internetworks.
the design of a network topology.
different protocols for switches and routers
network security strategy.
LAN's hierarchical models, and secure models.
between different LAN's hardware.
10. State the WAN technology concepts.
11. Distinguish between WAN's
12. Understand the configuration of the
13. Stating the design models for the WLAN.
14. Compare between the WLAN's models.
15. Describe the traffic flow.
16. Check the traffic load.
17. Apply different networks using
Wireshark or OPNET
· Identifying customers’ needs and
goals: analyzing business goals and
constraints, analyzing technical goals and tradeoffs, analyzing existing
· Logical network design: design a network topology, design models for addressing and numbering,
selecting switching and routing protocols, developing network security
strategy, developing network management strategy
· LAN design: hierarchical models, redundant models, secure models, LAN types (
large buildings and campus LANs, small remote sites), LAN hardware
(repeaters, switches, bridges, routers).
· WAN: WAN technology concepts (physical layer, data link layer, switching),
WAN connection options (dedicated connection link options, circuit-switched
connection options, packet switched connection options, Internet connection
options, choosing a WAN link connection), frame relay (basic frame relay
concepts, configuring a frame relay network)
· WLAN: wireless design models, topologies, and infrastructures, service sets
(base station, SSID distributed system, infrastructure, AD Hoc mode), WLAN
design modes (site-to-site connections, point-to point, point-to-multipoint),
wireless mesh networks, evolution of WLAN models.
· Network traffic: traffic flow (terminal/host traffic, client server traffic, peer to
peer traffic, server/server traffic, distributed computing traffic flow,
traffic flow in Voice over IP), traffic load (calculating theoretical traffic
load, estimating theoretical load by routing protocols, traffic behavior).
· Analysis and design tools: Wireshark and OPNET 2
Sam Halabi, Danny McPherson,
"Internet routing architectures" ,2nd Edition, CISCO press, ISBN
1-57870-233-X Analyst Study Guide" ,2010
The course is intending to
cover internet design principles, internet routing design, and internet
Recognize internet architecture
2. Stating internet and the
3. Explain about internet
and end-to-end arguments
4. Summarizing modularity
and layering in a network architectures.
5. Exemplify internet
6. Describing of routing
7. Exemplify border gateway
8. Recognize tuning BGP capabilities.
9. Compare controlling
routing inside the autonomous system
10. Evaluate the interaction
of non BGP routers with BGP routers
11. Paraphrasing route
reflectors, and IGP expansions
12. Stating the different
protocols for the internet application layer
Compare different application layer protocols, MIME and SNTP
architecture of the Internet: introduction,
Internet and the layering principle, Internet and the end-to-end arguments
· Internet design principles: modularity,
integrated design, layering, modularity and layering in network
architectures, end-to-end arguments
· Interdomain routing basics: overview
of routing, border gateway protocol V4
· Internet routing design: tuning
BGP capabilities, redundancy, symmetry, and load balancing, controlling
routing inside the autonomous system, interaction of non BGP routers with BGP
routers, BGP policies
large-scale autonomous systems: route
reflectors, IGP expansions
application layer protocols: MIME, SNTP,
SMTP, SNTP, Telnet
Wireless Sensor Networks
-Ian F.kyildiz, and M.Can Vuran , Wireless sensor
-C. Poellabauer , Fundamentals of wireless sensor
networks. Theory and practice, 2010 Wiley.
1. Recognize sensors platforms.
2. State the features of wireless sensor networks
3. Describe wireless technologies for WSN
4. Explain the different applications of WSN
5. State different types of WSN.
6. State the current challenges for WSN.
7. State the research trends for WSN.
8. Describe Layers of the WSN Protocol stack.
9. Interpret CSMA technique
10. Describe MAC protocol
11. Describe SMAC protocol
12. Describe TRAMA protocol
13. Recognize routing mechanisms for Wireless sensor
14. Differentiate between Flat, Hierarchical, and
geographic routing protocols.
15. Differentiate between flooding and gossiping
16. Describe SPIN routing protocol.
17. Describe Leach routing protocol.
18. Describe Pegasis routing protocol.
19. Explain Geographic routing.
20. Differentiate between Greedy and Face routing.
21. Describe GPRS routing protocol.
22. State the features of operating systems for WSN
23. Describe the components of tinyOs
24. Describe the interfaces of tinyOs,
configurations, and wiring.
25. Describe the configurations of tinyOs.
26. Describe the wiring of tinyOs.
27. State challenges for time synchronization in WSN
28. Describe Global Positioning System
29. Describe NTP protocol
30. Describe TPSN protocol
31. State the general characteristics of IEEE
32. Describe the supported topologies of IEEE
33. Describe the physical layer of IEEE 802.15.4
34. Describe MAC layer of IEEE 802.15.4 standard.
35. State the challenges for localization algorithms
36. Differentiate between range-based, range free
37. Describe Time of arrival (TOA) ranging technique
38. Describe one way TOA technique
39. Describe two way TOA technique
40. Describe Received Signal Strength RSS technique.
the course content, text book(s), reference(s) and course plan.
-Sensor networks: sensor platforms, WSN architecture
and protocol stack, applications (military, environmental, health, home,
industrial), factors influencing WSN design (hardware constraints, fault
tolerance, scalability, power consumption, topology, transmission media)
-MAC protocols: challenges for MAC, CSMA, SMAC, and TRAMA.
-Network layer: challenges for routing, data centric
and flat architecture protocols (flooding, gossiping, SPIN), hierarchical (Leach,
Pegasis), geographic routing, energy efficient routing protocols.
-Location and positioning in wireless sensor
networks: greedy and face routing protocols.
-TinyOs concepts and programming: components,
interfaces, configurations, and wiring.
-Time synchronization in wireless sensor networks:
challenges for time synchronization, Network Time Protocol, Timing Sync
Protocol for WSN.
-IEEE 802.15.4 standard: general characteristics,
supported topologies, physical, and Mac layers overview.
-Localization: challenges, ranging techniques, range
based localization techniques, range free localization techniques.
Rajiv Ramaswani ,Kumar N. Sivarajan, Galen H. Sasaki, "Optical
Networks. A practical perspective" , Morgan Kauffman publishers, 3rd
Optical Fiber Communication, Gerd Keiser, Mc-Graw Hill, Last
edition.John R. Vacca, " Optical Networking. Best practices
Handbook" , John Wiley & Sons publisher, 2007.
The course covers underlying and fundamental light
characteristics concepts. And demonstrates components, types, and
communication of fiber optics which support modern wireless communication
systems and networks. Some of the basic knowledge of some networks
(SONET/SDH) has been described in this course. The focus for optical
networking fundamentals is on the physical layer of the network protocol
stack. The optical line terminal and optical line amplifier of WDM networks
is studied in this course.
1. describing light as an electromagnetic wave
2. describing the polarization of light wave
3. explain the interference effects on light wave
4. Explain the basic elements of optical fiber
5. Explain the fiber modes
6. Stating the basic operating principles of single
mode and multimode fibers.
7. Describe the different Transmission constraints
8. Compare between different types of propagation
9. Stating the difference between the couplers,
isolators and circulators
10. Explain the principle of operation of
multiplexers and filters
11. Stating the advantages and disadvantages of
12. Compare between the different types of optical
13. Explain the different components of digital
communication optical system
14. Explain the transmitters and detectors,
switches, wavelength converters.
15. Explain the switches and wavelength converters.
16. Describing the interaction between optical
components and IP
17. Explain light path routing solution,
18. Explain the OSPF enhancements
19. Stating the different types of IP links
20. Discriminate between the control channels, data
21. Explain the integrated optical networks
22. Recalling the modulation
23. Explain the subcarrier modulation and
24. Stating spectral efficiency
25. Explain the spectral efficiency
26. Explain the error detection and correction.
27. Explain the time division multiplexing,
28. Differentiate between the VCAT and LCAS,
29. Describe the SONET/SDH layers,
30. Explain the SONET frame structure,
31. Explain the SONET/SDH physical layer,
32. Discriminate the elements of a SONET/SDH
33. Explain the optical line terminal.
34. Distinguish between the different types of
optical line amplifiers.
35. Explain the Add/Drop multiplexers
36. Explain the cross-connects.
- Light Characteristics: light as an
electromagnetic wave, polarization, interference
- Fiber Optics: Modes, Transmission
constraints (fiber-optic cable modes, fiber optic glass, plastic
optical-fiber, fluid-filled fiber optics, transmitting light on a fiber,
light propagation in multimode fiber, single mode propagation)
- Fiber Optics Components: couplers,
isolators and circulators, multiplexers and filters, optical amplifiers,
transmitters, detectors, switches, wavelength converters.
- Optical networking fundamentals:
interaction between optical components and IP, light path routing solution,
OSPF enhancements/ IS-IS, IP links, control channels, data channels,
integrated optical networks
- Fiber Optics Communications:
modulation, subcarrier modulation and multiplexing, spectral efficiency,
demodulation, error detection and correction.
- SONET/SDH Networks: multiplexing,
VCAT and LCAS, SONET/SDH layers, SONET frame structure, SONET/SDH physical
layer, elements of a SONET/SDH infrastructure
- WDM Networks: optical line
terminal, optical line amplifiers, Add/Drop multiplexers, cross-connects.
Creation in IT
creation :entrepreneurship for the 21 century,jefrry A.Timmons and Stephen
foundation for the
study in investigation of
business; basic knowledge and
understanding of economic,
managerial theories of
enterprise creation and
development with a particular (but
not exclusive) focus
on the creation
of small nosiness; Theoretical and
policy frameworks for
the study of
entrepreneurship, defined as new venture creation and innovative
growth relating to different types of organizations.
elective, or selected elective
Students who successfully complete
this course will be able to:
1- Describe the role and skills of entrepreneur and
cultivate an entrepreneurial mindset.
2- Explain principles and dynamics of various functions of
business (e.g. marketing, accounting, operations and HRM) to create value
added product and services
3- Identify, asses and evaluate business opportunities and
construct a robust business plan
4- Describe the implications of various business ownership
and financial structures.
5- Describe the various venture capital opportunities
including (venture capitalist, angel investors, IPO in the stock market and
conventional lending instructions).
6- Describe the role of CIO and CKO within a business
· Introduction to the course content, text book(s),
reference(s) and course plan.
Characteristics Amidst Global Challenges
process & entrepreneurship development
· The Opportunity:
Creating, Shaping, Recognizing, Seizing
· Preparing for an
· Crafting the Business Plan
· Institutional infrastructure to promote
· Financing Entrepreneurial Ventures
· Obtaining Venture and
Emerging trends in Entrepreneurship
- Please ( Click here ) to download the Course Description.