• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

11/20- Network Protocols

Overview

Networks represent a large portion of our digital infrastructure; nearly every application and device relies on the network, and most organizations require access to resources on the Internet.  In this course, will look at networks and telecommunications in two sections.  We begin in this unit exploring the various protocols and standards used in networking, and why they are important.  In the next section, we will look at methods of securing our network infrastructure.

We will review physical and logical network topologies and devices common in local area and wide area networks, including routers, switches, telecom devices, and various network services.

This week’s topics:

  • ISO OSI
  • TCP/IP
  • Topologies and Cabling
  • Routing / Switching
  • Wired and Wireless Network Technologies

 

In this unit, plan to:

  • Read: pages 431-458 in the Network Security text
  • Read: pages 381-405 in the Security Essentials text
  • Complete: this week’s written assignment
  • Complete: this week’s practical assignments
  • Participate: in the weekly discussion forum

Written Assignment

Practical Assignment

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in