وصف البرنامج
هذا برنامج درجة الماجستير تخصص شبكات الحاسوب مناسب للخريجين الذين يرغبون في متابعة دراستهم في شبكات الكمبيوتر والحوسبة السحابية والذين لديهم خلفية كافية في أي برنامج بكالوريوس متعلق بالحوسبة. سيسمح هذا التخصص للطلاب باكتساب المعرفة والخبرة المطلوبة لتقييم وتصميم وبناء شبكات الكمبيوتر الآمنة ومراكز البيانات والشبكات القائمة على الحوسبة السحابية. القدرة على إجراء تحليل أداء لتقنيات الشبكات المختلفة وأنظمة مراكز البيانات والعمليات والبروتوكولات. ويغطي نظرية وممارسة تصميم وبناء أنظمة شبكات فعالة بما في ذلك جودة الخدمة وبروتوكولات التوجيه المناسبة وتقنيات التبديل. يتم تضمين مواد اختيارية في المنهج مثل إدارة الشبكة والوسائط المتعددة وإدارة الأمن والسياسات الامنية للشبكات لجعل هذا البرنامج أكثر تقدمًا. بالإضافة إلى ذلك ، يمنح برنامج الماجستير هذا للطلاب خبرة عملية كافية مع التقنيات ومجموعات الأدوات لبناء أنظمة الشبكات القائمة على الإنترنت.
أهداف البرنامج
مخرجات البرنامج
بعد الانتهاء بنجاح من البرنامج ، سيتمكن الطلاب من:
المؤهل العلمي الذي يتحصل عليه الطالب
ماجستير في تقنية المعلومات في شبكات الحاسوب
متطلبات الالتحاق بالبرنامج
- ان يكون المتقدم حاصل على بكالوريوس في تقنية المعلومات تخصص شبكات أو هندسة الحاسوب او الاتصالات أو علوم الكمبيوتر من برنامج معترف به من مركز ضمان الجودة في المستوى الجامعي
- اجتياز الامتحان التحريرى بنجاح
- اجتياز امتحان المقابلة بنجاح
الخطة الدراسية
يؤهل برنامج ماجستير في الشبكات الطالب للحصول على درجة ماجستير في الشبكات من خلال العديد من المقررات الدراسية التى وضعت بعناية لتغطي الجوانب المختلفة في هذا التخصص.
يمتد البرنامج على مدى 4 فصول دراسية يدرس خلالها الطالب 30 وحدة دراسية منها 3 وحدة عامة، و 12 وحدة الزامية. كما يدرس عدد 6 وحدة إختيارية من قائمة المقررات الاختيارية المقترحة. بالإضافة الى مشروع تخرج في مجال تخصصه
الخطة الدراسية للبرنامج الدارسي موضحة على الفصول الدراسية التالية:
الفصل الاول
الرمز | اسم المقرر | الوحدات | نوع المقرر | الاسبقيات |
---|
ITNT511 | طرق البحث | 03 | إجباري | + |
This course introduces students to the issues, concepts, methods and techniques associated with science and technology research in general and those most commonly used for research in information technology and management. On successful completion of this course, students should be able to: Recognize and explain the main research methodologies used in information technology research, Choose the appropriate research methodology, Describe the most common data collection and analysis methods used in information systems research, Explain the ethical and professional issues that may arise in research, Communicate both orally and in writing, and describe the professional environment and different kinds of roles in which information technology research is conducted.
ITNT513 | بروتكول التوجيه المتقدم وهندسة النقل | 03 | إجباري | + |
The course should provide extended theoretical and practical knowledge of advanced routing. The main part of the course concerns the configuration, function, and use of various types of routing protocol.
ITNT515 | تطبيقات المتحسسات اللاسلكية | 03 | إجباري | + |
Wireless sensor networks are deployed in high densities in order to obtain detailed information about the operational environment. Applications range from environmental monitoring and seismic studies to mobile target tracking, military surveillance, and scientific exploration. Wireless sensor networks are expected to dominate every aspect of our lives in the near future. This course presents the fundamentals regarding the hardware and software of wireless sensor networks.
الفصل الثاني
الرمز | اسم المقرر | الوحدات | نوع المقرر | الاسبقيات |
---|
ITNT522 | الحوسبة السحابية وتصميم مراكز البيانات | 03 | إجباري | + |
Cloud Computing is an important new paradigm in the area of Information Technology that currently provides a common basis for a new wave of technology development such as Big Data and in pushing further the mobility-based pervasive computing concept. Cloud Computing embodies advances in computing, networking, and storage technologies which individually and collectively include major hardware and software breakthroughs. These include computer virtualization, distributed and replicated storage, and software based networking. In its own turn, Cloud Computing motivates further technology advancement and changes how the modern IT infrastructure is built and evolves. There is a growing demand for specialists with strong technical background and deep knowledge of the Cloud Computing technologies.
ITNT524 | جودة الخدمة وتقييم الآداء | 03 | إجباري | + |
This course addresses the topics of Quality of Service (QoS) and performance evaluation of computer networks efficiency in networks. In the QoS part, the course outlines all basic concepts of QoS of computer networks such as models, protocols, marking and classification techniques. In the performance part the course aims to introduce fundamental concepts of performance evaluation of computer systems and networks. Then, the course continues with some fundamental performance analysis techniques including methods for performance measurement, performance metrics, monitoring, experimental design, and system modeling. Other topics include: comparing two or more systems; system tuning; performance bottleneck identification; characterizing the load on the system (workload characterization); determining the number and size of components (capacity planning); predicting the performance at future loads (forecasting); queuing theory, mean value analysis, and modelling. The course concludes with applications of the learned concepts to measure the performances of computer systems like communication networks.
الفصل الرابع
الرمز | اسم المقرر | الوحدات | نوع المقرر | الاسبقيات |
---|
ITNT600 | رسالة الماجستير | 03 | إجباري | + |
Dissertation combines the educational theory and practice to create a learning experience that enables the development of skills that can be applied to complicated real-world problems. The dissertation project module commences with a research methods training component during which students will be given instruction and guidance on the planning and organization of their work. During the course of the research methods training students will also be expected to start formulating their project. The project itself, will be individually or jointly supervised as soon as the committee approves the proposal. There is an interim assessment point during the course of the project where students submit their project specification and design. At the end of the project students are expected to submit a dissertation describing their project.
المقررات الاختيارية
الرمز | اسم المقرر | الوحدات | نوع المقرر | الاسبقيات |
---|
ITNT501 | شبكات النطاق العريض والشبكات البصرية | 03 | إختياري | + |
This is an advanced course focused on the principles of operation, architectures, protocol design and performance management techniques for integrated broadband computer networks designed to support multimedia transport and services. The course covers a wide range of emerging technologies used in high speed local, metropolitan and wide area networks, including Gigabit ETHERNETS, FDDI, Frame Relay and ATM. Several switching architectures are presented and their performances analyzed and compared. Traffic-related management strategies including call-setup procedures, congestion and flow control, admission control, traffic shaping, policing, resource allocation and other QoS-related issues are carefully described and analyzed. The course will also introduce several broadband multimedia applications including IP multicasting and present a host of multicast routing procedures. Ultra-broadband Optical Networking technologies, including SONET and DWDM along with Optical Switching architectures will be discussed. In addition, several topics in Wireless Networks are treated with some detail including WLANs, Bluetooth, Mobile IP, WAP and wireless access to the Internet.
ITNT502 | السياسة الأمنية وادارة المخاطر | 03 | إختياري | + |
This course discusses how to implement security policies to support organizational goals. It provides students with an introduction to information security policies, discuss the entire lifecycle of policy creation and enactment and presents students with issue specific policies in different domains of security. The course also discusses disaster recovery methodologies for identifying, quantifying, mitigating, and controlling security risks. Students learn to write IT risk management plans, standards, and procedures that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data, and user access
ITNT503 | ادارة الشبكات | 03 | إختياري | + |
The course will provide information to students on how to install, maintain, and manage networks, and explain the principles of network management, different standards and protocols used in managing networks. The course will also provide the Automation of network management operations and making use of readily available network management systems.
ITNT504 | مواضيع مختارة | 03 | إختياري | + |
The primary objective of this course is to expose graduate students to the exciting new research topics in networking. The secondary objective is to motivate graduate students to take up research work in the new and exciting areas in networking.The course deals with advanced networking topics. The state of the current Internet; new applications and their impact on the Internet; Sensors and the Internet; mobile ad hoc networking, disruption-tolerant networking and opportunistic networking. This course consists of lectures, discussions, debates, seminars and project presentations.
ITNT505 | أمن النظم والشبكات | 03 | إختياري | + |
The course begins with a study of classical cryptosystems and the methods used to break them. The major currently used systems, DES, AES and RSA, are then introduced and examined from a design and security perspective. It then reviews how these tools are utilized in the Internet protocols and applications such as SSL/TLS, IPSEC, Kerberos, PGP and others including wireless. They will learn how to identify network security threats.System security issues are also covered, such as viruses, intrusion and firewalls. The design, implementation and configuration of system security for operating systems, databases and servers with attention given to defense and prevention systems, intrusion detection systems and trace-back systems. They will also learn how to select and deploy firewalls and manage VPNs.This module provides students with a solid theoretical and practical foundation for building secure distributed systems. Students will discover how to protect systems against malicious attacks, using technologies (both hardware and software) such as: cryptology, software reliability, VPN, IDS and IPS.
ITNT506 | شبكات الوسائط المتعددة المتقدمة | 03 | إختياري | + |
Multimedia networking is an important area in networking. This course explores recent advances in multimedia networking technologies. Major topics include multimedia compression and standards such as JPEG and MPEG, Internet multimedia applications such VoIP and IPTV, multimedia transport over wire and wireless networks, multimedia protocols such as SIP, RTP, RTCP, RTSP, and RSVP, multicasting of multimedia data, and network systems support for multimedia and performance analysis.