Csc5113c May 2026

One student famously found a delayed SQL injection spread across 47 fragmented ICMP echo requests. The professor didn’t even know that was possible until the student presented it. "Don't trust the wire. Don't trust the endpoint. Don't trust your textbook." This isn't paranoia. It’s the course’s core thesis. The Internet was built on trust. Modern networks survive on verification.

My server was talking to the client. But so was something else . csc5113c

CSC5113C won’t just teach you how networks work. It will teach you how they fail . And in doing so, it will make you one of the rare engineers who can actually defend them. One student famously found a delayed SQL injection

You learn fast. You learn that sequence numbers without crypto are just polite suggestions. You learn that "congestion" is often just malice. And you learn that tcpdump is the difference between an A and a sleepless incomplete. Ask any CSC5113C alumnus about ~/lab4/attacks/ . They’ll go quiet. Don't trust the endpoint

CSC5113C does something crueler—and far more educational. It forces you to implement the protocols, then immediately break them.

There is a moment in every Computer Science graduate course where the textbook stops making sense and reality kicks in. For me, that moment came at 2:00 AM in the networking lab, watching Wireshark scroll by like the green code from The Matrix .

One week you’re coding a reliable data transfer protocol over UDP (think: TCP from scratch, but sadder). The next week, your lab partner is tasked with launching a selective ACK dropping attack against your implementation using Scapy.