Course detail

Projecting, Administration and Security of Computer Networks

FEKT-LNSBAcad. year: 2018/2019

Modern civilization depends on a correct functioning of computer networks. Significant attention must therefore be paid to the security and design of these networks. On completing the course, students will have a thorough overview of the functioning, security and design of computer networks. Lectures are mainly dedicated to explaining the protocols in particular computer network layers, the principles of securing computer networks, and the design of computer networks. Laboratory exercises are dedicated to the administration and security of linux servers.

Language of instruction

Czech

Number of ECTS credits

5

Mode of study

Not applicable.

Learning outcomes of the course unit

A student who completes the course will be able to:
• explain the applications of cryptography in computer networks,
• explain the way computer networks in the physical layer function and are secured,
• explain the way computer networks in the link layer function and are secured,
• explain the way computer networks in the network layer function and are secured,
• explain the way computer networks in the transport layer function and are secured,
• explain the way computer networks in the application layer function and are secured,
• explain the general methodology of computer network design,
• deal with the administration and security of linux servers.

Prerequisites

No special knowledge is required.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Techning methods include lectures and computer laboratories. Course is taking advantage of e-learning system

Assesment methods and criteria linked to learning outcomes

10 points can be obtained for fulfilling the tasks in laboratory exercises and 90 points can be obtained for the examination. The examination is a written one and it is to check whether the student is able to explain the functioning and security of computer networks in different layers of the RM-OSI model.

Course curriculum

1. Cryptography in computer networks.
2. Physical layer and its protection.
3. Link layer and its protection.
4. Network layer and its protection – protocols.
5. Network layer and its protection – routing.
6. Transport layer and its protection.
7. Application layer and its protection.
8. WLAN networks.
9. Protection of LAN networks.
10. Network security.
11. Design of the WAN network.
12. IPv6 protocol.
13. Prospective evolutionary trends.

Work placements

Not applicable.

Aims

The goal of the course is to provide students with a good insight into the branch of designing and securing computer networks and their functioning.

Specification of controlled education, way of implementation and compensation for absences

Attendance at Laboratory exercises is obligatory.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

BURDA, K. Návrh, správa a bezpečnost počítačových sítí. Brno: VUT v Brně, 2014. s. 1-171.
Dostálek, L. - Kabelová, A.: Velký průvodce protokoly TCP/IP. Computer Press, Brno 2005.
Graham, S. - Shah, S.: Administrace systému Linux. Grada, Praha 2003.

Recommended reading

Kállay, F. - Peniak, P.: Počítačové sítě a jejich aplikace. Grada, Praha 2003.

Classification of course in study plans

  • Programme EEKR-ML Master's

    branch ML-EST , 2 year of study, summer semester, elective interdisciplinary
    branch ML-TIT , 2 year of study, summer semester, elective specialised

  • Programme EEKR-ML Master's

    branch ML-TIT , 1 year of study, summer semester, elective specialised
    branch ML-EST , 1 year of study, summer semester, elective interdisciplinary

  • Programme EEKR-CZV lifelong learning

    branch EE-FLE , 1 year of study, summer semester, elective specialised

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

1. Basic elements of computer networks (network cards, hubs, switches, routers).
2. The structure of computer networks.
3. The design of computer networks.
4. Transmission protocols and their security - IEEE 802.3, TCP/IP.
5. Transmission protocols and their security - IPv6, IPSec, SSL.
6. Transmission protocols and their security - WAP.
7. Administration of linux systems.
8. Security of linux systems.
9. Configuration of network elements.
10.Configuration of network services.
11.The security of network services.
12.Firewalls and communication blocking.
13.Monitoring of network elements and traffics.

Laboratory exercise

26 hod., compulsory

Teacher / Lecturer

Syllabus

Laboratory exercises
1. Installation and management of the single-user system.
2. Installation of programs and users.
3. Security settings of the single-user system.
4. Settings of the graphic interface.
5. Installation and management of the server.
6. Security settings of the server.
7. Settings of DNS and FTP services.
8. Settings of email services and web servers.
9. Settings of the SELinux and GRSecurity.
10. Settings of the NFS and PAX.
11. Settings of LDAP and Kerberos.
12. Network monitoring.
13. Final exercise.