Computer Networks 1
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
01SITE1 | Z | 2 | 1+1 | Czech |
- Course guarantor:
- Miroslav Minárik
- Lecturer:
- Miroslav Minárik
- Tutor:
- Miroslav Minárik
- Supervisor:
- Department of Mathematics
- Synopsis:
-
Understanding the history and present network (LAN, WAN, use the principles and technologies). Architecture of reference model ISO/OSI. Network protocols, practical exercises with TCP/IP communications. Internet services - mail, remote access, www. Secure communication, tunneling.
Directory services, certificates, certification authorities, public key infrastructure (PKI). Use in practice. Network security - firewalls (packet filters, proxies, gateways, NAT, DMZ), practical exercises.
(According to the interest - the serial control lines, modems)
- Requirements:
-
Programming basics and Algorithmization (in the extent of the courses ZPRO, ZALG held at the FNSPE
CTU in Prague).
- Syllabus of lectures:
-
1st Past and present of computer networks. Topology, used principles and technologies.
2nd The reference model ISO/OSI
3rd Network protocols, TCP/IP communication
4th Internet services. Remote access, electronic mail (formats, transmission, access to the mailbox)
5th Security of services, tunneling
- Syllabus of tutorials:
-
1st Access to e-mail, formatting and transmission
2nd Secure encrypted communication channel, tunneling
3rd TCP / IP communication (option C, C + +, Java, etc.)
4th Remote access (telnet, ssh, XWindows, Remote Desktop, VNC)
- Study Objective:
-
Knowledge: use of secure channels, principles of electronic mail, directory services and their use, public key infrastructure, firewall principles.
Skills: Build a secure transmission channel, work with certificates, basic routing and firewall settings.
- Study materials:
-
Key references:
[1] Scott Oaks, Java security, O'Reilly, 2001
Recommended references:
[3] William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, "Firewalls and Internet security: repelling the wily hacker?, ADDISON-WESLEY, 2003
[4] Gert De Laet, Gert Schauwers, "Network security fundamentals?, Cisco Press, 2004
[5] William Stallings, "Cryptography and Network Security: Principles and Practice?, Prentice Hall, 2006
Interneto:
[7] standardy "RequestForComments? (http://www.ietf.org/)
Media and tools:
Computer training room with Windows/Linux and programming languages Java, C, C++, Pascal.
- Note:
- Time-table for winter semester 2024/2025:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Wed Thu Fri - Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Fyzikální inženýrství - Počítačová fyzika (elective course)
- Aplikace informatiky v přírodních vědách (elective course)
- Aplikovaná informatika (compulsory course in the program)
- Matematické inženýrství - Matematická informatika (elective course)
- Physical Engineering - Computational physics (elective course)