Computer Networks 2
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
01SITE2 | Z | 2 | 1+1 | Czech |
- Course guarantor:
- Miroslav Minárik
- Lecturer:
- Tutor:
- Miroslav Minárik
- Supervisor:
- Department of Mathematics
- Synopsis:
-
Understanding the history and present network (LAN, WAN, use the principles and technologies). Architecture of reference model ISO/OSI. Network protocols, practical exercises with TCP/IP communications. Internet services - mail, remote access, www. Secure communication, tunneling.
Directory services, certificates, certification authorities, public key infrastructure (PKI). Use in practice. Network security - firewalls (packet filters, proxies, gateways, NAT, DMZ), practical exercises.
(According to the interest - the serial control lines, modems)
- Requirements:
-
Programming basics and Algorithmization (in the extent of the courses ZPRO, ZALG held at the FNSPE
CTU in Prague).
- Syllabus of lectures:
-
6th Network and computer security (firewalls: packet filter, proxies, gateways, NAT), virtual private network
7th Directory services, identify real world entities, ASN1, LDAP, LDIF
8th Certificates, CA, public key infrastructure
9th Electronic Signature
- Syllabus of tutorials:
-
5th Access to the directory service, LDAP LDIF
6th Simple CA based on OpenSSL
7th Encryption, digital signature (the Java JCE)
8th Interconnection networks, routing, firewall (filtering, NAT)
- Study Objective:
-
Knowledge: use of secure channels, principles of electronic mail, directory services and their use, public key infrastructure, firewall principles.
Skills: Build a secure transmission channel, work with certificates, basic routing and firewall settings.
- Study materials:
-
Key references:
[1] Scott Oaks, Java security, O'Reilly, 2001
Recommended references:
[3] William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, "Firewalls and Internet security: repelling the wily hacker?, ADDISON-WESLEY, 2003
[4] Gert De Laet, Gert Schauwers, "Network security fundamentals?, Cisco Press, 2004
[5] William Stallings, "Cryptography and Network Security: Principles and Practice?, Prentice Hall, 2006
Internet:
[7] standardy "RequestForComments? (http://www.ietf.org/)
Media and tools:
Computer training room with Windows/Linux and programming languages Java, C, C++, Pascal.
- Note:
- Time-table for winter semester 2024/2025:
- Time-table is not available yet
- Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Fyzikální inženýrství - Počítačová fyzika (elective course)
- Aplikace informatiky v přírodních vědách (elective course)
- Aplikovaná informatika (compulsory course in the program)
- Matematické inženýrství - Matematická informatika (elective course)
- Physical Engineering - Computational physics (elective course)