Communication Networks

Learning Outcomes

  1. define concept, architecture and organisation of communication networks
  2. explain how communication networks operate and their functionality
  3. apply knowledge about communication networks and protocols
  4. analyze protocol functions and services, as well as protocol stacks in order to select appropriate ones
  5. analyze organization of public and private networks based on IP protocol
  6. define secutity threats and available solutions in the Internet
  7. design network models including local area networks, Internet subnetworks and Internet access
  8. evaluate communication solutions based on TCP/IP protocol stack

Forms of Teaching

Lectures

Lectures according to the schedule.

Laboratory

Laboratory assignments according to the schedule shown at the introductory lecture. The lab consists of 3 cycles, of 5 hours each, which include individual preparatory study, entry quiz, performing the assignment in the lab, and written examination.

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 20 % 15 % 20 % 15 %
Homeworks 0 % 10 % 0 % 10 %
Class participation 0 % 15 % 0 % 15 %
Mid Term Exam: Written 0 % 30 % 0 %
Final Exam: Written 0 % 30 %
Exam: Written 0 % 60 %

Week by Week Schedule

  1. Types and architectures of communication networks; Physical and logical organization of Internet, Communication network architecture and layered reference models (OSI and TCP/IP)
  2. Transmission network technology, topology, organization, and standardization, Multiplexing techniques and multiple access
  3. Physical and MAC layers in local area networks (LANs), Multiple access, Media access control and logical link control. Example: 802.3/Ethernet.
  4. Basic network components and architectures for switching and routing, Routing protocols, Switching and routing in LANs; local networks interconnection
  5. Communication protocols, Network and transport layer protocols: case studies focused on Internet Protocol (IP), Transmission Control Protocol (TCP); And User Datagram Protocol (UDP)
  6. Communication protocols, Network and transport layer protocols: case studies focused on Internet Protocol (IP), Transmission Control Protocol (TCP); And User Datagram Protocol (UDP)
  7. Communication protocols, Network and transport layer protocols: case studies focused on Internet Protocol (IP), Transmission Control Protocol (TCP); And User Datagram Protocol (UDP)
  8. Midterm exam
  9. Communication protocols, Application layer protocols: case studies focused on Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), File Transfer Protocol (FTP), Telnet
  10. Communication protocols, Application layer protocols: case studies focused on Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), File Transfer Protocol (FTP), Telnet
  11. Communication protocols, Application layer protocols: case studies focused on Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), File Transfer Protocol (FTP), Telnet
  12. Fundamentals of network security, types of threats and attacks in networked environments. Cryptographic protection: symetric and asymetric algorithms, hash functions, digital signature, key management. Digital certificates. Public key infrastructure (PKI). Protection of computers and networks. Case studies focused on vulnerabilities of fundamental Internet protocols and applications. Protection methods at the network- and upper layers.
  13. Fundamentals of network security, types of threats and attacks in networked environments. Cryptographic protection: symetric and asymetric algorithms, hash functions, digital signature, key management. Digital certificates. Public key infrastructure (PKI). Protection of computers and networks. Case studies focused on vulnerabilities of fundamental Internet protocols and applications. Protection methods at the network- and upper layers.
  14. Network interconnection in the Internet, example: academic and research network. Selected topics in Internet technologies.
  15. Final exam

Study Programmes

University undergraduate
Computer Engineering (module)
(6. semester)
Computer Science (module)
(6. semester)
Computing (study)
(4. semester)
Information Processing (module)
(6. semester)
Software Engineering and Information Systems (module)
(6. semester)
Telecommunication and Informatics (module)
(6. semester)

Literature

A. Bažant, G. Gledec, Ž. Ilić, G. Ježić, M. Kos, M. Kunštić, I. Lovrek, M. Matijašević, B. Mikac, V. Sinković (2014.), Osnovne arhitekture mreža, Element Zagreb
Andrew S. Tanenbaum, David J. Wetherall (2013.), Computer Networks, 5th ed., Pearson
Fred Halsall (2005.), Computer Networking and the Internet, Pearson Education
James F. Kurose, Keith W. Ross (2020.), Computer Networking: A Top-Down Approach, 8. ed., Pearson
Larry L. Peterson, Bruce S. Davie (2011.), Computer Networks, Elsevier

Associate Lecturers

Laboratory exercises

For students

General

ID 183420
  Summer semester
6 ECTS
L3 English Level
L2 e-Learning
60 Lectures
16 Laboratory exercises

Grading System

85 Excellent
70 Very Good
60 Good
50 Acceptable