Communication Networks

Learning Outcomes

  1. define concept, architecture and organisation of communication networks
  2. explain how communication networks operate and their functionality
  3. apply knowledge about communication networks and protocols
  4. analyze protocol functions and services, as well as protocol stacks in order to select appropriate ones
  5. analyze organization of public and private networks based on IP protocol
  6. define secutity threats and available solutions in the Internet
  7. design network models including local area networks, Internet subnetworks and Internet access
  8. evaluate communication solutions based on TCP/IP protocol stack

Forms of Teaching

Lectures

Laboratory

Other

Week by Week Schedule

  1. Types and architectures of communication networks; Physical and logical organization of Internet, Communication network architecture and layered reference models (OSI and TCP/IP reference models)
  2. Transmission network technology, topology, organization, and standardization, Multiplexing techniques and multiple access
  3. Physical and MAC layers in local area networks (LANs), Multiple access , Media access control and logical link control, Ethernet standards
  4. Basic network components and architectures for switching and routingswitching, Routing protocols, Switching and routing in LANs; local networks interconnections
  5. Communication protocols, Network and transport layer protocols: case studies focused on Internet Protocol (IP), Transmission Control Protocol (TCP); And User Datagram Protocol (UDP)
  6. Communication protocols, Network and transport layer protocols: case studies focused on Internet Protocol (IP), Transmission Control Protocol (TCP); And User Datagram Protocol (UDP)
  7. Communication protocols, Network and transport layer protocols: case studies focused on Internet Protocol (IP), Transmission Control Protocol (TCP); And User Datagram Protocol (UDP)
  8. Midterm exam
  9. Communication protocols, Application layer protocols: case studies focused on Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), File Transfer Protocol (FTP), and Session Initiation Protocol (SIP)
  10. Communication protocols, Application layer protocols: case studies focused on Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), File Transfer Protocol (FTP), and Session Initiation Protocol (SIP)
  11. Communication protocols, Application layer protocols: case studies focused on Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), File Transfer Protocol (FTP), and Session Initiation Protocol (SIP)
  12. Security threats; Security requirements for networks and services; Security analysis; Protection measures; Security standards, organizations, and bodies; Relevant laws and recommendations, Cryptographic protection; Basic definitions and objectives: symmetric and asymmetric algorithms, hash functions, digital signature, and key management, Digital certificates; Public key infrastructure (PKI); PKI components and users, Operating system security; Vulnerabilities; Malware; Viruses, warms, trojans; Case studies focused on Windows and Unix operating systems, Protection of computers and networks; Types of threats and attacks (e.g., denial of service, spoofing, sniffing and traffic redirection, man-in-the-middle, message integrity attacks, routing attacks, and traffic analysis), levels of defense; Case studies focused on vulnerabilities of Internet protocols and applications; Protection methods on the network layer, TCP/IP protocol stack security: network and transport layer; Protocol vulnerabilities and attacks, Firewall: traffic filtering; Firewall architectures; Network address translation (NAT), Techniques and tools for vulnerability scaning; Intrusion detection systems; Host-based, network-based approaches, and hybrid approaches, Virtual private networks (VPNs): security protocols, design, and advantages and disadvantages of various models, Defense mechanisms and countermeasures (e.g., network monitoring, intrusion detection, firewalls, spoofing and DoS protection, honeypots, tracebacks), Operational network security management (e.g., configure network access control)
  13. Network signaling, Call processing, Service processing; Intelligent networks, Protocols in mobile networks
  14. IPv4 and IPv6 protocol suites; Mobile IP, Virtual LANs
  15. Final exam

Study Programmes

University undergraduate
Computing (study)
(4. semester)

Literature

(.), Osnovne arhitekture mreža, A. Bažant, G. Gledec, Ž. Ilić, G. Ježić, M. Kos, M. Kunštić, I. Lovrek, M. Matijašević, B. Mikac, V. Sinković,
(.), Computer Networks, Andrew S. Tanenbaum, David J. Wetherall,
(.), Computer Networking and the Internet, Fred Halsall,
(.), Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, Keith W. Ross,
(.), Computer Networks: A Systems Approach, Larry L. Peterson, Bruce S. Davie,

General

ID 183420
  Summer semester
6 ECTS
L3 English Level
L1 e-Learning
60 Lectures
0 Exercises
16 Laboratory exercises
0 Project laboratory