440-6013/01 – Selected Issues of Network Technologies (VPST)
Gurantor department | Department of Telecommunications | Credits | 10 |
Subject guarantor | prof. Ing. Miroslav Vozňák, Ph.D. | Subject version guarantor | prof. Ing. Miroslav Vozňák, Ph.D. |
Study level | postgraduate | Requirement | Choice-compulsory type B |
Year | | Semester | winter + summer |
| | Study language | Czech |
Year of introduction | 2019/2020 | Year of cancellation | |
Intended for the faculties | FEI | Intended for study types | Doctoral |
Subject aims expressed by acquired skills and competences
The aim of the course is to acquaint students with selected hot topics of networks in field of routing and security. The first domain consists of overview of modern routing protocols, routing in MANET (Mobile ad-hoc) networks and new opportunities in SDN (Software-defined networks).
The second one is focused on security issues, anomaly detection, standard modern cryptography approach and promising QKD (Quantum key distribution).
Upon completion of this course, students should be able to design, implement and solve selected tasks in domains of routing and security of networks.
Teaching methods
Lectures
Summary
The course deals with three main domains. The first one is devoted to Ad-hoc
networks, especially routing algorithms and techniques in mobile and
vehicular ad-hoc networks. The second is focuses on software-defined
networks and detection of anomalies in networks. The last domain deals with
approaches to the conventional cryptography based on computational
complexity and also to the future cryptography based on keys' distribution
using principles of quantum mechanics.
Compulsory literature:
[1] Schneier, B. Applied Cryptography: Protocols, Algorithms and Source Code in C, Wiley, 784 p., 2015.
[2] Goransson, P. et al. Software Defined Networks, Second Edition: A Comprehensive Approach. Morgan Kaufmann; 2 edition, 436 p., 2016.
Recommended literature:
[1] Gamal, A.E., Kim, Y.-H. Network information theory (2011) Network Information Theory, Cambridge University Press
[2] M. Mehic, O. Maurhart, S. Rass, M. Voznak, Implementation of quantum key distribution network simulation module in the network simulator NS-3, Quantum Information Processing, Vol. 16, No. 10, 23 p., 2017.
Way of continuous check of knowledge in the course of semester
Continuous evaluation of submitted projects.
E-learning
Other requirements
There are not defined other requirements for the student.
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
The subject is focused on:
a) Routing network protocols
b) Mobile ad-hoc networks and their modelling
c) Software-defined networks
d) Anomaly detection, Intrusion detection systems
e) Conventiona cryptography - symmnetric, asymmetric, el. signatures and hash functions
f) Cryptography using laws of qauntum mechanics for the keys' distribution
Conditions for subject completion
Occurrence in study plans
Occurrence in special blocks