440-6013/01 – Selected Issues of Network Technologies (VPST)

Gurantor departmentDepartment of TelecommunicationsCredits10
Subject guarantorprof. Ing. Miroslav Vozňák, Ph.D.Subject version guarantorprof. Ing. Miroslav Vozňák, Ph.D.
Study levelpostgraduateRequirementChoice-compulsory type B
YearSemesterwinter + summer
Study languageCzech
Year of introduction2019/2020Year of cancellation
Intended for the facultiesFEIIntended for study typesDoctoral
Instruction secured by
LoginNameTuitorTeacher giving lectures
VOZ29 prof. Ing. Miroslav Vozňák, Ph.D.
Extent of instruction for forms of study
Form of studyWay of compl.Extent
Full-time Examination 30+0
Part-time Examination 30+0

Subject aims expressed by acquired skills and competences

The aim of the course is to acquaint students with selected hot topics of networks in field of routing and security. The first domain consists of overview of modern routing protocols, routing in MANET (Mobile ad-hoc) networks and new opportunities in SDN (Software-defined networks). The second one is focused on security issues, anomaly detection, standard modern cryptography approach and promising QKD (Quantum key distribution). Upon completion of this course, students should be able to design, implement and solve selected tasks in domains of routing and security of networks.

Teaching methods



The course deals with three main domains. The first one is devoted to Ad-hoc networks, especially routing algorithms and techniques in mobile and vehicular ad-hoc networks. The second is focuses on software-defined networks and detection of anomalies in networks. The last domain deals with approaches to the conventional cryptography based on computational complexity and also to the future cryptography based on keys' distribution using principles of quantum mechanics.

Compulsory literature:

[1] Schneier, B. Applied Cryptography: Protocols, Algorithms and Source Code in C, Wiley, 784 p., 2015. [2] Goransson, P. et al. Software Defined Networks, Second Edition: A Comprehensive Approach. Morgan Kaufmann; 2 edition, 436 p., 2016.

Recommended literature:

[1] Gamal, A.E., Kim, Y.-H. Network information theory (2011) Network Information Theory, Cambridge University Press [2] M. Mehic, O. Maurhart, S. Rass, M. Voznak, Implementation of quantum key distribution network simulation module in the network simulator NS-3, Quantum Information Processing, Vol. 16, No. 10, 23 p., 2017.

Way of continuous check of knowledge in the course of semester

Continuous evaluation of submitted projects.


Other requirements

There are not defined other requirements for the student.


Subject has no prerequisities.


Subject has no co-requisities.

Subject syllabus:

The subject is focused on: a) Routing network protocols b) Mobile ad-hoc networks and their modelling c) Software-defined networks d) Anomaly detection, Intrusion detection systems e) Conventiona cryptography - symmnetric, asymmetric, el. signatures and hash functions f) Cryptography using laws of qauntum mechanics for the keys' distribution

Conditions for subject completion

Full-time form (validity from: 2019/2020 Winter semester)
Task nameType of taskMax. number of points
(act. for subtasks)
Min. number of points
Examination Examination  
Mandatory attendence parzicipation:

Show history

Occurrence in study plans

Academic yearProgrammeField of studySpec.ZaměřeníFormStudy language Tut. centreYearWSType of duty
2020/2021 (P0714D060001) Communication Technology P Czech Ostrava Choice-compulsory type B study plan
2020/2021 (P0714D060001) Communication Technology K Czech Ostrava Choice-compulsory type B study plan
2019/2020 (P0714D060001) Communication Technology P Czech Ostrava Choice-compulsory type B study plan
2019/2020 (P0714D060001) Communication Technology K Czech Ostrava Choice-compulsory type B study plan

Occurrence in special blocks

Block nameAcademic yearForm of studyStudy language YearWSType of blockBlock owner