440-6013/02 – Selected Issues of Network Technologies (VPST)
Gurantor department | Department of Telecommunications | Credits | 10 |
Subject guarantor | prof. Ing. Miroslav Vozňák, Ph.D. | Subject version guarantor | prof. Ing. Miroslav Vozňák, Ph.D. |
Study level | postgraduate | Requirement | Choice-compulsory type B |
Year | | Semester | winter + summer |
| | Study language | English |
Year of introduction | 2019/2020 | Year of cancellation | |
Intended for the faculties | HGF, FEI | Intended for study types | Doctoral |
Subject aims expressed by acquired skills and competences
The aim of the course is to acquaint students with selected hot topics of networks in field of routing and security. The first domain consists of overview of modern routing protocols, routing in MANET (Mobile ad-hoc) networks and new opportunities in SDN (Software-defined networks). The second one is focused on security issues, anomaly detection, standard modern cryptography approach and promising QKD (Quantum key distribution). Upon completion of this course, students should be able to design, implement and solve selected tasks in domains of routing and security of networks.
Teaching methods
Lectures
Summary
The course deals with three main domains. The first one is devoted to Ad-hoc networks, especially routing algorithms and techniques in dynamically changing the topology of nodes. The second is focused on software-defined networks and the detection of anomalies in traffic. The last domain deals with approaches to conventional cryptography based on computational complexity and also to future cryptography based on keys' distribution using principles of quantum mechanics.
Compulsory literature:
Recommended literature:
[1] Gamal, A.E., Kim, Y.-H. Network information theory (2011) Network Information Theory, Cambridge University Press.
[2] Mehic M. et al. Quantum Key Distribution: A Networking Perspective (2020) ACM Computing Surveys, vol. 53, No. 5, art. 96. DOI:10.1145/3402192.
[3] Barakabitze A., Hines A. Multimedia streaming in SDN/NFV and 5G networks: Machine learning for managing big data streaming (2022) Wiley - IEEE press, pp. 1 - 240. DOI: 10.1002/9781119800828
[4] Niemiec M., Mehic M., Voznak M. Risk assessment approach to estimate security of cryptographic keys in quantum cryptography (2020) Lecture Notes in Electrical Engineering, 554, pp. 114-124. DOI: 10.1007/978-3-030-14907-9_12
Way of continuous check of knowledge in the course of semester
Continuous evaluation of submitted projects.
E-learning
Other requirements
There are not defined other requirements for the student.
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
The subject is focused on:
a) Routing network protocols
b) Mobile ad-hoc networks and their modelling
c) Software-defined networks
d) Anomaly detection, Intrusion detection systems
e) Conventiona cryptography - symmnetric, asymmetric, el. signatures and hash functions
f) Cryptography using laws of qauntum mechanics for the keys' distribution
Upon completion of this course, students should be able to design, implement and solve selected tasks in domains of routing and security of networks.
Conditions for subject completion
Occurrence in study plans
Occurrence in special blocks
Assessment of instruction
Předmět neobsahuje žádné hodnocení.