Subject description - B4B32PKS

Summary of Study | Summary of Branches | All Subject Groups | All Subjects | List of Roles | Explanatory Notes               Instructions
B4B32PKS Computer and Communication Networks
Roles:PZ, PO Extent of teaching:2P + 2C
Department:13132 Language of teaching:CS
Guarantors:Boháč L. Completion:Z,ZK
Lecturers:Boháč L., Vaněk T. Credits:6
Tutors:Boháč L., Holeček J., Kocur Z., Pravda I., Vaněk T. Semester:L


The aim of the course is to familiarize students with current trends in the switched local networks and the key functions of routing protocols in IP networks. The second part of the course introduces students to concepts of ensuring the information security in the communication networks. An integral part of the course is also an explanation of the principles for ensuring the adequate quality of services in data networks and features of some file sharing application protocols. The course is aimed rather primarily practically then theoretically

Study targets:

The students will master a design of the small scale data networks including a basic security measures.

Course outlines:

1. Basic function of Ethernet switches, the technical implementations
of the switching MAC tables (CAM table and Hash function ), understanding the concept of the switched virtual LAN (VLAN)
2. Design of the switched Ethernet LAN, a special supporting protocols (like Spanning-tree) and providing the quality of services in Ethernet LANs
3. Architecture of routing and switching components in data networks. Optical switching and optical networks.
4. Routing algorithms and techniques (Dijkstra, Ford-Fulkerson, deflection routing, Fuzzy routing). Routing algorithms in data networks (vector, link state). Function of RIP routing protocol
5. Function of OSPF and BGP routing protocols
6. Integrated and differentiated model for ensuring quality of service in IP networks
7. The protocols for multicast registration and multicast routing (IGMP and PIM)
8. Security of data networks (IPsec, TLS / SSL), the normal types of attacks and actions against them
9. Methods and security protocols for data exchange in wireless WiFi
10. Authentication and authorization infrastructures (IEEE802.1x, RADIUS,
Kerberos, LDAP)
11. Security certificates and their usage (PKI, VPN)
12. Wide area networks based on technologies of Frame Relay and Multiprotocol Label Switching
13. Function of some useful file transfer and sharing protocols - FTP, TFTP, CIFS
14. Framework of the network management (SNMP, MIB)

Exercises outline:

1. Overview of the content of lessons, safety work in laboratory
2. Design with LAN switches - I. practical insight into
a LAN switching principle and viewing the content of the MAC table
3. Design with LAN switches - II. setting and verification
of STP function and its configuration, the basic level of LAN security
4. VLSM addressing of IP networks - examples of calculation
5. Design of IP routed network - I. network connection,
assignment of IP addresses to individual interfaces, setting of the static routing, network function verification (Ping, Traceroute)
6. Design of IP routed network - II. network connection,
assignment of IP addresses to individual interfaces, setting of RIP routing, verification of network function
7. Configuration of VPN network with IPsec protocol, verification of communication
8. Assesment
9. Design and verification of function of WiFi network - basic IEEE802.1x
analysis 10th Design of IP routed network - III. network connection, assignment of IP addresses to individual interfaces, setting of OSPF routing, verification of network function 11st Design of IP routed network - IV. network connection, assignment of IP addresses to individual interfaces, setting of BGP routing, verification of network function
12. Demonstration of network management functions based on SNMP protocol
13. Spare exercise
14. End of the semester, granting credits


- Tanenbaum, A.S.: Computer Networks, Prentice Hall PTR; 4 edition(August 19, 2002), ISBN: 978-0130661029 - Kurose, J.F., Ross, K.W.: Computer Networking: A Top-Down Approach Featuring the Internet (3rd Edition), ISBN: 978-0321227355 - DOYLE, Jeff, DEHAVEN, Jennifer. Routing TCP/IP. [s.l.] : [s.n.], 2001. 945 s. - SEIFERT, Rich. The Switch Book : The Complete Guide to LAN Switching technology. [s.l.] : [s.n.], 2000. 698 s. ISBN 0-471-34586-5. - SPURGEON, Charles E. Ethernet : The Definitive guide. [s.l.] : [s.n.], 2000. 498 s. ISBN 1-56592-660-9.


Students have to successfully elaborate practical exercises and individual netowking project. The subject will be evaluated as 30 % laboratory exercises, 30 % individual project and 40 % theory examination.


data netorks, routing, switching, security, wireless netoworks, WIFI, WAN, LAN

Subject is included into these academic programs:

Program Branch Role Recommended semester
BPOI2_2016 Internet of Things PO 4
BPOI2_2018 Internet of Things PZ 4

Page updated 23.4.2024 17:51:08, semester: Z/2024-5, Z,L/2023-4, Send comments about the content to the Administrators of the Academic Programs Proposal and Realization: I. Halaška (K336), J. Novák (K336)