63716 Communications Protocols and Network Security

63716 Communications Protocols and Network Security

  • Study programme and level: Interdisciplinary University Study Programme in Administrative Information Science - 1st Cycle
  • 6 ECTS
  • Course type: Elective
  • Lectures: 45
  • Tutorial: 30
  • Individual work: 105
  • Lecturer: Andrej Brodnik, PhD


1. Objectives and competences

Students already learnt about basic concepts of computer communications and operating systems. In this course they will we will learn more details about some more important protocols and in the second half get more familiar with basic methods and techniques for protecting of computer and general information systems.
The goal of the project is to acquire practical knowledge. The theoretical background is presented only in the necessary amount.

2. Content

  • Introduction and basics of TCP/IP
  • Protocols of a network layer
    • MPLS, mobile IP
    • multicasting
  • Protocols of an application layer
    • Boot-strap protocols (DHCP, BOOTP)
    • E-mail protocols (SMTP, IMAP, POP, MIME)
    • Multimedia protocols (RTP, RSVP, QoS)
    • Network management protocols (SNMP)
  • General introduction in network security
    • Introduction into cryptography, public and private keys,
    • Symmetric and asymmetric cryptography, digests
    • Modes of operation, e.g. CBC, triple DES, OFB, CFB, CTR, and their derivatives
  • Authentication, passwords and their privacy, authentication protocols and attacks on them
  • Secret key distribution, Kerberos
    • Details of Kerberos and analysis
  • Public key distribution and PKI
    • Analysis of PKI models
  • Survey and analysis of various standards
    • E.g. SSL, IPsec
    • Some details of cryptographic algorithms (e.g. Diffie-Hellman, RSA)
  • E-mail, attacks on it and its protection

3. Readings

  • RFC standards.
  • Douglas E. Comer, Internetworking with TCP/IP, vol.1. Prentice Hall.
  • M. Subramanian: Network Management: An introduction to principles and practice, Addison Wesley Longman.
  • A. Farrel, The Internet and Its Protocols: A Comparative Approach, Morgan Kaufmann.
  • E. Cole, Network Security Bible, Wiley.
  • C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall.
  • Andrew S. Tanenbaum, Computer Networks. Prentice Hall.
  • J. F. Kurose, K. W. Ross: Computer Networking, Addison‐Wesley.
  • Adrian Farrel: The Internet and Its Protocols: A Comparative Approach, Morgan Kaufmann.

4. Intended learning outcomes

Knowledge and understanding:

  • Student understands how particular protocols operate and is capable to generalize to other protocols. (S)he is familiar with basic problems of system and network security and the methods of its protection.


  • Student is capable to manage and use particular protocols, and to maintain basic security in the system.


  • Capable to recognize and understand the conversion of a practical problem into an engineering pattern.

Transferable skills:

  • Theoretical basic skills for the engineering approach in solving of practical problems appearing in systems.

5. Learning and teaching methods

Lectures, exercises, assignments (homeworks), seminars, consultations, laboratory work.

6. Assessment

Grading: 6-10 pass, 1-5 fail.

  • two midterms: each at least 40% and average at least 50%; or
  • final exam: at least 50%
  • two seminar / laboratory works: each at least 20% and average at least 40%
  • four assignments: each assignment at least 20% and average at least 40%
  • notes from lectures or exercises