|
|
Main menu for Browse IS/STAG
Course info
USII / FPSI
:
Course description
Department/Unit / Abbreviation
|
USII
/
FPSI
|
Academic Year
|
2022/2023
|
Academic Year
|
2022/2023
|
Title
|
Computer Networks I
|
Form of course completion
|
Examination
|
Form of course completion
|
Examination
|
Accredited / Credits
|
Yes,
5
Cred.
|
Type of completion
|
Combined
|
Type of completion
|
Combined
|
Time requirements
|
Lecture
3
[HRS/WEEK]
Tutorial
2
[HRS/WEEK]
|
Course credit prior to examination
|
Yes
|
Course credit prior to examination
|
Yes
|
Automatic acceptance of credit before examination
|
No
|
Included in study average
|
YES
|
Language of instruction
|
Czech
|
Occ/max
|
|
|
|
Automatic acceptance of credit before examination
|
No
|
Summer semester
|
0 / -
|
0 / -
|
0 / -
|
Included in study average
|
YES
|
Winter semester
|
8 / -
|
1 / -
|
0 / -
|
Repeated registration
|
NO
|
Repeated registration
|
NO
|
Timetable
|
Yes
|
Semester taught
|
Winter semester
|
Semester taught
|
Winter semester
|
Minimum (B + C) students
|
not determined
|
Optional course |
Yes
|
Optional course
|
Yes
|
Language of instruction
|
Czech
|
Internship duration
|
0
|
No. of hours of on-premise lessons |
|
Evaluation scale |
A|B|C|D|E|F |
Periodicity |
každý rok
|
Evaluation scale for credit before examination |
S|N |
Periodicita upřesnění |
|
Fundamental theoretical course |
No
|
Fundamental course |
Yes
|
Fundamental theoretical course |
No
|
Evaluation scale |
A|B|C|D|E|F |
Evaluation scale for credit before examination |
S|N |
Substituted course
|
USII/PPSI1
|
Preclusive courses
|
N/A
|
Prerequisite courses
|
N/A
|
Informally recommended courses
|
N/A
|
Courses depending on this Course
|
USII/PPSI2
|
Histogram of students' grades over the years:
Graphic PNG
,
XLS
|
Course objectives:
|
The aim of the course is to introduce the students to the key concepts in the data networks area. It focuses on the communication theory, basic network types and communication protocols, computer and data network planning, linking and general network security, introduction to hardware technologies focusing on servers and network hardware.
|
Requirements on student
|
Assignment: successful submission and defence of all given tasks. Examination: written (at minimum 65 %) and oral. Detalied requirements for assignment and examination pass will be specified at the first lecture.
|
Content
|
Computer development; development of computational model.
Computer construction; basics of communication in computer networks.
Processors; structure of data networks, classification.
Memory; ISO / OSI model.
Interface; topology.
Transfer media.
Communication and media access control methods.
Communication standards.
Network Layer Communication.
Transport layer.
Application-oriented layer protocols and services.
Computer network security.
Note: In the first five blocks, there is always a hardware and network theme, anothers only network theme.
|
Activities
|
|
Fields of study
|
|
Guarantors and lecturers
|
|
Literature
|
-
Basic:
Archiv článků, http://www.earchiv.cz/
(Peterka J.)
-
Basic:
Sosinsky, Barrie A.. Mistrovství - počítačové sítě : [vše, co potřebujete vědět o správě sítí]. Brno: Computer Press, 2010. ISBN 978-80-251-3363-7.
-
Basic:
Spurná, Ivona. Počítačové sítě : praktická příručka správce sítě. Kralice na Hané: Computer Media, 2010. ISBN 978-80-7402-036-0.
-
Basic:
Horák, Jaroslav. Počítačové sítě pro začínající správce. Brno: Computer Press, 2011. ISBN 978-80-251-3176-3.
-
Basic:
Minasi, Mark. Velký průvodce hardwarem. Praha: Grada, 2002. ISBN 80-247-0273-8.
-
Recommended:
Toxen, Bob. Bezpečnost v Linuxu : prevence a odvrácení napadení systému. Brno: Computer Press, 2003. ISBN 80-7226-716-7.
-
Recommended:
Tanenbaum A.S. Computer Networks, Fourth Edition. Prentice Hall, 2003.
-
Recommended:
Strebe, Matthew. Firewally a proxy-servery : praktický průvodce. Brno: Computer Press, 2003. ISBN 80-7226-983-6.
-
Recommended:
Kurtz G., Břehovský P., Pojsl J., Čevela R. Hacking bez tajemství : Windows, NetWare, UNIX/Linux. Praha, 2002. ISBN 80-7226-644-6.
-
Recommended:
Zelenka J., Čech P., Naiman K. Ochrana dat. Hradec Králové, 2002.
-
Recommended:
Odom, Wendell. Počítačové sítě bez předchozích znalostí. Brno: CP Books, 2005. ISBN 80-251-0538-5.
-
Recommended:
Kállay, Fedor. Počítačové sítě LAN/MAN/WAN a jejich aplikace. Praha: Grada, 2003. ISBN 80-247-0545-1.
-
Recommended:
Prosise, Chris. Počítačový útok : detekce, obrana a okamžitá náprava. Praha: Computer Press, 2002. ISBN 80-7226-682-9.
-
Recommended:
Pužmanová, Rita. Širokopásmový Internet : přístupové a domácí sítě. Brno: Computer Press, 2004. ISBN 80-251-0139-8.
-
Recommended:
Pužmanová, Rita. TCP/IP v kostce. České Budějovice: Kopp, 2004. ISBN 80-7232-236-2.
-
Recommended:
Jirovský, Václav. Vademecum správce sítě. Praha: Grada, 2001. ISBN 80-7169-745-1.
-
Recommended:
Dostálek, Libor. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. Brno: Computer Press, 2006. ISBN 80-251-0828-7.
-
Recommended:
Dostálek, Libor. Velký průvodce protokoly TCP IP. Praha: Computer Press, 2003. ISBN 80-7226-849-X.
-
Recommended:
Dostálek, Libor. Velký průvodce protokoly TCP/IP a systémem DNS. Praha: Computer Press, 2002. ISBN 80-7226-675-6.
|
Time requirements
|
Full-time form of study
|
Activities
|
Time requirements for activity [h]
|
Kontaktní výuka
|
65
|
Příprava na zkoušku
|
35
|
Individual project
|
15
|
Příprava na zápočet
|
20
|
Domácí příprava na výuku
|
15
|
Total
|
150
|
|
Prerequisites - other information about course preconditions |
- |
Competences acquired |
A student who has successfully completed the course can:
describe the basic historical phases of computer development and give examples;
enumerate and characterize types of computational model, include them historically, explain differences and similarities;
graphically and verbally describe the structure of the computer and the general network node;
to characterize individual types of communications in computer networks, to specify their properties and to identify advantages and disadvantages of given types of communication;
describe individual types of computer memories and explain their technological and functional differences;
describe the ISO / OSI model, its individual layers, the communication between them and the importance of the model for practice;
to characterize and classify computer interface types, explain their purpose and use at present;
describe and classify transmission media according to the method of signal transmission, corresponding topology and purpose;
to characterize the problems of communication on the link layer and its related problem of access control using individual types of access methods, to describe selected access methods;
enumerate and give a brief description of the communication standards used in practice;
describe and explain in detail network layer communication using network protocols and current standards;
describe and explain in detail transport layer communication using transport protocols and current standards;
describe and explain application layer communication using selected application protocols of commonly used network services including secure;
to characterize basic types of computer network security in relation to individual types of threats to network infrastructure security, network traffic, services and data.
A student who has successfully completed the course can:
draw and describe the basic types of network topologies with examples of their use;
create a network node configuration proposal based on its function, usage, and communication requirements;
create a configuration proposal for basic network infrastructure types for a Small Office / Home Office (SOHO) target entity, including security design against basic security threats on a computer network;
use basic tools for configuring and managing a network node;
solve simple network infrastructure interference in order to manage computer network traffic;
install the operating system on a network node, configure network connectivity, and basic network services.
The student who has successfully completed the course is able to:
make informed decisions about how to handle requests and service interventions as an IT team manager by assigning a task to team members based on their own expertise, team members' expertise, and team-based input;
to work as a member of an IT team managing a larger network infrastructure and to apply the expertise and practical experience to prepare for the planning of service and operational tasks in the network infrastructure. |
Teaching methods |
- Monologic (reading, lecture, briefing)
- Dialogic (discussion, interview, brainstorming)
- Skills training
|
Assessment methods |
- Oral examination
- Written examination
- Home assignment evaluation
|
|
|
|