Skip to main content
Skip header
Terminated in academic year 2021/2022

Best Practice in Communication Network II

Type of study Follow-up Master
Language of instruction English
Code 440-4214/02
Abbreviation PKS II
Course title Best Practice in Communication Network II
Credits 4
Coordinating department Department of Telecommunications
Course coordinator doc. Ing. Jaroslav Zdrálek, Ph.D.

Subject syllabus

Lectures:
• Special distributions OS, that are suitable to embedded system with low with low power consumption, their properties and specifics of OpenWRT, appropriate hardware platforms and their comparison
• Reports and data log from different systems, debugging services, Syslog
• Monitoring and management network - RRDtol,SNMP
• Advance tools for network monitoring – Nagiosand Zabbix
• Observation traffic IP network, Netflow, probes, collectors, analyze Netflow statistic
• Virtual tools for different operating systems and back-up of Linux
• LDAP protocol, address services, objects and attributes, openLDAP
• Authentication using RADIUS and TACACS
• Single sign-on system – SSO, Kerberos
• Advance authentication principles, authentication users between federations with applications SAML
• Shibboleth, its architecture and use
• Request tracker, tool for management and solve problems in network
• XMMP protocol, Instant Messaging and Presence, Jabber
• Practice example installation of advance network

Practises:
• Installation and configuration special Linux open-source distributions. Enter semester projects.
• Installation and configuration program Syslog, local and remote store system records.
• Monitoring and management networks using SNMP protocols, installation and configuration RRDtool
• Use advance tools for monitoring and management network using Nagios and Zabbix
• Traffic observation in communication networks using open-source tools, tcpdump, iptraf and ngrep
• Installation and configuration virtual tools – VirtualBox, Xen, Quemu, Wmware. Back-up in Linux, tools tar dd, rsync
• Installation and configuration open-source tools – OpenDAP for access to data on file servers
• Installation and configuration single sign-on system, installation and configuration Kerberos
• Advance authentication principles using SAML application
• Installation and configuration Request Tracker using Appache and MySQL
• Installation and configuration communication tool – Jabber
• Presentation of semester projects


Literature

• JULIAN, Mike. Practical Monitoring: Effective Strategies for the Real World. United States: O'Reilly Media, 2017. ISBN 978-1491957356 .
• WILSON, Yvonne a Abhishek HINGNIKAR. Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0. United States: Apress, 2019. ISBN 978-1484250945 .
• BOCK, Lisa. Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication. Great Britain: Packt Publishing, 2020. ISBN 978-1838988388 .

Advised literature

• NEMETH, Evi, Garth SNYDER, Trent R. HEIN, Ben WHALEY a Dan MACKIN’S. UNIX and Linux System Administration Handbook. 5th edition. Addison-Wesley Professional, 2017. ISBN 978-0134277554 .
• MINING, Ethem. Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, & Penetration Testing. Includes Valuable Basic Networking Concepts. 1th edition. Independently published, 2019. ISBN 978-1672429733 .