Skip to main content
Skip header

Best Practice in Communication Network II

Type of study Follow-up Master
Language of instruction Czech
Code 440-4214/03
Abbreviation PKS II
Course title Best Practice in Communication Network II
Credits 5
Coordinating department Department of Telecommunications
Course coordinator Ing. Lukáš Kapičák, Ph.D.

Subject syllabus

Lectures:
• Special distributions of operating systems, that are suitable to embedded systems with low power consumption, their properties and specifics, appropriate hardware platforms and their comparison.
• Reports and logged data from different systems, debugging and optimization of services, Syslog, NTP.
• Monitoring and management of networks - RRDtol, SNMP.
• Advance tools for network monitoring – Nagios, Zabbix and Grafana.
• Observation and generation traffic in IPv6 networks, Netflow, probes, collector, analysis of Netflow statistic.
• Virtual tools for different operating systems and back-up in Linux.
• LDAP protocol, address services, objects, and attributes, openLDAP.
• Authentication using RADIUS and TACACS.
• Single sign-on system – SSO, Kerberos.
• Advance authentication principles, authentication users between federations with applications SAML
• Shibboleth, its architecture, and using.
• Request tracker, tool for management and solving problems in network.
• XMPP protocol, Instant Messaging and Presence, Jabber.
• Practice example installation of advance network.

Practices:
• Installation and configuration special Linux open-source distributions. Assignment of semester projects.
• Installation and configuration of Syslog, local and remote storge of system logs. Installation and configuration of NTP protocol.
• Monitoring and management networks by using SNMP protocols. Installation, and configuration RRDtool.
• Using advance tools for monitoring and management network by using Nagios, Zabbix and Grafana.
• Observation and generation traffic in communication networks by using open-source tools, tcpdump, iptraf, ngrep and scapy.
• Installation and configuration of virtual tools – KVM, LXC/LXD, VirtualBox, Xen, Qemu, Wmware. Back-up in Linux, tools tar, dd and rsync.
• Installation and configuration open-source tools – OpenLDAP for access to data on file servers.
• Installation and configuration single sign-on system. Installation and configuration of Kerberos.
• Advance authentication principles by using SAML application, e.g. Simplesamlphp.
• Installation and configuration Request Tracker by using Appache and MySQL.
• Installation and configuration communication tool – Jabber.
• Presentation of semester projects.


Projects:
Project No. 1. The aim of the project is the collection, processing, and automatic rendering of data from various sensors in the network using a time series database.
Project No. 2. The aim of the project is to describe, configure and analyze various authentication and authorization methods in IPv6 networks.

Literature

• JULIAN, Mike. Practical Monitoring: Effective Strategies for the Real World. United States: O'Reilly Media, 2017. ISBN 978-1491957356 .
• WILSON, Yvonne a Abhishek HINGNIKAR. Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0. United States: Apress, 2019. ISBN 978-1484250945 .
• BOCK, Lisa. Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication. Great Britain: Packt Publishing, 2020. ISBN 978-1838988388 .

Advised literature

• NEMETH, Evi, Garth SNYDER, Trent R. HEIN, Ben WHALEY a Dan MACKIN’S. UNIX and Linux System Administration Handbook. 5th edition. Addison-Wesley Professional, 2017. ISBN 978-0134277554 .
• MINING, Ethem. Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, & Penetration Testing. Includes Valuable Basic Networking Concepts. 1th edition. Independently published, 2019. ISBN 978-1672429733 .