Skip to main content
Skip header

ECTS Course Overview



Best Practice in Communication Network II

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code440-4214/04
Number of ECTS Credits Allocated5 ECTS credits
Type of Course Unit *Optional
Level of Course Unit *Second Cycle
Year of Study *
Semester when the Course Unit is deliveredWinter Semester
Mode of DeliveryFace-to-face
Language of InstructionEnglish
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
ZDR20doc. Ing. Jaroslav Zdrálek, Ph.D.
NEV05Ing. Pavel Nevlud
ROZ132Ing. Jan Rozhon, Ph.D.
KAP063Ing. Lukáš Kapičák
Summary
The course follows on the course Practice in Communication Network I, which students pass out in the Bachelor study. Students are now engaged in advanced networking techniques that are required in medium-sized and larger companies. Among the key themes of the course we can include monitoring and management networks using open-source systems such as Nagios, Zabix and Grafana, as well as authentication mechanisms, especially with the use of LDAP, RADIUS and Kerberos protocol and advanced single sign-on systems, the end of the semester is devoted to systems of services for Presence and Instant Messaging. After graduating of course student has a comprehensive knowledge of network with equipment on Linux platform that are required by service organization and necessary for administrator of large networks.
Learning Outcomes of the Course Unit
The goal of course is to apply theoretical knowledge of computer networks, basic network services with operating system Linux and IPv6 protocol, into practical solutions. The graduate of this course will gain knowledge in the field of monitoring IPv6 networks, authentication and authorization.
Course Contents
Lectures:
• Special distributions of operating systems, that are suitable to embedded systems with low power consumption, their properties and specifics, appropriate hardware platforms and their comparison.
• Reports and logged data from different systems, debugging and optimization of services, Syslog, NTP.
• Monitoring and management of networks - RRDtol, SNMP.
• Advance tools for network monitoring – Nagios, Zabbix and Grafana.
• Observation and generation traffic in IPv6 networks, Netflow, probes, collector, analysis of Netflow statistic.
• Virtual tools for different operating systems and back-up in Linux.
• LDAP protocol, address services, objects, and attributes, openLDAP.
• Authentication using RADIUS and TACACS.
• Single sign-on system – SSO, Kerberos.
• Advance authentication principles, authentication users between federations with applications SAML
• Shibboleth, its architecture, and using.
• Request tracker, tool for management and solving problems in network.
• XMPP protocol, Instant Messaging and Presence, Jabber.
• Practice example installation of advance network.

Practices:
• Installation and configuration special Linux open-source distributions. Assignment of semester projects.
• Installation and configuration of Syslog, local and remote storge of system logs. Installation and configuration of NTP protocol.
• Monitoring and management networks by using SNMP protocols. Installation, and configuration RRDtool.
• Using advance tools for monitoring and management network by using Nagios, Zabbix and Grafana.
• Observation and generation traffic in communication networks by using open-source tools, tcpdump, iptraf, ngrep and scapy.
• Installation and configuration of virtual tools – KVM, LXC/LXD, VirtualBox, Xen, Qemu, Wmware. Back-up in Linux, tools tar, dd and rsync.
• Installation and configuration open-source tools – OpenLDAP for access to data on file servers.
• Installation and configuration single sign-on system. Installation and configuration of Kerberos.
• Advance authentication principles by using SAML application, e.g. Simplesamlphp.
• Installation and configuration Request Tracker by using Appache and MySQL.
• Installation and configuration communication tool – Jabber.
• Presentation of semester projects.


Projects:
Project No. 1. The aim of the project is the collection, processing, and automatic rendering of data from various sensors in the network using a time series database.
Project No. 2. The aim of the project is to describe, configure and analyze various authentication and authorization methods in IPv6 networks.

Recommended or Required Reading
Required Reading:
• JULIAN, Mike. Practical Monitoring: Effective Strategies for the Real World. United States: O'Reilly Media, 2017. ISBN 978-1491957356.
• WILSON, Yvonne a Abhishek HINGNIKAR. Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0. United States: Apress, 2019. ISBN 978-1484250945.
• BOCK, Lisa. Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication. Great Britain: Packt Publishing, 2020. ISBN 978-1838988388.
• SATRAPA, Pavel. IPv6: internetový protokol verze 6. 4. aktualizované a rozšířené vydání. Praha: CZ.NIC, 2019. ISBN 978-80-88168-46-1.
• JULIAN, Mike. Practical Monitoring: Effective Strategies for the Real World. United States: O'Reilly Media, 2017. ISBN 978-1491957356.
• WILSON, Yvonne a Abhishek HINGNIKAR. Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0. United States: Apress, 2019. ISBN 978-1484250945.
• BOCK, Lisa. Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication. Great Britain: Packt Publishing, 2020. ISBN 978-1838988388.
Recommended Reading:
• NEMETH, Evi, Garth SNYDER, Trent R. HEIN, Ben WHALEY a Dan MACKIN’S. UNIX and Linux System Administration Handbook. 5th edition. Addison-Wesley Professional, 2017. ISBN 978-0134277554.
• MINING, Ethem. Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, & Penetration Testing. Includes Valuable Basic Networking Concepts. 1th edition. Independently published, 2019. ISBN 978-1672429733.
• NEMETH, Evi, Garth SNYDER, Trent R. HEIN, Ben WHALEY a Dan MACKIN’S. UNIX and Linux System Administration Handbook. 5th edition. Addison-Wesley Professional, 2017. ISBN 978-0134277554.
• MINING, Ethem. Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, & Penetration Testing. Includes Valuable Basic Networking Concepts. 1th edition. Independently published, 2019. ISBN 978-1672429733.
Planned learning activities and teaching methods
Lectures, Experimental work in labs, Project work
Assesment methods and criteria
Tasks are not Defined