Course Internetworking And Network Security
Responsible: Prof.Dr. Grebe
Course
Meets requirements of following modules(MID)
Course Organization
Version |
created |
2011-11-14 |
VID |
1 |
valid from |
WS 2012/13 |
valid to |
|
|
|
Course identifiers |
Long name |
Internetworking And Network Security |
CID |
F07_IN |
CEID (exam identifier) |
|
|
Contact hours per week (SWS) |
Lecture |
2 |
Exercise (unsplit) |
2 |
Exercise (split) |
|
Lab |
1 |
Project |
|
Seminar |
|
Tutorial(voluntary) |
|
|
|
Total contact hours |
Lecture |
30 |
Exercise (unsplit) |
30 |
Exercise (split) |
|
Lab |
15 |
Project |
|
Seminar |
|
Tutorial (voluntary) |
|
|
|
Max. capacity |
Exercise (unsplit) |
|
Exercise (split) |
30 |
Lab |
18 |
Project |
|
Seminar |
|
|
Total effort (hours): 150
Instruction language
- Deutsch, 90%
- Englisch, 10%
Study Level
Prerequisites
- Knowledge and Competences of Module Networks and Protocols (NP)
- alternate requorements: knowledge and competences of IP networking courses or CCNA (ITN and RSE)
- Networking Fundamentals
- TCP/IP Protocol Family
- ISO/OSI Model and Protocols
- IPv4/IPv6 Addressing, Subnetting, and Routing
- Switching Techniques
- TCP/UDP Transport Techniques
- Application Protocols
- Network Implementation Competences (Client, Server, Switch, Router)
Textbooks, Recommended Reading
- J. Kurose, K. Ross: "Computer Networks- Top-Down-Approach", Pearson
- A. Tanenbaum: „Computer Networks“, Pearson
- J. Schiller: "Mobilkommunikation", 2. Auflage Prentice Hall, 2003
- N. Pohlmann: "Firewallsysteme", 5. Auflage mitp-Verlag, 2003
- H.-G. Hegering, S. Abeck, B. Neumair: "Integriertes Management vernetzter Systeme", 1. Auflage dPunkt Verlag, 1999
- IETF RFCs www.ietf.org
-
- Additional reading in script
Instructors
Supporting Scientific Staff
- Dipl.-Inf. Michael Willecke
Transcipt Entry
Internetworking and Network Security
Assessment
Type |
sMP |
Regelfall (bei großer Prüfungszahl: sK) |
Total effort [hours] |
sMP |
10 |
Frequency: 2-3/year
Course components
Lecture/Exercise
Objectives
Lerninhalte (Kenntnisse)
- Scaling Network Technologies
- Hierarchical Network Design
- Switching Layer
- Access, Distribution, Core Layer
- Layer 2 Redundancy
- Spanning Tree Protocol (STP) and Variations
- Default Gateway Protocols
- Link Aggregation
- Switch Security
- Port Security
- Angriffe auf Switched LAN
- MAC Filtering
- VLAN
- Wireless LAN (WLAN) Technology
- WLAN band, frequencies, bandwidth
- 2,4 GHz ISM Band
- 5 GHz Band
- 802.11 Standards
- IEEE 802.11a, b, g, n, ac
- WLAN architectures
- Ad Hoc mode
- Infrastructure mode
- Bridge Mode
- Repeater Mode
- Media Access Control (MAC)
- CSMA/CA
- RTS/CTS
- 802.11 Frame Types
- WLAN Security
- Association
- Probing
- Authenication
- Association
- Security Techniques
- SSID Supression
- MAC Filtering
- WEP
- WPA/TKIP
- WPA2/AES
- 802.11i EAP
- Advanced Routing
- Advanced OSPF Rouitng
- IPv4 and OSPFv2
- Cost adjustment
- Neighbor adjacencies management
- DR / BDR concepts
- Timing Management
- OSPF Authentication
- IPV6 and OSPFv3
- Multiarea OSPF Routing
- Hierarchical Routing
- LSA message types
- Inter-area Routing
- WAN Technologies
- Enterprise Network Design
- WAN Options
- Leased Lines
- Dialup Connections
- Frame Relay and ATM
- Ethernet WAN
- MPLS
- DSL
- Cable Networks
- VPN
- Serial Connections
- Time Division Multiplex
- SDH / SONET
- HDLC Protocol
- PPP Protocol
- DSL Technology
- DSL Standards and Variations
- DSL Network Architecture
- DSL Transmission
- Integrated Access Device (IAD)
- PPPoE
- Network Security
- Crypthografic Methods
- Security Threats and Objectives
- Block and stream ciphers
- Symmetrical Encription
- Asymmetrical Encryption
- Secure Key Generation
- Hashing
- Network Address Translation (NAT)
- Hiding Network Topologies and Addresses
- NAT
- PAT
- Packet Filter and Firewalls
- Paketfilter
- Default Strategies
- Access Control Lists (ACL)
- Standard ACL
- Extended ACL
- Firewalls
- Packet Level Firewalls
- Stateful Firewalls
- Application Level Firewalls
- Demilitarised Zone (DMZ)
- Proxy Gateways
- Circuit Level Gateway
- Application Level Gateway
- NAT / NAPT Gateway
- Virtual Private Networks (VPN)
- VPN Architecture
- L2TP Tunneling
- GRE Tunneling
- IPsec VPN
- IPsec Architecture
- IPsec Authentication
- IPsec Encryption
- IPsec Key Management
- Transport Layer Security (SSL, TLS)
- Application Layer Security
- Network Management
- Network Management Objectives
- Management Dimensions
- FCAPS
- Fault
- Configuration
- Accounting
- Performance
- Security
- Simple Network Management Protocol (SNMP)
- SNMP Management Architecture
- Management Information Base (MIB)
- ASN.1
- SNMPv1 Protocol
- SNMPv2 Protocol
- SNMPv3 Protocol
- Syslog
- NetFlow
Acquired Skills
- students acquire advanced knowledge on theory and applications of networking technologies with focus on IP networks
- students are enabled to plan and implement enterprise networks including branch offices and remote offices
- students have fundamental knowledge on network threats, security means and security protocols
- students know SNMP network management mechanisms, and concepts
Additional Component Assessment
- CCNA Chapter Exams/Final Exams
- Beitrag zum LV-Ergebnis
- Intervall
further education
Objectives
Additional Component Assessment
Das Urheberrecht © liegt bei den mitwirkenden Autoren. Alle Inhalte dieser Kollaborations-Plattform sind Eigentum der Autoren.
Ideen, Anfragen oder Probleme bezüglich Foswiki?
Feedback senden