Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BIK-ADS Network Administration Extent of teaching: 13KP+4KC
Instructor: Completion: Z,ZK
Department: 18104 Credits: 5 Semester: Z

Annotation:
Students acquire basic skills needed to administrate computer networks, networking technologies, services, and to ensure their security. They understand and are able practically use Ethernet technology, VLAN, authorisation, security architecture of computer networks, routing protocols and backbone routing mechanisms, directory and naming services and addressing, administration of networking equipment, secure client connections and secure data transfer, flow control mechanisms, and service availability monitoring.

Lecture syllabus:
1. Introduction. Ethernet technology, VLAN, authorization. Security architecture of computer networks - firewall, VPN.
2. Routing protocols of autonomous systems - RIP, OSPF. Backbone routing mechanisms - EGP, BGP.
3. Naming services, addressing - DNS, DHCP. Naming services - LDAP.
4. Mail. Network equipment administration - protocols.
5. Network equipment administration - applications. Secure connection of clients and secure data transfer - RADIUS, ssh, ssl, IPsec.
6. Data flows in computer networks - QoS, flow control mechanisms. Service availability monitoring, SLA.

Seminar syllabus:
1. Introduction. Firewall - seminar. Firewall - lab. Dynamic routing - seminar. Dynamic routing - lab. Domain Name System - seminar.
2. Domain Name System - lab. Consultation. Mail server - lab. Monitoring systems - seminar. Monitoring systems - lab. [2] Semestral project presentation.

Literature:
1. Kurose, J. F., Ross, K. W. ''Computer Networking: A Top-Down Approach (4th Edition)''. Addison Wesley, 2007. ISBN 0321497708.
2. Stallings, W. ''SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 (3rd Edition)''. Addison-Wesley Professional, 1999. ISBN 0201485346.
3. Josephsen, D. ''Building a Monitoring Infrastructure with Nagios''. Prentice Hall, 2007. ISBN 0132236931.

Requirements:
Basic knowledge of network technologies.

Informace o předmětu a výukové materiály naleznete na https://courses.fit.cvut.cz/BI-ADS/
Student, kterému chybí předmět BIK-ADS a tento již není vypsaný, zapíše si jako náhradu BIK-SSB.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BIK-WSI-SI.2015 Web and Software Engineering V 5
BIK-SPOL.2015 Unspecified Branch/Specialisation of Study VO 5
BIK-BIT.2015 Computer Security and Information technology V 5
BIK-BIT.2020 Computer Security and Information technology V 5


Page updated 28. 3. 2024, semester: Z/2023-4, L/2019-20, L/2022-3, Z/2019-20, Z/2022-3, L/2020-1, L/2023-4, Z/2020-1, Z,L/2021-2, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška