12 points, SCA Band 2, 0.250 EFTSL
Postgraduate - Unit
Refer to the specific census and withdrawal dates for the semester(s) in which this unit is offered.
- Term 3 2017 (Day)
This unit is only available to students enrolled in the double award Master International/Master of Information Technology Systems with South East University, China
Module 1: In-depth coverage of the protocols used to operate the Internet and intranets, and a selection of major applications, including specific implementations of the protocols and systems. The topics include: Advanced Internet Addressing: IPv6, subnetting, supernetting. TCP Performance and Enhancements: Reno, New-Reno, Fast Retransmit and Recovery, etc. Unicast and multicast routing protocols: BGP4, OSPF, MOSPF, DVMRP, etc. Messaging systems: SMTP, MIME, POP3, IMAP, World Wide Web systems: client-server implementations, HTTP, Real Time Protocols: RTP, RTCP,RSVP. Security and Firewall. Quality of Service issues: DiffServ and IntServ. Network management and Remote File activities.
Module 2: This unit aims to provide students with fundamental knowledge of network and information security. Topics to be covered include network components and services, network computer systems and security policy, security at different system layers, basic cryptography and information security, information security and communications, intrusion detection system, malicious code and detection and prevention systems, authentication systems, and wireless security.
On successful completion of this unit, students should be able to:
- interpret complex information contained in the networking protocol standards;
- analyse and evaluate details of the network protocols related to the: data link network, transport and application layers;
- evaluate parameters of the data transfer through the local area, backbone, metropolitan and wide area network;
- analyse and evaluate multimedia networks and network management systems;
- critically assess threats, vulnerabilities and risks to an organisations' networks and synthesise alternatives with estimates of their effectiveness;
- conduct forensic analysis of the system when a security breach takes place.
Examination (2 hours): 50%; In-semester assessment: 50%
10 hrs lectures/wk, 10 hrs tutorials/wk for 5 weeks
See also Unit timetable information