Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Code ...... Course item: ..... 1. INFORMATION ABOUT THE COURSE A. Basic information Name of course Study level Unit running the study programme Study programme Speciality Name of teacher (s) and his academic degree Introductory courses Prerequisites Internet Techniques First degree Faculty of Telecommunication, Computer Science and Electrical Engineering Electronics and Telecommunications Rafał Kozik, PhD Mariusz Sulima PhD None Networks B. Semester/week schedule of classes Semester Lectures winter or summer 15 Classes Laboratories Project Seminars 15 Field exercises ECTS 6 2. EFFECTS OF EDUCATION (acc. to National Qualifications Framework) Knowledge Skills Competences broad knowledge of current internet techniques Students will gain a broad knowledge and understanding of various internet related aspects (technological and non-technological). Students will learn new technologies enabling the usage of new internet-based applications (e.g. VoIP). Emerrging internet-related aspects, such as QoS, security, resilience and dependability will be covered. On successful completion of the course student is supposed to be able to use knowledge of current internet techniques 3. TEACHING METHODS lecture, multimedia slides, lab, projects 4. METHODS OF EXAMINATION written exam, tests 5. SCOPE Lectures Laboratories Internet techniques lecture covers the following aspects: Internet revolution: influence of the internet network on civilization, societies and our life (economy, teaching, culture etc.). New internet services and underlying technologies. Streaming and real-time protocols (RTP, RTCP, RTSP). Multicast (applications, technologies, protocols (PIM)). QoS (models, protocols, technologies). MPLS. Internet security aspects. Intrusion Detection Systems. Anomaly Detection Systems. SSO/AAI techniques. Introduction to IMS. Cyber threats and cyber defence. Internet based social networking (e.g. Twitter, Youtube). Military networks, cyber warfare. Semantic Web and Web 2.0. SOA. IoS. P2P. Cloud computing. Laboratories exercises are relevant to the issues raised at the lecture. Students learn the practical use of tools and technologies - this includes web services; content management systems (CMS); traffic monitoring tools; basic internet services such as DNS, FTP, WWW, E-mail; exchange data in XML format; HTML; Javascript / jQuery; Bootstrap; RTP streaming; Service hosting on Linux and Windows; cloud services (ie. virtual servers, databases, files storage services, etc.); security context to hacking attacks 6. LITERATURE Basic literature Supplementary literature P. Zikopoulos, “Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data”, McGraw-Hill, 2012; D. Stuttard, “The Web Application Hacker's Handbook Finding and Exploiting Security Flaws”, 2ed, John Wiley & Sons, 2011; K. Barry, D. Dick, “Web Services, Service-Oriented Architectures, and Cloud Computing”, Elsevier, 2013 EU projects deliverables in the area of future internet and trust networks. Scientific papers and books about network security, cyber defense and network applications.