[an error occurred while processing this directive] [an error occurred while processing this directive]
[an error occurred while processing this directive]
[an error occurred while processing this directive]
Monash University

FIT5191 Network protocols and network security - Term 3, 2015

Module 1: In-depth coverage of the protocols used to operate the Internet and intranets, and a selection of major applications, including specific implementations of the protocols and systems. The topics include: Advanced Internet Addressing: IPv6, subnetting, supernetting. TCP Performance and Enhancements: Reno, New-Reno, Fast Retransmit and Recovery, etc. Unicast and multicast routing protocols: BGP4, OSPF, MOSPF, DVMRP, etc. Messaging systems: SMTP, MIME, POP3, IMAP, World Wide Web systems: client-server implementations, HTTP, Real Time Protocols: RTP, RTCP,RSVP. Security and Firewall. Quality of Service issues: DiffServ and IntServ. Network management and Remote File activities.

Module 2: This unit aims to provide students with fundamental knowledge of network and information security. Topics to be covered include network components and services, network computer systems and security policy, security at different system layers, basic cryptography and information security, information security and communications, intrusion detection system, malicious code and detection and prevention systems, authentication systems, and wireless security.

Mode of Delivery

Suzhou (Day)

Workload Requirements

10 hrs lectures/wk, 10 hrs tutorials/wk for 5 weeks

See also Unit timetable information

Additional workload requirements

Lectures: 2 hours per day
Tutorials/Lab Sessions: 2 hours per day per tutorial
and up to an additional 30 hours in some weeks for completing lab and project work, private study and revision.

Chief Examiner

Campus Lecturer

Suzhou

Prof. Balasubramaniam Srinivasan

A/Prof. Andrew P Paplinski

Your feedback to Us

Monash is committed to excellence in education and regularly seeks feedback from students, employers and staff. One of the key formal ways students have to provide feedback is through the Student Evaluation of Teaching and Units (SETU) survey. The University’s student evaluation policy requires that every unit is evaluated each year. Students are strongly encouraged to complete the surveys. The feedback is anonymous and provides the Faculty with evidence of aspects that students are satisfied and areas for improvement.

For more information on Monash’s educational strategy, see:

www.monash.edu.au/about/monash-directions/ and on student evaluations, see: www.policy.monash.edu/policy-bank/academic/education/quality/student-evaluation-policy.html

Previous Student Evaluations of this Unit

The median of the overall student satisfaction for the unit was 4.84 and students did not suggested any changes/

If you wish to view how previous students rated this unit, please go to
https://emuapps.monash.edu.au/unitevaluations/index.jsp

Academic Overview

Learning Outcomes

At the completion of this unit students will:
  • have a well-developed conceptual framework, enabling them to keep pace with developments in the rapidly changing field of network computing;
  • have a thorough understanding of one or more specialised areas of study within network computing;
  • be familiar with using current technology, systems and software relevant to network computing;
  • be able to practise professionally as a network computing specialist;
  • understand the fundamentals of Network Security issues including possible vulnerabilities in a computer system, software and hardware applications;
  • be familiar with basic symmetric and asymmetric cryptography including symmetric and asymmetric crypto systems such as DES, RSA, RC4;
  • understand authentication systems;
  • understand security regime to prevent computer malicious codes such as viruses, logic bombs, etc;
  • be familiar with security design at different levels of OSI model, IPSec, SSL, and security at application layer;
  • understand the need of firewalls, detection and prevention systems.

Unit Schedule

Week Activities Assessment
0   No formal assessment or activities are undertaken in week 0
1 Sessions 1-3 for network protocols, 1-2 for network security  
2 Sessions 4-5 for network protocols, 3-5 for network security  
3 Sessions 6-8 for network protocols, 6-7 for network security Network Security Class Test on 9 July 2015
4 Sessions 9-10 for network protocols, 8-10 for network security Network Protocols Class Test on 14 July 2015
5 Sessions 11-12 for network protocols, 11-12 for network security  
6    
7    
8    
9    
10    
11    
12    
  SWOT VAC No formal assessment is undertaken during SWOT VAC
  Examination period LINK to Assessment Policy: http://policy.monash.edu.au/policy-bank/
academic/education/assessment/
assessment-in-coursework-policy.html

*Unit Schedule details will be maintained and communicated to you via your learning system.

Teaching Approach

Lecture and tutorials or problem classes
This teaching and learning approach helps students to initially encounter information at lectures, discuss and explore the information during tutorials, and practice in a hands-on lab environmentt

Assessment Summary

Examination (3 hours): 50%; In-semester assessment: 50%

Assessment Task Value Due Date
Network Security Class Test on 9 July 2015 25% 9 July 2015
Network Protocols Class Test on 14 July 2015 25% 14 July 2015
Examination 1 50% To be advised

Assessment Requirements

Assessment Policy

Assessment Tasks

Participation

  • Assessment task 1
    Title:
    Network Security Class Test on 9 July 2015
    Description:
    Students need to sit a 2-hour class test related to topics studied in the Network Security part of the unit.
    Weighting:
    25%
    Criteria for assessment:

    The criteria used to assess submissions are:

    • Correctness and understanding - there may be more than one "right" answer in many cases.
    • Completeness - that you have answered all parts of each question.
    • Presentation - that you have presented your answers using the appropriate method.
    • Use of evidence and argument - you are able to explain your position by using logical argument.
    Due date:
    9 July 2015
  • Assessment task 2
    Title:
    Network Protocols Class Test on 14 July 2015
    Description:
    Students need to sit a 2-hour class test related to topics studied in the Network Protocols part of the unit.
    Weighting:
    25%
    Criteria for assessment:

    The criteria used to assess submissions are:

    • Correctness and understanding - there may be more than one "right" answer in many cases.
    • Completeness - that you have answered all parts of each question.
    • Presentation - that you have presented your answers using the appropriate method.
    • Use of evidence and argument - you are able to explain your position by using logical argument.
    Due date:
    14 July 2015

Examinations

  • Examination 1
    Weighting:
    50%
    Length:
    3 hours
    Type (open/closed book):
    Closed book
    Electronic devices allowed in the exam:
    None

Learning resources

Monash Library Unit Reading List (if applicable to the unit)
http://readinglists.lib.monash.edu/index.html

Feedback to you

Types of feedback you can expect to receive in this unit are:

  • Informal feedback on progress in labs/tutes
  • Test results and feedback

Extensions and penalties

Returning assignments

Assignment submission

It is a University requirement (http://www.policy.monash.edu/policy-bank/academic/education/conduct/student-academic-integrity-managing-plagiarism-collusion-procedures.html) for students to submit an assignment coversheet for each assessment item. Faculty Assignment coversheets can be found at http://www.infotech.monash.edu.au/resources/student/forms/. Please check with your Lecturer on the submission method for your assignment coversheet (e.g. attach a file to the online assignment submission, hand-in a hard copy, or use an electronic submission). Please note that it is your responsibility to retain copies of your assessments.

Online submission

If Electronic Submission has been approved for your unit, please submit your work via the learning system for this unit, which you can access via links in the my.monash portal.

Required Resources

Please check with your lecturer before purchasing any Required Resources. Limited copies of prescribed texts are available for you to borrow in the library, and prescribed software is available in student labs.

Software:

  1. GPG on Linux platform, free software
  2. Wireshark, free software

Prescribed text(s)

Limited copies of prescribed texts are available for you to borrow in the library.

William Stallings. (2011). Cryptography and Network Security: Principles and Practices.. (5th) Pearson.

J. Kurose, K. Ross. (2013). Computer Networking. (6th) Pearson.

Examination material or equipment

Exam will be closed book.

Other Information

Policies

Monash has educational policies, procedures and guidelines, which are designed to ensure that staff and students are aware of the University’s academic standards, and to provide advice on how they might uphold them. You can find Monash’s Education Policies at: www.policy.monash.edu.au/policy-bank/academic/education/index.html

Faculty resources and policies

Important student resources including Faculty policies are located at http://intranet.monash.edu.au/infotech/resources/students/

Graduate Attributes Policy

Student Charter

Student services

Monash University Library

Disability Liaison Unit

Students who have a disability or medical condition are welcome to contact the Disability Liaison Unit to discuss academic support services. Disability Liaison Officers (DLOs) visit all Victorian campuses on a regular basis.

[an error occurred while processing this directive]