logo Insalogo Insa

Internet and Security

Objectives

At the end of this module, the student will have understood and be able to explain (main concepts):

-   Network interconnection part:

  • the basic concepts and techniques allowing interconnecting local area networks in the Internet: repeater, bridge, router
  • the basic concepts and techniques allowing interconnecting LAN in the Internet : subnetting, CIDR, VLAN, VPN, applicative proxy, NAT
  • the main protocols of the TCP/IP Internet architecture : UDP, TCP, IP, ARP/proxy ARP, ICMP, DHCP (Note : RIP, OSPF and BGP are briefly introduced).

 

-   Distributed algorithm part:

  • principal characteristics of the distributed systems (asynchronism, distribution of control and the data, absence of common knowledge, dynamicity,…),
  • their specific problems and the difficulty of their solution in a distributed context (mutual exclusion, management of the shared data, distributed choice, diffusion, detection of the termination,…),
  • some generic algorithmic tools allowing to solve them: causality, distributed recursivity (waves)  and distributed  iteration (phases), specific topological structures.

-   Security part:

  • principles of computer security through the properties that characterize it as well as the classification of the major threats and the corresponding countermeasures,
  • main vulnerabilities of computer networks, in particular the Internet network as well as the corresponding countermeasures,
  • main software vulnerabilities as well as some countermeasures.

The student will be able to:

-   Network Interconnection part:

  • do architecture choices allowing to take into account requirements and constraints associated to a LAN interconnection,
  • do basic or complex addressing and routing schemas,
  • set up (administrate) Ethernet and IP networks in the basic and advanced interconnection contexts considered in the course.

 

-   Distributed algorithm part:

  •  solve  generic problems involved in the implementation of systems distributed
  • handle the most general tools allowing to conceptualize them.

-   Security part:

  • analyse a computer network and its applications in order to identify the main vulnerabilities, from software and network point of view

propose corresponding countermeasures to improve the security of the whole system

Form of assessment

The evaluation of outcome prior learning is made as a continuous training during the semester. According ot the teaching, the assessment will be different: as a written exam, an oral exam, a record, a written report, peers review...