Network models and protocol architecture addresses
Course Description (Higher Education)
Title: NETWORKING AND SECURITY
| AQF Level of Program | ||||||
|---|---|---|---|---|---|---|
| 5 | 6 | 7 | 8 | 9 | 10 | |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|
This course will introduce the fundamentals of networking through analysis of the Open System Interconnection (OSI) and Internet networking models. Students will learn the role of each model layer and the technologies used to provide end-to-end connectivity between computer systems and the associated networking protocols. The course will also introduce cloud computing and investigate the role of cyber security in securing information systems. The role of personnel and encryption to secure Internet communications will also be studied.
Grade Scheme: Graded (HD, D, C, etc.)
Placement Component: No
| 1 /12 |
|---|
Course Description (Higher Education)
ITECH1102 NETWORKING AND SECURITY
| Type | Day | Time | Room | Staff / Comment |
|---|---|---|---|---|
| 3:30 pm - 5:30 pm | S102 |
|
||
|
5:30 pm - 7:30 pm | S203 | ||
| 5:30 pm - 7:30 pm | S307 |
|
||
|
9:00 am - 11:00 am | S204 | ||
| 5:30 pm - 7:30 pm | S204 |
|
Additional consultation time can be booked by contacting the staff member concerned directly.
K2. Describe and explain the principles of communication in networks.
K3. Describe the role and functionality of hardware and software entities that contribute to network
Skills:
ITECH1102 NETWORKING AND SECURITY
Application of knowledge and skills:
Values and Graduate Attributes:
Values:
FedUni graduate attributes statement. To have graduates with knowledge, skills and competence that
enable them to stand out as critical, creative and enquiring learners who are capable, flexible and work
| Attribute | Brief Description | Focus |
|---|---|---|
| Medium | ||
|
Medium | |
|
Medium | |
| Medium |
Scope:
Topics may include:
Course Description (Higher Education)
ITECH1102 NETWORKING AND SECURITY
Transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport layer functions, reliable and unreliable services, ports, linking to the application layer, segmentation, session management.
Introduction to Local Area Networks (LAN), LAN components, Ethernet and Token Ring, LAN design consideration, Wireless LAN, Wide Area Networks (WAN).
Cryptography and other network security technologies.
Planning and Implementing a Corporate Security Policy.
| Week(s) | Topic(s) |
|---|---|
| 1-2 |
| Week(s) | Topic(s) |
|---|---|
| 3- 7 | |
| 7 lab | |
| 8 |
|
| 9 | |
| 10 - 11 | |
| 12 |
The following tasks will be graded.
| Task | Released | Due |
|
Type |
|---|---|---|---|---|
| Week 2 | Fri, Dec 14, 2018 - 17:00 (Week 5) | 6.0% | A | |
| Week 5 | In timetabled laboratory (Week 11) | 9.0% | A | |
| Week 2 | Fri, Jan 25, 2019 - 17:00 (Week 10) | 15.0% | A | |
| Week 7 | In timetabled laboratory (Week 7) | 10.0% | B | |
|
Exam period | End of exam | 60.0% | B |
Laboratory Tasks (throughout the semester): Students are required to complete set computing, networking and security tasks during laboratory sessions. Upon completing the tasks, students get marks allocated for those tasks. The tasks are designed to help students understand the material covered in lectures by interaction with computing systems. These tasks relate to learning outcomes K1, K4, K5, K6, S1, S2, S3, A1, A2, A3 & A4.
ITECH1102 NETWORKING AND SECURITY
and laboratory material covered in topics 1 - 8. Students must analyse the lecture material, reflect upon it, solve any given problem, research associated concepts and technologies and write a coherent analysis of the material. This assessment task will help students to understand the content delivered during weeks 1 to 9 and should, therefore, help students to perform well in associated assessment tasks. Students are also allowed to bring five (5) A4 sides of their ePortfolio into the laboratory test as resource material. These tasks relate to learning outcomes K1, K2, K3, K4, K6 and A1.
| Learning Activity | Description | Hours |
|---|---|---|
|
|
48 |
| 18 | ||
| 15 | ||
|
|
15 |
Course Description (Higher Education)
ITECH1102 NETWORKING AND SECURITY
| Learning Activity | Description | Hours |
|---|---|---|
| 24 | ||
|
30 | |
| Total: | 150 | |
Assessment Criteria:
In order to receive a passing grade in this Course, students must receive a passing mark in the invigilated (Type B) assessment tasks and an overall passing mark in the combined result of all (Type A and Type B) assessment tasks. Additionally, students who are determined to be 'at risk' may be subject to extra requirements such as minimum attendance. Failure to satisfy these extra requirements may result in an automatic fail in the course.
Late Assignment:
For all assessment items handed in after the official due date without an agreed extension, a 10% penalty will be applied to the total mark for each day (or part thereof) late after the due date (including weekends and public holidays).
Special Consideration:
If students are adversely affected by life circumstances a discretionary assessment extension of up to five University working days for one assessment task may be granted at the discretion of the tutor, lecturer, or course coordinator (dependent on faculty process) upon a direct request by the student via the Discretionary Assessment Extension form.
| a c c e s s | t o | t h e | p o l i c y , | p r o c e d u r e s | o r | a s s o c i a t e d | f o r m s , |
|---|
To be eligible to sit for the examination a student must have undertaken and submitted at least one prior assessment task (worth more than 10%) for this Course.
Available Grades:
Supplementary information concerning teaching, learning, and assessment may be provided from time to time in response to unforeseen circumstances. This may include changes in times or location of classes,
| range | of | educational | policies, | procedures | and | guidelines, | which | you | can | find | at |
|---|
Student Support:
The University provides many different kinds of services to help you gain the most from your studies. You
Materials:
General:
Textbooks:
NIL.
| 9 /12 |
|---|
Course Description (Higher Education) ITECH1102 NETWORKING AND SECURITY
Bezencon, Hahnen, Pavlovic, Grubbs & Jenkins. Linux Lite - Help Manual. Retrieved 15/2/2017, from
Nathan Haines. Nathan Haines. (2015). Beginning Ubuntu for Windows and Mac users (Online resource through Library catalogue). Apress. . Retrieved . from
Note that some material in lectures, assignments and other resources provided to students may contain direct quotations from the text book(s) and references listed.
Course Description (Higher Education)
ITECH1102 NETWORKING AND SECURITY
| Assessed | Level |
|---|
1.1 Information strategy
|
Yes | 1 |
|---|---|---|
|
Yes | 1 |
|
Yes | 1 |
|---|---|---|
|
No | 1 |
|
No | 1 | ||
|---|---|---|---|---|
|
Yes | 1 | ||
| Yes | 1 | |||
| 11 /12 |
Australian Computer Society - Core Body of Knowledge: 2016 accreditation
| Assessed | Level |
|---|
| No | Knowledge |
|---|




















Transport layer protocols:
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
transport layer functions, reliable and unreliable services, ports,
linking to the application layer, segmentation, session management.
Introduction to Local Area Networks
(LAN), LAN components, Ethernet and Token Ring, LAN design
consideration, Wireless LAN, Wide Area Networks (WAN).
Cryptography and other network
security technologies.
Planning and Implementing a Corporate
Security Policy.