0% found this document useful (0 votes)
21 views

Syllabus Template For 2024-2025

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Syllabus Template For 2024-2025

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SYLLABUS

Fall semester 2024-2025 academic year


Educational program «6B06103-Computer Engineering», «6B06104-Computer Science»

ID Independent work Number of credits General Independent work


and name of the student Lectures Practical Lab. number of the student
of course (IWS) (L) classes classes of credits under the guidance
(PC) (LC) of a teacher (IWST)

101222 3 3 - 6 9 7
Computer
Networks and
Security
ACADEMIC INFORMATION ABOUT THE COURSE
Learning Cycle, Lecture Types Form and platform final control
Format component types of practical classes
Offline Profiling Analytical reviews Creating practical work Written
with special network
devices, in a Packet
Tracer environment
Lecturer - (s) Makasheva Teili
e-mail : [email protected]
Phone : +7 701 785 50 46
Assistant - (s) Makasheva Teili
e-mail : [email protected]
Phone : +7 701 785 50 46
ACADEMIC COURSE PRESENTATION
Purpose Expected Learning Outcomes (LO) * Indicators of LO achievement (ID)
of the course
To develop the LO 1 (cognitive): Knowledge of network architecture, network 1.1 Be able to distinguish between
ability to design design and application areas, network types, messages, address types of networks. Know the basic
and administer types. Be able to distinguish between the types and categories commands, how to distinguish between
computer of devices used on the network. cable types and manage them. The
networks, and ability to work with the Packet tracer
solve network commands.
security issues. 1.2 Distinguish between the type of
Key topics cables and know for what purposes
include: Network they can be used.
communication, 1.3 Be able to distinguish between
OSI model, and basic topologies and programmatically
its application- build network topology diagrams.
level protocols, LO 2 (functional): Have an idea about the seven levels of the 2.1 The ability to monitor the main
transportation, OSI model. Be able to describe the functions of each level and processes on the network and monitor
and networking know the protocols for performing these functions whether a network connection is
layers of the OSI established.
model. 2.2 Be able to distinguish between high
and low levels. Definition of their
activities.
2.3 Defining network IP addresses,
masks, subnets, IP address ranges
applicable to hosts and interfaces, and
broadcast addresses.
LO 3 (functional): Static routing. Knowing the main 3.1 Checking the created network
application, purpose and setting in the guide. Be able to connection with setting up a static
distinguish between the main advantages. route.
3.2 Be able to analyze the routing
table. Analysis of the routing process.
LO 4 (systemic): The ability to use dynamic routing and 4.1 The ability to work with dynamic
dynamic routing protocols. Be able to analyze the guide table. protocols based on the distance vector.
4.2 Configuring protocols based on
communication status and maintaining
network operation.
4.3 Be able to draw up a network
diagram based on the guide table
(reverse calculation in the network)
LO 5 (systemic): Have an understanding of ACL management, 5.1 Setting network restrictions. Be
be able to clearly define the types and areas of application. able to distinguish between types of
Have an understanding of network security. restrictions and work with basic
commands.
5.2 Be able to identify the main types
of network threats and have an idea of
programs, methods of prevention.
Prerequisites Information and Communication Technologies
Postrequisites Design of LAN and WAN networks. Network Switching and Routing
Learning Literature:
Resources 1. А. Ю. Пыркова, Л. Ш. Черикбаева ; Компьютерлік желілер : оқу құралы / Әл-Фараби атын.
ҚазҰУ. - Алматы : Қазақ ун-ті, 2016. - 156, [2] б. - ISBN 978-601-04-1825-7 :
2. В. Олифер Н. Олифер — Компьютерные сети. Принципы, технологии, протоколы 2020.
3. Компьютерлік желілер [Мәтін] : оқулық / [қазақ тілінде ауд.: А. М. Махметова, С. Б.
Беркімбаева] ; ҚР Білім және ғылым м-гі. - Алматы : ҚР Жоғары оқу орынд. қауымдастығы,
2013. - URL: 1-part. - 551, [1] б. - ISBN 978-601-217-445-8 :
4. Бодов С. Протоколы маршрутизации. СПб.: Питер, 2015.
5. Перов А.А. Основы проектирования сетей. М., 6th edition, 2017.
6. Wenliang Du: Internet Security: A Hands-on Approach, (3rd edition)
Internet resources
1. http://elib.kaznu.kz/order-book.
2. netacad.com
3. https://easy-network.ru
Software
1. Cisco Packet Tracer

Academic The academic policy of the course is determined by the Academic Policy and the Policy of Academic
course policy Integrity of Al-Farabi Kazakh National University .
Documents are available on the main page of IS Univer .
Integration of science and education. The research work of students, undergraduates and doctoral
students is a deepening of the educational process. It is organized directly at the departments, laboratories,
scientific and design departments of the university, in student scientific and technical associations.
Independent work of students at all levels of education is aimed at developing research skills and
competencies based on obtaining new knowledge using modern research and information technologies. A
research university teacher integrates the results of scientific activities into the topics of lectures and
seminars (practical) classes, laboratory classes and into the tasks of the IWST, IWS, which are reflected in
the syllabus and are responsible for the relevance of the topics of training sessions and assignments.
Attendance. The deadline for each task is indicated in the calendar (schedule) for the implementation of
the content of the course. Failure to meet deadlines results in loss of points.
Аcademic honesty. Practical/laboratory classes, IWS develop the student's independence, critical
thinking, and creativity. Plagiarism, forgery, the use of cheat sheets, cheating at all stages of completing
tasks are unacceptable.
Compliance with academic honesty during the period of theoretical training and at exams, in addition to
the main policies, is regulated by the "Rules for the final control" , "Instructions for the final control of the
autumn / spring semester of the current academic year" , "Regulations on checking students' text
documents for borrowings".
Documents are available on the main page of IS Univer .
Basic principles of inclusive education. The educational environment of the university is conceived as a
safe place where there is always support and equal attitude from the teacher to all students and students to
each other, regardless of gender, race / ethnicity, religious beliefs, socio-economic status, physical health
of the student, etc. All people need the support and friendship of peers and fellow students. For all
students, progress is more about what they can do than what they can't. Diversity enhances all aspects of
life.
All students, especially those with disabilities, can receive counseling assistance by phone / e- mail
[email protected].
Integration MOOC (massive open online course). In the case of integrating MOOC into the course, all
students need to register for MOOC. The deadlines for passing MOOC modules must be strictly observed
in accordance with the course study schedule.
ATTENTION! The deadline for each task is indicated in the calendar (schedule) for the implementation
of the content of the course, as well as in the MOOC. Failure to meet deadlines results in loss of points.
INFORMATION ABOUT TEACHING, LEARNING AND ASSESSMENT
Score-rating letter system of assessment of accounting for educational Assessment Methods
achievements
Grade Digital points, Assessment according to Criteria-based assessment is the process of correlating actual learning
equivalent % content the traditional system outcomes with expected learning outcomes based on clearly defined criteria.
points Based on formative and summative assessment.
A 4.0 _ 95-100 Great Formative assessment is a type of assessment that is carried out in the course
of daily learning activities. It is the current measure of progress. Provides an
A- 3.67 90-94 operational relationship between the student and the teacher. It allows you to
determine the capabilities of the student, identify difficulties, help achieve the
B+ 3.33 85-89 Fine best results, timely correct the educational process for the teacher. The
performance of tasks, the activity of work in the classroom during lectures,
seminars, practical exercises (discussions, quizzes, debates, round tables,
laboratory work, etc.) are evaluated. Acquired knowledge and competencies are
assessed.
Summative assessment - type of assessment, which is carried out upon
completion of the study of the section in accordance with the program of the
course. Conducted 3-4 times per semester when performing IWS. This is the
assessment of mastering the expected learning outcomes in relation to the
descriptors. Allows you to determine and fix the level of mastering the course
for a certain period. Learning outcomes are evaluated.
B 3.0 80-84 Formative and summative assessment Points % content

B- 2.67 75-79 Activity at lectures


C+ 2.33 70-74 Work in practical classes 90
C 2.0 65-69 Satisfactorily Independent work 110
C- 1.67 60-64 Final control (exam) 40
D+ 1.33 55-59 TOTAL 100
D 1.0 50-54 TOTAL 100
FX 0,5 25-49 Unsatisfactory
F 0 0-24

A week Topic name Number Max.


of hours ball
MODULE 1. Basics of network communication
1 L 1. Introduction to computer networks. Network components: devices, Media, Services. Basics 2
of communication. Topological diagrams. Network types. Network trends. (Module 1-2)
LC 1. Online media. The local network is LAN. The global network is WAN. Network 4 7
topologies. Working with the Packet Tracer program. Using help and navigation. Working with
basic device settings.
2 L 2. Using the level model. Advantages of using the level model. Protocols. Physical level and 2
its features. (Module 3-4)
LC 2. Communication process. Types of cables. The processes of sending and receiving. Open 4 7
interval-connection model of the OSI system. Network devices and working with cables.
3 L 3. Data transfer level standards. Frames. Personnel. MAC-address table. Ethernet connection. 2
Network technologies (module 6-7)
LC 3. Basic requirements for a reliable network. Configuring Cisco IOS devices using the 4 7
command line interface.
IWST 1. Passing tests on modern network technologies. 15
IWS 1. The main commands used in building a network. Data transmission through the network
space. Consultation on the implementation of "data delivery to the right application" (Module
5)
4 L 4. Network level. MAC and IP addresses. Node Routing table. Network addresses and 2
addressing. Network stage protocols. IPv4 protocol. IPv4 package and subheading. (Module 8-9)
LC 4. Components and types of IP addresses. Learn how to structure a network using masks. 4 7
5 L 5. Introduction to routing. An introduction to IPv4 addressing. Internal networks. The basis of 2
VLSM. IPv4 address planning. (Module 10-11)
LC 5. Consideration of subnet partitioning methods. Distribution of network IP addresses 4 7
defined between several subnets (i.e., a minimum number of unused addresses should remain in
each grid). The main commands and methods used in the network.
IWST 2. Admission of the IWS 1. Passing the final test on the network connections module. 15
(Module 12)
MODULE 2. Advanced Networks
6 L 6. The main objectives of the transport layer. Segmentation. Information exchange 2
management. An additional level. Domain Name System (Module 13-14)
LC 6. TCP and UDP segmentation. Defining static routes on the network. Perform the initial 4 7
configuration of the router. A simple IP packet. Networks-dividing hosts into groups.
7 L7. Methods for controlling access to the data transmission layer in WAN and LAN topologies 2
(Module 15)
LC 7. The purpose and functions of the channel layer in preparation for data transmission in a 4 8
specific environment. Configuring data transfer at the session and network stages.
IWST 3. Telnet services and protocol. Passing a test on the configuration of e-mail processes. 20
IWS 2. Consultations about «Using of protocols and services on the network. Implementation
of " P2P services and the Gnutella protocol»
100
Midterm control 1 100
8 L 8. The role of dynamic and static routing protocols.The main purpose of static protocols.The 2
main purpose of dynamic protocols.The operation of dynamic routing protocols.Configuration of
the RIPv1 dynamic protocol.The dynamic RIP protocol.
LC 8. Routing processes: how the routes are read. Analysis of the router routing table. 4 7
Connecting to devices via static routes. Advantages and disadvantages of dynamic routing.
Classification of dynamic routing protocols. Metrics and routing protocols.
IWST 4. Consultations on the implementation and admission of IWS 2 11
9 L 9. Dynamic protocols based on communication status: OSPF encapsulated OSPF message. 2
Types of OSPF packages.
LC 9. Dijkstra's algorithm is OSPF and SPF. Authentication. Basic OSPF configuration. The 4 7
format of the OSPF message. The Hello protocol. Link-state Update (LSUs) and Link-State
Notification (LSAs). OSPF verification. The OSPF metric. OSPF process research: verification
and authentication.
10 L 10. Types of ACLs and their application.The standard ACL. Applying a time interval to ACL 2
rules.Dynamic ACL configuration.(Module 15)
LC 10. Extended ACL. Configuring standard ACL settings. 4 7
IWST 5. Passing the final test on advanced networks. 11
IWS 3. Consultations about «IP packets are switching data from one end to the other. Entry in
the routing table implementation» (Module 17)
11 L 11. Types of threats. Network threats. Reducing network attacks (Module 16-17) 2
LC 11. Configure network devices using SSH 4 7
12 L 12. Network support. Maintaining network documentation (Module 1) 2
LC 12. Methods of diagnostics and troubleshooting. Remote troubleshooting of connection 4 7
problems.
IWST 6. Admission of IWS 3 11
13 L 13. Detection of cybersecurity threats, vulnerabilities and widespread cyberattacks on the 2
network (Module 2)
LC 13. Analyze and simulate network attacks such as code insertion, buffer overflow, cross-site 4 7
scripting
14 L 14. Network security basics. Dynamic ACL. (Module 3) 2
LC 14. Providing secure wireless access. Firewalls and host-based attack prevention 4 7
15 L 15. The concept of network security, basic security in a computer network. (Final Test) 2
LC 15. Means and methods of protecting computer information. The use of basic risk reduction 4 7
methods.
IWST 7. Take the test for configuring and verifying the OSPF protocol. 11
100
Midterm control 2 100
Final control (exam) 100
100

Acting dean of the faculty


Information technology ___________________________________ O. N. Turar

Chair of the Academic Committee


on the Quality of Teaching and Learning ___________________________________ K. S. Baisholanova

Acting head of Department


Of Computer Science ___________________________________ M. N. Satymbekov

Lecturer ____________________________________ Teili Makasheva


RUBRICATOR OF THE SUMMATIVE ASSESSMENT

CRITERIA EVALUATION OF LEARNING OUTCOMES

Written calculation assignment "Allocation of addresses to the subnet" (25% of 100% MC)

Criterion "Excellent" "Good" "Satisfactory" "Unsatisfactory"


20-25% 15-20% 10-15% 0-10%
Understanding network Knows how to understand Knows how to understand Knows how to understand network An understanding of network addresses
addresses, mastering address network addresses and address network addresses and address addresses and address allocation. Cannot that does not fully understand address
allocation techniques allocation. Can use basic methods. allocation. Can use basic use basic methods. allocation techniques. Cannot use basic
It can relate to the main methods. Cannot relate to the methods. It cannot relate to the main
theoretical material. main theoretical material. theoretical material.
Understanding the basics of Understands the basics of The average understands the The average person understands the Does not understand the Basics of
routing, design routing, knows how to design basics of routing, can design basics of routing, cannot design routing well, cannot design
its.

You might also like