Module Code | CSU34031 |
Module Name | Advanced Telecommunications |
ECTS Weighting[1] | 5 ECTS |
Semester taught | Semester 2 |
Module Coordinator/s | Hitesh Tewari |
Module Learning Outcomes
On successful completion of this module, students will be able to:
LO1. Demonstrate an in-depth knowledge of the Transport and Application Layers of the OSI reference model
LO2. Have a good understanding of basic cryptographic constructs used in symmetric and asymmetric cryptosystems
LO3. Have a good understanding of the application of cryptographic techniques in network security and electronic payment systems
LO4. Analyse the requirements for a given organizational structure and select the most appropriate networking and security architecture
LO5. Have a working knowledge of network programming using sockets and the use of cryptographic libraries for securing network traffic
Module Content
This module concentrates on building upon the students SF years data
communications knowledge and introduces them to advanced topics in the areas of
data communications and cryptography. A detail study is made of the TCP protocol
in terms of multiplexing, flow and congestion control to understand the effects
congestion in a large distributed network such as the Internet. A number of
Application Layer protocols such as HTTP, DNS and AJAX are studied to understand
how Web Applications are designed today. The students are also provided with an indepth knowledge of cryptography which gives them an appreciation of how to secure
data communication messages over an open network such as the Internet.
Specific topics addressed in this module include:
- Transport Layer Issues – Multiplexing, UDP, TCP, Flow Control, Congestion Control
- Application Layer Issues – HTTP, DNS, Web Applications
- Network Security – Symmetric and Asymmetric Key Cryptography, Key Agreement Protocols, X.509 and Public Key Infrastructure (PKI), Digital Signatures, Discrete Logarithms, Elliptic Curve Cryptography, Authentication Protocol
- Electronic Payment Systems – Ecash, Bitcoin, Micropayments
Teaching and learning Methods
There are three lectures a week. In addition, there are two substantial individual programming projects as part of which students are required to demonstrate their working prototype.
Assessment Details
Examination 3 hour written examination: 100%
Assessment Component | Brief Description | Learning Outcomes Addressed | % of total | Week set | Week Due |
Examination | Take home assessment | LO1, LO2, LO3 | 80% | ||
Project 1 | Individual Project | LO4, LO5 | 10% | 2 | 6 |
Project 2 | Individual Project | LO4, LO5 | 10% | 8 | 12 |
Reassessment Details
Take home assessment (100%)
Contact Hours and Indicative Student Workload
Contact Hours (scheduled hours per student over full module), broken down by: | 33 hours |
Lecture | 31 hours |
Laboratory | 2 hours |
Tutorial or seminar | 0 hours |
Other | 0 hours |
Independent study (outside scheduled contact hours), broken down by: | 65 hours |
Preparation for classes and review of material (including preparation for examination, if applicable) | 33 hours |
completion of assessments (including examination, if applicable) | 32 hours |
Total Hours | 98 hours |
Recommended Reading List
Computer Networking – A Top-Down Approach, 7th Ed., James F. Kurose, Pearson Intl.
Understanding Cryptography, Christof Paar, Springer.
Module Pre-requisites
Prerequisite modules: CSU23031 – Telecommunications II.
Other/alternative non-module prerequisites:
Module Co-requisites
None