[an error occurred while processing this directive] [an error occurred while processing this directive]
[an error occurred while processing this directive]
[an error occurred while processing this directive]
Monash University

FIT5191 Network protocols and network security - Semester 2, 2012

Module 1: In-depth coverage of the protocols used to operate the Internet and intranets, and a selection of major applications, including specific implementations of the protocols and systems. The topics include: Advanced Internet Addressing: IPv6, subnetting, supernetting. TCP Performance and Enhancements: Reno, New-Reno, Fast Retransmit and Recovery, etc. Unicast and multicast routing protocols: BGP4, OSPF, MOSPF, DVMRP, etc. Messaging systems: SMTP, MIME, POP3, IMAP, World Wide Web systems: client-server implementations, HTTP, Real Time Protocols: RTP, RTCP,RSVP. Security and Firewall. Quality of Service issues: DiffServ and IntServ. Network management and Remote File activities.

Module 2: This unit aims to provide students with fundamental knowledge of network and information security. Topics to be covered include network components and services, network computer systems and security policy, security at different system layers, basic cryptography and information security, information security and communications, intrusion detection system, malicious code and detection and prevention systems, authentication systems, and wireless security.

Contact Hours

10 hrs lectures/wk, 10 hrs tutorials/wk for 5 weeks


Lectures: 2 hours per day
Tutorials/Lab Sessions: 2 hours per day per tutorial
and up to an additional 30 hours in some weeks for completing lab and project work, private study and revision.

Chief Examiner

Campus Lecturer

Academic Overview


At the completion of this unit students will:
  • have a well-developed conceptual framework, enabling them to keep pace with developments in the rapidly changing field of network computing;
  • have a thorough understanding of one or more specialised areas of study within network computing;
  • be familiar with using current technology, systems and software relevant to network computing;
  • be able to practise professionally as a network computing specialist;
  • understand the fundamentals of Network Security issues including possible vulnerabilities in a computer system, software and hardware applications;
  • be familiar with basic symmetric and asymmetric cryptography including symmetric and asymmetric crypto systems such as DES, RSA, RC4;
  • understand authentication systems;
  • understand security regime to prevent computer malicious codes such as viruses, logic bombs, etc;
  • be familiar with security design at different levels of OSI model, IPSec, SSL, and security at application layer;
  • understand the need of firewalls, detection and prevention systems.

Graduate Attributes

Monash prepares its graduates to be:
  1. responsible and effective global citizens who:
    1. engage in an internationalised world
    2. exhibit cross-cultural competence
    3. demonstrate ethical values
  2. critical and creative scholars who:
    1. produce innovative solutions to problems
    2. apply research skills to a range of challenges
    3. communicate perceptively and effectively

Assessment Summary

Examination: 50%; In-semester assessment: 50%

Assessment Task Value Due Date
Assignment 1 Network protocols 25% 23/10/2012
Assignment 2 Network security 25% 08/11/2012
Examination 1 25% To be advised
Examination 2 25% To be advised

Teaching Approach

Lecture and tutorials or problem classes
This teaching and learning approach provides facilitated learning, practical exploration and peer learning.


Our feedback to You

Types of feedback you can expect to receive in this unit are:
  • Informal feedback on progress in labs/tutes
  • Graded assignments with comments
  • Interviews
  • Solutions to tutes, labs and assignments

Your feedback to Us

Monash is committed to excellence in education and regularly seeks feedback from students, employers and staff. One of the key formal ways students have to provide feedback is through SETU, Student Evaluation of Teacher and Unit. The University's student evaluation policy requires that every unit is evaluated each year. Students are strongly encouraged to complete the surveys. The feedback is anonymous and provides the Faculty with evidence of aspects that students are satisfied and areas for improvement.

For more information on Monash's educational strategy, and on student evaluations, see:

Previous Student Evaluations of this unit

Previous feedback has highlighted that practical sessions should be used to reinforce student learning.

If you wish to view how previous students rated this unit, please go to

Required Resources

Please check with your lecturer before purchasing any Required Resources. Limited copies of prescribed texts are available for you to borrow in the library, and prescribed software is available in student labs.


  1. OPNET IT Guru® Academic Edition on Windows, free software from OPNET.com for teaching purposes
  2. IPTABLE on Linux platform, free software
  3. GPG on Linux platform, free software
  4. Wireshark, free software

Prescribed text(s)

Limited copies of prescribed texts are available for you to borrow in the library.

Behrouz A. Forouzan. (2010). TCP/IP Protocol Suite. (4th) McGraw-Hill.

William Stallings. (2011). Cryptography and Network Security: Principles and Practices. (5th) Pearson.

Kevin Brown, Leann Christianson, and William Stallings. (2005 or later). OPNET Lab Manual to Accompany Data and Computer Communications, seventh edition and Computer Networking with internet Protocols and Technology, fourth edition. (7th or later) Pearson/Prentice Hall (ISBN: 0131482521).

Examination material or equipment

Exam will be closed book.

Unit Schedule

Week Activities Assessment
0 Introduction No formal assessment or activities are undertaken in week 0
1 Sessions 1-5 for network protocols  
2 Sessions 6-10 for network protocols  
3 Sessions 11-12 for network protocols and Sessions 1-3 Network security Assignment 1 Presentations
4 Sessions 4-8 for network security  
5 Sessions 9-12 for network security Assignment 2 Presentations
  SWOT VAC No formal assessment is undertaken in SWOT VAC
  Examination period LINK to Assessment Policy: http://policy.monash.edu.au/policy-bank/

*Unit Schedule details will be maintained and communicated to you via your MUSO (Blackboard or Moodle) learning system.

Assessment Requirements

Assessment Policy

Faculty Policy - Unit Assessment Hurdles (http://www.infotech.monash.edu.au/resources/staff/edgov/policies/assessment-examinations/unit-assessment-hurdles.html)

Academic Integrity - Please see the Demystifying Citing and Referencing tutorial at http://lib.monash.edu/tutorials/citing/

Assessment Tasks


  • Assessment task 1
    Assignment 1 Network protocols
    Students need to model networks and study the roles of protocols for efficient communication.
    Criteria for assessment:

    Students need to demonstrate their work in an interview and give a presentation.

    Due date:
  • Assessment task 2
    Assignment 2 Network security
    Students need to demonstrate use of GPG and IPTables to secure systems. 
    Criteria for assessment:

    Students need to demonstrate their work in an interview and give a presentation.

    Due date:


  • Examination 1
    1.5 hours
    Type (open/closed book):
    Closed book
    Electronic devices allowed in the exam:
    Calculators are allowed
  • Examination 2
    1.5 hours
    Type (open/closed book):
    Closed book
    Electronic devices allowed in the exam:
    Calculators are allowed

Assignment submission

It is a University requirement (http://www.policy.monash.edu/policy-bank/academic/education/conduct/plagiarism-procedures.html) for students to submit an assignment coversheet for each assessment item. Faculty Assignment coversheets can be found at http://www.infotech.monash.edu.au/resources/student/forms/. Please check with your Lecturer on the submission method for your assignment coversheet (e.g. attach a file to the online assignment submission, hand-in a hard copy, or use an online quiz).

Online submission

If Electronic Submission has been approved for your unit, please submit your work via the VLE site for this unit, which you can access via links in the my.monash portal.

Extensions and penalties

Returning assignments

Resubmission of assignments

Students should discuss with lecturer

Referencing requirements

Library Guides for Citing and Referencing at http://guides.lib.monash.edu/content.php?pid=88267&sid=656564

Other Information


Student services

The University provides many different kinds of support services for you. Contact your tutor if you need advice and see the range of services available at www.monash.edu.au/students. For Sunway see http://www.monash.edu.my/Student-services, and for South Africa see http://www.monash.ac.za/current/

The Monash University Library provides a range of services and resources that enable you to save time and be more effective in your learning and research. Go to http://www.lib.monash.edu.au or the library tab in my.monash portal for more information. At Sunway, visit the Library and Learning Commons at http://www.lib.monash.edu.my/. At South Africa visit http://www.lib.monash.ac.za/.

Academic support services may be available for students who have a disability or medical condition. Registration with the Disability Liaison Unit is required. Further information is available as follows:

  • Website: http://monash.edu/equity-diversity/disability/index.html;
  • Email: dlu@monash.edu
  • Drop In: Equity and Diversity Centre, Level 1 Gallery Building (Building 55), Monash University, Clayton Campus, or Student Community Services Department, Level 2, Building 2, Monash University, Sunway Campus
  • Telephone: 03 9905 5704, or contact the Student Advisor, Student Commuity Services at 03 55146018 at Sunway
[an error occurred while processing this directive]