Professional study programme

Back   Schedule   Hrvatski

Information Systems and Computer Networks SAR401-17

ECTS 7 | P 45 | A 15 | L 15 | K 0 | ISVU 175220 | Academic year: 2019./2020.

Course groups

Prikaži sve grupe na predmetu

Course lecturers



Familiarise students with basic terms in information theory; Explain practical significance and the purpose of entropy and error control coding, and introduce students to the application of basic error control codes; Teach students how to properly interpret reference layered network models and understand protocol functions of particular layers; Train students to individually plan and implement a local network with a possibility of Internet connection (solving thereby routing and addressing problems); Familiarise students with basic characteristics of different mobile network generations; Teach students how to apply basic network security mechanisms, depending on network security requirements.

Conditions for enrollment

The necessary requirements to enrol in the second year of the studies.

Course description

The concept and meaning of information and information systems. Information content and properties. Entropy and its properties. Types and properties of information sources. Markov sources. A model and description of a communication system. Discrete information systems. Information transmission and channel capacity. Entropy coding. Optimal coding. Arithmetic coding. Fundamentals of error control coding. Block codes. Binary linear codes. Hamming codes. Cyclic codes. The concept and types of communication networks. Network topology. Network function layering. Layered models: OSI and TCP/IP. Physical principles of data transmission. Physical layer. Types and characteristics of transmission media. Line codes. Access networks and technologies. Data link layer. Error control and flow control. Medium access in wired and wireless networks. MAC sublayer. A local area network and protocols. Ethernet. Wireless local area networks. Bluetooth. Wireless sensor networks. Network routing and routing protocols. Internetworking. Internet. IP protocol (IPv4 and IPv6). IP addressing. Internet control protocols. ICMP protocol. Internet transport protocols (TCP and UDP). Application layer protocols. Internet services. Public mobile networks. Data protection and network security.

Student requirements

Defined by the Student evaluation criteria of the Faculty of Electrical Engineering, Computer Science and Information Technology Osijek and paragraph 1.9

Monitoring of students

Defined by the Student evaluation criteria of the Faculty of Electrical Engineering, Computer Science and Information Technology Osijek and paragraph 1.9

Obligatory literature

1. 1 I. S. Pandžić i dr. Uvod u teoriju informacije i kodiranje Element, Zagreb, 2007.

2. 2 A. S. Tanenbaum, D. J. Wetherall Computer networks (5. izdanje) Prentice Hall, Boston, 2011.

Pretraži literaturu na:

Recommended additional literature

1. 1 R. M. Gray Entropy and Information Theory Springer-Verlag, NewYork, 2013.

2. 2 A. Bažant i dr. Osnovne arhitekture mreža Element, Zagreb, 2003.

Course assessment

Conducting university questionnaires on teachers (student-teacher relationship, transparency of assessment criteria, motivation for teaching, teaching clarity, etc.). Conducting Faculty surveys on courses (upon passing the exam, student self-assessment of the adopted learning outcomes and student workload in relation to the number of ECTS credits allocated to activities and courses as a whole).

Overview of course assesment

Learning outcomes
Upon successful completion of the course, students will be able to:

1. define and explain basic terms in information theory

2. understand and interpret basic methods and procedures of entropy and error control coding

3. interpret reference layered networking models and present protocol functions layer by layer

4. plan implementation of a local area network, including solving routing, addressing and Internet connectivity problems

5. interpret characteristics and basic principles of 2G, 3G and 4G mobile networks

6. evaluate advantages and disadvantages of certain network security mechanisms depending on security requirements

Aktivnosti studenta: Vidi tablicu aktivnosti