Elements and Performance Criteria
- Analyse the operation of the Internet
- Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements
- Assess media access control (MAC) and IP addressing and their application in security
- Report on transmission control protocol/internet protocol (TCP/IP) operations and the use of transport protocols for transmitting data over the network
- Examine the various types of routing protocols and implication on security
- Analyse forms of label switching as applied to data packets
- Use software to simulate the least cost algorithms
- Analyse internetwork protocols
- Research and report internetwork operations
- Analyse protocol considerations of voice over internet protocol (VoIP)
- Research the protocols G723.1, G729 and G729A standards and evaluate their application in internetworking
- Determine the format of JPEG and GIF files as applied to still pictures
- Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures
- Evaluate the features of different of multi-service protocols and of different email system protocols in networking operations
- Produce a report on the features the different web-based protocols used in internetworking operations
- Analyse features and types of network security
- Analyse procedures and processes used for security attacks and use of protection mechanisms
- Research conventional encryption algorithms and determine possible locations of encryption devices
- Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved
- Research one-way hashing and secure hashing functions
- Produce a report on digital signature standard (DSS) principles including public key cryptography algorithms for network security
- Research features of public key authentication and email network security protocols
- Research features of web, network management and system security
- Analyse how web threats and attacks occur in an IP network and determine system intruders and threats
- Research the operation of transaction protocols
- Evaluate the processes used for selection and protection of system passwords
- Evaluate system threats and methods used to counter act the threats
- Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations
- Document evaluation report