Objective
To understand the concepts of computer networking, functions of different layers and protocols, and know the idea of IPV6 and security.
Syllabus
- Introduction to Computer Network
- Uses of Computer Network
- Networking model client/server, p2p, active network
- Protocols and Standards
- OSI model and TCP/IP model
- Comparison of OSI and TCP/IP model
- Example network: The Internet, X.25, Frame Relay, Ethernet, VoIP, NGN and MPLS, xDSL.
- Physical Layer
- Network monitoring: delay, latency, throughput
- Transmission media: Twisted pair, Coaxial, Fiber optic, Line-of-site, Satellite
- Multiplexing, Circuit switching, Packet switching, VC Switching, Telecommunication switching system (Networking of Telephone exchanges)
- ISDN: Architecture, Interface, and Signaling
- Data Link Layer
- Functions of Data link layer
- Framing
- Error Detection and Corrections,
- Flow Control
- Examples of Data Link Protocol, HDLC, PPP
- The Medium Access Sub-layer
- The channel allocation problem
- Multiple Access Protocols
- Ethernet,
- Networks: FDDI, ALOHA, VLAN, CSMA/CD, IEEE 802.3(Ethernet), 802.4(Token Bus), 802.5(Token Ring), and 802.1(Wireless LAN).
- Network Layer
- Internetworking &devices: Repeaters, Hubs, Bridges, Switches, Router, Gateway
- Addressing: Internet address, classful address
- Subnetting
- Routing: techniques, static vs. dynamic routing , routing table for classful address
- Routing Protocols: RIP, OSPF, BGP, Unicast and multicast routing protocols
- Routing algorithms: shortest path algorithm, flooding, distance vector routing, link state routing; Protocols: ARP, RARP, IP, ICMP
- Transport Layer
- The transport service: Services provided to the upper layers
- Transport protocols: UDP, TCP
- Port and Socket
- Connection establishment, Connection release
- Flow control & buffering
- Multiplexing & de-multiplexing
- Congestion control algorithm: Token Bucket and Leaky BucketTransport Layer
- Application Layer
- Web: HTTP & HTTPS
- File Transfer: FTP, PuTTY, WinSCP
- Electronic Mail: SMTP, POP3, IMAP
- DNS
- P2PApplications
- Socket Programming
- Application server concept: proxy caching, Web/Mail/DNS server optimization
- Concept of traffic analyzer: MRTG, PRTG, SNMP, Packet tracer, Wireshark.
- Introduction to IPV6
- IPv6- Advantages
- Packet formats
- Extension headers
- Transition from IPv4 to IPv6: Dual stack, Tunneling, Header Translation
- Multicasting
- Network Security
- Properties of secure communication
- Principles of cryptography: Symmetric Key and Public Key
- RSA Algorithm,
- Digital Signatures
- Securing e-mail (PGP)
- Securing TCP connections (SSL)
- Network layer security (IPsec, VPN)
- Securing wireless LANs (WEP)
- Firewalls: Application Gateway and Packet Filtering, and IDS