17 Jun
17Jun


CP1341: COMPUTER NETWORKS AND SECURITY

 SYLLABUS 

Module I: 

Introduction to networks – Data Communication – Data flow simplex, Half duplex, Full duplex-Type of Connection – broadcast, Point–to-Point, multidrop. Bandwidth- bit rate, baud rate. Transmission media –Copper wires, fibre optics, Radio transmission, microwave, Satellite. Switching - circuit, packet, message. 

Module II: 

Network software - standards- Layering, packets, Layered PDUs, ISO-OSI model, TCP/IP model – Comparison. Framing- bit oriented, byte oriented, Error correction – detection – parity, hamming code, CRC. Flow control – stop and wait, sliding window, Error control - Stop &wait ARQ,Go Back N ARQ, Piggybacking, pipelining, Ethernet, Multiple Access Protocols - pureslotted ALOHA, CSMA, CSMA/CD. LAN Standards, Token bus, Token ring, Interfacing devices – bridge, hub, switch, router, gateway. 

Module III:

 Internetworking- datagrams, fragmentation – Routing-Flooding, Distance vector routing, Link state routing. Concepts of congestion control-leaky bucket algorithm. Process to Process delivery TCP, UDP, Application Layer - DNS, Remote login, file transfer protocol (FTP). 

Module IV: 

Information Security: Network security – concepts and policies, cryptography -encryption, ciphers, steganography, symmetric and public key encryption, RSA algorithm, authentication methods, message digest, digital signatures, DSS, E-mail security, MIME, IP Security, Web Security: Secure Socket layer. Malicious Software, viruses & anti-virus software, firewall. Security and Law: - Regulations in India. Indian Copyright Act, Consumer Protection Act. Future Trends – The Law of Convergence.

 4. REFERENCES

 4.1 Core 

1.Brijendra Singh, Data Communication and Computer Networks, 3/e, PHI 2.Brijendra Singh, Cryptography & Network Security, PHI. 3.Pachghare, V.K., Cryptography and Information Security, PHI

Comments
* The email will not be published on the website.
I BUILT MY SITE FOR FREE USING