1052234110
COMPUTER NETWORKS AND SECURITY Theory
Unit I DATA COMMUNICATION
Data Communication: Components of a data communication– Data flow: Simplex –
Half duplex – Full duplex .Types of Connections: Point to Point – Multipoint;
Topologies: Star, Bus, Ring, Mesh, Hybrid – Advantages and Disadvantages of each
topology.
Types of Networks: Need of Computer Networks – LAN – MAN – WAN – Internet –
Intranet – Internet Service Providers (ISP) – Client-server – Peer to Peer – Wi-Fi –
Bluetooth.
Network Devices: Switches – Bridges – Routers – Gateways.
09
Unit II OSI MODEL AND 802.X PRTOCOLS
Network Models: OSI Model – Layered Architecture – Function of Layers – TCP/IP
Protocol Suite
802.X Protocols: Concepts and PDU format of CSMA/CD(802.3) – Token ring
(802.5) – Ethernet – Types of Ethernet(Fast Ethernet, gigabit Ethernet, High speed
Ethernet 10GE to 800GE) – Comparison between 802.3 and 802.5.
09
Unit III NETWORK, TRANSPORT AND APPLICATION LAYER PROTOCOLS
Network Layer Protocol: IP – Interior Gateway Protocols: ARP, RARP (concepts
only)
IP Addressing: Dotted Decimal Notation – Subnetting and Supernetting – Ipv4 –
Ipv6
Overview of TCP/IP – Transport Layer Protocols: Stop and wait protocol- Connection
Oriented and Connectionless Service – Sockets – TCP and UDP
Application Layer Protocols: FTP – HTTP – Telnet
09
Unit IV NETWORK SECURITY
Network Security: Definition – Need of Network Security – Principles of Security –
Attacks – Types of Attacks – Criminal Attacks – Legal Attacks – Passive and
Active Attacks – Software Supply Chain Attacks .
Cryptography: Definition – Symmetric Encryption Principles – Symmetric Block
Encryption algorithms – DES – Digest Function – Public key cryptography principles
10
– RSA– Digital Signature (concepts only)
Unit V NETWORK SECURITY APPLICATIONS
Hackers Techniques: Historical hacking techniques and Open sharing – Bad
Passwords – Advanced techniques – Viruses – Worms – Trojan Horses – SPAM
Security Mechanisms: Introduction – Types of Firewalls – Packet Filters –
Application Gateways – Limitation of Firewalls .Intrusion: Intruders – Intruder
detection – Classification of Intruder – Detection Systems – Honeypots
Reviews
There are no reviews yet.