Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

computer networks and security

Semester :  V

Course Code : 18CS52

CIE Marks : 40                       SEE Marks : 60

COMPUTER NETWORKS AND SECURITY
18CS52

SYLLABUS

Module-1

Application Layer: Principles of Network Applications: Network Application Architectures, Processes Communicating, Transport Services Available to Applications, Transport Services Provided by the Internet, Application-Layer Protocols. The Web and HTTP: Overview of HTTP, Non-persistent and Persistent Connections, HTTP Message Format, User-Server Interaction: Cookies, Web Caching, The Conditional GET, File Transfer: FTP Commands & Replies, Electronic Mail in the Internet: SMTP, Comparison with HTTP, Mail Message Format, Mail Access Protocols, DNS; The Internet’s Directory Service: Services Provided by DNS, Overview of How DNS Works, DNS Records and Messages, Peer-to-Peer Applications: P2P File Distribution, Distributed Hash Tables, Socket Programming: creating Network Applications: Socket Programming with UDP, Socket Programming with TCP.
T1: Chap 2

Module-2

Transport Layer: Introduction and Transport-Layer Services: Relationship Between Transport and Network Layers, Overview of the Transport Layer in the Internet, Multiplexing and Demultiplexing: Connectionless Transport: UDP, UDP Segment Structure, UDP Checksum, Principles of Reliable Data Transfer: Building a Reliable Data Transfer Protocol, Pipelined Reliable Data Transfer Protocols, Go-Back-N, Selective repeat, Connection-Oriented Transport TCP: The TCP Connection, TCP Segment Structure, RoundTrip Time Estimation and Timeout, Reliable Data Transfer, Flow Control, TCP Connection Management, Principles of Congestion Control: The Causes and the Costs of Congestion, Approaches to Congestion Control, Network-assisted congestion-control example, ATM ABR Congestion control, TCP Congestion Control: Fairness.
T1: Chap 3

Module-3

The Network layer: What’s Inside a Router?: Input Processing, Switching, Output Processing, Where Does Queuing Occur? Routing control plane, IPv6, A Brief foray into IP Security, Routing Algorithms: The Link-State (LS) Routing Algorithm, The Distance-Vector (DV) Routing Algorithm, Hierarchical Routing, Routing in the Internet, Intra-AS Routing on the Internet: RIP, Intra-AS Routing on the Internet: OSPF, Inter/AS Routing: BGP, Broadcast Routing Algorithms and Multicast. T1: Chap 4: 4.3-4.7

Module-4

Network Security: Overview of Network Security: Elements of Network Security, Classification of Network Attacks, Security Methods, Symmetric-Key Cryptography: Data Encryption Standard (DES), Advanced Encryption Standard (AES), Public-Key Cryptography: RSA Algorithm, Diffie-Hellman Key-Exchange Protocol, Authentication: Hash Function, Secure Hash Algorithm (SHA), Digital Signatures, Firewalls and Packet Filtering, Packet Filtering, Proxy Server.
Textbook2: Chapter 10

Module-5

Multimedia Networking: Properties of video, properties of Audio, Types of multimedia Network Applications, Streaming stored video: UDP Streaming, HTTP Streaming, Adaptive streaming and DASH, content distribution Networks Voice-over-IP :Limitations of the Best-Effort IP Service ,Removing Jitter at the Receiver for Audio ,Recovering from Packet Loss Protocols for Real-Time Conversational Applications , RTP , SIP
Textbook11: Chap 7