* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Syllabus - V-SECT
Computer security wikipedia , lookup
Net neutrality law wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Network tap wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Wireless security wikipedia , lookup
Distributed firewall wikipedia , lookup
Deep packet inspection wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer network wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
TCP congestion control wikipedia , lookup
Routing in delay-tolerant networking wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Syllabus Course Semester Subject Title Subject Code : : : : MCA 5th Advanced Computer Network Security MCA 51 Introduction Introduction, Uses of Computer Networks, Business Applications, Home Applications, Mobile Users, Social Issues. Network Hardware and software Network Hardware, Wireless Networks, Internetworks, Network Software, Protocol Hierarchies, Design Issues for the Layers, Connection-Oriented and Connectionless, Service, Service Primitives, Relationships of Services to Protocols. Example Networks The ARPANET, The Internet, ATM. Network Layer Design issues Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Comparison of Virtual Circuit and Datagram Subnets Routing algorithms The Optimality Principle, Shortest Path Routing, Flooding, Distance Vector Routing, Link state Routing, Hierarchical Routing, Broadcast Routing, Multicast Routing, Routing for Mobile Hosts Congestion Control Algorithms General Principles of Congestion Control, Congestion Prevention Policies, Congestion Control in Virtual-Circuit Subnets, Congestion Control in Datagram Subnet, Load Shedding, Jitter Control Quality of Service Flow characteristics, Techniques for Achieving- Good Quality of Service, Integrated Services, Differentiated Services Internetworking Need for Network Layer, Internet as Packet-Switched Network, Internet as Connectionless Network, Tunneling, Internet work Routing, Fragmentation. The Network Layer in the Internet The IP Protocol, IP Addresses, Subnet, IPV6 Services and elements The Transport Service, Services Provided to the Upper Layers, Transport Service Primitives, Elements of Transport Protocols, Addressing, Connection Establishment, Connection Release, Flow Control and Buffering The Internet Transport Protocol Introduction to UDP, Remote Procedure Call, The Real-Time Transport Protocol Transmission Control Protocol Introduction to TCP, TCP Segment Header, TCP Connection Establishment, TCP Connection Release, Modeling TCP Connection Management, TCP Transmission Policy, TCP Congestion Control Domain Name System Application Layer Overview, DNS, The DNS Name System, Resource Records, Name Servers Electronic Mail Architecture and Services, The User Agent, Message Formats, Message Transfer, Final Delivery Overview Services, Mechanisms and Attacks, OSI Security Architecture, A Model for Network Security Cryptography-I Symmetric cipher Model, General concepts, Cryptanalysis, Substitution Techniques, Transposition Techniques Cryptography-II Simplified DES, Block Cipher principles, The Data Encryption Standard, The RSA algorithm E-mail Security Introduction, Pretty Good Security, Operational description of PGP, Cryptographic keys and key rings, S/MIME, S/MIME Functionality, S/MIME Messages