Theme Options

NEWSLETTER

Advanced Networking

1389

New

According to Syllabus w.e.f. 2013 PUNE, Maharashtra (INDIA)

Advanced Networking

M.Sc. Computer Science

Author : Dr. Nitin Kulkarni, Anand Jain

Book ID : 1389

Edition : 5th 2016

ISBN : 978-93-5016-100-5

Solved Question Papers upto October 2016

More details

Rs.261

Rs.290

-10%

Contents

1. Review of Basic Concepts

   1. Introduction     

   2. Network Architecture   

   3. Reference Models 

   4. TCP/IP Protocol Suite  

   5. Underlying Technologies: LAN (802.3)     

   6. Wireless LANS (802.11) 

   7. Point-To-Point WANS    

   8. Switched WANS

2. The Internet Layer Protocols

   1. Introduction     

   2. Internet Protocol (IP) 

   3. Review of Ipv4 Protocol

   4. IPv6 

   5. Differences between IPv4 and IPv6  

   6. Transition from IPv4 to IPv6 

   7. Internet Control Message Protocol (ICMPv4)     

   8. ICMPv6

3. Routing Protocols

   1. Introduction     

   2. Forwarding 

   3. Structure of a Router  

   4. Routing Table    

   5. Intra and Inter Domain Routing     

   6. Distance Vector Routing Protocol   

   7. Routing Information Protocol 

   8. OSPF (Open Shortest Path First)    

   9. BGP (Border Gateway Protocol)

   10.Multicast Routing

4. The Transport Layer

   1. Introduction     

   2. The Transport Service  

   3. Process-To-Process Communication   

   4. Elements of Transport Protocol     

   5. User Datagram Protocol (UDP) 

   6. Transmission Control Protocol (TCP)   

5. Multimedia    

   1. Introduction     

   2. Digitizing Audio And Video   

   3. Streaming Stored Audio And Video   

   4. Streaming Live Audio And Video     

   5. Real Time Interactive Audio/Video  

   6. RTP AND RTCP     

   7. Voice OVER IP

6. Introduction to Security

   1. Introduction     

   2. The Need For Security  

   3. Security Approaches    

   4. Principles of Security 

   5. Types of Attacks

7. Cryptography: Concepts and Techniques

   1. Introduction     

   2. Plain Text and Cipher Text   

   3. Substitution Techniques

   4. Transposition Techniques     

   5. Symmetric and Asymmetric Key 

   6. Cryptography

8. Symmetric Key Algorithms

   1. Introduction     

   2. Algorithm Types and Modes    

   3. DES (Data Encryption Standard)     

   4. AES (Advanced Encryption Standard) 

   5. IDEA (International Data Encryption Algorithm)

9. Asymmetric Key Algorithms

   1. Introduction     

   2. RSA (Revest-Shamir-Adleman)  

   3. Symmetrical and Asymmetrical Key Cryptography  

   4. Digital Signatures

10. Digital Certificates

    1. Introduction    

    2. Digital Certificates

11. Internet Security Protocols

    1. Introduction    

    2. Secure Socket Layer   

    3. TLS (Transport Layer Security)    

    4. SHTTP (Secure Hypertext Transfer Protocol)    

    5. TSP (Time Stamp Protocol)   

    6. SET (Secure Electronic Transaction)     

    7. SSL Vs SET

    8. 3-D Secure Protocol   

    9. Electronic Money

    10.E-mail Security 

    11.Firewalls 

    12.IP Security (IPSEC)   

    13.VPN (Virtual Private Networks)

12. User Authentication

    1. Introduction    

    2. Passwords 

    3. Certificate-Based Authentication  

    4. Kerberos  

    5. Security Handshake Pitfalls

No customer comments for the moment.

Write a review

Write a review

4 other products in the same category:

Customers who bought this product also bought: