You are on page 1of 5

Network Protocols and Security Advanced

L-T-P-S : 3-0-2-4 Credits : 5


Pre-requisites : NIL Contact Hours: 5

Mapping of Course Outcomes to Program outcomes:


CO# CO Description BTL PO/PSO Mapping
CO1 Apply the knowledge of communication to understand 3 PO1, PO2, PO3,
the concepts of physical layer and datalink layer. PSO2
CO2 Analyze various MAC protocols and apply IP 4 PO2, PO3, PSO2
addressing concepts to subnet a network.
CO3 Analyze static and dynamic routing algorithms and 4 PO2, PO3, PSO2
transport layer protocols.
CO4 Analyze application layer protocols and various 4 PO2, PO3, PSO2
cryptographic algorithms.
CO5 Analyze various link layer protocols and advanced 4 PO2, PO5, PSO2
security concepts.
CO6 Analyze the functionality of the network using different 4 PO2, PO5, PSO2
protocols and working of various cryptographic
algorithms.

Syllabus

CO1: Introduction to Computer networks and Data Link Layer: Use of Computer Networks,
Network Hardware, Network software, Reference models: OSI and TCP/IP, Physical Layer:
The theoretical basis for Data Communication, Guided and Unguided Transmission Media,
Switching. Data Link Layer: DLL design issues. Error Detection and Correction, Elementary
data link protocols, sliding window protocols.

CO2: Medium Access Control Sub layer: Channel allocation problem, multiple access
protocols, Design issues of Network layer, Inter-networking Devices: Distinguishing of
Networking Devices and Inter-networking Devices, VLANS, Addressing: IP addressing
(IPV4 & IPV6), subnetting; IP Tunneling, NAT,PAT

CO3: ARP, DHCP Types of Routing: static, default and dynamic. Networking Protocols:
RIP, OSPF, BGP; Access Control list for IPV4, IPV6, Other Protocols: Transport Layer:
Process to Process Delivery; UDP; TCP; Stream Control Transmission Protocol (SCTP);
Congestion Control: Open Loop, Closed Loop Choke Packets; Quality of Service:
Techniques to Improve QoS: Leaky bucket algorithm, Token bucket algorithm.

CO4: Application Layer: DNS, SMTP, SNMP Introduction to Security, Security goals,
Security Attacks, Security Services and Mechanisms, A Security Model, Asymmetric &
Symmetric key Ciphers, Substitution Techniques, Transposition Techniques, DES, RSA
algorithm, Secure Socket Layer
CO5: Ethernet, HDLC, CHAP, PAP, PPP, PPPoE, AAA, IPSec, ACL, OSPF V3, IPV6: EUI-
64, DAD; MPLS, Firewalls, Hashing, Digital Signatures.

Text Books
1 Data Communications and Networking (3rd Ed.) –B. A. Ferouzan – TMH
2 Computer Networks (4th Ed.)”, A. S. Tanenbaum – – Pearson Education/PHI
Reference Text books
1 Data and Computer Communications (5th Ed.) – W. Stallings – PHI/ Pearson Education
2 Network for Computer Scientists & Engineers, Zheng & Akhtar, OUP
3 Data & Computer Communication, Black, PHI
4 Data Communication & Network, Miller, Vikas
5 Digital & Data Communication, Miller, Jaico
6 Understanding Data Communication & Network, Shay Vikas
Web References
1 Kurose and Rose – “Computer Networking -A top down approach featuring the internet”–
Pearson Education
2 “Communication Networks” – Leon, Garica, Widjaja TMH
3 “Internetworking with TCP/IP, Comer – vol. 1, 2, 3(4th Ed.)” – Pearson Education/PHI

Network Protocols and Security


L-T-P-S : 3-0-2-0 Credits : 3
Pre-requisites : NIL Contact Hours: 5

Mapping of Course Outcomes to Program outcomes:


CO# CO Description BTL PO/PSO Mapping
CO1 Apply the knowledge of communication to understand 3 PO1, PO2, PO3,
the concepts of physical layer and datalink layer. PSO2
CO2 Analyze various MAC protocols and apply IP 4 PO2, PO3, PSO2
addressing concepts to subnet a network.
CO3 Analyze static and dynamic routing algorithms and 4 PO2, PO3, PSO2
transport layer protocols.
CO4 Analyze application layer protocols and various 4 PO2, PO3, PSO2
cryptographic algorithms.
CO5 Analyse the functionality of the network using different 4 PO2, PO5, PSO2
protocols and working of various cryptographic
algorithms.

Syllabus

CO1: Introduction to Computer networks and Data Link Layer: Use of Computer Networks,
Network Hardware, Network software, Reference models: OSI and TCP/IP, Physical Layer:
The theoretical basis for Data Communication, Guided and Unguided Transmission Media,
Switching. Data Link Layer: DLL design issues. Error Detection and Correction, Elementary
data link protocols, sliding window protocols.

CO2: Medium Access Control Sub layer: Channel allocation problem, multiple access
protocols, Design issues of Network layer, Inter-networking Devices: Distinguishing of
Networking Devices and Inter-networking Devices, VLANS, Addressing: IP addressing
(IPV4 & IPV6), subnetting; IP Tunneling, NAT,PAT

CO3: ARP, DHCP Types of Routing: static, default and dynamic. Networking Protocols:
RIP, OSPF, BGP; Access Control list for IPV4, IPV6, Other Protocols: Transport Layer:
Process to Process Delivery; UDP; TCP; Stream Control Transmission Protocol (SCTP);
Congestion Control: Open Loop, Closed Loop Choke Packets; Quality of Service:
Techniques to Improve QoS: Leaky bucket algorithm, Token bucket algorithm.

CO4: Application Layer: DNS, SMTP, SNMP Introduction to Security, Security goals,
Security Attacks, Security Services and Mechanisms, A Security Model, Asymmetric &
Symmetric key Ciphers, Substitution Techniques, Transposition Techniques, DES, RSA
algorithm, Secure Socket Layer

Text Books
1 Data Communications and Networking (3rd Ed.) –B. A. Ferouzan – TMH
2 Computer Networks (4th Ed.)”, A. S. Tanenbaum – – Pearson Education/PHI
Reference Text books
1 Data and Computer Communications (5th Ed.) – W. Stallings – PHI/ Pearson Education
2 Network for Computer Scientists & Engineers, Zheng & Akhtar, OUP
3 Data & Computer Communication, Black, PHI
4 Data Communication & Network, Miller, Vikas
5 Digital & Data Communication, Miller, Jaico
6 Understanding Data Communication & Network, Shay Vikas
Web References
1 Kurose and Rose – “Computer Networking -A top down approach featuring the internet”–
Pearson Education
2 “Communication Networks” – Leon, Garica, Widjaja TMH
3 “Internetworking with TCP/IP, Comer – vol. 1, 2, 3(4th Ed.)” – Pearson Education/PHI

You might also like