DevEX - reference for building teams, processes, and platforms
Network programming blown up syllabus
1. Page 1 of 5
NETWORK PROGRAMMING BLOWN UP SYLLABUS
Introduction to Networking and Internet
1. What is Internet ?
1.1. A Nuts and bolts description
1.2. A Service description
1.3. What is a protocol
1.4. Some *****
2. The Network Edge
2.1. End Systems, clients and Servers
2.2. Connectionless and Connection Oriented service
3. The Network Core
3.1. Circuit Switching and Packet Switching
3.2. Packet forwarding in computer nerworks
4. Network Access and physical media
4.1. Network Access
4.2. Physical Media
5. ISPs and Internet Backbones
6. Delay and loss in Packet switching networks
6.1. Types of delays
6.2. Queuing Delays and packet loss
6.3. Delay and routes in the Internet
7. Protocol Layers and their Service models
7.1. Layered Architecture
7.2. The Internet protocol stack
7.3. Network Entities and layers
8. History of computer networking and internet
8.1. The development of packet switching 1961 – 1972
8.2. Proprietary network and internetworking 1972 – 1980
8.3. A proliferation of networks 1980 – 1990
8.4. The internet explosion 1990s
8.5. Recent development
Communication Protocols
1. Introduction
2. TCP/IP – The Internet Protocols
3. XNS – Xerox Network System
4. SNA – System Network Architecture
5. NetBIOS
6. OST Protocols
7. UUCP – Unix to Unix Copy Protocol
8. Protocol Com*****
2. Page 2 of 5
Berkeley Sockets
1. Introduction
2. Overview
3. Unix Domain Protocols
4. Socket Addresses
5. Elementary Socket System Calls
6. A Simple Example
7. Advanced Socket System Calls
8. Reserved Ports
9. Stream Pipes
10. Passing File Descriptions
11. Socket Options
12. Asynchronous I/O
13. Input/Output Multiplexing
14. Out‐of‐bound data
15. Sockets and signals
16. Internet super server
17. Socket implementation
Socket Implementation
1. Introduction
1.1. Clients and servers
1.2. What is a socket?
2. Basic Sockets
2.1. Creating and destroying
2.2. Specifying Addresses
2.3. TCP server
3. Constructing messages
3.1. Encoding Data
3.2. Byter Ordering
3.3. Alignment and Padding
3.4. Framing and parsing
4. Socket Programming
4.1. Socket options
4.2. Signals
4.3. Non blocking I/O
4.4. Multitasking
4.5. Multiplexing
4.6. Multiple Recipients
5. Under the Hood
5.1. Buffering and TCP
5.2. Deadlock
5.3. Performance Implications
5.4. TCP Socket life cycle
3. Page 3 of 5
5.5. Demultiplexing Demystified
Time and date routines
1. Introductions
2. Internet Time and date client
3. Network time and synchronization
Ping Routines
1. Introduction
2. Internet Ping client
3. XNS Echo client
System V transport layer interface
1. Introduction
2. Overview
3. Transport end point Addresses
4. Elementary TLI functions
5. A simple example
6. Advanced TLI Functions
7. Streams
8. TLI implementations
9. Stream pipes
10. Passing file descriptors
11. Input/Output Multiplexing
12. Asynchronous I/O
13. Out of Band Data
Network Security
1. Whats is Network security?
2. Principles of cryptography
2.1. Symmetric Key Cryptography
2.2. Public Key Encryption
3. Authentication
3.1. Authentication Protocol ap 1.0
3.2. Authentication Protocol ap 2.0
3.3. Authentication Protocol ap 3.0
3.4. Authentication Protocol ap 3.1
3.5. Authentication Protocol ap 4.0
3.6. Authentication Protocol ap 5.0
4. Integrity
4.1. Generating Digital Signatures
4.2. Message Digests
4.3. Hash Function Algorithms
4. Page 4 of 5
5. Key Distribution Certification
5.1. The Key Distribution Centre
5.2. Public Key Certification
6. Access Control Firewalls
6.1. Packet Filtering
6.2. Application gateway
7. Attacks and Counter measures
7.1. Mapping
7.2. Packet Sniffing
7.3. Spoofing
7.4. Denial of service and distributed denial of service attacks
7.5. Hijacking
8. Security in man layers : Case Studies
8.1. Secure email
8.2. Secured socket layer (SSL) and “Transport Layer Security” (TLS)
8.3. Network Layer Security: IPSec
8.4. Security in IEEE 802.11
9. Security
Trivial File Transfer Protocol
1. Introduction
2. Protocol
3. Security
4. Data formats
5. Connections
6. Client user interface
7. UDP implementation
8. TCP implementation
Remote procedure calls
1. Introduction
2. Transparency issues
3. RPC protocol
4. RPC programming
5. Sun RPC
6. Xerox courier
7. Apollo RPC
8. Future directions in RPC programming
Remote Login
1. Introduction
2. Terminal line disciplines
3. A sample example
4. Pseudo terminals
5. Page 5 of 5
5. Terminal modes
6. Control terminals
7. rlogin overview
8. Windowing environments
9. Flow control
10. Pseudo terminal packet mode
11. rlogin client
12. rlogin server
Router and switch configurations
Internet operating systems
1. why is an internet platform an operating system
2. properties of an internet operating system
3. why are internet operating systems necessary
4. list of internet operating systems
Internetwork Setup
Wireless Internetworking
Network Protocol Analyzers
Traffic Generation