SlideShare a Scribd company logo
1 of 5
Download to read offline
Page 1 of 5 
 

                         NETWORK PROGRAMMING BLOWN UP SYLLABUS 

Introduction to Networking and Internet 

    1. What is Internet ? 
              1.1. A Nuts and bolts description 
              1.2. A Service description 
              1.3. What is a protocol 
              1.4. Some ***** 
    2. The Network Edge 
              2.1. End Systems, clients and Servers 
              2.2. Connectionless and Connection Oriented service 
    3. The Network Core 
              3.1. Circuit Switching and Packet Switching 
              3.2. Packet forwarding in computer nerworks 
    4. Network Access and physical media 
              4.1. Network Access 
              4.2. Physical Media 
    5. ISPs and Internet Backbones 
    6. Delay and loss in Packet switching networks 
              6.1. Types of delays 
              6.2. Queuing Delays and packet loss 
              6.3. Delay and routes in the Internet 
    7. Protocol Layers and their Service models 
              7.1. Layered Architecture 
              7.2. The Internet protocol stack 
              7.3. Network Entities and layers 
    8. History of computer networking and internet 
              8.1. The development of packet switching 1961 – 1972 
              8.2. Proprietary network and internetworking 1972 – 1980 
              8.3. A proliferation of networks 1980 – 1990 
              8.4. The internet explosion 1990s 
              8.5. Recent development 

Communication Protocols 

    1.   Introduction 
    2.   TCP/IP – The Internet Protocols 
    3.   XNS – Xerox Network System 
    4.   SNA – System Network Architecture 
    5.   NetBIOS 
    6.   OST Protocols 
    7.   UUCP – Unix to Unix Copy Protocol 
    8.   Protocol  Com***** 

     
Page 2 of 5 
 

    Berkeley Sockets 

    1.    Introduction 
    2.    Overview 
    3.    Unix Domain Protocols 
    4.    Socket Addresses 
    5.    Elementary Socket System Calls 
    6.    A Simple Example 
    7.    Advanced Socket System Calls 
    8.    Reserved Ports 
    9.    Stream Pipes 
    10.   Passing File Descriptions 
    11.   Socket Options 
    12.   Asynchronous I/O 
    13.   Input/Output Multiplexing 
    14.   Out‐of‐bound data 
    15.   Sockets and signals 
    16.   Internet super server 
    17.   Socket implementation 

    Socket Implementation 

    1. Introduction 
              1.1. Clients and servers 
              1.2. What is a socket? 
    2. Basic Sockets 
              2.1. Creating and destroying 
              2.2. Specifying Addresses 
              2.3. TCP server 
    3. Constructing messages 
              3.1. Encoding Data 
              3.2. Byter Ordering 
              3.3. Alignment and Padding 
              3.4. Framing and parsing 
    4. Socket Programming 
              4.1. Socket options 
              4.2. Signals 
              4.3. Non blocking I/O 
              4.4. Multitasking 
              4.5. Multiplexing 
              4.6. Multiple Recipients 
    5. Under the Hood 
              5.1. Buffering and TCP 
              5.2. Deadlock 
              5.3. Performance Implications 
              5.4. TCP Socket life cycle 
Page 3 of 5 
 

               5.5. Demultiplexing  Demystified 

Time and date routines 

    1. Introductions 
    2. Internet Time and date client 
    3. Network time and synchronization 

Ping Routines 

    1. Introduction 
    2. Internet Ping client 
    3. XNS Echo client 

System V transport layer interface 

    1.    Introduction 
    2.    Overview 
    3.    Transport end point Addresses 
    4.    Elementary TLI functions 
    5.    A simple example 
    6.    Advanced TLI Functions 
    7.    Streams 
    8.    TLI implementations 
    9.    Stream pipes 
    10.   Passing file descriptors 
    11.   Input/Output Multiplexing 
    12.   Asynchronous I/O 
    13.   Out of Band Data 

Network Security 

    1. Whats is Network security? 
    2. Principles of cryptography 
                         2.1. Symmetric Key Cryptography 
                         2.2. Public Key Encryption 
    3. Authentication 
                         3.1. Authentication Protocol  ap 1.0 
                         3.2. Authentication Protocol  ap 2.0 
                         3.3. Authentication Protocol  ap 3.0 
                         3.4. Authentication Protocol  ap 3.1 
                         3.5. Authentication Protocol  ap 4.0 
                         3.6. Authentication Protocol  ap 5.0 
4. Integrity 
                         4.1. Generating Digital Signatures 
                         4.2. Message Digests 
                         4.3. Hash Function Algorithms 
         
Page 4 of 5 
 

5. Key Distribution Certification 
                    5.1. The Key Distribution Centre 
                    5.2. Public Key Certification 
6. Access Control Firewalls 
                    6.1. Packet Filtering 
                    6.2. Application gateway 
7. Attacks and Counter measures 
                    7.1. Mapping 
                    7.2. Packet Sniffing 
                    7.3. Spoofing 
                    7.4. Denial of service and distributed denial of service attacks 
                    7.5. Hijacking 
8. Security in man layers : Case Studies 
                    8.1. Secure email 
                    8.2. Secured socket layer (SSL) and “Transport Layer Security” (TLS)  
                    8.3. Network Layer Security: IPSec 
                    8.4. Security in IEEE 802.11 
9. Security 

Trivial File Transfer Protocol 

    1.   Introduction 
    2.   Protocol 
    3.   Security 
    4.   Data formats 
    5.   Connections 
    6.   Client user interface 
    7.   UDP implementation 
    8.   TCP implementation 

Remote procedure calls 

    1.   Introduction 
    2.   Transparency issues 
    3.   RPC protocol 
    4.   RPC programming 
    5.   Sun RPC 
    6.   Xerox courier 
    7.   Apollo RPC 
    8.   Future directions in RPC programming 

Remote Login 

    1.   Introduction 
    2.   Terminal line disciplines 
    3.   A sample example 
    4.   Pseudo terminals 
Page 5 of 5 
 

    5.    Terminal modes 
    6.    Control terminals 
    7.    rlogin overview 
    8.    Windowing environments 
    9.    Flow control 
    10.   Pseudo  terminal  packet mode 
    11.   rlogin client 
    12.   rlogin server 

Router and switch configurations 

Internet operating systems 

    1.    why is an internet platform an operating system 
    2.    properties of an internet operating system 
    3.    why are internet operating systems necessary 
    4.    list of internet operating systems 

Internetwork Setup 

Wireless Internetworking 

Network Protocol Analyzers 

Traffic Generation 

 

 

           

                          

 

 

                      

 

 

 

More Related Content

What's hot

Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Jim Geovedi
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018CodeOn
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017Satyendra Singh
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFMaximilan Wilhelm
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technologyhome
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
 
CCNAX 200 120 dumps
CCNAX 200 120 dumpsCCNAX 200 120 dumps
CCNAX 200 120 dumpsabdulquyyum
 
SCL
SCLSCL
SCLESUG
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackMaximilan Wilhelm
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPMaximilan Wilhelm
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPMaximilan Wilhelm
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...Selva Kumar
 

What's hot (20)

Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
 
CCNA Quick Notes
CCNA Quick NotesCCNA Quick Notes
CCNA Quick Notes
 
9517ijnsa03
9517ijnsa039517ijnsa03
9517ijnsa03
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
 
CCNAX 200 120 dumps
CCNAX 200 120 dumpsCCNAX 200 120 dumps
CCNAX 200 120 dumps
 
SCL
SCLSCL
SCL
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IP
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
 

Similar to Network programming blown up syllabus

36522520 comm-network
36522520 comm-network36522520 comm-network
36522520 comm-networkengineerNoor
 
A Course Outline About Computer Networks
A Course Outline About Computer NetworksA Course Outline About Computer Networks
A Course Outline About Computer Networksadil raja
 
Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete GuideDaisyWatson5
 
Group Apres
Group ApresGroup Apres
Group Apresramya5a
 
225735365 ccna-study-guide-a
225735365 ccna-study-guide-a225735365 ccna-study-guide-a
225735365 ccna-study-guide-ahomeworkping10
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Kurs CCNA 200 - 301
Kurs CCNA 200 - 301Kurs CCNA 200 - 301
Kurs CCNA 200 - 301tctal
 
Network security essentials applications and standards - 17376.pdf
Network security essentials  applications and standards - 17376.pdfNetwork security essentials  applications and standards - 17376.pdf
Network security essentials applications and standards - 17376.pdfDrBasemMohamedElomda
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network AssociateSumit K Das
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 

Similar to Network programming blown up syllabus (20)

Hhs toc glossary
Hhs toc glossaryHhs toc glossary
Hhs toc glossary
 
Fe4
Fe4Fe4
Fe4
 
36522520 comm-network
36522520 comm-network36522520 comm-network
36522520 comm-network
 
Comm network
Comm networkComm network
Comm network
 
Networking
NetworkingNetworking
Networking
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
 
A Course Outline About Computer Networks
A Course Outline About Computer NetworksA Course Outline About Computer Networks
A Course Outline About Computer Networks
 
Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete Guide
 
Group Apres
Group ApresGroup Apres
Group Apres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
ICND 1
ICND 1ICND 1
ICND 1
 
225735365 ccna-study-guide-a
225735365 ccna-study-guide-a225735365 ccna-study-guide-a
225735365 ccna-study-guide-a
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Kurs CCNA 200 - 301
Kurs CCNA 200 - 301Kurs CCNA 200 - 301
Kurs CCNA 200 - 301
 
Network security essentials applications and standards - 17376.pdf
Network security essentials  applications and standards - 17376.pdfNetwork security essentials  applications and standards - 17376.pdf
Network security essentials applications and standards - 17376.pdf
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Network programming blown up syllabus

  • 1. Page 1 of 5    NETWORK PROGRAMMING BLOWN UP SYLLABUS  Introduction to Networking and Internet  1. What is Internet ?  1.1. A Nuts and bolts description  1.2. A Service description  1.3. What is a protocol  1.4. Some *****  2. The Network Edge  2.1. End Systems, clients and Servers  2.2. Connectionless and Connection Oriented service  3. The Network Core  3.1. Circuit Switching and Packet Switching  3.2. Packet forwarding in computer nerworks  4. Network Access and physical media  4.1. Network Access  4.2. Physical Media  5. ISPs and Internet Backbones  6. Delay and loss in Packet switching networks  6.1. Types of delays  6.2. Queuing Delays and packet loss  6.3. Delay and routes in the Internet  7. Protocol Layers and their Service models  7.1. Layered Architecture  7.2. The Internet protocol stack  7.3. Network Entities and layers  8. History of computer networking and internet  8.1. The development of packet switching 1961 – 1972  8.2. Proprietary network and internetworking 1972 – 1980  8.3. A proliferation of networks 1980 – 1990  8.4. The internet explosion 1990s  8.5. Recent development  Communication Protocols  1. Introduction  2. TCP/IP – The Internet Protocols  3. XNS – Xerox Network System  4. SNA – System Network Architecture  5. NetBIOS  6. OST Protocols  7. UUCP – Unix to Unix Copy Protocol  8. Protocol  Com*****   
  • 2. Page 2 of 5    Berkeley Sockets  1. Introduction  2. Overview  3. Unix Domain Protocols  4. Socket Addresses  5. Elementary Socket System Calls  6. A Simple Example  7. Advanced Socket System Calls  8. Reserved Ports  9. Stream Pipes  10. Passing File Descriptions  11. Socket Options  12. Asynchronous I/O  13. Input/Output Multiplexing  14. Out‐of‐bound data  15. Sockets and signals  16. Internet super server  17. Socket implementation  Socket Implementation  1. Introduction  1.1. Clients and servers  1.2. What is a socket?  2. Basic Sockets  2.1. Creating and destroying  2.2. Specifying Addresses  2.3. TCP server  3. Constructing messages  3.1. Encoding Data  3.2. Byter Ordering  3.3. Alignment and Padding  3.4. Framing and parsing  4. Socket Programming  4.1. Socket options  4.2. Signals  4.3. Non blocking I/O  4.4. Multitasking  4.5. Multiplexing  4.6. Multiple Recipients  5. Under the Hood  5.1. Buffering and TCP  5.2. Deadlock  5.3. Performance Implications  5.4. TCP Socket life cycle 
  • 3. Page 3 of 5    5.5. Demultiplexing  Demystified  Time and date routines  1. Introductions  2. Internet Time and date client  3. Network time and synchronization  Ping Routines  1. Introduction  2. Internet Ping client  3. XNS Echo client  System V transport layer interface  1. Introduction  2. Overview  3. Transport end point Addresses  4. Elementary TLI functions  5. A simple example  6. Advanced TLI Functions  7. Streams  8. TLI implementations  9. Stream pipes  10. Passing file descriptors  11. Input/Output Multiplexing  12. Asynchronous I/O  13. Out of Band Data  Network Security  1. Whats is Network security?  2. Principles of cryptography  2.1. Symmetric Key Cryptography  2.2. Public Key Encryption  3. Authentication  3.1. Authentication Protocol  ap 1.0  3.2. Authentication Protocol  ap 2.0  3.3. Authentication Protocol  ap 3.0  3.4. Authentication Protocol  ap 3.1  3.5. Authentication Protocol  ap 4.0  3.6. Authentication Protocol  ap 5.0  4. Integrity  4.1. Generating Digital Signatures  4.2. Message Digests  4.3. Hash Function Algorithms   
  • 4. Page 4 of 5    5. Key Distribution Certification  5.1. The Key Distribution Centre  5.2. Public Key Certification  6. Access Control Firewalls  6.1. Packet Filtering  6.2. Application gateway  7. Attacks and Counter measures  7.1. Mapping  7.2. Packet Sniffing  7.3. Spoofing  7.4. Denial of service and distributed denial of service attacks  7.5. Hijacking  8. Security in man layers : Case Studies  8.1. Secure email  8.2. Secured socket layer (SSL) and “Transport Layer Security” (TLS)   8.3. Network Layer Security: IPSec  8.4. Security in IEEE 802.11  9. Security  Trivial File Transfer Protocol  1. Introduction  2. Protocol  3. Security  4. Data formats  5. Connections  6. Client user interface  7. UDP implementation  8. TCP implementation  Remote procedure calls  1. Introduction  2. Transparency issues  3. RPC protocol  4. RPC programming  5. Sun RPC  6. Xerox courier  7. Apollo RPC  8. Future directions in RPC programming  Remote Login  1. Introduction  2. Terminal line disciplines  3. A sample example  4. Pseudo terminals 
  • 5. Page 5 of 5    5. Terminal modes  6. Control terminals  7. rlogin overview  8. Windowing environments  9. Flow control  10. Pseudo  terminal  packet mode  11. rlogin client  12. rlogin server  Router and switch configurations  Internet operating systems  1. why is an internet platform an operating system  2. properties of an internet operating system  3. why are internet operating systems necessary  4. list of internet operating systems  Internetwork Setup  Wireless Internetworking  Network Protocol Analyzers  Traffic Generation