SlideShare a Scribd company logo
Page 1 of 5 
 

                         NETWORK PROGRAMMING BLOWN UP SYLLABUS 

Introduction to Networking and Internet 

    1. What is Internet ? 
              1.1. A Nuts and bolts description 
              1.2. A Service description 
              1.3. What is a protocol 
              1.4. Some ***** 
    2. The Network Edge 
              2.1. End Systems, clients and Servers 
              2.2. Connectionless and Connection Oriented service 
    3. The Network Core 
              3.1. Circuit Switching and Packet Switching 
              3.2. Packet forwarding in computer nerworks 
    4. Network Access and physical media 
              4.1. Network Access 
              4.2. Physical Media 
    5. ISPs and Internet Backbones 
    6. Delay and loss in Packet switching networks 
              6.1. Types of delays 
              6.2. Queuing Delays and packet loss 
              6.3. Delay and routes in the Internet 
    7. Protocol Layers and their Service models 
              7.1. Layered Architecture 
              7.2. The Internet protocol stack 
              7.3. Network Entities and layers 
    8. History of computer networking and internet 
              8.1. The development of packet switching 1961 – 1972 
              8.2. Proprietary network and internetworking 1972 – 1980 
              8.3. A proliferation of networks 1980 – 1990 
              8.4. The internet explosion 1990s 
              8.5. Recent development 

Communication Protocols 

    1.   Introduction 
    2.   TCP/IP – The Internet Protocols 
    3.   XNS – Xerox Network System 
    4.   SNA – System Network Architecture 
    5.   NetBIOS 
    6.   OST Protocols 
    7.   UUCP – Unix to Unix Copy Protocol 
    8.   Protocol  Com***** 

     
Page 2 of 5 
 

    Berkeley Sockets 

    1.    Introduction 
    2.    Overview 
    3.    Unix Domain Protocols 
    4.    Socket Addresses 
    5.    Elementary Socket System Calls 
    6.    A Simple Example 
    7.    Advanced Socket System Calls 
    8.    Reserved Ports 
    9.    Stream Pipes 
    10.   Passing File Descriptions 
    11.   Socket Options 
    12.   Asynchronous I/O 
    13.   Input/Output Multiplexing 
    14.   Out‐of‐bound data 
    15.   Sockets and signals 
    16.   Internet super server 
    17.   Socket implementation 

    Socket Implementation 

    1. Introduction 
              1.1. Clients and servers 
              1.2. What is a socket? 
    2. Basic Sockets 
              2.1. Creating and destroying 
              2.2. Specifying Addresses 
              2.3. TCP server 
    3. Constructing messages 
              3.1. Encoding Data 
              3.2. Byter Ordering 
              3.3. Alignment and Padding 
              3.4. Framing and parsing 
    4. Socket Programming 
              4.1. Socket options 
              4.2. Signals 
              4.3. Non blocking I/O 
              4.4. Multitasking 
              4.5. Multiplexing 
              4.6. Multiple Recipients 
    5. Under the Hood 
              5.1. Buffering and TCP 
              5.2. Deadlock 
              5.3. Performance Implications 
              5.4. TCP Socket life cycle 
Page 3 of 5 
 

               5.5. Demultiplexing  Demystified 

Time and date routines 

    1. Introductions 
    2. Internet Time and date client 
    3. Network time and synchronization 

Ping Routines 

    1. Introduction 
    2. Internet Ping client 
    3. XNS Echo client 

System V transport layer interface 

    1.    Introduction 
    2.    Overview 
    3.    Transport end point Addresses 
    4.    Elementary TLI functions 
    5.    A simple example 
    6.    Advanced TLI Functions 
    7.    Streams 
    8.    TLI implementations 
    9.    Stream pipes 
    10.   Passing file descriptors 
    11.   Input/Output Multiplexing 
    12.   Asynchronous I/O 
    13.   Out of Band Data 

Network Security 

    1. Whats is Network security? 
    2. Principles of cryptography 
                         2.1. Symmetric Key Cryptography 
                         2.2. Public Key Encryption 
    3. Authentication 
                         3.1. Authentication Protocol  ap 1.0 
                         3.2. Authentication Protocol  ap 2.0 
                         3.3. Authentication Protocol  ap 3.0 
                         3.4. Authentication Protocol  ap 3.1 
                         3.5. Authentication Protocol  ap 4.0 
                         3.6. Authentication Protocol  ap 5.0 
4. Integrity 
                         4.1. Generating Digital Signatures 
                         4.2. Message Digests 
                         4.3. Hash Function Algorithms 
         
Page 4 of 5 
 

5. Key Distribution Certification 
                    5.1. The Key Distribution Centre 
                    5.2. Public Key Certification 
6. Access Control Firewalls 
                    6.1. Packet Filtering 
                    6.2. Application gateway 
7. Attacks and Counter measures 
                    7.1. Mapping 
                    7.2. Packet Sniffing 
                    7.3. Spoofing 
                    7.4. Denial of service and distributed denial of service attacks 
                    7.5. Hijacking 
8. Security in man layers : Case Studies 
                    8.1. Secure email 
                    8.2. Secured socket layer (SSL) and “Transport Layer Security” (TLS)  
                    8.3. Network Layer Security: IPSec 
                    8.4. Security in IEEE 802.11 
9. Security 

Trivial File Transfer Protocol 

    1.   Introduction 
    2.   Protocol 
    3.   Security 
    4.   Data formats 
    5.   Connections 
    6.   Client user interface 
    7.   UDP implementation 
    8.   TCP implementation 

Remote procedure calls 

    1.   Introduction 
    2.   Transparency issues 
    3.   RPC protocol 
    4.   RPC programming 
    5.   Sun RPC 
    6.   Xerox courier 
    7.   Apollo RPC 
    8.   Future directions in RPC programming 

Remote Login 

    1.   Introduction 
    2.   Terminal line disciplines 
    3.   A sample example 
    4.   Pseudo terminals 
Page 5 of 5 
 

    5.    Terminal modes 
    6.    Control terminals 
    7.    rlogin overview 
    8.    Windowing environments 
    9.    Flow control 
    10.   Pseudo  terminal  packet mode 
    11.   rlogin client 
    12.   rlogin server 

Router and switch configurations 

Internet operating systems 

    1.    why is an internet platform an operating system 
    2.    properties of an internet operating system 
    3.    why are internet operating systems necessary 
    4.    list of internet operating systems 

Internetwork Setup 

Wireless Internetworking 

Network Protocol Analyzers 

Traffic Generation 

 

 

           

                          

 

 

                      

 

 

 

More Related Content

What's hot

Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Jim Geovedi
 
CCNA Quick Notes
CCNA Quick NotesCCNA Quick Notes
CCNA Quick Notes
Eng. Emad Al-Atoum
 
9517ijnsa03
9517ijnsa039517ijnsa03
9517ijnsa03
IJNSA Journal
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
inbroker
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
Eng. Emad Al-Atoum
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
Tonachi Shika
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018
CodeOn
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017
Satyendra Singh
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Maximilan Wilhelm
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technologyhome
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
Carlos Humberto Rivera Mera
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
IOSR Journals
 
CCNAX 200 120 dumps
CCNAX 200 120 dumpsCCNAX 200 120 dumps
CCNAX 200 120 dumps
abdulquyyum
 
SCL
SCLSCL
SCL
ESUG
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
Maximilan Wilhelm
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IP
Maximilan Wilhelm
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Maximilan Wilhelm
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
Selva Kumar
 

What's hot (20)

Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
 
CCNA Quick Notes
CCNA Quick NotesCCNA Quick Notes
CCNA Quick Notes
 
9517ijnsa03
9517ijnsa039517ijnsa03
9517ijnsa03
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
 
CCNAX 200 120 dumps
CCNAX 200 120 dumpsCCNAX 200 120 dumps
CCNAX 200 120 dumps
 
SCL
SCLSCL
SCL
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IP
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
 

Similar to Network programming blown up syllabus

Fe4
Fe4Fe4
Networking
NetworkingNetworking
Networking
Inihsravm
 
36522520 comm-network
36522520 comm-network36522520 comm-network
36522520 comm-network
engineerNoor
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
thetechnicalzone
 
A Course Outline About Computer Networks
A Course Outline About Computer NetworksA Course Outline About Computer Networks
A Course Outline About Computer Networks
adil raja
 
Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete Guide
DaisyWatson5
 
Group Apres
Group ApresGroup Apres
Group Apresramya5a
 
ICND 1
ICND 1ICND 1
225735365 ccna-study-guide-a
225735365 ccna-study-guide-a225735365 ccna-study-guide-a
225735365 ccna-study-guide-a
homeworkping10
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
Yoram Orzach
 
Kurs CCNA 200 - 301
Kurs CCNA 200 - 301Kurs CCNA 200 - 301
Kurs CCNA 200 - 301
tctal
 
Network security essentials applications and standards - 17376.pdf
Network security essentials  applications and standards - 17376.pdfNetwork security essentials  applications and standards - 17376.pdf
Network security essentials applications and standards - 17376.pdf
DrBasemMohamedElomda
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
Sumit K Das
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
Anne Starr
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
Anne Starr
 

Similar to Network programming blown up syllabus (20)

Hhs toc glossary
Hhs toc glossaryHhs toc glossary
Hhs toc glossary
 
Fe4
Fe4Fe4
Fe4
 
Comm network
Comm networkComm network
Comm network
 
Networking
NetworkingNetworking
Networking
 
36522520 comm-network
36522520 comm-network36522520 comm-network
36522520 comm-network
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
 
A Course Outline About Computer Networks
A Course Outline About Computer NetworksA Course Outline About Computer Networks
A Course Outline About Computer Networks
 
Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete Guide
 
Group Apres
Group ApresGroup Apres
Group Apres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
ICND 1
ICND 1ICND 1
ICND 1
 
225735365 ccna-study-guide-a
225735365 ccna-study-guide-a225735365 ccna-study-guide-a
225735365 ccna-study-guide-a
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Kurs CCNA 200 - 301
Kurs CCNA 200 - 301Kurs CCNA 200 - 301
Kurs CCNA 200 - 301
 
Network security essentials applications and standards - 17376.pdf
Network security essentials  applications and standards - 17376.pdfNetwork security essentials  applications and standards - 17376.pdf
Network security essentials applications and standards - 17376.pdf
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Network programming blown up syllabus

  • 1. Page 1 of 5    NETWORK PROGRAMMING BLOWN UP SYLLABUS  Introduction to Networking and Internet  1. What is Internet ?  1.1. A Nuts and bolts description  1.2. A Service description  1.3. What is a protocol  1.4. Some *****  2. The Network Edge  2.1. End Systems, clients and Servers  2.2. Connectionless and Connection Oriented service  3. The Network Core  3.1. Circuit Switching and Packet Switching  3.2. Packet forwarding in computer nerworks  4. Network Access and physical media  4.1. Network Access  4.2. Physical Media  5. ISPs and Internet Backbones  6. Delay and loss in Packet switching networks  6.1. Types of delays  6.2. Queuing Delays and packet loss  6.3. Delay and routes in the Internet  7. Protocol Layers and their Service models  7.1. Layered Architecture  7.2. The Internet protocol stack  7.3. Network Entities and layers  8. History of computer networking and internet  8.1. The development of packet switching 1961 – 1972  8.2. Proprietary network and internetworking 1972 – 1980  8.3. A proliferation of networks 1980 – 1990  8.4. The internet explosion 1990s  8.5. Recent development  Communication Protocols  1. Introduction  2. TCP/IP – The Internet Protocols  3. XNS – Xerox Network System  4. SNA – System Network Architecture  5. NetBIOS  6. OST Protocols  7. UUCP – Unix to Unix Copy Protocol  8. Protocol  Com*****   
  • 2. Page 2 of 5    Berkeley Sockets  1. Introduction  2. Overview  3. Unix Domain Protocols  4. Socket Addresses  5. Elementary Socket System Calls  6. A Simple Example  7. Advanced Socket System Calls  8. Reserved Ports  9. Stream Pipes  10. Passing File Descriptions  11. Socket Options  12. Asynchronous I/O  13. Input/Output Multiplexing  14. Out‐of‐bound data  15. Sockets and signals  16. Internet super server  17. Socket implementation  Socket Implementation  1. Introduction  1.1. Clients and servers  1.2. What is a socket?  2. Basic Sockets  2.1. Creating and destroying  2.2. Specifying Addresses  2.3. TCP server  3. Constructing messages  3.1. Encoding Data  3.2. Byter Ordering  3.3. Alignment and Padding  3.4. Framing and parsing  4. Socket Programming  4.1. Socket options  4.2. Signals  4.3. Non blocking I/O  4.4. Multitasking  4.5. Multiplexing  4.6. Multiple Recipients  5. Under the Hood  5.1. Buffering and TCP  5.2. Deadlock  5.3. Performance Implications  5.4. TCP Socket life cycle 
  • 3. Page 3 of 5    5.5. Demultiplexing  Demystified  Time and date routines  1. Introductions  2. Internet Time and date client  3. Network time and synchronization  Ping Routines  1. Introduction  2. Internet Ping client  3. XNS Echo client  System V transport layer interface  1. Introduction  2. Overview  3. Transport end point Addresses  4. Elementary TLI functions  5. A simple example  6. Advanced TLI Functions  7. Streams  8. TLI implementations  9. Stream pipes  10. Passing file descriptors  11. Input/Output Multiplexing  12. Asynchronous I/O  13. Out of Band Data  Network Security  1. Whats is Network security?  2. Principles of cryptography  2.1. Symmetric Key Cryptography  2.2. Public Key Encryption  3. Authentication  3.1. Authentication Protocol  ap 1.0  3.2. Authentication Protocol  ap 2.0  3.3. Authentication Protocol  ap 3.0  3.4. Authentication Protocol  ap 3.1  3.5. Authentication Protocol  ap 4.0  3.6. Authentication Protocol  ap 5.0  4. Integrity  4.1. Generating Digital Signatures  4.2. Message Digests  4.3. Hash Function Algorithms   
  • 4. Page 4 of 5    5. Key Distribution Certification  5.1. The Key Distribution Centre  5.2. Public Key Certification  6. Access Control Firewalls  6.1. Packet Filtering  6.2. Application gateway  7. Attacks and Counter measures  7.1. Mapping  7.2. Packet Sniffing  7.3. Spoofing  7.4. Denial of service and distributed denial of service attacks  7.5. Hijacking  8. Security in man layers : Case Studies  8.1. Secure email  8.2. Secured socket layer (SSL) and “Transport Layer Security” (TLS)   8.3. Network Layer Security: IPSec  8.4. Security in IEEE 802.11  9. Security  Trivial File Transfer Protocol  1. Introduction  2. Protocol  3. Security  4. Data formats  5. Connections  6. Client user interface  7. UDP implementation  8. TCP implementation  Remote procedure calls  1. Introduction  2. Transparency issues  3. RPC protocol  4. RPC programming  5. Sun RPC  6. Xerox courier  7. Apollo RPC  8. Future directions in RPC programming  Remote Login  1. Introduction  2. Terminal line disciplines  3. A sample example  4. Pseudo terminals 
  • 5. Page 5 of 5    5. Terminal modes  6. Control terminals  7. rlogin overview  8. Windowing environments  9. Flow control  10. Pseudo  terminal  packet mode  11. rlogin client  12. rlogin server  Router and switch configurations  Internet operating systems  1. why is an internet platform an operating system  2. properties of an internet operating system  3. why are internet operating systems necessary  4. list of internet operating systems  Internetwork Setup  Wireless Internetworking  Network Protocol Analyzers  Traffic Generation