Sie sind auf Seite 1von 3

Roll Numb er 1,31 2,32

Topic

Description

Classless and Class full addressing Design Issues in Transport layer

Discuss the details of addressing including Default gateway and Subnet mask How the complexity of transport layer depends on the services provided by the network layer. how two transport protocol entities communicate with each other through TPDU. Also Explain the protocols used on transport layer. Discuss the IP addressing with its types. What is network address and host address, and show its use by creating a small network. Concept of subnet mask and subnet addresses. How are subnet mask are defined and used. show it with small example. Difference between Error correction and detection
techniques and discussion on all the error correction techniques with their differences. also discuss each technique with example Discuss the version 6 implementation, how is it different from version 4. Discuss the packet format as well and show it is use by creating a small network. Discuss the various type of software and hardware firewall. Both the Packet filter and Proxy Firewall should be discussed. Demonstrate the use with the help of the Cisco Pix firewall Discuss the use of ARP and RARP , the concept ,packet format ARP request and reply is unicast and broadcast. Explain why? Architecture, Protocols, Interfaces and features, services and backbone node selection Explain the working of router with its application areas and also discuss any security oriented router.Discuss the role of switches in network with its type. Concept of wifi, why to adopt wifi.Explain with its architecture and implementation of security in wifi Discuss the cases of Securing your own pc, Securing a (web)server, Securing a network in terms of hacking. Discuss the all attacks on a network and how we can manage security for different kind of situations like large businesses, small businesses, Government. Discuss the various attacks

3,33

Ip Addressing

4,34

Subnetting

5,35

Error correction and detection techniques and implementation

6,36

IPv6

7,37

Firewall

8,38

ARP / RARP

9,39 10,40

Backbone networks
Routers and Switches

11,41 12,42 13,43

Wi Fi Hacking Security of Networks

against network layer protocol. i.e. IP. How to prevent from these attacks.

14,44 15,45 16,46

WAN Protocols E-mail

Discuss the types of wan protocols. Explain the working of X.25 and LAPB in detail. Architecture of email and protocols used in it. How to setup your own email server.

User Datagram Protocol Transmission Control Protocol Domain System

Discuss the process to process communication, how the packets are sent, what ports are used, discuss the complete frame format and uses Discuss the process to process communication, how the packets are sent, what ports are used, discuss the complete frame format and uses

17,47

18,48

Name Discuss the compete DNS hierarchy, The various domain names and how the resolution takes place. Configure the DNS settings on a server. Demonstrate the concept with the help of snapshots from actual configuration Host Discuss the use and benefits of a DHCP server. How the configuration is done and IPs allocated. Write down and show the steps using the snapshots. Also discuss the differences with BootP

19,49

Dymanic Configuration Protocol

20,50

File Protocol

Transfer Discuss the uses and mode of operations of a FTP server and client, Set up a FTP server and download/upload a file from the same. Take the actual snapshots of the commands that are being typed to ftp a file from the server. Discuss the methods used for CIDR, how is it beneficial as compared to other techniques of addressing. Set up a network and put addresses based on CIDR technique to illustrate the concept. Discuss all the Switching Techniques with their working and differences from each other. Discuss about ip addresses and various techniques to trace an ip address. Use simulator software like Boson Netsim/Packet tracer etc and take the snapshots also to show results. Discuss about this protocol and its features. Take an example too. Use simulator software like Boson Netsim/Packet tracer etc and take the snapshots also to show results. Discuss about this protocol and its features. Take

21,51

CIDR

22 23

Switching Techniques IP Tracing

24

OSPF

25

RIP

an example too. Use simulator software like Boson Netsim/Packet tracer etc and take the snapshots also to show results. 26 BGP Discuss about this protocol and its features. Take an example too. Use simulator software like Boson Netsim/Packet tracer etc and take the snapshots also to show results. Discuss about these protocol and its features. Take an example too. Also elaborate on the usage of these technologies. Discuss about this technique. Its advantages and disadvantages along with an example. Also discuss the switching used in voice communication. Discuss about this technique. Its advantages and disadvantages along with an example. Also discuss what will happen if multiplexing technique is not there. Discuss the protocols; use the algorithm to exhibit the usage, various areas where it can be used. The complete protocol stack needs to be discussed; The benefits and the downsides of WEP are to be discussed

27

Ethernet, LocalTalk, Token Ring, and FDDI. Switching

28

29

Multiplexing

30

WEP & WEP issues

Das könnte Ihnen auch gefallen