11498_k2r15

Upload: upendra-singh

Post on 06-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 11498_K2R15

    1/3

    Roll

    Numb

    er

    Topic Description

    1,31 Classless and Class

    full addressing

    Discuss the details of addressing including Default

    gateway and Subnet mask

    2,32 Design Issues in

    Transport layer

    How the complexity of transport layer depends on

    the services provided by the network layer. how

    two transport protocol entities communicate with

    each other through TPDU. Also Explain the

    protocols used on transport layer.

    3,33 Ip Addressing Discuss the IP addressing with its types. What is

    network address and host address, and show its

    use by creating a small network.4,34 Subnetting Concept of subnet mask and subnet addresses.

    How are subnet mask are defined and used. show

    it with small example.

    5,35 Error correction anddetection techniques and

    implementation

    Difference between Error correction and detection

    techniques and discussion on all the error correction

    techniques with their differences. also discuss each technique

    with example

    6,36 IPv6 Discuss the version 6 implementation, how is it different from

    version 4. Discuss the packet format as well and show it is useby creating a small network.

    7,37 Firewall Discuss the various type of software and hardware firewall.Both the Packet filter and Proxy Firewall should be discussed.

    Demonstrate the use with the help of the Cisco Pix firewall

    8,38 ARP / RARP Discuss the use of ARP and RARP , the concept ,packetformat ARP request and reply is unicast and broadcast.

    Explain why?

    9,39 Backbone networks Architecture, Protocols, Interfaces and features, services andbackbone node selection

    10,40 Routers and Switches Explain the working of router with its application areas and alsodiscuss any security oriented router.Discuss the role of

    switches in network with its type.

    11,41 Wi Fi Concept of wifi, why to adopt wifi.Explain with its architectureand implementation of security in wifi

    12,42 Hacking Discuss the cases of Securing your own pc, Securing a(web)server, Securing a network in terms of hacking.

    13,43 Security of Networks Discuss the all attacks on a network and how we can manage

    security for different kind of situations like large businesses,small businesses, Government. Discuss the various attacks

  • 8/3/2019 11498_K2R15

    2/3

    against network layer protocol. i.e. IP. How to prevent from

    these attacks.

    14,44 WAN Protocols Discuss the types of wan protocols. Explain the working of X.25 and LAPB in detail.

    15,45 E-mail Architecture of email and protocols used in it. How to setupyour own email server.

    16,46 User Datagram

    Protocol

    Discuss the process to process communication,

    how the packets are sent, what ports are used,

    discuss the complete frame format and uses

    17,47 Transmission

    Control Protocol

    Discuss the process to process communication,

    how the packets are sent, what ports are used,

    discuss the complete frame format and uses

    18,48 Domain NameSystem

    Discuss the compete DNS hierarchy, The various

    domain names and how the resolution takes

    place. Configure the DNS settings on a server.

    Demonstrate the concept with the help of

    snapshots from actual configuration

    19,49 Dymanic HostConfigurationProtocol

    Discuss the use and benefits of a DHCP server.

    How the configuration is done and IPs allocated.

    Write down and show the steps using the

    snapshots. Also discuss the differences with BootP

    20,50 File TransferProtocol

    Discuss the uses and mode of operations of a FTP

    server and client, Set up a FTP server and

    download/upload a file from the same. Take the

    actual snapshots of the commands that are being

    typed to ftp a file from the server.

    21,51 CIDR Discuss the methods used for CIDR, how is it

    beneficial as compared to other techniques of

    addressing. Set up a network and put addresses

    based on CIDR technique to illustrate the concept.

    22 SwitchingTechniques Discuss all the Switching Techniques with theirworking and differences from each other.

    23 IP Tracing Discuss about ip addresses and various

    techniques to trace an ip address. Use simulator

    software like Boson Netsim/Packet tracer etc and

    take the snapshots also to show results.

    24 OSPF Discuss about this protocol and its features. Take

    an example too. Use simulator software like

    Boson Netsim/Packet tracer etc and take the

    snapshots also to show results.

    25 RIP Discuss about this protocol and its features. Take

  • 8/3/2019 11498_K2R15

    3/3

    an example too. Use simulator software like

    Boson Netsim/Packet tracer etc and take the

    snapshots also to show results.

    26 BGP Discuss about this protocol and its features. Take

    an example too. Use simulator software likeBoson Netsim/Packet tracer etc and take the

    snapshots also to show results.

    27 Ethernet, LocalTalk,

    Token Ring, and

    FDDI.

    Discuss about these protocol and its features.

    Take an example too. Also elaborate on the usage

    of these technologies.

    28 Switching Discuss about this technique. Its advantages and

    disadvantages along with an example. Also

    discuss the switching used in voice

    communication.

    29 Multiplexing Discuss about this technique. Its advantages and

    disadvantages along with an example. Also

    discuss what will happen if multiplexing technique

    is not there.

    30 WEP & WEP issues Discuss the protocols; use the algorithm to exhibit

    the usage, various areas where it can be used.

    The complete protocol stack needs to be

    discussed; The benefits and the downsides of WEP

    are to be discussed