11498_k2r15
TRANSCRIPT
-
8/3/2019 11498_K2R15
1/3
Roll
Numb
er
Topic Description
1,31 Classless and Class
full addressing
Discuss the details of addressing including Default
gateway and Subnet mask
2,32 Design Issues in
Transport layer
How the complexity of transport layer depends on
the services provided by the network layer. how
two transport protocol entities communicate with
each other through TPDU. Also Explain the
protocols used on transport layer.
3,33 Ip Addressing Discuss the IP addressing with its types. What is
network address and host address, and show its
use by creating a small network.4,34 Subnetting Concept of subnet mask and subnet addresses.
How are subnet mask are defined and used. show
it with small example.
5,35 Error correction anddetection techniques and
implementation
Difference between Error correction and detection
techniques and discussion on all the error correction
techniques with their differences. also discuss each technique
with example
6,36 IPv6 Discuss the version 6 implementation, how is it different from
version 4. Discuss the packet format as well and show it is useby creating a small network.
7,37 Firewall Discuss the various type of software and hardware firewall.Both the Packet filter and Proxy Firewall should be discussed.
Demonstrate the use with the help of the Cisco Pix firewall
8,38 ARP / RARP Discuss the use of ARP and RARP , the concept ,packetformat ARP request and reply is unicast and broadcast.
Explain why?
9,39 Backbone networks Architecture, Protocols, Interfaces and features, services andbackbone node selection
10,40 Routers and Switches Explain the working of router with its application areas and alsodiscuss any security oriented router.Discuss the role of
switches in network with its type.
11,41 Wi Fi Concept of wifi, why to adopt wifi.Explain with its architectureand implementation of security in wifi
12,42 Hacking Discuss the cases of Securing your own pc, Securing a(web)server, Securing a network in terms of hacking.
13,43 Security of Networks Discuss the all attacks on a network and how we can manage
security for different kind of situations like large businesses,small businesses, Government. Discuss the various attacks
-
8/3/2019 11498_K2R15
2/3
against network layer protocol. i.e. IP. How to prevent from
these attacks.
14,44 WAN Protocols Discuss the types of wan protocols. Explain the working of X.25 and LAPB in detail.
15,45 E-mail Architecture of email and protocols used in it. How to setupyour own email server.
16,46 User Datagram
Protocol
Discuss the process to process communication,
how the packets are sent, what ports are used,
discuss the complete frame format and uses
17,47 Transmission
Control Protocol
Discuss the process to process communication,
how the packets are sent, what ports are used,
discuss the complete frame format and uses
18,48 Domain NameSystem
Discuss the compete DNS hierarchy, The various
domain names and how the resolution takes
place. Configure the DNS settings on a server.
Demonstrate the concept with the help of
snapshots from actual configuration
19,49 Dymanic HostConfigurationProtocol
Discuss the use and benefits of a DHCP server.
How the configuration is done and IPs allocated.
Write down and show the steps using the
snapshots. Also discuss the differences with BootP
20,50 File TransferProtocol
Discuss the uses and mode of operations of a FTP
server and client, Set up a FTP server and
download/upload a file from the same. Take the
actual snapshots of the commands that are being
typed to ftp a file from the server.
21,51 CIDR Discuss the methods used for CIDR, how is it
beneficial as compared to other techniques of
addressing. Set up a network and put addresses
based on CIDR technique to illustrate the concept.
22 SwitchingTechniques Discuss all the Switching Techniques with theirworking and differences from each other.
23 IP Tracing Discuss about ip addresses and various
techniques to trace an ip address. Use simulator
software like Boson Netsim/Packet tracer etc and
take the snapshots also to show results.
24 OSPF Discuss about this protocol and its features. Take
an example too. Use simulator software like
Boson Netsim/Packet tracer etc and take the
snapshots also to show results.
25 RIP Discuss about this protocol and its features. Take
-
8/3/2019 11498_K2R15
3/3
an example too. Use simulator software like
Boson Netsim/Packet tracer etc and take the
snapshots also to show results.
26 BGP Discuss about this protocol and its features. Take
an example too. Use simulator software likeBoson Netsim/Packet tracer etc and take the
snapshots also to show results.
27 Ethernet, LocalTalk,
Token Ring, and
FDDI.
Discuss about these protocol and its features.
Take an example too. Also elaborate on the usage
of these technologies.
28 Switching Discuss about this technique. Its advantages and
disadvantages along with an example. Also
discuss the switching used in voice
communication.
29 Multiplexing Discuss about this technique. Its advantages and
disadvantages along with an example. Also
discuss what will happen if multiplexing technique
is not there.
30 WEP & WEP issues Discuss the protocols; use the algorithm to exhibit
the usage, various areas where it can be used.
The complete protocol stack needs to be
discussed; The benefits and the downsides of WEP
are to be discussed