Computer Networks: Uses Of Computer Networks, Network Software, Network Hardware,
Network elements (LAN, WAN, host, workstation, server), Physical topologies (bus, star, ring, mesh, backbone), Reference Models-OSI – protocols on different layers, TCP/IP, Comparison, Network Introduction to Data Communications: Concepts & Terminology, Analog and Digital Signals, Data Transmission : Data Signals & Transmission, Transmission Impairments, Analog and Digital Modulation, Asynchronous & Synchronous Transmissions, Electromagnetic spectrum, Multiplexing, Transmission Media (twisted pair, coaxial cable, fibre optics), Unguided media: (Radio waves, microwave, Infrared, Bluetooth, Wi-Fi, Wi-Max). The Medium Access sub layer: The Channel Allocation Problem, Multiple Access Protocols (The Ethernet MAC sub layer Protocol, The Binary Exponential Back off Algorithm, Ethernet Performance, Switched Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.2: Logical Link Control) Network Layer Design Issues, Routing Algorithms, Congestion Control Algorithms, Quality Of Service (Requirements, Techniques For Achieving Good Quality Of Services https://www.slideshare.net/abhishekwadhwa786/quality-ofservice- abhishek?next_slideshow=1 ), Internetworking, IPv4, ICMP (Internet Control Message Protocol), IPv6, and ICMPv6. SECTION B The Transport Service (Services Provided To The Upper Layers And Transport Service Primitives), Elements Of Transport Protocols, The Internet Transport Protocols: UDP(Introduction To UDP, Remote Procedure Call), TCP(Introduction To TCP, The TCP Service Model, The TCP Protocol, The TCP Segment Header, TCP Connection Establishment, TCP Connection Release, Modelling TCP Connection Management, TCP Transmission Policy And TCP Congestion Control) The Application Layer: Domain Name System, Domain Name Space, DNS in the Internet, Electronic Mail, WWW (Architectural overview), HTTP, introduction to SNMP, Multimedia (introduction to audio, voice over IP, introduction to video, video on demand), Introduction to cryptography, substitution ciphers, transposition ciphers, one-time pads, two fundamental cryptographic principles(Redundancy, freshness), digital signatures(symmetric-key signatures, public key-signatures, message digests and the birthday attack), management of Public Keys (certificates). Cloud Computing Basics: Overview, Applications, Intranet and the Cloud, First Movers on the cloud, the need for Cloud Computing, Benefits of cloud Computing, Limitations of Cloud Computing
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Palo Alto Networks: The Ultimate Guide To Quickly Pass All The Exams And Getting Certified. Real Practice Test With Detailed Screenshots, Answers And Explanations
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)