0% found this document useful (0 votes)
20 views

EC3401-Networks and Security - Syllabus

The document outlines the course EC3401 Networks and Security, detailing its objectives, units of study, practical exercises, course outcomes, textbooks, and references. Key topics include network models, routing protocols, transport and application layers, network security mechanisms, and hardware security. The course aims to equip students with knowledge and skills in networking and security through theoretical and practical learning experiences.

Uploaded by

jnesaratnamr
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

EC3401-Networks and Security - Syllabus

The document outlines the course EC3401 Networks and Security, detailing its objectives, units of study, practical exercises, course outcomes, textbooks, and references. Key topics include network models, routing protocols, transport and application layers, network security mechanisms, and hardware security. The course aims to equip students with knowledge and skills in networking and security through theoretical and practical learning experiences.

Uploaded by

jnesaratnamr
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

EC3401 NETWORKS AND SECURITY LTPC

3 024
COURSE OBJECTIVES:
 To learn the Network Models and datalink layer functions.
 To understand routing in the Network Layer.
 To explore methods of communication and congestion control by the Transport Layer.
 To study the Network Security Mechanisms.
 To learn various hardware security attacks and their countermeasures.
UNIT I NETWORK MODELS AND DATALINK LAYER 9
Overview of Networks and its Attributes – Network Models – OSI, TCP/IP, Addressing – Introduction
to Datalink Layer – Error Detection and Correction – Ethernet(802.3)- Wireless LAN – IEEE 802.11,
Bluetooth – Flow and Error Control Protocols – HDLC – PPP.

UNIT II NETWORK LAYER PROTOCOLS 9


Network Layer – IPv4 Addressing – Network Layer Protocols(IP,ICMP and Mobile IP) Unicast and
Multicast Routing – Intradomain and Interdomain Routing Protocols – IPv6 Addresses – IPv6 –
Datagram Format - Transition from IPv4 to IPv6.

UNIT III TRANSPORT AND APPLICATION LAYERS 9


Transport Layer Protocols – UDP and TCP Connection and State Transition Diagram - Congestion
Control and Avoidance(DEC bit, RED)- QoS - Application Layer Paradigms – Client – Server
Programming – Domain Name System – World Wide Web, HTTP, Electronic Mail.

UNIT IV NETWORK SECURITY 9


OSI Security Architecture – Attacks – Security Services and Mechanisms – Encryption –Advanced
Encryption Standard – Public Key Cryptosystems – RSA Algorithm – Hash Functions – Secure
Hash Algorithm – Digital Signature Algorithm.
UNIT V HARDWARE SECURITY 9
Introduction to hardware security, Hardware Trojans, Side – Channel Attacks – Physical Attacks and
Countermeasures – Design for Security. Introduction to Blockchain Technology.
45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
Experiments using C
1. Implement the Data Link Layer framing methods,
i) Bit stuffing, (ii) Character stuffing
2. Implementation of Error Detection / Correction Techniques
i) LRC, (ii) CRC, (iii) Hamming code
3. Implementation of Stop and Wait, and Sliding Window Protocols
4. Implementation of Go back-N and Selective Repeat Protocols.
5. Implementation of Distance Vector Routing algorithm (Routing Information Protocol)
(Bellman-Ford).
6. Implementation of Link State Routing algorithm (Open Shortest Path First) with 5 nodes
(Dijkstra's).
7. Data encryption and decryption using Data Encryption Standard algorithm.
8. Data encryption and decryption using RSA (Rivest, Shamir and Adleman) algorithm.
9. Implement Client Server model using FTP protocol.
Experiments using Tool Command Language
1. Implement and realize the Network Topology - Star, Bus and Ring using NS2.
2. Implement and perform the operation of CSMA/CD and CSMA/CA using NS2.
COURSE OUTCOMES:
Upon successful completion of the course the student will be able to
CO1: Explain the Network Models, layers and functions.
CO2: Categorize and classify the routing protocols.
CO3: List the functions of the transport and application layer.
CO4: Evaluate and choose the network security mechanisms.
CO5: Discuss the hardware security attacks and countermeasures.
TOTAL:75 PERIODS
TEXTBOOKS
1. Behrouz.A.Forouzan, Data Communication and Networking, Fifth Edition, TMH, 2017.(Unit
– I,II,III)
2. William Stallings, Cryptography and Network Security, Seventh Edition, Pearson Education,
2017(Unit- IV)
3. Bhunia Swarup, Hardware Security –A Hands On Approach,Morgan Kaufmann, First edition,
2018.(Unit – V).

REFERENCES
1. James.F.Kurose and Keith.W.Ross, Computer Networking – A Top – Down Approach, Sixth
Edition, Pearson, 2017.
2. Doughlas .E.Comer, Computer Networks and Internets with Internet Applications, Fourth
Edition, Pearson Education, 2008.

You might also like