This course provides an introduction to fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics to be covered include: overview of network architectures, applications (HTTP, FTP), network programming interfaces (e.g., sockets), transport (TCP, UDP), flow control, congestion control, IP, routing , IPv6, multicast, data link protocols, error-detection/correction, multiple access, LAN, Ethernet, wireless networks, and network security. Examples will be drawn primarily from the Internet (e.g., TCP, UDP, and IP) protocol suite. Over the course of the quarter, students program in C++ on UNIX systems to build web clients and servers, and a fully compatible TCP/IP stack that can run them.
Introduction to Computer Networking
- Filed under Academic Lectures
-
September 12, 2014
-
September 12, 2014
Permanent link to this article: https://www.darknessgate.com/2014/09/12/introduction-computer-networking/
Categories
- Cloud Encryption (5)
- Privacy Tools (96)
- Web Proxies (2)
- Safe Browsing (16)
- Secure Connection (25)
- Secure Deletetion (8)
- Cleaning Tools (21)
- Encryption Tools (25)
- Hiding techniques (13)
- Anonymity Online (30)
- Android (1)
- Malicious Software Detection (78)
- Anti Malware (5)
- AntiVirus (29)
- Anti Trojan (16)
- Anti KeyLogger (20)
- Anti Spyware (37)
- Anti Rootkits (25)
- Anti Spam (8)
- Anti Phishing (3)
- Anti Stealth (0)
- Process Discovery (15)
- Integrity Checking Tools (15)
- Startup Program Monitor (6)
- System Management (42)
- Backup Software (20)
- Data Recovery (16)
- Registry Monitor (10)
- Network Security (58)
- Firewall (17)
- Vulnerability scanner (1)
- Network Analyzer (22)
- Intrusion Detection Systems (IDS) (6)
- Port Monitor (7)
- Traceroutes Tools (0)
- Anti-Sniffing Tools (6)
- DNS Tools (1)
- Wireless Networks Security (67)
- Web Application Security (22)
- SQL Injunction detection tools (20)
- Website Mirroring Tools (9)
- Linux Security Distro (27)
- Social engineering (4)
- Digital Forensic (97)
- Integrated Forensic Software (13)
- Debuggers (1)
- Memory Imaging (16)
- $MFT Parser (2)
- Encrypted Disk Detector (2)
- Metadata Analyzer (6)
- Registry analysis (7)
- Forensic Live CD/DVD (5)
- Memory Forensics (10)
- Forensic Tools (3)
- Password Recovery (12)
- Hex Editor (12)
- Disk Image (13)
- USB Write Blocker (4)
- Browser Forensic (1)
- Email Forensic (3)
- Forensic User Groups (1)
- Antiforensics (19)
- Learn Programming (28)
- Academic Lectures (100)
- Technical Training (17)
- Tech Tips (1)
- Security News (100)
- Uncategorized (5)
Archive
Data Hiding Techniques in Windows OS
Your Location
Tag Cloud
Android anonymouse anonymouse IM Browser Specific checksum Command Line Tool Commercial Application Computer Forensics Course Lectuers Cyber intelligence Data Hiding Digital Certificates Encryption File System FireWall Framework Freeware Hash Internet Protocols intrusion detection Latest Computer Security News learn programming Linux OS Mac Malware Analysis Mobile Networks Network Backup Network Forensics Online Tool open source Password Cracking PC Utilities Portable Version Privacy Safety Online Secure Communication Security learning Symbian USB USB flash USB forensic vulnerability scanner Windows OS wireless networks XSS