

RSA Algorithm using Multiple Precision Arithmetic Library.LZW (Lempel–Ziv–Welch) Compression technique.Active and Passive attacks in Information Security.Types of DNS Attacks and Tactics for Security.Introduction of Firewall in Computer Network.Basic Network Attacks in Computer Network.Difference between layer-2 and layer-3 switches.ARP, Reverse ARP(RARP), Inverse ARP (InARP), Proxy ARP and Gratuitous ARP.How Address Resolution Protocol (ARP) works?.Difference between Circuit Switching and Packet Switching.Differences between Virtual Circuits and Datagram Networks.Packet Switching and Delays in Computer Network.Administrative Distance (AD) and Autonomous System (AS).Routing Information Protocol (RIP) V1 & V2.Features of Enhanced Interior Gateway Routing Protocol (EIGRP).Root Bridge Election in Spanning Tree Protocol.Open shortest path first (OSPF) router roles and configuration.


Open Shortest Path First (OSPF) Protocol fundamentals.Internet Control Message Protocol (ICMP).Route Poisoning and Count to infinity problem in Routing.Routing v/s Routed Protocols in Computer Network.Difference between Distance vector routing and Link State routing.Types of Network Address Translation (NAT).Introduction of Variable Length Subnet Mask (VLSM).C Program to find IP Address, Subnet Mask & Default Gateway.Program to determine class, Network and Host ID of an IPv4 address.Internet Protocol version 6 (IPv6) Header.Collision Domain and Broadcast Domain in Computer Network.Difference between Unicast, Broadcast and Multicast in Computer Network.Line Configuration in Computer Networks.Maximum Data Rate (channel capacity) for Noiseless and Noisy channels.Collision Avoidance in wireless networks.Introduction of MAC Address in Computer Network.Program to calculate the Round Trip Time (RTT).

