Area 1: Computer Architecture and High-Performance Computing |
Topics:
|
Books: 1. Hennessey & Patterson, Computer Architecture: A Quantitative Approach, latest edition. 2. Culler and Singh, Parallel Computer Architecture: A Hardware/Software Approach, Morgan Kaufmann, latest edition. |
Area 2: Computer Networks |
Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, DNS—The Internet's Directory Service, Peer-to-Peer Applications Transport Layer: Connectionless Transport: UDP, Principles of Reliable Data Transfer, Connection-Oriented Transport: TCP, Principles of Congestion Control, TCP Congestion Control Network Layer: Virtual Circuit and Datagram Networks, The Internet Protocol (IP), Addressing and Subnetting, Routing Algorithms, Internet Routing Protocols, Spanning Tree Algorithms, Principles of Mobility Management and Mobile IP Link Layer and Local Area Networks: Services and Multiple Access Protocols, ARQ strategies, analysis of ARQ strategies, Ethernet: 802.3, Wi-Fi: 802.11 Wireless LANs Delay Models in Data Networks {ref 2: chapter 12] Little's theorem, Single and multiple servers queuing models, Network of queues (Jackson's theorem) Network Security: Cryptography: Principles, Ciphers, Diffie-Hellman Key Exchange, DES, AES, Cipher Modes; Public Key Infrastructures: RSA, Public Key Certificates, X.509; Digital Signatures: Message Digests, Symmetric Key Signatures, Public Key Signatures, Attacks; Security Protocols: Kerberos, SSL/TLS, IPSEC. |
References: [1] Computer Networks by Andrew Tanenbaum, Prentice Hall; 5 edition, 2010. [2] Probability, Statistics, and Random Processes for Electrical Engineering by L. Garcia, Prentice Hall; 3rd edition, 2008. |
Area 3: Computer Networks Security |
Cryptography: Principles, Ciphers, DES, AES {ref [2]}, Cipher Modes, Integrity Public Key Infrastructures: RSA, Public Key Certificates, X.509, Digital Signatures: Message Digests, Diffie-Hellman Key Exchange, Public Key Signatures, Elliptic Curve Cryptography {ref [2]} Security Protocols: Hash Functions, Access Control, Authentication, Authorization, and Other Topics, Simple Authentication, Real-World Security Protocols (SSH, SSL/TLS, IPsec, Kerberos), Attacks |
References:
|
Area 4: Digital System Design and Automation Area |
Topics:
|
References:
|