Structure Query Language, C programming, Java, Servlet, Jsp, Unix

Tuesday 12 June 2012

FON ( FUNDAMENTALS OF NETWORKING )


**How to use Command line argument in gcc compiler

1. Framing Techniques

  1. Character Count. [SHOW]   [ READ ]
  2. Byte Stuffing. [SHOW]   [ READ ]
  3. Bit Stuffing. [SHOW]   [ READ ]
2. Error Detection and Correction Techniques
  1. Single Bit Parity. [ SHOW ]
  2. Block Parity. [ SHOW ]
  3. Checksum. [ SHOW ]
  4. CRC Checksum. [ SHOW ]
  5. LRC(Longitudinal Redundancy Check) [ SHOW ]
  6. Hamming Code. 
3. All Data Link Layer Protocols
  1. Protocol - 1 (Unrestricted Simplex Protocol) [ SHOW ]
  2. Protocol - 2 (Simplex Stop And Wait Protocol) [ SHOW ]
  3. Protocol - 3 (Simplex Protocol For Noisy Channel) [ SHOW ]
  4. Protocol - 4 (A 1-bit Sliding Window Protocol)
  5. Protocol - 5 (Go-Back N Protocol)
  6. Protocol - 6 (Selective Repeat Protocol)
4. Cryptography (Without Using java security/cryptography package).
  1. Simple Socket Programming. [ SHOW ]
  2. Generalized Caesar Cipher. [ SHOW ]
  3. Mono-alphabetic substitution cipher. [ SHOW ]
  4. Transposition(Columnar) cipher.
  5. P-Box.  [ SHOW ]
  6. S-Box.
  7. Product Cipher.
  8. One Time Pad.
5. Cryptography (suing java security/cryptography packages)
  1. DES (with ECB,CBM,CFM modes).
  2. 3DES (with ECB,CBC,CFM modes).
  3. AES(with ECB,CBC,CFM modes).
  4. Stream Cipher implementation of DES,3DES and AES.

12 comments:

  1. tankas for program bro

    ReplyDelete
  2. both are god
    prity

    ReplyDelete
  3. Thank you for giving helpful material.

    ReplyDelete
  4. Hello I wants some description about bit stuffing.

    ReplyDelete
  5. thaks for our help

    ReplyDelete
  6. dear sir when i run bit stuffing program it shows segmentation fault error kindly help to solve it.

    ReplyDelete
  7. Both the protocol 1&2, are these with command line argument??

    ReplyDelete
  8. where is hamming code n bros,,,i need that code

    ReplyDelete