HOME > IT & Software > Network Security Implement L3 Routing Table ACL in CC++

Network Security Implement L3 Routing Table ACL in CC++

SynopsisNetwork Security – Implement L3 Routing Table & ACL...
Network Security Implement L3 Routing Table ACL in CC++  No.1

Network Security – Implement L3 Routing Table & ACL in C/C++, available at Free, has an average rating of 4.4, with 16 lectures, based on 40 reviews, and has 4708 subscribers.

Free Enroll Now

You will learn about Trie Data Structure Use in Designing Routing Table and Access Control List Longest Prefix Match based Route Lookup Bit Level Advanced Programming Build Library for Object Filtering based on Attribute Match This course is ideal for individuals who are Students, Professional Software Developers or Network Development Engineers, Cloud Or Distributed Systems or Any enthusiast who want to learn Deep Concepts It is particularly useful for Students, Professional Software Developers or Network Development Engineers, Cloud Or Distributed Systems or Any enthusiast who want to learn Deep Concepts.

Enroll now: Network Security – Implement L3 Routing Table & ACL in C/C++

Summary

Title: Network Security – Implement L3 Routing Table & ACL in C/C++

Price: Free

Average Rating: 4.4

Number of Lectures: 16

Number of Published Lectures: 16

Number of Curriculum Items: 18

Number of Published Curriculum Objects: 18

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • Trie Data Structure Use in Designing Routing Table and Access Control List
  • Longest Prefix Match based Route Lookup
  • Bit Level Advanced Programming
  • Build Library for Object Filtering based on Attribute Match
  • Who Should Attend

  • Students, Professional Software Developers
  • Network Development Engineers, Cloud Or Distributed Systems
  • Any enthusiast who want to learn Deep Concepts
  • Target Audiences

  • Students, Professional Software Developers
  • Network Development Engineers, Cloud Or Distributed Systems
  • Any enthusiast who want to learn Deep Concepts
  • ***  22 Sept 2022 – This Course is under Development  ***

    This Course aims at Explaining and Implementing the Data Structures Required to Implement IPV4 Routing Table and Access Control Lists. Both these features are ubiquitously used in Networking/Embedded/Distributed System/Cloud Computing etc, and hence we decided to throw a course on explaining the internal design and implementation.

    We shall be going to build a Library called mtrie library,which will form the foundation for implementing IPV4 Routing Table and Access Control List framework.  Trie is a popular standard data structure and its variant is used to solve different types of industry problems.

    We shall be building Cisco like Access Control List which is used for Security, Controlling the traffic flow Or restricting the access & permissions to the user to certain resources over the network. Below is Cisco Example. We shall be going to re-invent the wheel.

    access-list allow_traffic permit UDP 122.1.1.1 255.255.255.255 40.1.1.1 255.255.255.255

    access-list allow_traffic permit UDP 122.1.1.0 255.255.255.0 40.1.1.0 255.255.255.0

    access-list allow_traffic permit UDP 122.1.0.0 255.255.0.0 40.0.0.0 255.255.0.0

    access-list allow_traffic deny any 0.0.0.0 0.0.0.0

    This Course is Data Structure and Algorithmic Intensive, and We shall be showing all demonstrations in C/C++. However, you are free to implement the explained concepts in the language of your choice.

    Pre-requisite :

    It’s desirable you understand how Subnet Masks work, and a very basic Networking background is required. This Course is exclusively designed for Intermediate to advanced developers only. If you are still struggling with programming basics, pls excuse this course.  The complexity level of this course is intermediate, and not for beginners. You will need to do a lot of Bit-Level Programming in this course.

    End Product :

    The end product of this course is that you will have fully working Routing Table and Access Control List Libraries which you can further integrate into your other projects readily or decorate your resume with these milestones.

    Table of Contents

    1. What is Access Control List and how does it work?

    2. What is the Longest prefix Match?

    3. Trie Data Structure

    4. Optimizing Trie to construct Routing Table Data Structure ( called mtrie )

  • Route Insertion Algorithm

  • Route Deletion Algorithm

  • Route Search Algorithm

  • Longest Prefix Match Algorithm

  • << Delivered Till here as on 22 Sept 2022 >>

    5. Building Routing Table CRUD APIs over Mtrie Data Structure   

    6. Implementing Access Control List Over Mtrie Data Structure

  • Compiling ACL Rule into TCAM entry format

  • Installing ACL Rule

  • Uninstalling ACL Rule

  • ACL lookup based on Longest Prefix Match

  • 7. Testing our Codes and Libraries

    Course Curriculum

    Chapter 1: Agenda and Pre-Requisites

    Lecture 1: Agenda and Pre-Requisites

    Chapter 2: Revision – How ACLs and Routing Table Works

    Lecture 1: Access Control List Overview

    Lecture 2: ACL Evaluation

    Lecture 3: Longest Prefix Match based Forwarding

    Lecture 4: Summary

    Chapter 3: IPV4 Routing Table Algorithm

    Lecture 1: Prefix Masks and Wildcard

    Lecture 2: Data Structures

    Lecture 3: Route Insertion – Example 1

    Lecture 4: Route Insertion – Example 2

    Lecture 5: Summary

    Lecture 6: Route Search Algorithm

    Lecture 7: Route Deletion Algorithm

    Lecture 8: Route Deletion Example

    Lecture 9: Longest Prefix Match – Route LookUp

    Lecture 10: Route Lookup Example 1

    Lecture 11: Route Lookup Example 2

    Instructors

  • Network Security Implement L3 Routing Table ACL in CC++  No.2
    Abhishek CSEPracticals
    I build Networks !
  • Network Security Implement L3 Routing Table ACL in CC++  No.3
    Shiwani Nigam
    Digital Marketing Executive
  • Network Security Implement L3 Routing Table ACL in CC++  No.4
    Ekta Ekta
    Facilities Manager
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 1 votes
  • 3 stars: 4 votes
  • 4 stars: 13 votes
  • 5 stars: 22 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!