Computer Networks & Data Communication Essentials - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Computer Networks & Data Communication Essentials (/Thread-Computer-Networks-Data-Communication-Essentials) |
Computer Networks & Data Communication Essentials - BaDshaH - 11-03-2023 Published 11/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 2.35 GB | Duration: 6h 43m A Comprehensive Guide to Internet Technologies: From Basics to Advanced Protocols and Security Measures [b]What you'll learn[/b] Computer Network Essentials StackHow Internet & Computer Networks Work? Over All TCP/IP Protocol Stack Important Application Layer Protocols TCP & UDP as Transport Layer Protocls IP Addressing: Classless InterDomain Routing (CIDR) Working of Switches & Routers Different Routing protocols & their comparison NAT, ICMP, ARP Multiple Access Protocols: ALOHA, Slotted ALOHA, CSMA/CD Ethernet Protocol Virtual LANS (VLANs) [b]Requirements[/b] Be ready to learn A Computer or laptop with internet connection No Prior Computer Networks' Knowledge Required [b]Description[/b] This meticulously designed program is tailored for beginners and aspiring IT professionals, providing a solid foundation in the core principles of computer networking & data communication. Whether you're a student venturing into the world of technology or a professional looking to strengthen your skills, this course offers a practical and accessible approach to understanding the fundamentals of computer networks.By the end of this course, you will have a comprehensive understanding of computer network essentials, empowering you to navigate the dynamic world of networking confidently. Join us on this educational journey, and let's build a strong foundation for your success in the exciting field of computer networks!Sections Breakdown:Introduction to Computer Networks:Explore the essentials of the internet, dissecting the components that form its backbone.Understand the roles of hosts, clients, and servers in network communication.Navigate through the Access Network, Core Network, and the overall architecture of the internet.Gain insights into the layers of the Internet Protocol (IP) stack.Application Layerive into networking applications and their design principles, including Client-Server and Peer-to-Peer architectures.Learn the intricacies of processes communicating through sockets.Explore protocols such as HTTP, FTP, SMTP, and DNS that drive internet applications.Understand the working of web caches and the BitTorrent file-sharing application.Transport Layerifferentiate between the Transport and Network layers.Compare and contrast TCP and UDP, delving into their segment structures and flow control mechanisms.Explore the intricacies of the TCP three-way handshake and connection closure.Network Layer:Understand the functions of routers, focusing on routing and forwarding.Grasp the nuances of IP addressing, subnets, and hierarchical addressing.Explore dynamic protocols like DHCP and NAT, essential for efficient network management.Gain insights into routing types, including static and dynamic, and Inter-AS routing protocols like BGP.Learn about ICMP, IPv6, and the complexities of routing on the Internet.The Link Layerelve into the services provided by the Link Layer, covering framing, link access, reliability, and more.Understand the role of network interface cards (NIC) and the communication between adjacent nodes.Explore multiple access protocols, controlled access protocols, and address resolution with ARP.Learn about Ethernet, switches, and the motivation behind using Virtual LANs (VLANs).The Physical Layer:Trace the evolution of IEEE 802.3 Ethernet standards and common implementations of fast Ethernet.Computer Network Security:Gain insights into firewalls, their types, and their critical role in network security.Explore stateless and stateful packet filtering, application gateways, and best practices for securing computer networks.Join us on this educational journey, where you'll not only learn the essentials but also delve into advanced protocols and security measures. Overview Section 1: Introduction Lecture 1 What is a Computer network? Lecture 2 Nuts and Bolts of Internet Lecture 3 Nuts and Bolts of Internet-Network Edge Devices "Hosts": Clients and Servers Lecture 4 Nuts and Bolts of Internet-Access Network & Core Network Lecture 5 Internet Structure: Network of Networks Lecture 6 How to Solve the Complexity of Internet-Computer Networks Lecture 7 Layered Approach To Solve Complexity: Air Travel Example Lecture 8 Internet Protocol (IP) Stack Lecture 9 Physical Layer Lecture 10 Datalink Layer Lecture 11 Network Layer Lecture 12 IP Address Format for IPv4 Lecture 13 Transport Layer Lecture 14 Application Layer Section 2: The Application Layer Lecture 15 The Reason Internet Exists: Networking Applications & Their Design Principle Lecture 16 Types of Network Applications: Client-Server Architecture Lecture 17 Types of Network Applications: Peer-to-Peer Architecture Lecture 18 Examples of Application Layer Protocols Lecture 19 Transport Service Requirements for Different Application Layer Protocols Lecture 20 How Processes Communicate using Sockets? Lecture 21 TCP Vs UDP as the Transport Layer Protocols Lecture 22 Transport Layer Protocols Used by the Notable Application Layer Protocols Lecture 23 Hypertext Transfer Protocol (HTTP) & Anatomy of a Webpage Lecture 24 Overview of HTTP Protocol Lecture 25 Persistent & Non-Persistent HTTP Lecture 26 Non-Persistent HTTP Example Lecture 27 Per Object Response Time in Non-Persistent HTTP Lecture 28 Response Time Comparison Between Persistent & Non-Persistent HTTP Lecture 29 General Format of an HTTP Request Message Lecture 30 HTTP Request Methods Lecture 31 General Format of an HTTP Response Message Lecture 32 HTTP Response Status Codes Lecture 33 Why use Cookies to Maintain Client-Server State Lecture 34 Application of Cookies Lecture 35 Maintaining Client & Server State Using Cookies Lecture 36 Displaying a Web Page with AD without using Cookies Lecture 37 Use Third Party Cookies To Track a User's Behaviour & Display Targeted Ads Lecture 38 Cookies and Privacy Concerns Lecture 39 How Web Cache (aka Proxy Server) Works? Lecture 40 Conditional GET to Update the Web Cache Lecture 41 Introduction to File Transfer Protocol (FTP) Lecture 42 FTP: Separate Control & Data Connections Lecture 43 FTP Commands & Responses Lecture 44 Simple Mail Transfer Protocol (SMTP) & Components of an Internet E-mail System Lecture 45 Example Scenario: Alice Sends an E-mail to Bob Lecture 46 An E-mail Message Format Lecture 47 SMTP Protocol Description (RFC 5321) Lecture 48 An Example of SMTP Client-Server Interaction Lecture 49 Mail Access Protocols: POP, IMAP, HTTP Lecture 50 Introduction to Domain Name System (DNS) Lecture 51 Basic Working Principle of DNS Lecture 52 Root, Top-Level Domain and Authoritative Servers Lecture 53 DNS Name Resolution: Iterated Query Lecture 54 DNS Name Resolution: Recursive Query Lecture 55 Caching of DNS Information To Improve Response Time Lecture 56 BitTorrent: Peer-to-Peer File Sharing Application Lecture 57 BitTorrent: Tit-for-Tat Upload Priority Section 3: The Transport Layer Lecture 58 Introduction to the Transport Layer Lecture 59 Transport Vs Network Layer Lecture 60 Two Principal Transport Layer Protocols: TCP & UDP Lecture 61 Transport Layer Multiplexing/Demultiplexing Lecture 62 How Transport Layer De-Multiplexing Works? Lecture 63 UDP (Connection-less) Demultiplexing: An Example Lecture 64 TCP (Connection-Oriented) Demultiplexing: An Example Lecture 65 User Datagram Protocol (UDP) Overview Lecture 66 Use Cases of UDP Lecture 67 UDP Segment Format Lecture 68 UDP Checksum Lecture 69 Transmission Control Protocol (TCP) Overview Lecture 70 TCP Seq. Numbers & ACKs Lecture 71 Bidertional Data Transfer Using TCP Lecture 72 TCP Reliability: Re-transmissions due to timeout events & Three Duplicate Acks Lecture 73 TCP Re-transmission Scenarios Lecture 74 TCP Segment Structure Lecture 75 TCP Flow Control Lecture 76 TCP Congestion Control Approach Lecture 77 Three Components of TCP Congestion Control: 1) Slow Start Lecture 78 2) Congestion (TCP Tahoe) Lecture 79 3) Fast Recovery (TCP Reno) Lecture 80 TCP Three-Way Handshake Lecture 81 Closing a TCP Connection Section 4: The Network Layer Lecture 82 Introduction to the Network Layer Lecture 83 Two Key Functions of Router: Routing and Forwarding Lecture 84 IP Range Aggregation and Longest Prefix Matching in Routing Tables Lecture 85 IP Addressing: A Data Network Example Lecture 86 IP Addressing: What is an interface? Lecture 87 IP Addressing: Subnets Lecture 88 Example: How many Subnets? Lecture 89 Internet IP Address Assignment Strategy Lecture 90 Hierarical Addressing: More Efficient Routing Lecture 91 Classless InterDomain Routing (CIDR) Lecture 92 How Does a Host Get An IP Address? Dynamic Host Configuration Protocol (DHCP) Lecture 93 Network Address Translation (NAT): Why NAT? Lecture 94 Principle of NAT Lecture 95 A NAT Scenario Lecture 96 Advantages of NAT Lecture 97 The NAT Traversal Problem Lecture 98 What is Routing and its Types? Static Vs Dynamic Routing Lecture 99 What is an Autonomous System (AS)? Intra-AS & Inter-AS Routing Protocols Lecture 100 Types of Interior Gateway Routing Protocols (IGPs): 1. Distance Vector Routing Lecture 101 2. Link State Routing Lecture 102 Why Inter-AS Routing Protocol is Used? Lecture 103 Example of Inter-AS Routing Lecture 104 Example of Inter-AS Routing: Choosing Among Multiple ASes Lecture 105 Inter-AS Routing on Internet using Border Gateway Protocol (BGP) Lecture 106 Internet Control Message Protocol (ICMP) Lecture 107 ICMP Error Message Example: Time Exceeded Lecture 108 Traceroute Lecture 109 Ping Command Using ICMP Echo & Reply Messages Lecture 110 IPv6 IP Address Section 5: The Link Layer Lecture 111 Introduction to the Link Layer Lecture 112 Why Different Link Layer Protocols for Different Physical Links? Lecture 113 Router Vs Switch Lecture 114 Services Provided by the Link Layer: Framing, Link Access, Reliability Lecture 115 Services Provided by the Link Layer: Flow Control, Error Detection & Correction Lecture 116 What is Network Interface Card (NIC) & how Adjacent Nodes Communicate using NIC? Lecture 117 Main Types of Link Access Protocols Lecture 118 Types of Multiple Access Protocols: 1) Channelization Protocols Lecture 119 Example of FDMA & TDMA Lecture 120 Types of Multiple Access Protocols: 2) Random Access Protocols Lecture 121 Pure ALOHA Lecture 122 Pros and Cons of Pure ALOHA Lecture 123 Slotted ALOHA Protocol and its Pros & Cons Lecture 124 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Lecture 125 Ethernet CSMA/CD Algorithm Lecture 126 Controlled Access (Taking Turns) Protocols Lecture 127 Polling Based Controlled Access Protocols Lecture 128 Token Passing Controlled Access Protocols Lecture 129 IP Vs MAC Address Lecture 130 Portability of the MAC Address Lecture 131 Address Resolution Protocol (ARP) Lecture 132 ARP Protocol in Action Lecture 133 Routing of IP Packets from One Subnet to Another Subnet Lecture 134 Ethernet & Its Physical Topology Lecture 135 Ethernet Frame Structure Lecture 136 Ethernet: Unreliable, Connection-less Lecture 137 Ethernet Switch & Its Properties Lecture 138 How Switch Self-learns the Forwarding Table? Lecture 139 Switch Working Algorithm Lecture 140 An Example of Switch Self-learning & Forwarding Lecture 141 Self learning of Switch Forwarding Tables in Case of Interconnected Switches Lecture 142 Motivation For Using Virtual LANs (VLANS) Lecture 143 Problem with VLANs Spanning Multiple Switches Lecture 144 VLAN Trunking Section 6: The Physical Layer Lecture 145 Evolution of IEEE 802.3 Ethernet Standards: Link & Physical Layer Lecture 146 Common Implementations of Fast Ethernet: Physical Layer of 10Base2 & 10Base5 Lecture 147 Common Implementations of Fast Ethernet: Physical Layer of 10BaseT Lecture 148 Common Implementations of Fast Ethernet: Physical Layer of 10BaseF Lecture 149 Common Gigabit and Fast Ethernet Implementation Section 7: Computer Network Security Lecture 150 What is a Firewall? Lecture 151 Why Firewalls are used? Lecture 152 Types of Firewalls: 1) Stateless Packet Filtering Lecture 153 Network Security Policy For Packet Filtering Lecture 154 Stateless Packet Filtering Implementation as Access Control List Lecture 155 Drawback Of Stateless Packet Filtering Lecture 156 2) Stateful Packet Filtering Lecture 157 Stateful Packet Filering in Access Control List Lecture 158 Application Gateways Beginners in IT and networking field Homepage |