Welcome to Expert Training The Online Course Shop!

Computer Networks Data Communication Essentials


Price: 5.00 USD | Size: 2.30 GB | Duration : 6.45+ Hours


Add to Wishlist
Add to Wishlist


Price: 5.00 USD | Size: 2.30 GB | Duration : 6.45+ Hours
Computer Networks Data Communication Essentials
What you’ll learn
Computer Network Essentials
StackHow Internet & Computer Networks Work?
Over All TCP/IP Protocol Stack
Important Application Layer Protocols
TCP & UDP as Transport Layer Protocls
IP Addressing: Classless InterDomain Routing (CIDR)
Working of Switches & Routers
Different Routing protocols & their comparison
Multiple Access Protocols: ALOHA, Slotted ALOHA, CSMA/CD
Ethernet Protocol
Virtual LANS (VLANs)
Be ready to learn
A Computer or laptop with internet connection
No Prior Computer Networks’ Knowledge Required
This meticulously designed program is tailored for beginners and aspiring IT professionals, providing a solid foundation in the core principles of computer networking & data communication. Whether you’re a student venturing into the world of technology or a professional looking to strengthen your skills, this course offers a practical and accessible approach to understanding the fundamentals of computer networks.By the end of this course, you will have a comprehensive understanding of computer network essentials, empowering you to navigate the dynamic world of networking confidently. Join us on this educational journey, and let’s build a strong foundation for your success in the exciting field of computer networks!Sections Breakdown:Introduction to Computer Networks:Explore the essentials of the internet, dissecting the components that form its backbone.Understand the roles of hosts, clients, and servers in network communication.Navigate through the Access Network, Core Network, and the overall architecture of the internet.Gain insights into the layers of the Internet Protocol (IP) stack.Application Layer:Dive into networking applications and their design principles, including Client-Server and Peer-to-Peer architectures.Learn the intricacies of processes communicating through sockets.Explore protocols such as HTTP, FTP, SMTP, and DNS that drive internet applications.Understand the working of web caches and the BitTorrent file-sharing application.Transport Layer:Differentiate between the Transport and Network layers.Compare and contrast TCP and UDP, delving into their segment structures and flow control mechanisms.Explore the intricacies of the TCP three-way handshake and connection closure.Network Layer:Understand the functions of routers, focusing on routing and forwarding.Grasp the nuances of IP addressing, subnets, and hierarchical addressing.Explore dynamic protocols like DHCP and NAT, essential for efficient network management.Gain insights into routing types, including static and dynamic, and Inter-AS routing protocols like BGP.Learn about ICMP, IPv6, and the complexities of routing on the Internet.The Link Layer:Delve into the services provided by the Link Layer, covering framing, link access, reliability, and more.Understand the role of network interface cards (NIC) and the communication between adjacent nodes.Explore multiple access protocols, controlled access protocols, and address resolution with ARP.Learn about Ethernet, switches, and the motivation behind using Virtual LANs (VLANs).The Physical Layer:Trace the evolution of IEEE 802.3 Ethernet standards and common implementations of fast Ethernet.Computer Network Security:Gain insights into firewalls, their types, and their critical role in network security.Explore stateless and stateful packet filtering, application gateways, and best practices for securing computer networks.Join us on this educational journey, where you’ll not only learn the essentials but also delve into advanced protocols and security measures.
Section 1: Introduction
Lecture 1 What is a Computer network?
Lecture 2 Nuts and Bolts of Internet
Lecture 3 Nuts and Bolts of Internet-Network Edge Devices “Hosts”: Clients and Servers
Lecture 4 Nuts and Bolts of Internet-Access Network & Core Network
Lecture 5 Internet Structure: Network of Networks
Lecture 6 How to Solve the Complexity of Internet-Computer Networks
Lecture 7 Layered Approach To Solve Complexity: Air Travel Example
Lecture 8 Internet Protocol (IP) Stack
Lecture 9 Physical Layer
Lecture 10 Datalink Layer
Lecture 11 Network Layer
Lecture 12 IP Address Format for IPv4
Lecture 13 Transport Layer
Lecture 14 Application Layer
Section 2: The Application Layer
Lecture 15 The Reason Internet Exists: Networking Applications & Their Design Principle
Lecture 16 Types of Network Applications: Client-Server Architecture
Lecture 17 Types of Network Applications: Peer-to-Peer Architecture
Lecture 18 Examples of Application Layer Protocols
Lecture 19 Transport Service Requirements for Different Application Layer Protocols
Lecture 20 How Processes Communicate using Sockets?
Lecture 21 TCP Vs UDP as the Transport Layer Protocols
Lecture 22 Transport Layer Protocols Used by the Notable Application Layer Protocols
Lecture 23 Hypertext Transfer Protocol (HTTP) & Anatomy of a Webpage
Lecture 24 Overview of HTTP Protocol
Lecture 25 Persistent & Non-Persistent HTTP
Lecture 26 Non-Persistent HTTP Example
Lecture 27 Per Object Response Time in Non-Persistent HTTP
Lecture 28 Response Time Comparison Between Persistent & Non-Persistent HTTP
Lecture 29 General Format of an HTTP Request Message
Lecture 30 HTTP Request Methods
Lecture 31 General Format of an HTTP Response Message
Lecture 32 HTTP Response Status Codes
Lecture 33 Why use Cookies to Maintain Client-Server State
Lecture 34 Application of Cookies
Lecture 35 Maintaining Client & Server State Using Cookies
Lecture 36 Displaying a Web Page with AD without using Cookies
Lecture 37 Use Third Party Cookies To Track a User’s Behaviour & Display Targeted Ads
Lecture 38 Cookies and Privacy Concerns
Lecture 39 How Web Cache (aka Proxy Server) Works?
Lecture 40 Conditional GET to Update the Web Cache
Lecture 41 Introduction to File Transfer Protocol (FTP)
Lecture 42 FTP: Separate Control & Data Connections
Lecture 43 FTP Commands & Responses
Lecture 44 Simple Mail Transfer Protocol (SMTP) & Components of an Internet E-mail System
Lecture 45 Example Scenario: Alice Sends an E-mail to Bob
Lecture 46 An E-mail Message Format
Lecture 47 SMTP Protocol Description (RFC 5321)
Lecture 48 An Example of SMTP Client-Server Interaction
Lecture 49 Mail Access Protocols: POP, IMAP, HTTP
Lecture 50 Introduction to Domain Name System (DNS)
Lecture 51 Basic Working Principle of DNS
Lecture 52 Root, Top-Level Domain and Authoritative Servers
Lecture 53 DNS Name Resolution: Iterated Query
Lecture 54 DNS Name Resolution: Recursive Query
Lecture 55 Caching of DNS Information To Improve Response Time
Lecture 56 BitTorrent: Peer-to-Peer File Sharing Application
Lecture 57 BitTorrent: Tit-for-Tat Upload Priority
Section 3: The Transport Layer
Lecture 58 Introduction to the Transport Layer
Lecture 59 Transport Vs Network Layer
Lecture 60 Two Principal Transport Layer Protocols: TCP & UDP
Lecture 61 Transport Layer Multiplexing/Demultiplexing
Lecture 62 How Transport Layer De-Multiplexing Works?
Lecture 63 UDP (Connection-less) Demultiplexing: An Example
Lecture 64 TCP (Connection-Oriented) Demultiplexing: An Example
Lecture 65 User Datagram Protocol (UDP) Overview
Lecture 66 Use Cases of UDP
Lecture 67 UDP Segment Format
Lecture 68 UDP Checksum
Lecture 69 Transmission Control Protocol (TCP) Overview
Lecture 70 TCP Seq. Numbers & ACKs
Lecture 71 Bidertional Data Transfer Using TCP
Lecture 72 TCP Reliability: Re-transmissions due to timeout events & Three Duplicate Acks
Lecture 73 TCP Re-transmission Scenarios
Lecture 74 TCP Segment Structure
Lecture 75 TCP Flow Control
Lecture 76 TCP Congestion Control Approach
Lecture 77 Three Components of TCP Congestion Control: 1) Slow Start
Lecture 78 2) Congestion (TCP Tahoe)
Lecture 79 3) Fast Recovery (TCP Reno)
Lecture 80 TCP Three-Way Handshake
Lecture 81 Closing a TCP Connection
Section 4: The Network Layer
Lecture 82 Introduction to the Network Layer
Lecture 83 Two Key Functions of Router: Routing and Forwarding
Lecture 84 IP Range Aggregation and Longest Prefix Matching in Routing Tables
Lecture 85 IP Addressing: A Data Network Example
Lecture 86 IP Addressing: What is an interface?
Lecture 87 IP Addressing: Subnets
Lecture 88 Example: How many Subnets?
Lecture 89 Internet IP Address Assignment Strategy
Lecture 90 Hierarical Addressing: More Efficient Routing
Lecture 91 Classless InterDomain Routing (CIDR)
Lecture 92 How Does a Host Get An IP Address? Dynamic Host Configuration Protocol (DHCP)
Lecture 93 Network Address Translation (NAT): Why NAT?
Lecture 94 Principle of NAT
Lecture 95 A NAT Scenario
Lecture 96 Advantages of NAT
Lecture 97 The NAT Traversal Problem
Lecture 98 What is Routing and its Types? Static Vs Dynamic Routing
Lecture 99 What is an Autonomous System (AS)? Intra-AS & Inter-AS Routing Protocols
Lecture 100 Types of Interior Gateway Routing Protocols (IGPs): 1. Distance Vector Routing
Lecture 101 2. Link State Routing
Lecture 102 Why Inter-AS Routing Protocol is Used?
Lecture 103 Example of Inter-AS Routing
Lecture 104 Example of Inter-AS Routing: Choosing Among Multiple ASes
Lecture 105 Inter-AS Routing on Internet using Border Gateway Protocol (BGP)
Lecture 106 Internet Control Message Protocol (ICMP)
Lecture 107 ICMP Error Message Example: Time Exceeded
Lecture 108 Traceroute
Lecture 109 Ping Command Using ICMP Echo & Reply Messages
Lecture 110 IPv6 IP Address
Section 5: The Link Layer
Lecture 111 Introduction to the Link Layer
Lecture 112 Why Different Link Layer Protocols for Different Physical Links?
Lecture 113 Router Vs Switch
Lecture 114 Services Provided by the Link Layer: Framing, Link Access, Reliability
Lecture 115 Services Provided by the Link Layer: Flow Control, Error Detection & Correction
Lecture 116 What is Network Interface Card (NIC) & how Adjacent Nodes Communicate using NIC?
Lecture 117 Main Types of Link Access Protocols
Lecture 118 Types of Multiple Access Protocols: 1) Channelization Protocols
Lecture 119 Example of FDMA & TDMA
Lecture 120 Types of Multiple Access Protocols: 2) Random Access Protocols
Lecture 121 Pure ALOHA
Lecture 122 Pros and Cons of Pure ALOHA
Lecture 123 Slotted ALOHA Protocol and its Pros & Cons
Lecture 124 Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Lecture 125 Ethernet CSMA/CD Algorithm
Lecture 126 Controlled Access (Taking Turns) Protocols
Lecture 127 Polling Based Controlled Access Protocols
Lecture 128 Token Passing Controlled Access Protocols
Lecture 129 IP Vs MAC Address
Lecture 130 Portability of the MAC Address
Lecture 131 Address Resolution Protocol (ARP)
Lecture 132 ARP Protocol in Action
Lecture 133 Routing of IP Packets from One Subnet to Another Subnet
Lecture 134 Ethernet & Its Physical Topology
Lecture 135 Ethernet Frame Structure
Lecture 136 Ethernet: Unreliable, Connection-less
Lecture 137 Ethernet Switch & Its Properties
Lecture 138 How Switch Self-learns the Forwarding Table?
Lecture 139 Switch Working Algorithm
Lecture 140 An Example of Switch Self-learning & Forwarding
Lecture 141 Self learning of Switch Forwarding Tables in Case of Interconnected Switches
Lecture 142 Motivation For Using Virtual LANs (VLANS)
Lecture 143 Problem with VLANs Spanning Multiple Switches
Lecture 144 VLAN Trunking
Section 6: The Physical Layer
Lecture 145 Evolution of IEEE 802.3 Ethernet Standards: Link & Physical Layer
Lecture 146 Common Implementations of Fast Ethernet: Physical Layer of 10Base2 & 10Base5
Lecture 147 Common Implementations of Fast Ethernet: Physical Layer of 10BaseT
Lecture 148 Common Implementations of Fast Ethernet: Physical Layer of 10BaseF
Lecture 149 Common Gigabit and Fast Ethernet Implementation
Section 7: Computer Network Security
Lecture 150 What is a Firewall?
Lecture 151 Why Firewalls are used?
Lecture 152 Types of Firewalls: 1) Stateless Packet Filtering
Lecture 153 Network Security Policy For Packet Filtering
Lecture 154 Stateless Packet Filtering Implementation as Access Control List
Lecture 155 Drawback Of Stateless Packet Filtering
Lecture 156 2) Stateful Packet Filtering
Lecture 157 Stateful Packet Filering in Access Control List
Lecture 158 Application Gateways
Beginners in IT and networking field


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Quick Navigation