Companies Home Search Profile

Computer Networks & Data Communication Essentials

Focused View

Dr. Moazzam Tiwana

6:44:34

12 View
  • 1 - What is a Computer network.mp4
    01:31
  • 2 - Nuts and Bolts of Internet.mp4
    03:00
  • 3 - Nuts and Bolts of InternetNetwork Edge Devices Hosts Clients and Servers.mp4
    01:22
  • 4 - Nuts and Bolts of InternetAccess Network Core Network.mp4
    02:32
  • 5 - Internet Structure Network of Networks.mp4
    04:53
  • 6 - How to Solve the Complexity of InternetComputer Networks.mp4
    00:54
  • 7 - Layered Approach To Solve Complexity Air Travel Example.mp4
    03:26
  • 8 - Internet Protocol IP Stack.mp4
    02:28
  • 9 - Physical Layer.mp4
    01:25
  • 10 - Datalink Layer.mp4
    01:49
  • 11 - Network Layer.mp4
    01:11
  • 12 - IP Address Format for IPv4.mp4
    01:49
  • 13 - Transport Layer.mp4
    03:36
  • 14 - Application Layer.mp4
    01:42
  • 15 - The Reason Internet Exists Networking Applications Their Design Principle.mp4
    02:41
  • 16 - Types of Network Applications ClientServer Architecture.mp4
    02:33
  • 17 - Types of Network Applications PeertoPeer Architecture.mp4
    01:37
  • 18 - Examples of Application Layer Protocols.mp4
    01:32
  • 19 - Transport Service Requirements for Different Application Layer Protocols.mp4
    03:16
  • 20 - How Processes Communicate using Sockets.mp4
    05:05
  • 21 - TCP Vs UDP as the Transport Layer Protocols.mp4
    03:35
  • 22 - Transport Layer Protocols Used by the Notable Application Layer Protocols.mp4
    02:57
  • 23 - Hypertext Transfer Protocol HTTP Anatomy of a Webpage.mp4
    02:58
  • 24 - Overview of HTTP Protocol.mp4
    03:13
  • 25 - Persistent NonPersistent HTTP.mp4
    01:33
  • 26 - NonPersistent HTTP Example.mp4
    03:20
  • 27 - Per Object Response Time in NonPersistent HTTP.mp4
    02:19
  • 28 - Response Time Comparison Between Persistent NonPersistent HTTP.mp4
    02:00
  • 29 - General Format of an HTTP Request Message.mp4
    03:44
  • 30 - HTTP Request Methods.mp4
    02:58
  • 31 - General Format of an HTTP Response Message.mp4
    02:30
  • 32 - HTTP Response Status Codes.mp4
    01:24
  • 33 - Why use Cookies to Maintain ClientServer State.mp4
    01:33
  • 34 - Application of Cookies.mp4
    02:00
  • 35 - Maintaining Client Server State Using Cookies.mp4
    04:30
  • 36 - Displaying a Web Page with AD without using Cookies.mp4
    02:16
  • 37 - Use Third Party Cookies To Track a Users Behaviour Display Targeted Ads.mp4
    07:52
  • 38 - Cookies and Privacy Concerns.mp4
    00:47
  • 39 - How Web Cache aka Proxy Server Works.mp4
    03:47
  • 40 - Conditional GET to Update the Web Cache.mp4
    02:56
  • 41 - Introduction to File Transfer Protocol FTP.mp4
    01:54
  • 42 - FTP Separate Control Data Connections.mp4
    02:42
  • 43 - FTP Commands Responses.mp4
    02:18
  • 44 - Simple Mail Transfer Protocol SMTP Components of an Internet Email System.mp4
    02:33
  • 45 - Example Scenario Alice Sends an Email to Bob.mp4
    01:59
  • 46 - An Email Message Format.mp4
    01:11
  • 47 - SMTP Protocol Description RFC 5321.mp4
    01:55
  • 48 - An Example of SMTP ClientServer Interaction.mp4
    04:12
  • 49 - Mail Access Protocols POP IMAP HTTP.mp4
    02:23
  • 50 - Introduction to Domain Name System DNS.mp4
    02:16
  • 51 - Basic Working Principle of DNS.mp4
    01:55
  • 52 - Root TopLevel Domain and Authoritative Servers.mp4
    03:01
  • 53 - DNS Name Resolution Iterated Query.mp4
    02:44
  • 54 - DNS Name Resolution Recursive Query.mp4
    01:44
  • 55 - Caching of DNS Information To Improve Response Time.mp4
    02:00
  • 56 - BitTorrent PeertoPeer File Sharing Application.mp4
    03:02
  • 57 - BitTorrent TitforTat Upload Priority.mp4
    02:09
  • 58 - Introduction to the Transport Layer.mp4
    01:34
  • 59 - Transport Vs Network Layer.mp4
    02:14
  • 60 - Two Principal Transport Layer Protocols TCP UDP.mp4
    02:35
  • 61 - Transport Layer MultiplexingDemultiplexing.mp4
    02:23
  • 62 - How Transport Layer DeMultiplexing Works.mp4
    01:47
  • 63 - UDP Connectionless Demultiplexing An Example.mp4
    02:10
  • 64 - TCP ConnectionOriented Demultiplexing An Example.mp4
    01:55
  • 65 - User Datagram Protocol UDP Overview.mp4
    02:35
  • 66 - Use Cases of UDP.mp4
    01:54
  • 67 - UDP Segment Format.mp4
    00:54
  • 68 - UDP Checksum.mp4
    03:26
  • 69 - Transmission Control Protocol TCP Overview.mp4
    02:01
  • 70 - TCP Seq Numbers ACKs.mp4
    02:41
  • 71 - Bidertional Data Transfer Using TCP.mp4
    03:03
  • 72 - TCP Reliability Retransmissions due to timeout events Three Duplicate Acks.mp4
    04:56
  • 73 - TCP Retransmission Scenarios.mp4
    02:31
  • 74 - TCP Segment Structure.mp4
    01:02
  • 75 - TCP Flow Control.mp4
    03:09
  • 76 - TCP Congestion Control Approach.mp4
    01:52
  • 77 - Three Components of TCP Congestion Control 1 Slow Start.mp4
    02:45
  • 78 - 2 Congestion TCP Tahoe.mp4
    03:00
  • 79 - 3 Fast Recovery TCP Reno.mp4
    03:13
  • 80 - TCP ThreeWay Handshake.mp4
    02:38
  • 81 - Closing a TCP Connection.mp4
    02:34
  • 82 - Introduction to the Network Layer.mp4
    02:37
  • 83 - Two Key Functions of Router Routing and Forwarding.mp4
    02:05
  • 84 - IP Range Aggregation and Longest Prefix Matching in Routing Tables.mp4
    04:11
  • 85 - IP Addressing A Data Network Example.mp4
    01:50
  • 86 - IP Addressing What is an interface.mp4
    01:13
  • 87 - IP Addressing Subnets.mp4
    03:07
  • 88 - Example How many Subnets.mp4
    01:07
  • 89 - Internet IP Address Assignment Strategy.mp4
    02:36
  • 90 - Hierarical Addressing More Efficient Routing.mp4
    04:02
  • 91 - Classless InterDomain Routing CIDR.mp4
    04:10
  • 92 - How Does a Host Get An IP Address Dynamic Host Configuration Protocol DHCP.mp4
    03:26
  • 93 - Network Address Translation NAT Why NAT.mp4
    00:49
  • 94 - Principle of NAT.mp4
    02:52
  • 95 - A NAT Scenario.mp4
    03:01
  • 96 - Advantages of NAT.mp4
    01:24
  • 97 - The NAT Traversal Problem.mp4
    02:48
  • 98 - What is Routing and its Types Static Vs Dynamic Routing.mp4
    02:35
  • 99 - What is an Autonomous System AS IntraAS InterAS Routing Protocols.mp4
    02:19
  • 100 - Types of Interior Gateway Routing Protocols IGPs 1 Distance Vector Routing.mp4
    03:23
  • 101 - 2 Link State Routing.mp4
    02:44
  • 102 - Why InterAS Routing Protocol is Used.mp4
    02:12
  • 103 - Example of InterAS Routing.mp4
    02:00
  • 104 - Example of InterAS Routing Choosing Among Multiple ASes.mp4
    02:07
  • 105 - InterAS Routing on Internet using Border Gateway Protocol BGP.mp4
    03:35
  • 106 - Internet Control Message Protocol ICMP.mp4
    02:02
  • 107 - ICMP Error Message Example Time Exceeded.mp4
    02:09
  • 108 - Traceroute.mp4
    03:15
  • 109 - Ping Command Using ICMP Echo Reply Messages.mp4
    02:20
  • 110 - IPv6 IP Address.mp4
    02:43
  • 111 - Introduction to the Link Layer.mp4
    03:32
  • 112 - Why Different Link Layer Protocols for Different Physical Links.mp4
    01:27
  • 113 - Router Vs Switch.mp4
    02:33
  • 114 - Services Provided by the Link Layer Framing Link Access Reliability.mp4
    02:19
  • 115 - Services Provided by the Link Layer Flow Control Error Detection Correction.mp4
    01:38
  • 116 - What is Network Interface Card NIC how Adjacent Nodes Communicate using NIC.mp4
    02:44
  • 117 - Main Types of Link Access Protocols.mp4
    01:52
  • 118 - Types of Multiple Access Protocols 1 Channelization Protocols.mp4
    02:04
  • 119 - Example of FDMA TDMA.mp4
    02:15
  • 120 - Types of Multiple Access Protocols 2 Random Access Protocols.mp4
    01:26
  • 121 - Pure ALOHA.mp4
    02:14
  • 122 - Pros and Cons of Pure ALOHA.mp4
    01:29
  • 123 - Slotted ALOHA Protocol and its Pros Cons.mp4
    03:09
  • 124 - Carrier Sense Multiple Access with Collision Detection CSMACD.mp4
    03:01
  • 125 - Ethernet CSMACD Algorithm.mp4
    03:18
  • 126 - Controlled Access Taking Turns Protocols.mp4
    01:28
  • 127 - Polling Based Controlled Access Protocols.mp4
    02:10
  • 128 - Token Passing Controlled Access Protocols.mp4
    01:53
  • 129 - IP Vs MAC Address.mp4
    02:21
  • 130 - Portability of the MAC Address.mp4
    01:49
  • 131 - Address Resolution Protocol ARP.mp4
    02:26
  • 132 - ARP Protocol in Action.mp4
    03:22
  • 133 - Routing of IP Packets from One Subnet to Another Subnet.mp4
    04:14
  • 134 - Ethernet Its Physical Topology.mp4
    01:57
  • 135 - Ethernet Frame Structure.mp4
    02:23
  • 136 - Ethernet Unreliable Connectionless.mp4
    01:51
  • 137 - Ethernet Switch Its Properties.mp4
    01:46
  • 138 - How Switch Selflearns the Forwarding Table.mp4
    02:40
  • 139 - Switch Working Algorithm.mp4
    02:24
  • 140 - An Example of Switch Selflearning Forwarding.mp4
    01:48
  • 141 - Self learning of Switch Forwarding Tables in Case of Interconnected Switches.mp4
    02:29
  • 142 - Motivation For Using Virtual LANs VLANS.mp4
    02:09
  • 143 - Problem with VLANs Spanning Multiple Switches.mp4
    01:43
  • 144 - VLAN Trunking.mp4
    02:21
  • 145 - Evolution of IEEE 8023 Ethernet Standards Link Physical Layer.mp4
    02:08
  • 146 - Common Implementations of Fast Ethernet Physical Layer of 10Base2 10Base5.mp4
    02:54
  • 147 - Common Implementations of Fast Ethernet Physical Layer of 10BaseT.mp4
    02:03
  • 148 - Common Implementations of Fast Ethernet Physical Layer of 10BaseF.mp4
    01:54
  • 149 - Common Gigabit and Fast Ethernet Implementation.mp4
    01:50
  • 150 - What is a Firewall.mp4
    03:10
  • 151 - Why Firewalls are used.mp4
    02:20
  • 152 - Types of Firewalls 1 Stateless Packet Filtering.mp4
    07:27
  • 153 - Network Security Policy For Packet Filtering.mp4
    07:00
  • 154 - Stateless Packet Filtering Implementation as Access Control List.mp4
    05:48
  • 155 - Drawback Of Stateless Packet Filtering.mp4
    03:06
  • 156 - 2 Stateful Packet Filtering.mp4
    01:53
  • 157 - Stateful Packet Filering in Access Control List.mp4
    01:41
  • 158 - Application Gateways.mp4
    02:59
  • Description


    A Comprehensive Guide to Internet Technologies: From Basics to Advanced Protocols and Security Measures

    What You'll Learn?


    • Computer Network Essentials
    • StackHow Internet & Computer Networks Work?
    • Over All TCP/IP Protocol Stack
    • Important Application Layer Protocols
    • TCP & UDP as Transport Layer Protocls
    • IP Addressing: Classless InterDomain Routing (CIDR)
    • Working of Switches & Routers
    • Different Routing protocols & their comparison
    • NAT, ICMP, ARP
    • Multiple Access Protocols: ALOHA, Slotted ALOHA, CSMA/CD
    • Ethernet Protocol
    • Virtual LANS (VLANs)

    Who is this for?


  • Beginners in IT and networking field
  • What You Need to Know?


  • Be ready to learn
  • A Computer or laptop with internet connection
  • No Prior Computer Networks' Knowledge Required
  • More details


    Description

    This meticulously designed program is tailored for beginners and aspiring IT professionals, providing a solid foundation in the core principles of computer networking & data communication. Whether you're a student venturing into the world of technology or a professional looking to strengthen your skills, this course offers a practical and accessible approach to understanding the fundamentals of computer networks.

    By the end of this course, you will have a comprehensive understanding of computer network essentials, empowering you to navigate the dynamic world of networking confidently. Join us on this educational journey, and let's build a strong foundation for your success in the exciting field of computer networks!

    Sections Breakdown:

    1. Introduction to Computer Networks:

      • Explore the essentials of the internet, dissecting the components that form its backbone.

      • Understand the roles of hosts, clients, and servers in network communication.

      • Navigate through the Access Network, Core Network, and the overall architecture of the internet.

      • Gain insights into the layers of the Internet Protocol (IP) stack.

    2. Application Layer:

      • Dive into networking applications and their design principles, including Client-Server and Peer-to-Peer architectures.

      • Learn the intricacies of processes communicating through sockets.

      • Explore protocols such as HTTP, FTP, SMTP, and DNS that drive internet applications.

      • Understand the working of web caches and the BitTorrent file-sharing application.

    3. Transport Layer:

      • Differentiate between the Transport and Network layers.

      • Compare and contrast TCP and UDP, delving into their segment structures and flow control mechanisms.

      • Explore the intricacies of the TCP three-way handshake and connection closure.

    4. Network Layer:

      • Understand the functions of routers, focusing on routing and forwarding.

      • Grasp the nuances of IP addressing, subnets, and hierarchical addressing.

      • Explore dynamic protocols like DHCP and NAT, essential for efficient network management.

      • Gain insights into routing types, including static and dynamic, and Inter-AS routing protocols like BGP.

      • Learn about ICMP, IPv6, and the complexities of routing on the Internet.

    5. The Link Layer:

      • Delve into the services provided by the Link Layer, covering framing, link access, reliability, and more.

      • Understand the role of network interface cards (NIC) and the communication between adjacent nodes.

      • Explore multiple access protocols, controlled access protocols, and address resolution with ARP.

      • Learn about Ethernet, switches, and the motivation behind using Virtual LANs (VLANs).

    6. The Physical Layer:

      • Trace the evolution of IEEE 802.3 Ethernet standards and common implementations of fast Ethernet.

    7. Computer Network Security:

      • Gain insights into firewalls, their types, and their critical role in network security.

      • Explore stateless and stateful packet filtering, application gateways, and best practices for securing computer networks.

    Join us on this educational journey, where you'll not only learn the essentials but also delve into advanced protocols and security measures.

    Who this course is for:

    • Beginners in IT and networking field

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dr. Moazzam Tiwana
    Dr. Moazzam Tiwana
    Instructor's Courses
    Dr. Moazzam Tiwana is a telecom engineer with a MSc. degree in Digital Telecommunication Systems from ENST, Paris, France in 2007 and a Ph.D. degree in Mobile Communications from Telecom SudParis Paris, France, in 2010. His PHD was with the R&D Group of Orange Labs of France Telecom. He has more than Twenty-one years of industrial and academic experience with research publications in the reputed international journals.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 158
    • duration 6:44:34
    • Release Date 2024/01/04

    Courses related to Computer Network

    Subtitle
    Building an Ubuntu Server
    Linkedin Learning Scott Simpson
    Scott Simpson
    Building an Ubuntu Server
    3:04:34
    English subtitles
    08/31/2024
    Subtitle
    Juniper Security Policies Fundamentals
    Subtitle
    Azure Storage Essential Training

    Courses related to IT Networking Fundamentals

    Courses related to Network Engineering