وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Computer Networks & Data Communication Essentials

سرفصل های دوره

A Comprehensive Guide to Internet Technologies: From Basics to Advanced Protocols and Security Measures


1 - Introduction
  • 1 - What is a Computer network
  • 2 - Nuts and Bolts of Internet
  • 3 - Nuts and Bolts of InternetNetwork Edge Devices Hosts Clients and Servers
  • 4 - Nuts and Bolts of InternetAccess Network Core Network
  • 5 - Internet Structure Network of Networks
  • 6 - How to Solve the Complexity of InternetComputer Networks
  • 7 - Layered Approach To Solve Complexity Air Travel Example
  • 8 - Internet Protocol IP Stack
  • 9 - Physical Layer
  • 10 - Datalink Layer
  • 11 - Network Layer
  • 12 - IP Address Format for IPv4
  • 13 - Transport Layer
  • 14 - Application Layer

  • 2 - The Application Layer
  • 15 - The Reason Internet Exists Networking Applications Their Design Principle
  • 16 - Types of Network Applications ClientServer Architecture
  • 17 - Types of Network Applications PeertoPeer Architecture
  • 18 - Examples of Application Layer Protocols
  • 19 - Transport Service Requirements for Different Application Layer Protocols
  • 20 - How Processes Communicate using Sockets
  • 21 - TCP Vs UDP as the Transport Layer Protocols
  • 22 - Transport Layer Protocols Used by the Notable Application Layer Protocols
  • 23 - Hypertext Transfer Protocol HTTP Anatomy of a Webpage
  • 24 - Overview of HTTP Protocol
  • 25 - Persistent NonPersistent HTTP
  • 26 - NonPersistent HTTP Example
  • 27 - Per Object Response Time in NonPersistent HTTP
  • 28 - Response Time Comparison Between Persistent NonPersistent HTTP
  • 29 - General Format of an HTTP Request Message
  • 30 - HTTP Request Methods
  • 31 - General Format of an HTTP Response Message
  • 32 - HTTP Response Status Codes
  • 33 - Why use Cookies to Maintain ClientServer State
  • 34 - Application of Cookies
  • 35 - Maintaining Client Server State Using Cookies
  • 36 - Displaying a Web Page with AD without using Cookies
  • 37 - Use Third Party Cookies To Track a Users Behaviour Display Targeted Ads
  • 38 - Cookies and Privacy Concerns
  • 39 - How Web Cache aka Proxy Server Works
  • 40 - Conditional GET to Update the Web Cache
  • 41 - Introduction to File Transfer Protocol FTP
  • 42 - FTP Separate Control Data Connections
  • 43 - FTP Commands Responses
  • 44 - Simple Mail Transfer Protocol SMTP Components of an Internet Email System
  • 45 - Example Scenario Alice Sends an Email to Bob
  • 46 - An Email Message Format
  • 47 - SMTP Protocol Description RFC 5321
  • 48 - An Example of SMTP ClientServer Interaction
  • 49 - Mail Access Protocols POP IMAP HTTP
  • 50 - Introduction to Domain Name System DNS
  • 51 - Basic Working Principle of DNS
  • 52 - Root TopLevel Domain and Authoritative Servers
  • 53 - DNS Name Resolution Iterated Query
  • 54 - DNS Name Resolution Recursive Query
  • 55 - Caching of DNS Information To Improve Response Time
  • 56 - BitTorrent PeertoPeer File Sharing Application
  • 57 - BitTorrent TitforTat Upload Priority

  • 3 - The Transport Layer
  • 58 - Introduction to the Transport Layer
  • 59 - Transport Vs Network Layer
  • 60 - Two Principal Transport Layer Protocols TCP UDP
  • 61 - Transport Layer MultiplexingDemultiplexing
  • 62 - How Transport Layer DeMultiplexing Works
  • 63 - UDP Connectionless Demultiplexing An Example
  • 64 - TCP ConnectionOriented Demultiplexing An Example
  • 65 - User Datagram Protocol UDP Overview
  • 66 - Use Cases of UDP
  • 67 - UDP Segment Format
  • 68 - UDP Checksum
  • 69 - Transmission Control Protocol TCP Overview
  • 70 - TCP Seq Numbers ACKs
  • 71 - Bidertional Data Transfer Using TCP
  • 72 - TCP Reliability Retransmissions due to timeout events Three Duplicate Acks
  • 73 - TCP Retransmission Scenarios
  • 74 - TCP Segment Structure
  • 75 - TCP Flow Control
  • 76 - TCP Congestion Control Approach
  • 77 - Three Components of TCP Congestion Control 1 Slow Start
  • 78 - 2 Congestion TCP Tahoe
  • 79 - 3 Fast Recovery TCP Reno
  • 80 - TCP ThreeWay Handshake
  • 81 - Closing a TCP Connection

  • 4 - The Network Layer
  • 82 - Introduction to the Network Layer
  • 83 - Two Key Functions of Router Routing and Forwarding
  • 84 - IP Range Aggregation and Longest Prefix Matching in Routing Tables
  • 85 - IP Addressing A Data Network Example
  • 86 - IP Addressing What is an interface
  • 87 - IP Addressing Subnets
  • 88 - Example How many Subnets
  • 89 - Internet IP Address Assignment Strategy
  • 90 - Hierarical Addressing More Efficient Routing
  • 91 - Classless InterDomain Routing CIDR
  • 92 - How Does a Host Get An IP Address Dynamic Host Configuration Protocol DHCP
  • 93 - Network Address Translation NAT Why NAT
  • 94 - Principle of NAT
  • 95 - A NAT Scenario
  • 96 - Advantages of NAT
  • 97 - The NAT Traversal Problem
  • 98 - What is Routing and its Types Static Vs Dynamic Routing
  • 99 - What is an Autonomous System AS IntraAS InterAS Routing Protocols
  • 100 - Types of Interior Gateway Routing Protocols IGPs 1 Distance Vector Routing
  • 101 - 2 Link State Routing
  • 102 - Why InterAS Routing Protocol is Used
  • 103 - Example of InterAS Routing
  • 104 - Example of InterAS Routing Choosing Among Multiple ASes
  • 105 - InterAS Routing on Internet using Border Gateway Protocol BGP
  • 106 - Internet Control Message Protocol ICMP
  • 107 - ICMP Error Message Example Time Exceeded
  • 108 - Traceroute
  • 109 - Ping Command Using ICMP Echo Reply Messages
  • 110 - IPv6 IP Address

  • 5 - The Link Layer
  • 111 - Introduction to the Link Layer
  • 112 - Why Different Link Layer Protocols for Different Physical Links
  • 113 - Router Vs Switch
  • 114 - Services Provided by the Link Layer Framing Link Access Reliability
  • 115 - Services Provided by the Link Layer Flow Control Error Detection Correction
  • 116 - What is Network Interface Card NIC how Adjacent Nodes Communicate using NIC
  • 117 - Main Types of Link Access Protocols
  • 118 - Types of Multiple Access Protocols 1 Channelization Protocols
  • 119 - Example of FDMA TDMA
  • 120 - Types of Multiple Access Protocols 2 Random Access Protocols
  • 121 - Pure ALOHA
  • 122 - Pros and Cons of Pure ALOHA
  • 123 - Slotted ALOHA Protocol and its Pros Cons
  • 124 - Carrier Sense Multiple Access with Collision Detection CSMACD
  • 125 - Ethernet CSMACD Algorithm
  • 126 - Controlled Access Taking Turns Protocols
  • 127 - Polling Based Controlled Access Protocols
  • 128 - Token Passing Controlled Access Protocols
  • 129 - IP Vs MAC Address
  • 130 - Portability of the MAC Address
  • 131 - Address Resolution Protocol ARP
  • 132 - ARP Protocol in Action
  • 133 - Routing of IP Packets from One Subnet to Another Subnet
  • 134 - Ethernet Its Physical Topology
  • 135 - Ethernet Frame Structure
  • 136 - Ethernet Unreliable Connectionless
  • 137 - Ethernet Switch Its Properties
  • 138 - How Switch Selflearns the Forwarding Table
  • 139 - Switch Working Algorithm
  • 140 - An Example of Switch Selflearning Forwarding
  • 141 - Self learning of Switch Forwarding Tables in Case of Interconnected Switches
  • 142 - Motivation For Using Virtual LANs VLANS
  • 143 - Problem with VLANs Spanning Multiple Switches
  • 144 - VLAN Trunking

  • 6 - The Physical Layer
  • 145 - Evolution of IEEE 8023 Ethernet Standards Link Physical Layer
  • 146 - Common Implementations of Fast Ethernet Physical Layer of 10Base2 10Base5
  • 147 - Common Implementations of Fast Ethernet Physical Layer of 10BaseT
  • 148 - Common Implementations of Fast Ethernet Physical Layer of 10BaseF
  • 149 - Common Gigabit and Fast Ethernet Implementation

  • 7 - Computer Network Security
  • 150 - What is a Firewall
  • 151 - Why Firewalls are used
  • 152 - Types of Firewalls 1 Stateless Packet Filtering
  • 153 - Network Security Policy For Packet Filtering
  • 154 - Stateless Packet Filtering Implementation as Access Control List
  • 155 - Drawback Of Stateless Packet Filtering
  • 156 - 2 Stateful Packet Filtering
  • 157 - Stateful Packet Filering in Access Control List
  • 158 - Application Gateways
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 28614
    حجم: 2404 مگابایت
    مدت زمان: 405 دقیقه
    تاریخ انتشار: 21 دی 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید