وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Computer Networks & Data Communication Essentials

سرفصل های دوره

A Comprehensive Guide to Internet Technologies: From Basics to Advanced Protocols and Security Measures


1 - Introduction
  • 1 - What is a Computer network
  • 2 - Nuts and Bolts of Internet
  • 3 - Nuts and Bolts of InternetNetwork Edge Devices Hosts Clients and Servers
  • 4 - Nuts and Bolts of InternetAccess Network Core Network
  • 5 - Internet Structure Network of Networks
  • 6 - How to Solve the Complexity of InternetComputer Networks
  • 7 - Layered Approach To Solve Complexity Air Travel Example
  • 8 - Internet Protocol IP Stack
  • 9 - Physical Layer
  • 10 - Datalink Layer
  • 11 - Network Layer
  • 12 - IP Address Format for IPv4
  • 13 - Transport Layer
  • 14 - Application Layer

  • 2 - The Application Layer
  • 15 - The Reason Internet Exists Networking Applications Their Design Principle
  • 16 - Types of Network Applications ClientServer Architecture
  • 17 - Types of Network Applications PeertoPeer Architecture
  • 18 - Examples of Application Layer Protocols
  • 19 - Transport Service Requirements for Different Application Layer Protocols
  • 20 - How Processes Communicate using Sockets
  • 21 - TCP Vs UDP as the Transport Layer Protocols
  • 22 - Transport Layer Protocols Used by the Notable Application Layer Protocols
  • 23 - Hypertext Transfer Protocol HTTP Anatomy of a Webpage
  • 24 - Overview of HTTP Protocol
  • 25 - Persistent NonPersistent HTTP
  • 26 - NonPersistent HTTP Example
  • 27 - Per Object Response Time in NonPersistent HTTP
  • 28 - Response Time Comparison Between Persistent NonPersistent HTTP
  • 29 - General Format of an HTTP Request Message
  • 30 - HTTP Request Methods
  • 31 - General Format of an HTTP Response Message
  • 32 - HTTP Response Status Codes
  • 33 - Why use Cookies to Maintain ClientServer State
  • 34 - Application of Cookies
  • 35 - Maintaining Client Server State Using Cookies
  • 36 - Displaying a Web Page with AD without using Cookies
  • 37 - Use Third Party Cookies To Track a Users Behaviour Display Targeted Ads
  • 38 - Cookies and Privacy Concerns
  • 39 - How Web Cache aka Proxy Server Works
  • 40 - Conditional GET to Update the Web Cache
  • 41 - Introduction to File Transfer Protocol FTP
  • 42 - FTP Separate Control Data Connections
  • 43 - FTP Commands Responses
  • 44 - Simple Mail Transfer Protocol SMTP Components of an Internet Email System
  • 45 - Example Scenario Alice Sends an Email to Bob
  • 46 - An Email Message Format
  • 47 - SMTP Protocol Description RFC 5321
  • 48 - An Example of SMTP ClientServer Interaction
  • 49 - Mail Access Protocols POP IMAP HTTP
  • 50 - Introduction to Domain Name System DNS
  • 51 - Basic Working Principle of DNS
  • 52 - Root TopLevel Domain and Authoritative Servers
  • 53 - DNS Name Resolution Iterated Query
  • 54 - DNS Name Resolution Recursive Query
  • 55 - Caching of DNS Information To Improve Response Time
  • 56 - BitTorrent PeertoPeer File Sharing Application
  • 57 - BitTorrent TitforTat Upload Priority

  • 3 - The Transport Layer
  • 58 - Introduction to the Transport Layer
  • 59 - Transport Vs Network Layer
  • 60 - Two Principal Transport Layer Protocols TCP UDP
  • 61 - Transport Layer MultiplexingDemultiplexing
  • 62 - How Transport Layer DeMultiplexing Works
  • 63 - UDP Connectionless Demultiplexing An Example
  • 64 - TCP ConnectionOriented Demultiplexing An Example
  • 65 - User Datagram Protocol UDP Overview
  • 66 - Use Cases of UDP
  • 67 - UDP Segment Format
  • 68 - UDP Checksum
  • 69 - Transmission Control Protocol TCP Overview
  • 70 - TCP Seq Numbers ACKs
  • 71 - Bidertional Data Transfer Using TCP
  • 72 - TCP Reliability Retransmissions due to timeout events Three Duplicate Acks
  • 73 - TCP Retransmission Scenarios
  • 74 - TCP Segment Structure
  • 75 - TCP Flow Control
  • 76 - TCP Congestion Control Approach
  • 77 - Three Components of TCP Congestion Control 1 Slow Start
  • 78 - 2 Congestion TCP Tahoe
  • 79 - 3 Fast Recovery TCP Reno
  • 80 - TCP ThreeWay Handshake
  • 81 - Closing a TCP Connection

  • 4 - The Network Layer
  • 82 - Introduction to the Network Layer
  • 83 - Two Key Functions of Router Routing and Forwarding
  • 84 - IP Range Aggregation and Longest Prefix Matching in Routing Tables
  • 85 - IP Addressing A Data Network Example
  • 86 - IP Addressing What is an interface
  • 87 - IP Addressing Subnets
  • 88 - Example How many Subnets
  • 89 - Internet IP Address Assignment Strategy
  • 90 - Hierarical Addressing More Efficient Routing
  • 91 - Classless InterDomain Routing CIDR
  • 92 - How Does a Host Get An IP Address Dynamic Host Configuration Protocol DHCP
  • 93 - Network Address Translation NAT Why NAT
  • 94 - Principle of NAT
  • 95 - A NAT Scenario
  • 96 - Advantages of NAT
  • 97 - The NAT Traversal Problem
  • 98 - What is Routing and its Types Static Vs Dynamic Routing
  • 99 - What is an Autonomous System AS IntraAS InterAS Routing Protocols
  • 100 - Types of Interior Gateway Routing Protocols IGPs 1 Distance Vector Routing
  • 101 - 2 Link State Routing
  • 102 - Why InterAS Routing Protocol is Used
  • 103 - Example of InterAS Routing
  • 104 - Example of InterAS Routing Choosing Among Multiple ASes
  • 105 - InterAS Routing on Internet using Border Gateway Protocol BGP
  • 106 - Internet Control Message Protocol ICMP
  • 107 - ICMP Error Message Example Time Exceeded
  • 108 - Traceroute
  • 109 - Ping Command Using ICMP Echo Reply Messages
  • 110 - IPv6 IP Address

  • 5 - The Link Layer
  • 111 - Introduction to the Link Layer
  • 112 - Why Different Link Layer Protocols for Different Physical Links
  • 113 - Router Vs Switch
  • 114 - Services Provided by the Link Layer Framing Link Access Reliability
  • 115 - Services Provided by the Link Layer Flow Control Error Detection Correction
  • 116 - What is Network Interface Card NIC how Adjacent Nodes Communicate using NIC
  • 117 - Main Types of Link Access Protocols
  • 118 - Types of Multiple Access Protocols 1 Channelization Protocols
  • 119 - Example of FDMA TDMA
  • 120 - Types of Multiple Access Protocols 2 Random Access Protocols
  • 121 - Pure ALOHA
  • 122 - Pros and Cons of Pure ALOHA
  • 123 - Slotted ALOHA Protocol and its Pros Cons
  • 124 - Carrier Sense Multiple Access with Collision Detection CSMACD
  • 125 - Ethernet CSMACD Algorithm
  • 126 - Controlled Access Taking Turns Protocols
  • 127 - Polling Based Controlled Access Protocols
  • 128 - Token Passing Controlled Access Protocols
  • 129 - IP Vs MAC Address
  • 130 - Portability of the MAC Address
  • 131 - Address Resolution Protocol ARP
  • 132 - ARP Protocol in Action
  • 133 - Routing of IP Packets from One Subnet to Another Subnet
  • 134 - Ethernet Its Physical Topology
  • 135 - Ethernet Frame Structure
  • 136 - Ethernet Unreliable Connectionless
  • 137 - Ethernet Switch Its Properties
  • 138 - How Switch Selflearns the Forwarding Table
  • 139 - Switch Working Algorithm
  • 140 - An Example of Switch Selflearning Forwarding
  • 141 - Self learning of Switch Forwarding Tables in Case of Interconnected Switches
  • 142 - Motivation For Using Virtual LANs VLANS
  • 143 - Problem with VLANs Spanning Multiple Switches
  • 144 - VLAN Trunking

  • 6 - The Physical Layer
  • 145 - Evolution of IEEE 8023 Ethernet Standards Link Physical Layer
  • 146 - Common Implementations of Fast Ethernet Physical Layer of 10Base2 10Base5
  • 147 - Common Implementations of Fast Ethernet Physical Layer of 10BaseT
  • 148 - Common Implementations of Fast Ethernet Physical Layer of 10BaseF
  • 149 - Common Gigabit and Fast Ethernet Implementation

  • 7 - Computer Network Security
  • 150 - What is a Firewall
  • 151 - Why Firewalls are used
  • 152 - Types of Firewalls 1 Stateless Packet Filtering
  • 153 - Network Security Policy For Packet Filtering
  • 154 - Stateless Packet Filtering Implementation as Access Control List
  • 155 - Drawback Of Stateless Packet Filtering
  • 156 - 2 Stateful Packet Filtering
  • 157 - Stateful Packet Filering in Access Control List
  • 158 - Application Gateways
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 28614
    حجم: 2404 مگابایت
    مدت زمان: 405 دقیقه
    تاریخ انتشار: ۲۱ دی ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید