Lecture No. | Description | Lecture By |
---|---|---|
Lecture 1 | Overview of computer network | Lecture by Mr. Mohit Tiwari, Lecture by Mr. Mohit Tiwari , Lecture by , Lecture by |
Lecture 2 | Seven- layer architecture | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 3 | TCP/IP suite of Protocol | Lecture by Mr. Mohit Tiwari, Lecture by Mr. Mohit Tiwari, Lecture by Mr. Mohit Tiwari , Lecture by |
Lecture 4 | Mac protocol for high speed LANS-1 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 5 | Mac protocol for high speed LANS-2 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 6 | MAN’s & WIRLESS LANs | Lecture by Mr. Mohit Tiwari, Lecture by , Lecture by , Lecture by |
Lecture 7 | FDDI | Lecture by Mr. Mohit Tiwari, Lecture by , Lecture by , Lecture by |
Lecture 8 | DQDB, HIPPI | Lecture by Mr. Mohit Tiwari , Lecture by Mr. Mohit Tiwari, Lecture by , Lecture by |
Lecture 9 | Gigabit Ethernet, Wireless Ethernet | Lecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by |
Lecture 10 | Fast access technologies.(For example, ADSL, cable Modem) | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 11 | Wi Fi | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 12 | Wimax | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 13 | Why IPV6, basic protocol, etc | Lecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by |
Lecture 14 | IPV6: extension & option | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 15 | IPV6: support for QS, Security | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 16 | Neighbor discover & auto-configuration | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 17 | Routing Protocols-1 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 18 | Routing Protocols-2 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 19 | Routing Protocols-3 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 20 | Change to other protocols | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 21 | Application programming interface for IPV6.6 bone-1 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 22 | Application programming interface for IPV6.6 bone-2 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 23 | Introduction to ATM, ATM reference Model | Lecture by Mr.Mohit Tiwari , Lecture by , Lecture by , Lecture by |
Lecture 24 | AAL layers, AAL0, AA1, AAL2, AAL3/4, AAL5-1 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 25 | AAL layers, AAL0, AA1, AAL2, AAL3/4, AAL5-2 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 26 | Mobility in network | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 27 | Mobile IP | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 28 | Security related issues | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 29 | IP Multicasting: Introduction | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 30 | Multicasting routing protocols,Multicast Distance Vector | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 31 | Multicasting routing protocols(MOSPF) | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 32 | Optimal Routing: Shortest Path Trees | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 33 | Group Management (IGMP) | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 34 | address assignment | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 35 | session discovery | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 36 | TCP extensions for high – speed networks-1 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 37 | TCP extensions for high – speed networks-2 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 38 | Transaction – oriented application, other new option in TCP | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 39 | Network security at various layers | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 40 | Secure-HTTP | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 41 | SSP, ESP | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 42 | Authentication Header | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 43 | key distribution protocols | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 44 | Digital signatures | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 45 | Digital certificates | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 46 | Quality of Service | Lecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by | Lecture 47 | Asynchronous Transfer mode ATM | Lecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by | Lecture 48 | Neighbour Discovery | Lecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by |