Home Advanced Computer Networks : MCA-206

Advanced Computer Networks : MCA-206

Lecture No.DescriptionLecture By
Lecture 1 Overview of computer networkLecture by Mr. Mohit Tiwari,    Lecture by Mr. Mohit Tiwari ,    Lecture by ,    Lecture by
Lecture 2 Seven- layer architectureLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 3 TCP/IP suite of ProtocolLecture by Mr. Mohit Tiwari,    Lecture by Mr. Mohit Tiwari,    Lecture by Mr. Mohit Tiwari ,    Lecture by
Lecture 4 Mac protocol for high speed LANS-1Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 5 Mac protocol for high speed LANS-2Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 6 MAN’s & WIRLESS LANsLecture by Mr. Mohit Tiwari,    Lecture by ,    Lecture by ,    Lecture by
Lecture 7 FDDILecture by Mr. Mohit Tiwari,    Lecture by ,    Lecture by ,    Lecture by
Lecture 8 DQDB, HIPPILecture by Mr. Mohit Tiwari ,    Lecture by Mr. Mohit Tiwari,    Lecture by ,    Lecture by
Lecture 9 Gigabit Ethernet, Wireless EthernetLecture by Mr. Mohit Tiwari ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 10 Fast access technologies.(For example, ADSL, cable Modem)Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 11 Wi FiLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 12 WimaxLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 13 Why IPV6, basic protocol, etcLecture by Mr. Mohit Tiwari ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 14 IPV6: extension & optionLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 15 IPV6: support for QS, SecurityLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 16 Neighbor discover & auto-configurationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 17 Routing Protocols-1Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 18 Routing Protocols-2Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 19 Routing Protocols-3Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 20 Change to other protocolsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 21 Application programming interface for IPV6.6 bone-1Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 22 Application programming interface for IPV6.6 bone-2Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 23 Introduction to ATM, ATM reference ModelLecture by Mr.Mohit Tiwari ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 24 AAL layers, AAL0, AA1, AAL2, AAL3/4, AAL5-1Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 25 AAL layers, AAL0, AA1, AAL2, AAL3/4, AAL5-2Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 26 Mobility in networkLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 27Mobile IPLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 28Security related issuesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 29IP Multicasting: IntroductionLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 30Multicasting routing protocols,Multicast Distance VectorLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 31Multicasting routing protocols(MOSPF)Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 32Optimal Routing: Shortest Path TreesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 33Group Management (IGMP)Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 34address assignmentLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 35session discoveryLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 36 TCP extensions for high – speed networks-1Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 37TCP extensions for high – speed networks-2Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 38Transaction – oriented application, other new option in TCPLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 39Network security at various layersLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 40Secure-HTTPLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 41SSP, ESPLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 42 Authentication HeaderLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 43 key distribution protocolsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 44 Digital signaturesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 45 Digital certificatesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 46 Quality of ServiceLecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by
Lecture 47 Asynchronous Transfer mode ATMLecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by
Lecture 48Neighbour DiscoveryLecture by Mr. Mohit Tiwari , Lecture by , Lecture by , Lecture by
[whatsapp]