Lecture No. | Description | Watch Videos |
---|---|---|
Lecture 1 | Introductory Concepts: Goals and Applications of Networks, Network structure and architecture, the OSI reference model, services, | Lecture by Mr. Mohit Tiwari , Lecture by Mr. Mohit Tiwari, Lecture by , Lecture by |
Lecture 2 | The Physical Layer, networks topology | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 3 | Theoretical Basis for Data Communication, Guided Transmission Media | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 4 | Wireless Transmission, Communication Satellites | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 5 | Digital Signal Encoding Formats – NRZ-L, NRZI, bipolar-AMI | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 6 | Digital Signal Encoding Formats -Manchester, Differential Manchester | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 7 | Digital Modulation – ASK, FSK | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 8 | Digital Modulation –PSK, QAM | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 9 | Digital Modulation – ASK, FSK, PSK, QAM Exercise | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 10 | Digitization – Sampling Theorem, PCM, DM | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 11 | Analog Modulation –Introducing AM, FM, PM, | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 12 | The Mobile Telephone System | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 13 | The Data Link Layer: Data Link Layer Design Issues | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 14 | Error Detection and Correlation, Flow Control Protocols | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 15 | Stop-and-wait Flow Control, , Error Control, Stop-and-wait ARQ | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 16 | Sliding – Window Flow Control, Go-back-N, Selective-repeat | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 17 | Example of Data Link Protocols-HDLC | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 18 | Medium access sub layer: Channel allocations, ALOHA Protocols | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 19 | Carrier Sense Multiple Access Protocols | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 20 | CSMA with Collision Detection | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 21 | Collision free protocols | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 22 | Ethernet | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 23 | Wireless LANs | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 24 | Bluetooth, Data Link Layer Switching. | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 25 | Network Layer:Point-to-Point network, | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 26 | Routing algorithms – Dijakastra shortest path algorithm | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 27 | Routing algorithms – Flooding, Distance Vector Routing Algorithm | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 28 | Routing algorithms – Link State Routing | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 29 | Congestion control – Leaky Bucket | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 30 | Congestion control – Token Leaky Bucket | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 31 | Congestion control – Choke packets | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 32 | Quality Control & Internetworking | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 33 | The Network Layer in the Internet | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 34 | IP Protocol & packet | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 35 | IP addresses, IPv6 | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 36 | Subneting & Masking | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 37 | Transport Layer:Design Issue | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 38 | Connection management, TCP window management | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 39 | Transmission Control Protocol | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 40 | User Datagram Protocol Performance Issues | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 41 | Application Layer:DNS | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 42 | Electronic Mail | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 43 | WWW | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 44 | MUTIMEDIA. | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 45 | Network Security:Cryptography, Compression Technique | Lecture by , Lecture by , Lecture by , Lecture by |