Home Data Communication & Networking : MCA-207

Data Communication & Networking : MCA-207

Lecture No. Description Watch Videos
Lecture 1 Introductory Concepts: Goals and Applications of Networks, Network structure and architecture, the OSI reference model, services, Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 2 The Physical Layer, networks topology Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 3 Theoretical Basis for Data Communication, Guided Transmission Media Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 4 Wireless Transmission, Communication Satellites Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 5 Digital Signal Encoding Formats – NRZ-L, NRZI, bipolar-AMI Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 6 Digital Signal Encoding Formats -Manchester, Differential Manchester Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 7 Digital Modulation – ASK, FSK Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 8 Digital Modulation –PSK, QAM Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 9 Digital Modulation – ASK, FSK, PSK, QAM Exercise Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 10 Digitization – Sampling Theorem, PCM, DM Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 11 Analog Modulation –Introducing AM, FM, PM, Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 12 The Mobile Telephone System Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 13 The Data Link Layer: Data Link Layer Design Issues Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 14 Error Detection and Correlation, Flow Control Protocols Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 15 Stop-and-wait Flow Control, , Error Control, Stop-and-wait ARQ Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 16 Sliding – Window Flow Control, Go-back-N, Selective-repeat Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 17 Example of Data Link Protocols-HDLC Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 18 Medium access sub layer: Channel allocations, ALOHA Protocols Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 19 Carrier Sense Multiple Access Protocols Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 20 CSMA with Collision Detection Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 21 Collision free protocols Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 22 Ethernet Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 23 Wireless LANs Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 24 Bluetooth, Data Link Layer Switching. Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 25 Network Layer:Point-to-Point network, Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 26 Routing algorithms – Dijakastra shortest path algorithm Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 27 Routing algorithms – Flooding, Distance Vector Routing Algorithm Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 28 Routing algorithms – Link State Routing Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 29 Congestion control – Leaky Bucket Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 30 Congestion control – Token Leaky Bucket Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 31 Congestion control – Choke packets Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 32 Quality Control & Internetworking Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 33 The Network Layer in the Internet Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 34 IP Protocol & packet Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 35 IP addresses, IPv6 Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 36 Subneting & Masking Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 37 Transport Layer:Design Issue Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 38 Connection management, TCP window management Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 39 Transmission Control Protocol Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 40 User Datagram Protocol Performance Issues Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 41 Application Layer:DNS Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 42 Electronic Mail Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 43 WWW Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 44 MUTIMEDIA. Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 45 Network Security:Cryptography, Compression Technique Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
[whatsapp]