Home Data Communication & Networking : MCA-207

Data Communication & Networking : MCA-207

Lecture No.DescriptionWatch Videos
Lecture 1Introductory Concepts: Goals and Applications of Networks, Network structure and architecture, the OSI reference model, services,Lecture by Mr. Mohit Tiwari ,    Lecture by Mr. Mohit Tiwari,    Lecture by ,    Lecture by
Lecture 2The Physical Layer, networks topologyLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 3Theoretical Basis for Data Communication, Guided Transmission MediaLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 4Wireless Transmission, Communication SatellitesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 5Digital Signal Encoding Formats – NRZ-L, NRZI, bipolar-AMILecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 6Digital Signal Encoding Formats -Manchester, Differential ManchesterLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 7Digital Modulation – ASK, FSKLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 8Digital Modulation –PSK, QAMLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 9Digital Modulation – ASK, FSK, PSK, QAM ExerciseLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 10Digitization – Sampling Theorem, PCM, DMLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 11Analog Modulation –Introducing AM, FM, PM,Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 12The Mobile Telephone SystemLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 13The Data Link Layer: Data Link Layer Design IssuesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 14Error Detection and Correlation, Flow Control ProtocolsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 15Stop-and-wait Flow Control, , Error Control, Stop-and-wait ARQLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 16Sliding – Window Flow Control, Go-back-N, Selective-repeatLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 17Example of Data Link Protocols-HDLCLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 18Medium access sub layer: Channel allocations, ALOHA ProtocolsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 19Carrier Sense Multiple Access ProtocolsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 20CSMA with Collision DetectionLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 21Collision free protocolsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 22EthernetLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 23Wireless LANsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 24Bluetooth, Data Link Layer Switching.Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 25Network Layer:Point-to-Point network,Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 26Routing algorithms – Dijakastra shortest path algorithmLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 27Routing algorithms – Flooding, Distance Vector Routing AlgorithmLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 28Routing algorithms – Link State RoutingLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 29Congestion control – Leaky BucketLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 30Congestion control – Token Leaky BucketLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 31Congestion control – Choke packetsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 32Quality Control & InternetworkingLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 33The Network Layer in the InternetLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 34IP Protocol & packetLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 35IP addresses, IPv6Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 36Subneting & MaskingLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 37Transport Layer:Design IssueLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 38Connection management, TCP window managementLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 39Transmission Control ProtocolLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 40User Datagram Protocol Performance IssuesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 41Application Layer:DNSLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 42Electronic MailLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 43WWWLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 44MUTIMEDIA.Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 45Network Security:Cryptography, Compression TechniqueLecture by ,    Lecture by ,    Lecture by ,    Lecture by
[whatsapp]