NOC:Demystifying Networking (USB)

₹950.00
In stock



Media Storage Type : 32 GB USB Stick

NPTEL Subject Matter Expert : Prof.Sridhar Iyer

NPTEL Co-ordinating Institute : IIT Bombay

NPTEL Lecture Count : 100

NPTEL Course Size : 7.6 GB

NPTEL PDF Text Transcription : Available and Included

NPTEL Subtitle Transcription : Available and Included (SRT)


Lecture Titles:

Lecture 1 - Introduction
Lecture 2 - Analogy for CEO's Problem
Lecture 3 - Discussing the CEO's Problem
Lecture 4 - From the CEO's Company to Layers in a Network
Lecture 5 - Layers in Detail
Lecture 6 - Layered Nature of a Network
Lecture 7 - Introduction to Internet Data Capturing using Wireshark
Lecture 8 - Network data captured while requesting a website
Lecture 9 - What is Cisco Packet Tracer
Lecture 10 - Modes of Cisco Packet Tracer
Lecture 11 - Getting Cisco Packet Tracer
Lecture 12 - Logical and Physical Typologies in Cisco Packet Tracer
Lecture 13 - Devices on Cisco Packet Tracer
Lecture 14 - Introduction to the Cisco Packet Tracer Activity for Week 1
Lecture 15 - Introduction to the campus network on Cisco Packet Tracer
Lecture 16 - Loading the page in Simulation Mode
Lecture 17 - Inspecting the packets in Simulation Mode
Lecture 18 - Editing the dummy website on Cisco Packet Tracer
Lecture 19 - Summary of the Cisco Packet Tracer Activity
Lecture 20 - Introduction to Anupam's Adventure
Lecture 21 - Anupam's adventure brings us to IP Addressing
Lecture 22 - Addressing at various layers
Lecture 23 - IP Addresses
Lecture 24 - Address Translation
Lecture 25 - Introduction to IP Addressing
Lecture 26 - Creating a network with Sub-net mask
Lecture 27 - Nomenclature of a sub-net mask
Lecture 28 - Network addresses and Private networks
Lecture 29 - Introduction to the Addressing Topology
Lecture 30 - Addressing a local network and DHCP
Lecture 31 - Addressing a local network manually
Lecture 32 - Addressing in Pubilc and Private Networks
Lecture 33 - Verifying Connectivity using Ping
Lecture 34 - Using network address translation to communicate on internet
Lecture 35 - Using Sub nets and Summary of addressing
Lecture 36 - Summary of the week
Lecture 37 - Analogy for the week 2
Lecture 38 - Discussion on dabbawala analogy
Lecture 39 - From dabbawalas to routers and switches
Lecture 40 - What is routing ?
Lecture 41 - Static routing in a router in CPT
Lecture 42 - How does a switch forwards packets CPT
Lecture 43 - How to add static route in a router? (CPT)
Lecture 44 - Traveler's dilemma
Lecture 45 - Duscussing the Traveler's dilemma
Lecture 46 - From Traveler's dilemma to Dynamic Routing
Lecture 47 - Dynamic Routing with Distance Vector
Lecture 48 - Distance Vector Routing in Detail
Lecture 49 - Dynamic Routing with Link State
Lecture 50 - Setting up dynamic routing in Packet Tracer
Lecture 51 - Summary of the week
Lecture 52 - Introduction to analogy for week 3
Lecture 53 - Analogy for week 3
Lecture 54 - Questions on analogy for week 3
Lecture 55 - Understanding the new order requirements
Lecture 56 - Introduction to Tranport Layer
Lecture 57 - Introduction to TCP
Lecture 58 - Introduction to UDP
Lecture 59 - Exploring UDP on Cisco Packet Tracer
Lecture 60 - TCP Connection Establishment
Lecture 61 - TCP Connection Closure
Lecture 62 - Summay of TCP and UDP on Cisco Packet Tracer
Lecture 63 - The story of the delivery fiasco
Lecture 64 - From delivery fisaco to Port Numbers
Lecture 65 - Application Layer in depth
Lecture 66 - Port number in Wireshark
Lecture 67 - Summary of port number and PAT
Lecture 68 - Summary of the entire TCP IP stack
Lecture 69 - Introducing the analogy for week 4
Lecture 70 - The secret box
Lecture 71 - Questions on analogy for week 4
Lecture 72 - Secret of the secret box
Lecture 73 - From secret box to encryption
Lecture 74 - Introduction to security and CIA
Lecture 75 - Information Security and Defence in Depth
Lecture 76 - Information Classification and Access Control
Lecture 77 - Process Management
Lecture 78 - Introduction to Network Security
Lecture 79 - Network Breach and Countermeasures
Lecture 80 - Internet Security
Lecture 81 - Securing the Internet Usage
Lecture 82 - Internet Security Products
Lecture 83 - Personal Computing Device Recommendations
Lecture 84 - Responsible Behavior on the Internet
Lecture 85 - Best practices for home Network and Media Devices
Lecture 86 - Closing thoughts on security
Lecture 87 - The story of a family trip
Lecture 88 - The troubleshooting approach
Lecture 89 - Troubleshooting Physical and Data Link Layers
Lecture 90 - Troubleshooting Network Layer
Lecture 91 - Troubleshooting Transport and Application Layers
Lecture 92 - Troubleshooting Summary
Lecture 93 - Troubleshooting Heuristics
Lecture 94 - Troubleshooting Challenge - 1
Lecture 95 - Troubleshooting challenge - 2
Lecture 96 - Troubleshooting Challenge - 3
Lecture 97 - Thats How we Troubleshoot
Lecture 98 - Week Summary
Lecture 99 - Course Closure
Lecture 100 - Course Credits

Write Your Own Review
You're reviewing:NOC:Demystifying Networking (USB)