InfoCoBuild

Demystifying Computer Networking

Demystifying Computer Networking. Instructor: Prof. Sridhar Iyer, Department of Computer Science and Engineering, IIT Bombay. This course will provide students with an overview of networking concepts and technologies. It is meant as a primer for non-majors, i.e., for students who don't have networking as a core course in their curriculum. After this primer, students may choose to take other networking courses for delving deeper into specific technologies. (from nptel.ac.in)

Lecture 77 - Process Management


Go to the Course Home or watch other lectures:

Lecture 01 - Introduction
Lecture 02 - The CEO's Challenge
Lecture 03 - Discussing the CEO's Problem
Lecture 04 - From the CEO's Company to Layers in a Network
Lecture 05 - Layers in Detail
Lecture 06 - Layered Nature of a Network
Lecture 07 - Introduction to Internet Data Capturing Using Wireshark
Lecture 08 - Network Data Captured While Requesting a Website
Lecture 09 - What is Cisco Packet Tracer?
Lecture 10 - Modes of Cisco Packet Tracer
Lecture 11 - Getting Cisco Packet Tracer
Lecture 12 - Logical and Physical Topologies in Cisco Packet Tracer
Lecture 13 - Devices on Cisco Packet Tracer
Lecture 14 - Introduction to the Cisco Packet Tracer Activity
Lecture 15 - Introduction to the Campus Network on Cisco Packet Tracer
Lecture 16 - Loading the Page in Simulation Mode
Lecture 17 - Inspecting the Packets in Simulation Mode
Lecture 18 - Editing the Dummy Website on Cisco Packet Tracer
Lecture 19 - Summary of the Cisco Packet Tracer Activity
Lecture 20 - Introduction to Anupam's Adventure
Lecture 21 - Anupam's Adventure Brings us to IP Addressing
Lecture 22 - Addressing at Various Layers
Lecture 23 - IP Addresses
Lecture 24 - Address Translation
Lecture 25 - Introduction to IP Addressing
Lecture 26 - Creating a Network with Subnet Mask
Lecture 27 - Nomenclature of a Subnet Mask
Lecture 28 - Network Addresses and Private Networks
Lecture 29 - Introduction to the Addressing Topology
Lecture 30 - Addressing a Local Network and DHCP
Lecture 31 - Addressing a Local Network Manually
Lecture 32 - Addressing in Public and Private Networks
Lecture 33 - Verifying Connectivity using Ping
Lecture 34 - Using Network Address Translation to Communicate on the Internet
Lecture 35 - Using Subnets and Summary of Addressing
Lecture 36 - Summary of Addressing
Lecture 37 - Analogy of Routing
Lecture 38 - Discussion on Dabbawala Analogy
Lecture 39 - From Dabbawalas to Routers and Switches
Lecture 40 - What is Routing?
Lecture 41 - Static Routing in a Router in CPT
Lecture 42 - How does a Switch forwards Packets? (CPT)
Lecture 43 - How to Add Static Route in a Router? (CPT)
Lecture 44 - Traveler's Dilemma
Lecture 45 - Discussing the Traveler's Dilemma
Lecture 46 - From Traveler's Dilemma to Dynamic Routing
Lecture 47 - Dynamic Routing with Distance Vector
Lecture 48 - Distance Vector Routing in Detail
Lecture 49 - Dynamic Routing with Link State
Lecture 50 - Setting Up Dynamic Routing in Packet Tracer
Lecture 51 - Summary of Dynamic Routing
Lecture 52 - Introduction: Analogy for Transport Layer
Lecture 53 - Analogy for Transport Layer
Lecture 54 - Questions on Analogy for Transport Layer
Lecture 55 - Understanding the New Order Requirements
Lecture 56 - Introduction to Transport Layer
Lecture 57 - Introduction to TCP (Transmission Control Protocol)
Lecture 58 - Introduction to UDP (User Datagram Protocol)
Lecture 59 - Exploring UDP on Cisco Packet Tracer
Lecture 60 - TCP Connection Establishment
Lecture 61 - TCP Connection Closure
Lecture 62 - Summary of TCP and UDP on Cisco Packet Tracer
Lecture 63 - The Story of the Delivery Fiasco
Lecture 64 - From Delivery Fiasco to Port Numbers
Lecture 65 - Application Layer in Depth
Lecture 66 - Port Number in Wireshark
Lecture 67 - Summary of Port Number and PAT
Lecture 68 - Summary of the Entire TCP/IP Stack
Lecture 69 - Introduction: Analogy for Security
Lecture 70 - The Secret Box
Lecture 71 - Questions on Analogy for Security
Lecture 72 - Secret of the Secret Box
Lecture 73 - From Secret Box to Encryption
Lecture 74 - Introduction to Security and CIA
Lecture 75 - Information Security and Defence in Depth
Lecture 76 - Information Classification and Access Control
Lecture 77 - Process Management
Lecture 78 - Introduction to Network Security
Lecture 79 - Network Breach and Countermeasures
Lecture 80 - Internet Security
Lecture 81 - Securing the Internet Usage
Lecture 82 - Internet Security Products
Lecture 83 - Personal Computing Device Recommendations
Lecture 84 - Responsible Behavior on the Internet
Lecture 85 - Best Practices for Home Network and Media Devices
Lecture 86 - Closing Thoughts on Security
Lecture 87 - The Story of a Family Trip
Lecture 88 - The Troubleshooting Approach
Lecture 89 - Troubleshooting Physical and Data Link Layers
Lecture 90 - Troubleshooting Network Layer
Lecture 91 - Troubleshooting Transport and Application Layers
Lecture 92 - Troubleshooting: Summary
Lecture 93 - Troubleshooting: Heuristics
Lecture 94 - Troubleshooting: Challenge 1
Lecture 95 - Troubleshooting: Challenge 2
Lecture 96 - Troubleshooting: Challenge 3
Lecture 97 - That's How We Troubleshoot
Lecture 98 - Summary: Security and Troubleshooting
Lecture 99 - Course Closure