- ISO-OSI 7-Layer Network Architecture
- Network Architecture(Contd) and Physical Layer
- Physical Layer (Contd) - Data Encoding
- Multiplexing, Network Topology, Aloha and CSMA/CD
- CSMA/CA, Contention Free Protocols and Limited Contention Protocols
- IEEE 802.3 and Ethernet
- IEEE 802.5: Token Ring Network
- Token Ring Network(Contd...) and IEEE 802.4: Token Bus Network
- Data Link Layer(DLL)
- Network Layer
- Network Layer(cont) - Routing Algorithms Classification
- Routing Algorithms
- ARP,RARP,ICMP Protocols
- Transport Layer Protocol (TCP)
- TCP (continued)
- TCP - Implementation Issues
- Unix Socket Programming - Part 1
- Unix Socket Programming - Part 2
- Unix Socket Programming - Part 3
- Unix Socket Programming - Part 4 and Some Topics in TCP
- TCP Congestion Control, Random Losses, PAWS
- UDP and DNS
- DNS(Continued), BOOTP, DHCP
- Routing in Internet
- Routing(Continued)- Algortihms
- Remote Procedure Call
- Remote Procedure Call - Using rpcgen(Contd..)
- Distributed Applications
- Applications- FTP and EMAIL
- PEM and SNMP
- Firewalls
- Wireless Networks
- Network Security
- Network Security(Contd...)
- Network Security(Contd...)
- Kerberos and Public Key Authentication
- NFS and AFS
Search This Blog
Showing posts with label Computer Networks NOTES. Show all posts
Showing posts with label Computer Networks NOTES. Show all posts
Computer Networks Lecture Notes
Computer Networks PPT PDF SLIDES
Course Title: Computer Networks II
Branch: Computer science and Engineering
Author: Stephen W. Turner
University: University of Michigan-Flint
Dated: 2011
Text Books Required: Computer Networks, 5th Edition by Andrew S. Tanenbaum and
David J. Wetherall , Prentice Hall,

Description:
This course will develop an understanding of:
a. Layered network architecture models.
b. Network, Transport and Application layer protocols.
c. Wireless networking techniques.
d. Practical design, construction, and administration of computer networks.
e. The web as an example of client-server computing: client-side and server-side
programs/scripts, CGI, applets; characteristics of web servers; web protocols.
f. Network security: fundamentals, public- and secret-key algorithms,
authentication protocols, digital signatures.
g. Network management: security issues; domain names and name services;
security issues and firewalls; QoS
Download Slides here:
Branch: Computer science and Engineering
Author: Stephen W. Turner
University: University of Michigan-Flint
Dated: 2011
Text Books Required: Computer Networks, 5th Edition by Andrew S. Tanenbaum and
David J. Wetherall , Prentice Hall,
Description:
This course will develop an understanding of:
a. Layered network architecture models.
b. Network, Transport and Application layer protocols.
c. Wireless networking techniques.
d. Practical design, construction, and administration of computer networks.
e. The web as an example of client-server computing: client-side and server-side
programs/scripts, CGI, applets; characteristics of web servers; web protocols.
f. Network security: fundamentals, public- and secret-key algorithms,
authentication protocols, digital signatures.
g. Network management: security issues; domain names and name services;
security issues and firewalls; QoS
Download Slides here:
Notes from | Links |
---|---|
Sockets | Introduction 2-up per page |
Introduction 4-up per page | |
Chapter 1 | Introduction 2-up per page |
Introduction 4-up per page | |
Chapter 2 | The Physical Layer 2-up per page |
The Physical Layer 4-up per page | |
Chapter 3 | The Data Link Layer 2-up per page |
The Data Link Layer 4-up per page | |
Chapter 4 | The Medium Access Sublayer 2-up per page |
The Medium Access Sublayer 4-up per page | |
Chapter 5 | The Network Layer 2-up per page |
The Network Layer 4-up per page | |
Chapter 6 | The Transport Layer 2-up per page |
The Transport Layer 4-up per page | |
Chapter 7 | The Application Layer, 7.1 - 7.3 2-up per page |
The Application Layer, 7.1 - 7.3 4-up per page | |
The Application Layer, 7.4 - 7.5 2-up per page | |
The Application Layer, 7.4 - 7.5 4-up per page | |
The Application Layer, (all sections) 2-up per page | |
The Application Layer, (all sections) 4-up per page | |
Chapter 8 | Network Security 2-up per page |
Network Security 4-up per page |
Subscribe to:
Posts (Atom)