Search this site
Embedded Files
Skip to main content
Skip to navigation
Demystifying Networking
Home
Course
Week 0
Week 1
1.1: The CEO's Problem
1.2 Layered Nature of Computer Networks
1.3 Introduction to Cisco Packet Tracer (CPT)
CPT: Requesting a Website
Quiz: Layered Nature of Networks
1.4 Anupam's Adventure
1.5 From Anupam's Adventure to Network Addressing
1.6 Addressing in Networks
1.7 Deep Dive into IP addresses
LxT IPv4 to IPv6
CPT: Network Addressing
Quiz: Network Addressing
1.8 Summary of Week 1
Analogy: The Dabbawalas
Week 2
1.1 Discussion on dabbawala analogy
1.2 From dabbawalas to routers and switches
2 What is Routing ?
3.1 Static routing in a router in CPT
3.2 How does a switch forwards packets? (CPT)
3.3 How to add static route in a router? (CPT)
4.1 Traveler's dilemma
4.2 Discussing the Traveler's dilemma
4.3 From Traveler's dilemma to Dynamic Routing
5.1 Dynamic Routing with Distance Vector
5.2 Distance Vector Routing in Detail with example
5.3 Dynamic Routing with Link State
Advanced Routing Protocols (OSPF)
6 Setting up dynamic routing in Packet Tracer
7 Summary of the week
8.1 Introduction to analogy for Week 3
8.2 Analogy for week 3
8.3 Questions on analogy for week 3
Week 3
1 Understanding the new order requirements
2.1 Introduction to Tranport Layer
2.2 Introduction to TCP
2.3 Introduction to UDP
2.4 Extending TCP to MTCP
3.1 Exploring UDP on Cisco Packet Tracer
3.2 TCP Connection Establishment
3.3 TCP Connection Closure
3.4 Summay of TCP and UDP on Cisco Packet Tracer
4 The story of the delivery fiasco
5.1 From delivery fisaco to Port Numbers
5.2 Application Layer in depth
6.1 Port number in Wireshark
6.2 from NAT to PAT
6.3 Summary of port number and PAT
7 Summary of the entire TCP IP stack
8.1 Introducing the analogy for week 4
8.2 The secret box
8.3 Questions on analogy for week 4
Week 3 FAQ (Frequently Asked Questions))
Week 4
1.1 Secret of the secret box
1.2 From secret box to encryption
2.1 Introduction to security and CIA
2.2 Information Security and Defense in Depth
2.3 Information Classification and Access Control
2.4 Process Management
2.5 Introduction to Network Security
2.6 Network Breach and Countermeasures
2.7 Internet Security
2.8 Securing the Internet Usage
2.9 Internet Security Products
2.10 Personal Computing Device Recommendations
2.11 Responsible Behavior on the Internet
2.12 Best practices for home Network and Media Devices
3.1 Introducing Information Technology Act 2000
3.2 Security Demonstration
3.3 Security Case Study
3.4 Home Network Best Practices
3.5 Closing Thoughts on Security
4 The story of a Family Trip
5.1 The troubleshooting approach
6.1 Troubleshooting Physical and Data Link Layers
6.2 Troubleshooting Network Layer
6.3 Troubleshooting Transport and Application Layers
6.4 Troubleshooting Summary
6.5 Troubleshooting Heuristics
7.1 Troubleshooting Challenge 1
7.2 Trouble shooting challenge 2
7.3 Trouble Shooting Challenge 3
7.4 Thats How we Troubleshoot
8 Week Summary
Course Closing
Course Credits
Discussion Forum
Demystifying Networking
Introduction to TCP
Dear Learners,
In this video we discuss about TCP in detail.
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse