Course Info
|
Course Category
|
Computer Science/Information Technology
|
Course Level
|
Undergraduate
|
Credit Hours
|
3
|
Pre-requisites
|
CS601
|
Instructor
|
Dr. Kashif Javed PHD
|
|
Course Contents
|
Course Introduction
What is a Network?
Traditional Computer Networks
Using the Network by Accident
Using the Network on Purpose
Well-known Network Applications
Building a Network: Starts with a Plan
Examples of Good Rules for Networking
Proprietary and Public Models
How TCP/IP Standard Grows?
Two-Well Known Networking Models
What is a Local Area Network?
LAN Cables and Connectors
Ethernet Hubs
Ethernet Frames and Collisions
How to avoid Collisions over Ethernet?
Importance of Ethernet Addresses
Frame Check Sequence
Two Ethernet Standards
Working of a LAN Switch
Switch: Collision Avoidance
Full Duplex and Full Switching
Learning Ethernet addresses
Ethernet Network Speeds
Multiple Physical LANs
Introduction to Virtual LANs
Packing VLAN鈥檚 frames in a Trunk
Email: A Network Application
TCP/IP Email Standards: SMTP, POP3
File Transfer Protocol (FTP)
World Wide Web and HTTP Protocol
Main Features of TCP
Working of TCP
TCP Flow and Congestion Control
User Datagram Protocol (UDP)
TCP Ports Numbers
TCP Segmentation
Basics of Internet Protocol (IP)
Working of IP and IP addresses
How to run an IP Network?
Classes of IP Networks
IP Subnetting
Network Address Translation (NAT)
Dynamic Host Configuration Protocol (DHCP)
Internet Control Message Protocol (ICMP)
End-to-End: Processing IP Packet
A Link State Routing Algorithm
Distance Vector Routing Algorithm
Working of Default Gateway Router
Address Resolution Protocol
Router鈥檚 Routing Logic and Table
Routing with Subnets
Router Hardware Architecture
Routing to Nearby Places
Dynamically Learning Routing Tables
How to Pick the Best Route
Interior & Exterior Routing Protocols
Introduction to Domain Name System
Domain Name System (DNS) Servers
Working of Domain Name System
DNS Resource Records
Introduction to Wide Area Network
Different Aspects of WAN Link
A Cross-over Cable versus Leased Circuit
Routers and WANS
Frame Relay
Frame Relay Switching
Virtual Circuits
Point-to-Point WANs & Frame Relay
Routing over PVCs
The Internet: A Large IP Network
Using a Phone Line for Data
Digital Subscriber Line (DSL)
Sending Data without a Phone Line
Introduction to AAA Security Model
Password Authentication Protocol
Virtual Private Network (VPN)
Enterprise Network and the Internet
Firewalls, Demilitarized Zone, IDS
Introduction to Wireshark
Five Common Network Problems
Next 5 Common Network Problems
Next 6 Common Network Problems
Next 4 Common Network Problems
Next 5 Common Network Problems
Next 8 Common Network Problems
A Four-Part Analysis Methodology
Using a Troubleshooting Checklist
Wireshark Lab 1
Wireshark Lab 2
Wireshark Lab 3
Wireshark Lab 4
Wireshark Lab 5
Wireshark Lab 6
Wireshark Lab 7
Wireshark Lab 8
Wireshark Lab 9
Wireshark Lab 10
Wireshark Lab 11
. Wireshark Lab 12
Wireshark Lab 13
Wireshark Lab 14
Capture Options for a Switched Network
. Wireshark Lab 15
Wireshark Lab 16
Wireshark Lab 17
Verify the Target Host Traffic
Wireshark Lab 18
Wireshark Lab 19
Wireshark Lab 20
Wireshark Lab 21
Do not Focus on Acceptable Delays
Watch for the Delays that DO Matter
Wireshark Lab 22
Wireshark Lab 23
Wireshark Lab 24
Wireshark Lab 25
Wireshark Lab 26
Wireshark Lab 27
Wireshark Lab 28
Wireshark Lab 29
Wireshark Lab 30
Wireshark Lab 31
RTT: Packets 2 and 3 of TCP Handshake
Wireshark Lab 32
Wireshark Lab 33
Wireshark Lab 34
Wireshark Lab 35
Wireshark Lab 36
Wireshark Lab 37
Wireshark Lab 38
Wireshark Lab 39
Wireshark Lab 40
Wireshark Lab 41
Wireshark Lab 42
Wireshark Lab 43
Wireshark Lab 44
Wireshark's Expert Infos System
Wireshark's Packet Loss Detection
Packet Loss Recovery Methods
Wireshark Lab 45
Wireshark Lab 46
Wireshark Lab 47
Wireshark Lab 48
Wireshark Lab 49
Duplicate ACKs and their Causes
Wireshark Lab 50
Wireshark Lab 51
Wireshark Lab 52
Out-of-Order Packets and their Causes
Wireshark Lab 53
Wireshark Lab 54
Causes of Fast Retransmissions
Wireshark Lab 55
Wireshark Lab 56
Causes of Retransmissions
Wireshark Lab 57
Wireshark Lab 58
Causes of ACKed Unseen Segments
Wireshark Lab 59
Wireshark Lab 60
Causes of Keep Alives
Wireshark Lab 61
Wireshark Lab 62
Wireshark Lab 63
Causes of Reused Ports
Wireshark Lab 74
Wireshark Lab 75
Causes of Checksum Errors
Wireshark Lab 76
Wireshark Lab 77
Wireshark Lab 78
Introduction to Packet Tracer
Packet Tracer鈥檚 Interface Overview
Creating a Simple topology
Introduction to Cisco and PT devices
Customizing Devices with Modules
Accessing CLI of a Device
Configuring Devices with Config Tab
Generic IP End Devices in PT
Configuring End Devices in PT
Packet Tracer鈥檚 Simulation Mode
Connecting Devices and Link Status
Testing Connectivity with PDUs
Clustering a Topology
Creating Cities, Offices & Wiring Closets
Managing Cables and Distances
Static Routing with GUI
Static Routing with CLI
Configuring RIP with GUI
Configuring RIP with CLI
Load Sharing
|
|
|