Course Overview
|
Course Synopsis
|
Network Design and Anlysis includes the core portion of design based on different topological network paradigms. The wirehark section enables the learner to comprehend the network filtering based on packets.
|
Course Learning Outcomes
|
Network Building, Wireshark
- Network Design and Anlysis includes the core portion of design based on different topological network paradigms. The wirehark section enables the learner to comprehend the network filtering based on packets.
|
Course Calendar
|
|
Week 01
1
|
Week 1.1 Course Introduction
|
2
|
Week 1.2 What is a Network?
|
3
|
Week 1.3 Traditional Computer Networks
|
4
|
Week 1.4 Using the Network by Accident
|
5
|
Week 1.5 Using the Network on Purpose
|
6
|
Week 1.6 Well-known Network Applications
|
7
|
Week 1.7 Building a Network: Starts with a Plan
|
8
|
Week 1.8 Examples of Good Rules for Networking
|
9
|
Week 1.9 Proprietary and Public Models
|
10
|
Week 1.10 How TCP/IP Standard Grows?
|
11
|
Week 1.11 Two-Well Known Networking Models
|
12
|
Week 1.12 What is a Local Area Network?
|
Week 02
13
|
Week 2.1 LAN Cables and Connectors
|
14
|
Week 2.2 Ethernet Hubs
|
15
|
Week 2.3 Ethernet Frames and Collisions
|
16
|
Week 2.4 How to avoid Collisions over Ethernet?
|
17
|
Week 2.5 Importance of Ethernet Addresses
|
18
|
Week 2.6 Frame Check Sequence
|
19
|
Week 2.7 Two Ethernet Standards
|
20
|
Week 2.8 Working of a LAN Switch
|
21
|
Week 2.9 Switch: Collision Avoidance
|
22
|
Week 2.10 Full Duplex and Full Switching
|
23
|
Week 2.11 Learning Ethernet addresses
|
24
|
Week 2.12 Ethernet Network Speeds
|
Week 03
25
|
Week 3.1 Multiple Physical LANs
|
26
|
Week 3.2 Introduction to Virtual LANs
|
27
|
Week 3.3 Packing VLAN’s frames in a Trunk
|
28
|
Week 3.4 Email: A Network Application
|
29
|
Week 3.5 TCP/IP Email Standards: SMTP, POP3
|
30
|
Week 3.6 File Transfer Protocol (FTP)
|
31
|
Week 3.7 World Wide Web and HTTP Protocol
|
32
|
Week 3.8 Main Features of TCP
|
33
|
Week 3.9 Working of TCP
|
34
|
Week 3.10 TCP Flow and Congestion Control
|
35
|
Week 3.11 User Datagram Protocol (UDP)
|
36
|
Week 3.12 TCP Ports Numbers
|
Assignment No. 1
Week 04
37
|
Week 4.1 TCP Segmentation
|
38
|
Week 4.2 Basics of Internet Protocol (IP)
|
39
|
Week 4.3 Working of IP and IP addresses
|
40
|
Week 4.4 How to run an IP Network?
|
41
|
Week 4.5 Classes of IP Networks
|
42
|
Week 4.6 IP Subnetting
|
43
|
Week 4.7 Network Address Translation (NAT)
|
44
|
Week 4.8 Dynamic Host Configuration Protocol (DHCP)
|
45
|
Week 4.9 Internet Control Message Protocol (ICMP)
|
46
|
Week 4.10 End-to-End: Processing IP Packet
|
47
|
Week 4.11 A Link State Routing Algorithm
|
48
|
Week 4.12 Distance Vector Routing Algorithm
|
Quiz No. 1
Week 05
49
|
Week 5.1 Working of Default Gateway Router
|
50
|
Week 5.2 Address Resolution Protocol
|
51
|
Week 5.3 Router’s Routing Logic and Table
|
52
|
Week 5.4 Routing with Subnets
|
53
|
Week 5.5 Router Hardware Architecture
|
54
|
Week 5.6 Routing to Nearby Places
|
55
|
Week 5.7 Dynamically Learning Routing Tables
|
56
|
Week 5.8 How to Pick the Best Route
|
57
|
Week 5.9 Interior & Exterior Routing Protocols
|
58
|
Week 5.10 Introduction to Domain Name System
|
59
|
Week 5.11 Domain Name System (DNS) Servers
|
60
|
Week 5.12 Working of Domain Name System
|
Week 06
61
|
Week 6.1 DNS Resource Records
|
62
|
Week 6.2 Introduction to Wide Area Network
|
63
|
Week 6.3 Different Aspects of WAN Link
|
64
|
Week 6.4 A Cross-over Cable versus Leased Circuit
|
65
|
Week 6.5 Routers and WANS
|
67
|
Week 6.7 Frame Relay Switching
|
68
|
Week 6.8 Virtual Circuits
|
69
|
Week 6.9 Point-to-Point WANs & Frame Relay
|
70
|
Week 6.10 Routing over PVCs
|
71
|
Week 6.11 The Internet: A Large IP Network
|
72
|
Week 6.12 Using a Phone Line for Data
|
Week 07
73
|
Week 7.1 Digital Subscriber Line (DSL)
|
74
|
Week 7.2 Sending Data without a Phone Line
|
75
|
Week 7.3 Introduction to AAA Security Model
|
76
|
Week 7.4 Password Authentication Protocol
|
77
|
Week 7.5 Virtual Private Network (VPN)
|
78
|
Week 7.6 Enterprise Network and the Internet
|
79
|
Week 7.7 Firewalls, Demilitarized Zone, IDS
|
80
|
Week 7.8 Introduction to Wireshark
|
81
|
Week 7.9 Five Common Network Problems
|
82
|
Week 7.10 Next 5 Common Network Problems
|
83
|
Week 7.11 Next 6 Common Network Problems
|
84
|
Week 7.12 Next 4 Common Network Problems
|
Week 08
85
|
Week 8.1 Next 5 Common Network Problems
|
86
|
Week 8.2 Next 8 Common Network Problems
|
87
|
Week 8.3 A Four-Part Analysis Methodology
|
88
|
Week 8.4 Using a Troubleshooting Checklist
|
89
|
Week 8.5 Wireshark Lab 1
|
90
|
Week 8.6 Wireshark Lab 2
|
91
|
Week 8.7 Wireshark Lab 3
|
92
|
Week 8.8 Wireshark Lab 4
|
93
|
Week 8.9 Wireshark Lab 5
|
94
|
Week 8.10 Wireshark Lab 6
|
95
|
Week 8.11 Wireshark Lab 7
|
96
|
Week 8.12 Wireshark Lab 8
|
Week 09
97
|
Week 9.1 Wireshark Lab 9
|
98
|
Week 9.2 Wireshark Lab 10
|
99
|
Week 9.3 Wireshark Lab 11
|
100
|
Week 9.4. Wireshark Lab 12
|
101
|
Week 9.5 Wireshark Lab 13
|
102
|
Week 9.6 Wireshark Lab 14
|
103
|
Week 9.7 Capture Options for a Switched Network
|
104
|
Week 9.8. Wireshark Lab 15
|
105
|
Week 9.9 Wireshark Lab 16
|
106
|
Week 9.10 Wireshark Lab 17
|
107
|
Week 9.11 Verify the Target Host Traffic
|
108
|
Week 9.12 Wireshark Lab 18
|
Week 10
109
|
Week 10.1 Wireshark Lab 19
|
110
|
Week 10.2 Wireshark Lab 20
|
111
|
Week 10.3 Wireshark Lab 21
|
112
|
Week 10.4 Do not Focus on Acceptable Delays
|
113
|
Week 10.5 Watch for the Delays that DO Matter
|
114
|
Week 10.6 Wireshark Lab 22
|
115
|
Week 10.7 Wireshark Lab 23
|
116
|
Week 10.8 Wireshark Lab 24
|
117
|
Week 10.9 Wireshark Lab 25
|
118
|
Week 10.10 Wireshark Lab 26
|
119
|
Week 10.11 Wireshark Lab 27
|
120
|
Week 10.12 Wireshark Lab 28
|
Week 11
121
|
Week 11.1 Wireshark Lab 29
|
122
|
Week 11.2 Wireshark Lab 30
|
123
|
Week 11.3 Wireshark Lab 31
|
124
|
Week 11.4 RTT: Packets 2 and 3 of TCP Handshake
|
125
|
Week 11.5 Wireshark Lab 32
|
126
|
Week 11.6 Wireshark Lab 33
|
127
|
Week 11.7 Wireshark Lab 34
|
128
|
Week 11.8 Wireshark Lab 35
|
129
|
Week 11.9 Wireshark Lab 36
|
130
|
Week 11.10 Wireshark Lab 37
|
131
|
Week 11.11 Wireshark Lab 38
|
132
|
Week 11.12 Wireshark Lab 39
|
Week 12
133
|
Week 12.1 Wireshark Lab 40
|
134
|
Week 12.2 Wireshark Lab 41
|
135
|
Week 12.3 Wireshark Lab 42
|
136
|
Week 12.4 Wireshark Lab 43
|
137
|
Week 12.5 Wireshark Lab 44
|
138
|
Week 12.6 Wireshark's Expert Infos System
|
139
|
Week 12.7 Wireshark's Packet Loss Detection
|
140
|
Week 12.8 Packet Loss Recovery Methods
|
141
|
Week 12.9 Wireshark Lab 45
|
142
|
Week 12.10 Wireshark Lab 46
|
143
|
Week 12.11 Wireshark Lab 47
|
144
|
Week 12.12 Wireshark Lab 48
|
Week 13
145
|
Week 13.1 Wireshark Lab 49
|
146
|
Week 13.2 Duplicate ACKs and their Causes
|
147
|
Week 13.3 Wireshark Lab 50
|
148
|
Week 13.4 Wireshark Lab 51
|
149
|
Week 13.5 Wireshark Lab 52
|
150
|
Week 13.6 Out-of-Order Packets and their Causes
|
151
|
Week 13.7 Wireshark Lab 53
|
152
|
Week 13.8 Wireshark Lab 54
|
153
|
Week 13.9 Causes of Fast Retransmissions
|
154
|
Week 13.10 Wireshark Lab 55
|
155
|
Week 13.11 Wireshark Lab 56
|
156
|
Week 13.12 Causes of Retransmissions
|
Week 14
157
|
Week 14.1 Wireshark Lab 57
|
158
|
Week 14.2 Wireshark Lab 58
|
159
|
Week 14.3 Causes of ACKed Unseen Segments
|
160
|
Week 14.4 Wireshark Lab 59
|
161
|
Week 14.5 Wireshark Lab 60
|
162
|
Week 14.6 Causes of Keep Alives
|
163
|
Week 14.7 Wireshark Lab 61
|
164
|
Week 14.8 Wireshark Lab 62
|
165
|
Week 14.9 Wireshark Lab 63
|
166
|
Week 14.10 Causes of Reused Ports
|
167
|
Week 14.11 Wireshark Lab 74
|
168
|
Week 14.12 Wireshark Lab 75
|
Week 15
169
|
Week 15.1 Causes of Checksum Errors
|
170
|
Week 15.2 Wireshark Lab 76
|
171
|
Week 15.3 Wireshark Lab 77
|
172
|
Week 15.4 Wireshark Lab 78
|
173
|
Week 15.5 Introduction to Packet Tracer
|
174
|
Week 15.6 Packet Tracer’s Interface Overview
|
175
|
Week 15.7 Creating a Simple topology
|
176
|
Week 15.8 Introduction to Cisco and PT devices
|
177
|
Week 15.9 Customizing Devices with Modules
|
178
|
Week 15.10 Accessing CLI of a Device
|
179
|
Week 15.11 Configuring Devices with Config Tab
|
180
|
Week 15.12 Generic IP End Devices in PT
|
Week 16
181
|
Week 16.1 Configuring End Devices in PT
|
182
|
Week 16.2 Packet Tracer’s Simulation Mode
|
183
|
Week 16.3 Connecting Devices and Link Status
|
184
|
Week 16.4 Testing Connectivity with PDUs
|
185
|
Week 16.5 Clustering a Topology
|
186
|
Week 16.6 Creating Cities, Offices & Wiring Closets
|
187
|
Week 16.7 Managing Cables and Distances
|
188
|
Week 16.8 Static Routing with GUI
|
189
|
Week 16.9 Static Routing with CLI
|
190
|
Week 16.10 Configuring RIP with GUI
|
191
|
Week 16.11 Configuring RIP with CLI
|
192
|
Week 16.12 Load Sharing
|
|
|
|