Starting a new Lecture Notes Series on Computer Networks
Youtube Lecture Playlist CreditsChannel Name: Gate Smashers
So Let Us Start to This Journey of Learning Computer Networks
By Lecture Notes together!
Lecture 1: Computer Networks and Security Full Syllabus
Lecture 2: Introduction to Computer Network
Lecture 3: Physical layer in computer networks
Lecture 4: Topologies in Computer Networks |Part 1
Lecture 5: Topologies in Computer Networks |Part 2
Lecture 7: Various Devices In Computer Networks
Lecture 8: Types Of Cables in Computer Networks
Lecture 9: Repeaters in Computer Networks
Lecture 10: Hub in Computer Networks
Lecture 11: Bridges In Computer Networks
Lecture 12: Routers in Computer Networks
Lecture 13: What is Circuit Switching in Computer Networks
Lecture 14: Packet Switching In Computer Networks
Lecture 16: What is Message Switching In Computer Networks
Lecture 18: Various Flow Control Protocols| Stop&Wait , GoBackN & Selective repeat in Data Link Layer
Lecture 19: Introduction to Error detection and Correction
Lecture 23: What is Pure Aloha
Lecture 24: Pure Aloha Vs Slotted Aloha with all imp points
Lecture 27: Numerical Question on CSMA/CD
Lecture 29: Class A in IP addressing with Example
Lecture 30: Class B in IP addressing with Example
Lecture 31: Class C in IP addressing with Example
Lecture 32: Class D & Class E in IP addressing with Example
Lecture 34: Disadvantages of Classful Addressing
Lecture 35: What is Classless Addressing (CIDR)
Lecture 36: Subnetting in Classful Addressing with Examples
Lecture 37: Variable Length Subnet Masking(VLSM)
Lecture 38: Subnetting in CIDR Addressing
Lecture 40: VLSM in Classless Addressing(CIDR)
Lecture 41: IPv4 Header Format – All Fields Explained
Lecture 42: Fragmentation of IPv4 Datagram
Lecture 43: IPv6 Header Format
Lecture 44: What is Routing Protocols
Lecture 45: Distance vector routing algorithm
Lecture 46: Link state routing in computer networks
Lecture 48: TCP: Transmission control protocol | part-1
Lecture 49: TCP: Transmission control protocol | Part-2
Lecture 51: TCP Data Transfer
Lecture 52: Connection Termination in TCP
Lecture 53: TCP Congestion Control
Lecture 54: UDP (User Datagram Protocol) header
Lecture 55: Advantages of UDP protocol over TCP
Lecture 56: TCP vs UDP differences
Lecture 57: Session Layer of OSI model
Lecture 58: Presentation layer in computer networks
Lecture 59: Application layer of OSI model
Lecture 60: Domain Name System (DNS)
Lecture 61: Domain Name Server(DNS) & its types
Lecture 62: All Networking Protocols & Devices
Lecture 63: Cryptography in computer network
Lecture 64: Symmetric Key Cryptography in Network Security
Lecture 65: Imp Question on Network Security
Lecture 66: Asymmetric key Cryptography
Lecture 67: RSA Algorithm in Network Security with examples
Lecture 68: What is Firewalls and How it Works
Lecture 69: What is Application(Proxy) Firewall
Lecture 70: 3 Imp Questions on Computer Networks