CCNA v1.1 (200-301) - CSU359 - Shoolini University
A Random Image for Introduction to Computer Networks

Introduction to Computer Networks

Learn the basics of computer networks, including the types of networks, network topologies, and network devices. Understand the importance of networking in today's digital world.

A Random Image for Scaler Module 1 - Why do we need Computer Networks?

Scaler Module 1 - Why do we need Computer Networks?

  • Scaler Course Summary
  • 51 minute read
  • Divya Mohan

Explore the reasons why computer networks are essential in today's digital world. Learn how networks enable communication, data sharing, and resource access across devices and locations.

A Random Image for Components of a Computer Network

Components of a Computer Network

Explore the components of a computer network, including devices, protocols, and services. Learn how network components work together to enable communication and data transfer.

A Random Image for Types of Computer Networks

Types of Computer Networks

Discover the different types of computer networks, including LANs, WANs, MANs, and PANs. Learn about the characteristics and applications of each network type.

A Random Image for Fiber Optic Cables

Fiber Optic Cables

Learn about fiber optic cables used in computer networks to transmit data over long distances. Explore the advantages of fiber optic cables over copper cables and their applications in network infrastructure.

A Random Image for Scaler Module 2 - Data Link Layer and LAN Protocols

Scaler Module 2 - Data Link Layer and LAN Protocols

  • Scaler Course Summary
  • 52 minute read
  • Divya Mohan

Learn about the data link layer and LAN protocols used in computer networks. Explore the functions of the data link layer and common LAN protocols such as Ethernet and Wi-Fi.

A Random Image for Network Topologies

Network Topologies

Learn about network topologies, including bus, star, ring, mesh, and hybrid topologies. Understand the advantages and disadvantages of each topology and their applications in network design.

A Random Image for Network Interface Cards

Network Interface Cards

Discover network interface cards (NICs) used in computer networks to connect devices to a network. Learn the functions of NICs and how they enable data transfer between devices.

A Random Image for Network Protocols

Network Protocols

Explore network protocols used in computer networks to enable communication between devices. Learn about common protocols such as TCP/IP, UDP, HTTP, and FTP.

A Random Image for Sliding Window Protocol

Sliding Window Protocol

Learn about the sliding window protocol used in computer networks to improve data transfer efficiency. Understand how the sliding window protocol manages data flow and error recovery in network communication.

A Random Image for SSL/TLS

SSL/TLS

Explore SSL/TLS protocols used to secure network communication over the internet. Learn how SSL/TLS protocols encrypt data and establish secure connections between clients and servers.

A Random Image for Multiple Access Protocols

Multiple Access Protocols

Learn about multiple access protocols used in computer networks to enable multiple devices to share a common communication channel. Explore CSMA/CD, CSMA/CA, and TDMA protocols and their applications.

A Random Image for Address Resolution Protocol

Address Resolution Protocol

Explore the Address Resolution Protocol (ARP) used in computer networks to map IP addresses to MAC addresses. Learn how ARP resolves network addresses and enables communication between devices.

A Random Image for Scaler Module 3 - LAN Protocols and Network Devices

Scaler Module 3 - LAN Protocols and Network Devices

  • Scaler Course Summary
  • 54 minute read
  • Divya Mohan

Discover LAN protocols and network devices used in computer networks. Learn about common LAN protocols such as Ethernet and network devices such as switches and routers.

A Random Image for Network Devices

Network Devices

Discover network devices such as routers, switches, hubs, and access points used in computer networks. Learn the functions of each device and how they contribute to network communication.

A Random Image for OSI Model

OSI Model

Learn about the OSI model, a conceptual framework used to understand and design computer networks. Explore the seven layers of the OSI model and their functions in network communication.

A Random Image for Data Link Layer

Data Link Layer

Explore the data link layer in the OSI model, responsible for error detection and correction in network communication. Learn the functions of the data link layer and its protocols.

A Random Image for TCP/IP Model

TCP/IP Model

Explore the TCP/IP model, a protocol suite used in computer networks to enable communication between devices. Learn the layers of the TCP/IP model and their functions in network communication.

A Random Image for Internet vs. Intranet vs. Extranet

Internet vs. Intranet vs. Extranet

Explore the differences between the internet, intranet, and extranet in computer networks. Learn how each network type is used to enable communication and data sharing within and between organizations.

A Random Image for Network Security

Network Security

Learn about network security concepts, including threats, vulnerabilities, and countermeasures. Understand the importance of network security and how to protect network assets from cyber threats.

A Random Image for Network Architecture

Network Architecture

Learn about network architecture, including the client-server and P2P architecture models. Understand how network architecture is designed and implemented to support network communication.

A Random Image for OSI Model vs TCP/IP Model

OSI Model vs TCP/IP Model

Explore the OSI model and TCP/IP model, two fundamental networking models used to understand and design computer networks. Learn the layers of each model and their functions.

A Random Image for Role and Function of Network Components

Role and Function of Network Components

  • CCNA v1.1 Concepts
  • 35 minute read
  • Divya Mohan

Discover the role and function of network Components such as Routers, Layer 2 and Layer 3 switches, Next-generation firewalls and IPS, Access points, Controllers , Endpoints, Servers, and PoE devices.

A Random Image for Characteristics of network topology architectures

Characteristics of network topology architectures

  • CCNA v1.1 Concepts
  • 39 minute read
  • Divya Mohan

Explore the characteristics of network topology architectures, including bus, star, ring, mesh, hybrid, Two-tier, Three-tier, Spine-leaf, WAN, Small office/home office (SOHO), On-premises and cloud. Understand the advantages and disadvantages of each topology.

A Random Image for Physical interface and cabling types

Physical interface and cabling types

  • CCNA v1.1 Concepts
  • 28 minute read
  • Divya Mohan

Learn about the physical interfaces and cabling types used in computer networks. Explore the different types of cables, connectors, and interfaces used to connect network devices.

A Random Image for Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)

Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)

  • CCNA v1.1 Concepts
  • 21 minute read
  • Divya Mohan

Learn how to identify interface and cable issues in computer networks, including collisions, errors, mismatch duplex, and speed. Understand the common problems that can occur in network interfaces and cables.

A Random Image for TCP and UDP

TCP and UDP

  • CCNA v1.1 Concepts
  • 33 minute read
  • Divya Mohan

Explore the TCP and UDP protocols, two fundamental protocols used in computer networks. Learn the differences between TCP and UDP and their applications in network communication.

A Random Image for Configure and verify IPv4 addressing and subnetting

Configure and verify IPv4 addressing and subnetting

  • CCNA v1.1 Concepts
  • 38 minute read
  • Divya Mohan

Learn how to configure and verify IPv4 addressing and subnetting in computer networks. Understand the concepts of IPv4 addressing, subnetting, and subnet masks to design and implement IP addressing schemes.

A Random Image for Private IPv4 addressing

Private IPv4 addressing

  • CCNA v1.1 Concepts
  • 24 minute read
  • Divya Mohan

Discover private IPv4 addressing and its importance in computer networks. Learn how private IP addresses are used within local networks to provide internal communication and network security.

A Random Image for IPv6 addressing and Prefix

IPv6 addressing and Prefix

  • CCNA v1.1 Concepts
  • 31 minute read
  • Divya Mohan

Explore IPv6 addressing and prefixes, an essential aspect of modern computer networks. Learn the structure of IPv6 addresses, address types, and prefixes used in IPv6 networks.

A Random Image for Verify IP parameters for Client OS (Windows, Mac OS, Linux)

Verify IP parameters for Client OS (Windows, Mac OS, Linux)

  • CCNA v1.1 Concepts
  • 20 minute read
  • Divya Mohan

Learn how to verify IP parameters for client operating systems such as Windows, Mac OS, and Linux. Understand the network settings and configurations required to connect client devices to a network.

A Random Image for Wireless Principles

Wireless Principles

  • CCNA v1.1 Concepts
  • 26 minute read
  • Divya Mohan

Explore wireless principles and technologies used in computer networks. Learn about wireless standards, technologies, and security protocols to design and implement wireless networks.

A Random Image for Virtualization fundamentals (server virtualization, containers, and VRFs)

Virtualization fundamentals (server virtualization, containers, and VRFs)

  • CCNA v1.1 Concepts
  • 34 minute read
  • Divya Mohan

Discover virtualization fundamentals, including server virtualization, containers, and VRFs. Learn how virtualization technologies are used to optimize resources and improve network performance.

A Random Image for Switching Concepts

Switching Concepts

  • CCNA v1.1 Concepts
  • 39 minute read
  • Divya Mohan

Learn the basics of switching in computer networks, including the functions of switches, VLANs, trunking, and spanning tree protocol. Understand how switches operate and communicate within a network.

A Random Image for Configure and verify VLANs (normal range) spanning multiple switches

Configure and verify VLANs (normal range) spanning multiple switches

  • CCNA v1.1 Concepts
  • 25 minute read
  • Divya Mohan

Learn how to configure and verify VLANs spanning multiple switches in computer networks. Understand the concept of VLANs and how they are used to segment networks and improve performance.

A Random Image for Configure and verify interswitch connectivity

Configure and verify interswitch connectivity

  • CCNA v1.1 Concepts
  • 31 minute read
  • Divya Mohan

Learn how to configure and verify interswitch connectivity in computer networks. Understand the different methods of connecting switches and configuring trunking to enable communication between switches.

A Random Image for Configure and verify Layer 2 discovery protocols (CDP, LLDP)

Configure and verify Layer 2 discovery protocols (CDP, LLDP)

  • CCNA v1.1 Concepts
  • 23 minute read
  • Divya Mohan

Learn how to configure and verify Layer 2 discovery protocols such as CDP and LLDP in computer networks. Understand the role of discovery protocols in network management and device discovery.

A Random Image for Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)

Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)

  • CCNA v1.1 Concepts
  • 26 minute read
  • Divya Mohan

Learn how to configure and verify EtherChannel using LACP in computer networks. Understand the benefits of EtherChannel and how it is used to aggregate links and improve network performance.

A Random Image for Basic Operations of Rapid PVST+ Spanning Tree Protocol

Basic Operations of Rapid PVST+ Spanning Tree Protocol

  • CCNA v1.1 Concepts
  • 28 minute read
  • Divya Mohan

Explore the basic operations of Rapid PVST+ Spanning Tree Protocol in computer networks. Learn how STP and RSTP are used to prevent loops and ensure network stability.

A Random Image for Cisco Wireless Architectures and AP Modes

Cisco Wireless Architectures and AP Modes

  • CCNA v1.1 Concepts
  • 34 minute read
  • Divya Mohan

Discover Cisco wireless architectures and access point modes used in wireless networks. Learn about the different wireless architectures and access point modes supported by Cisco devices.

A Random Image for Physical infrastructure connections of WLAN components

Physical infrastructure connections of WLAN components

  • CCNA v1.1 Concepts
  • 29 minute read
  • Divya Mohan

Learn about the physical infrastructure connections of WLAN components in wireless networks. Understand how wireless components are connected to the network infrastructure to provide wireless connectivity.

A Random Image for Network Device Management Access

Network Device Management Access

  • CCNA v1.1 Concepts
  • 21 minute read
  • Divya Mohan

Learn how to manage network devices and access them remotely in computer networks. Understand the different methods of accessing network devices for configuration and monitoring.

A Random Image for Wireless LAN GUI Configuration

Wireless LAN GUI Configuration

  • CCNA v1.1 Concepts
  • 32 minute read
  • Divya Mohan

Explore the GUI configuration of wireless LANs in computer networks. Learn how to configure wireless LANs using graphical user interfaces to manage wireless networks effectively.

A Random Image for IP Connectivity

IP Connectivity

  • CCNA v1.1 Concepts
  • 33 minute read
  • Divya Mohan

Learn about IP connectivity in computer networks, including the concepts of IP routing, static routing, and dynamic routing. Understand how IP connectivity is established and maintained in network environments.

A Random Image for Router Packet Forwarding Decisions

Router Packet Forwarding Decisions

  • CCNA v1.1 Concepts
  • 32 minute read
  • Divya Mohan

Explore the packet forwarding decisions made by routers in computer networks. Learn how routers forward packets based on routing tables, destination IP addresses, and routing protocols.

A Random Image for Configure and verify IPv4 and IPv6 static routing

Configure and verify IPv4 and IPv6 static routing

  • CCNA v1.1 Concepts
  • 29 minute read
  • Divya Mohan

Learn how to configure and verify IPv4 and IPv6 static routing in computer networks. Understand the concept of static routing and how it is used to manually configure routing paths.

A Random Image for OSPF Configuration and Verification

OSPF Configuration and Verification

  • CCNA v1.1 Concepts
  • 35 minute read
  • Divya Mohan

Explore the essential concepts of OSPF, including neighbor relationships, authentication, metric calculation, VLSM support, and more. Learn how to configure and verify OSPF for efficient and secure network routing.

A Random Image for Configure and verify single area OSPFv2

Configure and verify single area OSPFv2

  • CCNA v1.1 Concepts
  • 30 minute read
  • Divya Mohan

Learn how to configure and verify single area OSPFv2 in computer networks. Understand the concepts of OSPF and how it is used to establish routing paths within a single OSPF area.

A Random Image for First Hop Redundancy Protocols

First Hop Redundancy Protocols

  • CCNA v1.1 Concepts
  • 38 minute read
  • Divya Mohan

Explore first hop redundancy protocols used in computer networks to provide network redundancy and high availability. Learn about HSRP, VRRP, and GLBP and how they are used to ensure network reliability.

A Random Image for Configure and verify inside source NAT using static and pools

Configure and verify inside source NAT using static and pools

  • CCNA v1.1 Concepts
  • 34 minute read
  • Divya Mohan

Learn how to configure and verify inside source NAT using static and pools in computer networks. Understand the concept of NAT and how it is used to translate private IP addresses to public IP addresses.

A Random Image for Configure and verify NTP operating in a client and server mode

Configure and verify NTP operating in a client and server mode

  • CCNA v1.1 Concepts
  • 27 minute read
  • Divya Mohan

Learn how to configure and verify NTP operating in client and server mode in computer networks. Understand the importance of NTP in network synchronization and time management.

A Random Image for Role of DHCP and DNS within the network

Role of DHCP and DNS within the network

  • CCNA v1.1 Concepts
  • 32 minute read
  • Divya Mohan

Explore the role of DHCP and DNS within computer networks. Learn how DHCP is used to assign IP addresses dynamically, and how DNS is used to resolve domain names to IP addresses.

A Random Image for Function of SNMP in network operations

Function of SNMP in network operations

  • CCNA v1.1 Concepts
  • 33 minute read
  • Divya Mohan

Learn about the function of SNMP in network operations and management. Understand how SNMP is used to monitor network devices, collect data, and manage network performance.

A Random Image for Use of syslog features, including facilities and severity levels

Use of syslog features, including facilities and severity levels

  • CCNA v1.1 Concepts
  • 34 minute read
  • Divya Mohan

Explore the use of syslog features, including facilities and severity levels in computer networks. Learn how syslog is used for logging and monitoring network events and activities.

A Random Image for Configure and verify DHCP client and relay

Configure and verify DHCP client and relay

  • CCNA v1.1 Concepts
  • 30 minute read
  • Divya Mohan

Learn how to configure and verify DHCP client and relay in computer networks. Understand the role of DHCP clients and relays in obtaining IP addresses and configuring network settings.

A Random Image for Forwarding per-hop behavior (PHB) for QoS

Forwarding per-hop behavior (PHB) for QoS

  • CCNA v1.1 Concepts
  • 31 minute read
  • Divya Mohan

Explore the forwarding per-hop behavior (PHB) for QoS in computer networks. Learn how QoS is used to prioritize network traffic and ensure quality of service for critical applications.

A Random Image for Configure network devices for remote access using SSH

Configure network devices for remote access using SSH

  • CCNA v1.1 Concepts
  • 29 minute read
  • Divya Mohan

Learn how to configure network devices for remote access using SSH in computer networks. Understand the benefits of SSH and how it is used to securely manage network devices.

A Random Image for Capabilities and functions of TFTP/FTP in the network

Capabilities and functions of TFTP/FTP in the network

  • CCNA v1.1 Concepts
  • 30 minute read
  • Divya Mohan

Explore the capabilities and functions of TFTP and FTP in computer networks. Learn how TFTP and FTP are used for file transfer and configuration management in network environments.

A Random Image for Key Security Concepts

Key Security Concepts

  • CCNA v1.1 Concepts
  • 35 minute read
  • Divya Mohan

Learn about key security concepts in computer networks, including the principles of network security, security protocols, and best practices. Understand the importance of security in network design and implementation.

A Random Image for Security Program Elements

Security Program Elements

  • CCNA v1.1 Concepts
  • 37 minute read
  • Divya Mohan

Explore the elements of a security program in computer networks, including security policies, procedures, standards, and guidelines. Learn how security programs are designed and implemented to protect network assets.

A Random Image for Configure and verify device access control using local passwords

Configure and verify device access control using local passwords

  • CCNA v1.1 Concepts
  • 32 minute read
  • Divya Mohan

Learn how to configure and verify device access control using local passwords in computer networks. Understand the importance of access control and how it is used to secure network devices.

A Random Image for Security Password Policy

Security Password Policy

  • CCNA v1.1 Concepts
  • 31 minute read
  • Divya Mohan

Explore security password policies in computer networks, including password complexity, expiration, and reuse. Learn how password policies are used to enhance network security and protect user accounts.

A Random Image for IPsec Remote Access

IPsec Remote Access

  • CCNA v1.1 Concepts
  • 34 minute read
  • Divya Mohan

Learn about IPsec remote access in computer networks, including VPN technologies, encryption, and authentication protocols. Understand how IPsec is used to secure remote access connections.

A Random Image for Site-to-site VPN

Site-to-site VPN

  • CCNA v1.1 Concepts
  • 31 minute read
  • Divya Mohan

Explore site-to-site VPNs in computer networks, including tunneling protocols, encryption, and authentication methods. Learn how site-to-site VPNs are used to connect remote sites securely over the internet.

A Random Image for Configure and verify access control lists

Configure and verify access control lists

  • CCNA v1.1 Concepts
  • 33 minute read
  • Divya Mohan

Learn how to configure and verify access control lists (ACLs) in computer networks. Understand the role of ACLs in controlling traffic flow and securing network devices.

A Random Image for Configure and verify Layer 2 security features

Configure and verify Layer 2 security features

  • CCNA v1.1 Concepts
  • 27 minute read
  • Divya Mohan

Learn how to configure and verify Layer 2 security features in computer networks. Understand the security features used to protect Layer 2 protocols and prevent network attacks.

A Random Image for 3A Pillars of Security - Authentication, Authorization, and Accounting

3A Pillars of Security - Authentication, Authorization, and Accounting

  • CCNA v1.1 Concepts
  • 36 minute read
  • Divya Mohan

Explore the concepts of 3A (Authentication, Authorization, and Accounting) in computer networks. Learn how 3A is used to control access to network resources and monitor user activities.

A Random Image for Wireless Security Protocols

Wireless Security Protocols

  • CCNA v1.1 Concepts
  • 32 minute read
  • Divya Mohan

Learn about wireless security protocols used in computer networks to secure wireless communications. Explore WEP, WPA, WPA2, and WPA3 protocols and their encryption methods.

A Random Image for Configure and verify WLAN within the GUI using WPA2 PSK

Configure and verify WLAN within the GUI using WPA2 PSK

  • CCNA v1.1 Concepts
  • 25 minute read
  • Divya Mohan

Learn how to configure and verify WLAN within the GUI using WPA2 PSK in computer networks. Understand the steps to configure a wireless LAN with WPA2 PSK security using graphical user interfaces.

A Random Image for Automation and Programmability

Automation and Programmability

  • CCNA v1.1 Concepts
  • 31 minute read
  • Divya Mohan

Explore automation and programmability in computer networks, including network automation tools, programming languages, and APIs. Learn how automation is used to streamline network operations and improve efficiency.

A Random Image for Faculty Lecture 1: Overview of Computer Networks

Faculty Lecture 1: Overview of Computer Networks

Get an overview of computer networks, including the types of networks, network topologies, and network devices. Understand the fundamentals of networking and its applications in modern technology.

A Random Image for Faculty Lecture 2: Data Communication

Faculty Lecture 2: Data Communication

Learn about data communication in computer networks, including the transmission of data between devices. Understand the concepts of data transmission, data encoding, and data flow control.

A Random Image for Faculty Lecture 3: Data Communication and Networking

Faculty Lecture 3: Data Communication and Networking

Explore data communication and networking in computer networks, including the OSI model and TCP/IP model. Learn how data is transmitted and received between devices in a network.

A Random Image for Practice Questions and their Solutions

Practice Questions and their Solutions

Test your knowledge of computer networks with these practice questions and their solutions. Explore a range of topics and concepts to enhance your understanding of networking principles.