Introduction to Computer Networks
Learn the basics of computer networks, including the types of networks, network topologies, and network devices. Understand the importance of networking in today's digital world.
Scaler Module 1 - Why do we need Computer Networks?
Explore the reasons why computer networks are essential in today's digital world. Learn how networks enable communication, data sharing, and resource access across devices and locations.
Components of a Computer Network
Explore the components of a computer network, including devices, protocols, and services. Learn how network components work together to enable communication and data transfer.
Types of Computer Networks
Discover the different types of computer networks, including LANs, WANs, MANs, and PANs. Learn about the characteristics and applications of each network type.
Fiber Optic Cables
Learn about fiber optic cables used in computer networks to transmit data over long distances. Explore the advantages of fiber optic cables over copper cables and their applications in network infrastructure.
Scaler Module 2 - Data Link Layer and LAN Protocols
Learn about the data link layer and LAN protocols used in computer networks. Explore the functions of the data link layer and common LAN protocols such as Ethernet and Wi-Fi.
Network Topologies
Learn about network topologies, including bus, star, ring, mesh, and hybrid topologies. Understand the advantages and disadvantages of each topology and their applications in network design.
Network Interface Cards
Discover network interface cards (NICs) used in computer networks to connect devices to a network. Learn the functions of NICs and how they enable data transfer between devices.
Network Protocols
Explore network protocols used in computer networks to enable communication between devices. Learn about common protocols such as TCP/IP, UDP, HTTP, and FTP.
Sliding Window Protocol
Learn about the sliding window protocol used in computer networks to improve data transfer efficiency. Understand how the sliding window protocol manages data flow and error recovery in network communication.
SSL/TLS
Explore SSL/TLS protocols used to secure network communication over the internet. Learn how SSL/TLS protocols encrypt data and establish secure connections between clients and servers.
Multiple Access Protocols
Learn about multiple access protocols used in computer networks to enable multiple devices to share a common communication channel. Explore CSMA/CD, CSMA/CA, and TDMA protocols and their applications.
Address Resolution Protocol
Explore the Address Resolution Protocol (ARP) used in computer networks to map IP addresses to MAC addresses. Learn how ARP resolves network addresses and enables communication between devices.
Scaler Module 3 - LAN Protocols and Network Devices
Discover LAN protocols and network devices used in computer networks. Learn about common LAN protocols such as Ethernet and network devices such as switches and routers.
Network Devices
Discover network devices such as routers, switches, hubs, and access points used in computer networks. Learn the functions of each device and how they contribute to network communication.
OSI Model
Learn about the OSI model, a conceptual framework used to understand and design computer networks. Explore the seven layers of the OSI model and their functions in network communication.
Data Link Layer
Explore the data link layer in the OSI model, responsible for error detection and correction in network communication. Learn the functions of the data link layer and its protocols.
TCP/IP Model
Explore the TCP/IP model, a protocol suite used in computer networks to enable communication between devices. Learn the layers of the TCP/IP model and their functions in network communication.
Internet vs. Intranet vs. Extranet
Explore the differences between the internet, intranet, and extranet in computer networks. Learn how each network type is used to enable communication and data sharing within and between organizations.
Network Security
Learn about network security concepts, including threats, vulnerabilities, and countermeasures. Understand the importance of network security and how to protect network assets from cyber threats.
Network Architecture
Learn about network architecture, including the client-server and P2P architecture models. Understand how network architecture is designed and implemented to support network communication.
OSI Model vs TCP/IP Model
Explore the OSI model and TCP/IP model, two fundamental networking models used to understand and design computer networks. Learn the layers of each model and their functions.
Role and Function of Network Components
Discover the role and function of network Components such as Routers, Layer 2 and Layer 3 switches, Next-generation firewalls and IPS, Access points, Controllers , Endpoints, Servers, and PoE devices.
Characteristics of network topology architectures
Explore the characteristics of network topology architectures, including bus, star, ring, mesh, hybrid, Two-tier, Three-tier, Spine-leaf, WAN, Small office/home office (SOHO), On-premises and cloud. Understand the advantages and disadvantages of each topology.
Physical interface and cabling types
Learn about the physical interfaces and cabling types used in computer networks. Explore the different types of cables, connectors, and interfaces used to connect network devices.
Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
Learn how to identify interface and cable issues in computer networks, including collisions, errors, mismatch duplex, and speed. Understand the common problems that can occur in network interfaces and cables.
TCP and UDP
Explore the TCP and UDP protocols, two fundamental protocols used in computer networks. Learn the differences between TCP and UDP and their applications in network communication.
Configure and verify IPv4 addressing and subnetting
Learn how to configure and verify IPv4 addressing and subnetting in computer networks. Understand the concepts of IPv4 addressing, subnetting, and subnet masks to design and implement IP addressing schemes.
Private IPv4 addressing
Discover private IPv4 addressing and its importance in computer networks. Learn how private IP addresses are used within local networks to provide internal communication and network security.
IPv6 addressing and Prefix
Explore IPv6 addressing and prefixes, an essential aspect of modern computer networks. Learn the structure of IPv6 addresses, address types, and prefixes used in IPv6 networks.
Verify IP parameters for Client OS (Windows, Mac OS, Linux)
Learn how to verify IP parameters for client operating systems such as Windows, Mac OS, and Linux. Understand the network settings and configurations required to connect client devices to a network.
Wireless Principles
Explore wireless principles and technologies used in computer networks. Learn about wireless standards, technologies, and security protocols to design and implement wireless networks.
Virtualization fundamentals (server virtualization, containers, and VRFs)
Discover virtualization fundamentals, including server virtualization, containers, and VRFs. Learn how virtualization technologies are used to optimize resources and improve network performance.
Switching Concepts
Learn the basics of switching in computer networks, including the functions of switches, VLANs, trunking, and spanning tree protocol. Understand how switches operate and communicate within a network.
Configure and verify VLANs (normal range) spanning multiple switches
Learn how to configure and verify VLANs spanning multiple switches in computer networks. Understand the concept of VLANs and how they are used to segment networks and improve performance.
Configure and verify interswitch connectivity
Learn how to configure and verify interswitch connectivity in computer networks. Understand the different methods of connecting switches and configuring trunking to enable communication between switches.
Configure and verify Layer 2 discovery protocols (CDP, LLDP)
Learn how to configure and verify Layer 2 discovery protocols such as CDP and LLDP in computer networks. Understand the role of discovery protocols in network management and device discovery.
Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
Learn how to configure and verify EtherChannel using LACP in computer networks. Understand the benefits of EtherChannel and how it is used to aggregate links and improve network performance.
Basic Operations of Rapid PVST+ Spanning Tree Protocol
Explore the basic operations of Rapid PVST+ Spanning Tree Protocol in computer networks. Learn how STP and RSTP are used to prevent loops and ensure network stability.
Cisco Wireless Architectures and AP Modes
Discover Cisco wireless architectures and access point modes used in wireless networks. Learn about the different wireless architectures and access point modes supported by Cisco devices.
Physical infrastructure connections of WLAN components
Learn about the physical infrastructure connections of WLAN components in wireless networks. Understand how wireless components are connected to the network infrastructure to provide wireless connectivity.
Network Device Management Access
Learn how to manage network devices and access them remotely in computer networks. Understand the different methods of accessing network devices for configuration and monitoring.
Wireless LAN GUI Configuration
Explore the GUI configuration of wireless LANs in computer networks. Learn how to configure wireless LANs using graphical user interfaces to manage wireless networks effectively.
IP Connectivity
Learn about IP connectivity in computer networks, including the concepts of IP routing, static routing, and dynamic routing. Understand how IP connectivity is established and maintained in network environments.
Router Packet Forwarding Decisions
Explore the packet forwarding decisions made by routers in computer networks. Learn how routers forward packets based on routing tables, destination IP addresses, and routing protocols.
Configure and verify IPv4 and IPv6 static routing
Learn how to configure and verify IPv4 and IPv6 static routing in computer networks. Understand the concept of static routing and how it is used to manually configure routing paths.
OSPF Configuration and Verification
Explore the essential concepts of OSPF, including neighbor relationships, authentication, metric calculation, VLSM support, and more. Learn how to configure and verify OSPF for efficient and secure network routing.
Configure and verify single area OSPFv2
Learn how to configure and verify single area OSPFv2 in computer networks. Understand the concepts of OSPF and how it is used to establish routing paths within a single OSPF area.
First Hop Redundancy Protocols
Explore first hop redundancy protocols used in computer networks to provide network redundancy and high availability. Learn about HSRP, VRRP, and GLBP and how they are used to ensure network reliability.
Configure and verify inside source NAT using static and pools
Learn how to configure and verify inside source NAT using static and pools in computer networks. Understand the concept of NAT and how it is used to translate private IP addresses to public IP addresses.
Configure and verify NTP operating in a client and server mode
Learn how to configure and verify NTP operating in client and server mode in computer networks. Understand the importance of NTP in network synchronization and time management.
Role of DHCP and DNS within the network
Explore the role of DHCP and DNS within computer networks. Learn how DHCP is used to assign IP addresses dynamically, and how DNS is used to resolve domain names to IP addresses.
Function of SNMP in network operations
Learn about the function of SNMP in network operations and management. Understand how SNMP is used to monitor network devices, collect data, and manage network performance.
Use of syslog features, including facilities and severity levels
Explore the use of syslog features, including facilities and severity levels in computer networks. Learn how syslog is used for logging and monitoring network events and activities.
Configure and verify DHCP client and relay
Learn how to configure and verify DHCP client and relay in computer networks. Understand the role of DHCP clients and relays in obtaining IP addresses and configuring network settings.
Forwarding per-hop behavior (PHB) for QoS
Explore the forwarding per-hop behavior (PHB) for QoS in computer networks. Learn how QoS is used to prioritize network traffic and ensure quality of service for critical applications.
Configure network devices for remote access using SSH
Learn how to configure network devices for remote access using SSH in computer networks. Understand the benefits of SSH and how it is used to securely manage network devices.
Capabilities and functions of TFTP/FTP in the network
Explore the capabilities and functions of TFTP and FTP in computer networks. Learn how TFTP and FTP are used for file transfer and configuration management in network environments.
Key Security Concepts
Learn about key security concepts in computer networks, including the principles of network security, security protocols, and best practices. Understand the importance of security in network design and implementation.
Security Program Elements
Explore the elements of a security program in computer networks, including security policies, procedures, standards, and guidelines. Learn how security programs are designed and implemented to protect network assets.
Configure and verify device access control using local passwords
Learn how to configure and verify device access control using local passwords in computer networks. Understand the importance of access control and how it is used to secure network devices.
Security Password Policy
Explore security password policies in computer networks, including password complexity, expiration, and reuse. Learn how password policies are used to enhance network security and protect user accounts.
IPsec Remote Access
Learn about IPsec remote access in computer networks, including VPN technologies, encryption, and authentication protocols. Understand how IPsec is used to secure remote access connections.
Site-to-site VPN
Explore site-to-site VPNs in computer networks, including tunneling protocols, encryption, and authentication methods. Learn how site-to-site VPNs are used to connect remote sites securely over the internet.
Configure and verify access control lists
Learn how to configure and verify access control lists (ACLs) in computer networks. Understand the role of ACLs in controlling traffic flow and securing network devices.
Configure and verify Layer 2 security features
Learn how to configure and verify Layer 2 security features in computer networks. Understand the security features used to protect Layer 2 protocols and prevent network attacks.
3A Pillars of Security - Authentication, Authorization, and Accounting
Explore the concepts of 3A (Authentication, Authorization, and Accounting) in computer networks. Learn how 3A is used to control access to network resources and monitor user activities.
Wireless Security Protocols
Learn about wireless security protocols used in computer networks to secure wireless communications. Explore WEP, WPA, WPA2, and WPA3 protocols and their encryption methods.
Configure and verify WLAN within the GUI using WPA2 PSK
Learn how to configure and verify WLAN within the GUI using WPA2 PSK in computer networks. Understand the steps to configure a wireless LAN with WPA2 PSK security using graphical user interfaces.
Automation and Programmability
Explore automation and programmability in computer networks, including network automation tools, programming languages, and APIs. Learn how automation is used to streamline network operations and improve efficiency.
Faculty Lecture 1: Overview of Computer Networks
Get an overview of computer networks, including the types of networks, network topologies, and network devices. Understand the fundamentals of networking and its applications in modern technology.
Faculty Lecture 2: Data Communication
Learn about data communication in computer networks, including the transmission of data between devices. Understand the concepts of data transmission, data encoding, and data flow control.
Faculty Lecture 3: Data Communication and Networking
Explore data communication and networking in computer networks, including the OSI model and TCP/IP model. Learn how data is transmitted and received between devices in a network.
Practice Questions and their Solutions
Test your knowledge of computer networks with these practice questions and their solutions. Explore a range of topics and concepts to enhance your understanding of networking principles.