ICMP Uses in Computer Networks

Описание к видео ICMP Uses in Computer Networks

ICMP Uses in Computer Networks are explained with the following timecodes:

0:00 - ICMP – Internet Control Message Protocol - Computer Network
5:51 - Destination Unreachable in ICMP
11:16 - Source Quench in ICMP
13:07 - Time Exceeded in ICMP
15:14 - Parameter Problem in ICMP
17:25 - Router Advertisement in ICMP
18:38 - Router Solicitation in ICMP
19:28 - Ping using ICMP
22:06 - Traceroute using ICMP

ICMP Uses in Computer Networks are explained with the following outlines:
0. Computer Network
1. Network Layer
2. ICMP – Internet Control Message Protocol
3. Basics of ICMP – Internet Control Message Protocol
4. Working of ICMP – Internet Control Message Protocol
5. ICMP Frame structure

The Following Uses of ICMP are covered in this video:
1. Destination Unreachable in ICMP
2. Source Quench in ICMP
3. Time Exceeded in ICMP
4. Parameter Problem in ICMP
5. Router Advertisement in ICMP
6. Router Solicitation in ICMP

Chapter-wise detailed Syllabus of the Computer Network Course is as follows:

Chapter-1 Introduction to Computer Network:    • Introduction to Computer Network  
Computer Network Basics, Types of Data Communication in Computer Network, Types of Casting in Computer Network, Peer to Peer Network Vs Client Server Network, Types of Computer Network, Topologies of Computer Network.

Chapter-2 OSI Model:    • OSI Model in Computer Network  
Basics of OSI Model, OSI Model Details, Comparison of TCP and UDP, Comparison of OSI Model and TCP/IP Model, Transmission Medium in Computer Network, IP Address, MAC Address and Port Address.

Chapter-3 Data Link Layer:    • Data Link Layer in Computer Network  
Data Link Layer Basics, Transmission Delay & Propagation Delay, Stop & Wait ARQ Protocol, Capacity of Channel in Computer Network, Sliding Window Protocol, Go Back N ARQ Protocol, Selective Repeat ARQ Protocol, Comparison of Sliding Window Protocol, Go Back N ARQ Protocol and Selective Repeat ARQ Protocol, Media Access Protocols, Channelization Protocols: FDMA, TDMA, CDMA, Polling Protocol, Reservation Protocol, Token Passing Protocol, Pure ALOHA, Slotted ALOHA, CSMA - Carrier Sense Multiple Access, CSMA/CD, Back off Algorithm for CSMA/CD, CSMA/CA.

Chapter-4 Error Detection and Error Correction:    • Error Detection and Error Correction ...  
VRC - Vertical Redundancy Check & LRP - Longitudinal Redundancy Parity, Checksum, CRC - Cyclic Redundancy Check, Hamming Code for Error Correction and Error Detection, Minimum Hamming Distance, Error Detection Capabilities & Error Correction Capabilities.

Chapter-5 LAN Protocols:    • LAN Protocols in Computer Network  
Framing, Ethernet LAN Protocol - IEEE 802.3, Wireless LAN Protocol - IEEE 802.11, Token Ring LAN Protocol - IEEE 802.5, Examples on CSMA Protocols, Examples on Flow Control Protocols.

Chapter-6 Network Devices:    • Network Devices in Computer Network  
Repeater, Hub, Bridge, Switch, Router and Brouter, Comparison of Repeater Hub Bridge Switch Router and Brouter, Network Segment, Collision Domain & Broadcast Domain, Spanning Tree Protocol.

Chapter-7 Network Layer:    • Network Layer in Computer Network  
Network Layer Basics, logical Addressing, Classful Addressing of IP Address, Subnetting, Classes Inter-Domain Routing - CIDR, Subnet Masking, Supernetting, IPV4 Frame Format, Fragmentation, IPV4 Broadcasting, Localhost and Loopback, ARP, RARP, BOOTP , DHCP, Public IP and Privet IP, NAT - Network Address Translation, ICMP, Routing, Non Adaptive Routing, Distance Vector Routing, Link State Routing, Circuit Switching, Packet Switching and Message Switching, IPV6, IPV6 Casting, IPV6 Frame Format.

Chapter-8 Transport Layer:    • Transport Layer in Computer Network  
Transport Layer Basics, TCP Frame Format, Port Number & Network Socket, Sequence Number & Acknowledgment Number in TCP, Wrap Around Time and Life Time in TCP, Header Length and Checksum in TCP, TCP Connections, PSH URG RST Urgent Pointer and Option Field in TCP, Flow Control in TCP Protocol, Sliding Window Protocol in TCP, Retransmission in TCP, Congestion Control in TCP, Timers in TCP, Basic Algorithm for Timeout Timer in TCP, Jacobson's Algorithm for Timeout Timer in TCP, Karn's Modification of Timeout Timer in TCP, Silly Window Syndrome and It's Solution in TCP, Congestion Control using Traffic Shaping in TCP, Leaky Bucket Algorithm, Token Bucket Algorithm, UDP - User Datagram Protocol, UDP Segment Header, UDP Frame Format.

Chapter-9 Application Layer:    • Application Layer in Computer Network  
Application Layer Basics, DNS - Domain Name System, SMTP POP and IMAP, HTTP/HTTPs , FTP SFTP and TFTP - File Transfer Protocols.

#NetworkLayer #ComputerNetwork #ComputerNetworking @EngineeringFunda

Комментарии

Информация по комментариям в разработке