A Tour of the Internet and Networking
The Internet is really a network of networks. That is, the Internet is an interconnected set of privately and publicly owned and managed networks. Any network connected to the Internet must run the IP protocol and conform to certain naming and addressing conventions
The Application Layer
The application layer is confined to end systems. Core devices such as switches and routers don't understand anything about application and are confined to the 3 bottom layers of our 5-layer Internet stack!
The Transport Layer
Transport layer is responsible for transmitting data between different processes in the layered network architecture. You will learn about the principles of transport and how these are implemented in actual protocols (specifically UDP and TCP).
The Network Layer
The process-to-process communication in the transport layer depends on services provided by the layer under it, the network layer which is responsible for host-to-host communication. This is probably the most important and interesting layer in the networking stack. While the application and transport layers are implemented only in the end systems, the network layer is implemented across the whole network, so every router in the network has to process it.
The Link Layer
In computer networking, the link layer is the lowest layer in the Internet protocol suite, the networking architecture of the Internet. The link layer is the group of methods and communications protocols confined to the link that a host is physically connected to.
Wireless and Mobile Networks
In this part, you will learn about the wireless networking and the issue of mobility and how wireless networking relates and compares to traditional wired networking
We all want to know how to create a video streaming service or a live video chatting application like WhatApp!! This part will cover the networking issues of transmitting sound and video through the network.
Security in Computer Networks
This part will be mainly about secure communication over IP and how to defend it against various types of attacks