Master the fundamental protocols and technologies that power the modern internet with this comprehensive TCP/IP and Internet course. Designed for aspiring network professionals and IT specialists, this course takes you through the complete networking stack—from physical layer transmission to application layer protocols. You'll gain hands-on experience with transport protocols like TCP and UDP, explore network layer routing and IP addressing, and understand how data securely traverses the internet infrastructure. Through practical examples and real-world scenarios, you'll learn network architecture design, multimedia transmission, wireless networking, and essential security protocols. This course bridges theoretical computer networking concepts with practical implementation skills, preparing you to design, deploy, troubleshoot, and secure modern network systems across enterprise and cloud environments. Whether you're pursuing a career in network engineering, cybersecurity, or cloud computing, this course provides the foundational knowledge needed to excel in today's interconnected digital landscape.

TCP/IP and Internet

TCP/IP and Internet

Instructor: BITS Pilani Instructors Group
Access provided by Shoolini University
Recommended experience
Recommended experience
Intermediate level
Basic knowledge of computer systems and programming is recommended.
Recommended experience
Recommended experience
Intermediate level
Basic knowledge of computer systems and programming is recommended.
What you'll learn
Understand TCP/IP architecture, protocols, and layered networking principles, ensuring efficient and secure communication.
Analyse packet transmission, routing, congestion control, and network security challenges for optimised data flow.
Gain hands-on experience with Wireshark for packet analysis and develop network applications using socket programming.
Design, configure, and troubleshoot enterprise networks while applying security protocols to protect real-world systems.
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
November 2025
See how employees at top companies are mastering in-demand skills

There are 10 modules in this course
In this module, we get an overview of current computer networks and the internet, their evolution and their uses, before getting to know what a protocol is and why we need it in the context of a network. With a basic understanding of what a network and a protocol are, we then focus on learning the involvement of different entities, like the edge, access networks, and the core side. We then move on to learn the key characteristics which influence the network performance, including throughput and delay at various network entities. We conclude the module by describing the layered architecture by taking the Open Systems Interconnections (OSI) and TCP/IP models of layers and comparing them.
What's included
17 videos15 readings15 assignments
17 videos• Total 56 minutes
- Meet Your Instructor - Prof. Shwetha Vittal• 1 minute
- Meet Your Instructor - Prof. Mohammad Saleem Bagewadi• 1 minute
- Course Introductory Video• 4 minutes
- What is a Computer Network and an Internet?• 5 minutes
- Uses of Computer Network• 5 minutes
- History and Growth of Network and the Internet• 6 minutes
- What Is a Protocol and Why Do We Need It?• 2 minutes
- End Systems, Access Networks, and Physical Media• 4 minutes
- Circuit Switching and Packet Switching • 4 minutes
- Internet Structure - Network of Networks• 3 minutes
- Delay• 3 minutes
- Throughput and Loss• 3 minutes
- Need for a Layered Architecture and Its Working• 4 minutes
- TCP/IP Protocol Suite• 5 minutes
- OSI Model of Layers• 3 minutes
- Comparison of OSI and TCP/IP Models• 2 minutes
- Module Wrap Up Video• 2 minutes
15 readings• Total 215 minutes
- Course Overview• 10 minutes
- Course Structure & Critical Information• 10 minutes
- Recommended Reading: What is a Computer Network and an Internet?• 15 minutes
- Recommended Reading: Uses of Computer Network• 15 minutes
- Recommended Reading: History and Growth of Network and the Internet• 15 minutes
- Recommended Reading: What is a Protocol and Why do we Need it?• 15 minutes
- Recommended Reading: End Systems, Access Networks and Physical Media• 15 minutes
- Recommended Reading: Circuit Switching and Packet Switching• 15 minutes
- Recommended Reading: Internet Structure - Network of Networks • 15 minutes
- Recommended Reading: Delay• 15 minutes
- Recommended Reading: Throughput and Loss• 15 minutes
- Recommended Reading: Need for a Layered Architecture and Its Working• 15 minutes
- Recommended Reading: TCP/IP Model of Layers• 15 minutes
- Recommended Reading: OSI Model of Layers• 15 minutes
- Recommended Reading: Comparison of OSI and TCP/IP Models• 15 minutes
15 assignments• Total 135 minutes
- Test Yourself: Introduction to Networking and Internet• 30 minutes
- What is a Computer Network and an Internet?• 6 minutes
- Uses of Computer Network• 6 minutes
- History and Growth of Network and the Internet• 6 minutes
- What is a Protocol and Why do we Need it?• 6 minutes
- End Systems, Access Networks and Physical Media• 6 minutes
- Circuit Switching and Packet Switching• 6 minutes
- Internet Structure - Network of Networks• 6 minutes
- Delay• 6 minutes
- Throughput and Loss• 6 minutes
- Need for a Layered Architecture and Its Working• 3 minutes
- TCP/IP Protocol Suite• 6 minutes
- OSI Model of Layers• 6 minutes
- Comparison of OSI and TCP/IP Models• 6 minutes
- Let's Practice: Introduction to Networking and Internet• 30 minutes
In this module, we discuss the key principles of network applications, including client-server architecture and comparing it with peer-peer architecture, processes in the scope of an application, and creating network application programs with the help of a socket interface. We then move on to know what is World Wide Web (WWW), before learning the key application layer protocol behind the working of today’s Internet. i.e., HTTP in depth. Further, we will discuss the Domain Name System (DNS) in detail, including its role in today’s internet, its working in two different flavours, records, and messages used for DNS services. We conclude the module by describing what is Email, its message components, and which protocols have made today’s Email work realistically.
What's included
16 videos15 readings16 assignments
16 videos• Total 72 minutes
- Client-server vs. Peer-to-peer Architectures • 3 minutes
- Creating a Network Application – Processes, Addresses, and Sockets• 4 minutes
- Overview of World Wide Web and HTTP• 4 minutes
- Persistent vs. Non-Persistent HTTP• 4 minutes
- HTTP Messages• 4 minutes
- HTTP Cookies• 6 minutes
- Web Cache• 5 minutes
- HTTP/2• 4 minutes
- HTTP/3 - QUIC• 4 minutes
- Email Functioning and Operations• 4 minutes
- Email Protocols – SMTP• 5 minutes
- DNS Services, Structural Hierarchy and Servers• 6 minutes
- DNS Recursive vs. Iterative Functioning• 5 minutes
- DNS Messages and Records• 3 minutes
- Demonstrating Wireshark• 7 minutes
- Module Wrap Up Video• 2 minutes
15 readings• Total 225 minutes
- Recommended Reading: Client-Server Versus Peer-to-Peer Architectures • 15 minutes
- Recommended Reading: Creating a Network Application – Processes, Addresses, and Sockets• 15 minutes
- Recommended Reading: Overview of World Wide Web and HTTP• 15 minutes
- Recommended Reading: Persistent Versus Non-Persistent HTTP• 15 minutes
- Recommended Reading: HTTP Messages• 15 minutes
- Recommended Reading: HTTP Cookies• 15 minutes
- Recommended Reading: Web Cache• 15 minutes
- Recommended Reading: HTTP/2• 15 minutes
- Recommended Reading: HTTP/3 - QUIC• 15 minutes
- Recommended Reading: Email Functioning and Operations• 15 minutes
- Recommended Reading: Email Protocols – SMTP• 15 minutes
- Recommended Reading: DNS Services, Structural Hierarchy and Servers• 15 minutes
- Recommended Reading: DNS Recursive Versus Iterative Functioning• 15 minutes
- Recommended Reading: DNS Messages and Records• 15 minutes
- Recommended Reading: Demonstrating Wireshark• 15 minutes
16 assignments• Total 141 minutes
- Test Yourself: Internet Applications and Communications• 30 minutes
- Client-Server Versus Peer-to-Peer Architectures • 6 minutes
- Creating a Network Application – Processes, Addresses, and Sockets• 3 minutes
- Overview of World Wide Web and HTTP• 6 minutes
- Persistent Versus Non-Persistent HTTP• 6 minutes
- HTTP Messages• 6 minutes
- HTTP Cookies• 3 minutes
- Web Cache• 6 minutes
- HTTP/2• 6 minutes
- HTTP/3 - QUIC• 6 minutes
- Email Functioning and Operations• 6 minutes
- Email Protocols – SMTP• 6 minutes
- DNS Services, Structural Hierarchy and Servers• 6 minutes
- DNS Recursive vs. Iterative Functioning• 6 minutes
- DNS Messages and Records• 9 minutes
- Let's Practice: Internet Applications and Communications• 30 minutes
In this module, we discuss the working of major transport layer protocols namely, User Datagram Protocol (UDP) and Transport Control Protocol (TCP) in detail. At first, the multiplexing and demultiplexing of UDP and TCP are detailed with the help of their respective header formats. Next, the working of reliable data transfer and functioning of flow control in TCP are described in detail before presenting its connection management where TCP’s connection establishment and termination process are explained. The module then brings in the principles of congestion control and explains the different approaches by TCP for congestion control. Finally, the module concludes by comparing the UDP and TCP applications by discussing their respective pros and cons.
What's included
20 videos19 readings19 assignments
20 videos• Total 69 minutes
- Transport Layer Services• 3 minutes
- Multiplexing and Demultiplexing• 2 minutes
- UDP Segment Structure• 3 minutes
- Multiplexing and Demultiplexing in UDP• 2 minutes
- TCP Services• 2 minutes
- TCP Segment Structure• 6 minutes
- Multiplexing and Demultiplexing in TCP• 3 minutes
- Connection Establishment• 4 minutes
- Connection Termination• 3 minutes
- Reliable Data Transfer• 5 minutes
- TCP Timers • 6 minutes
- Flow Control • 3 minutes
- Silly Window Syndrome• 3 minutes
- Causes of Congestion• 2 minutes
- TCP Congestion Control • 4 minutes
- TCP Tahoe, Reno, and Cubic Approaches to Congestion Control• 5 minutes
- Connectionless vs. Connection Oriented Services• 3 minutes
- Berkeley Socket APIs• 4 minutes
- Demonstration of TCP Socket Programming with a Simple Chat Application• 4 minutes
- Module Wrap-Up Video• 2 minutes
19 readings• Total 285 minutes
- Recommended Reading: Transport Layer Services• 15 minutes
- Recommended Reading: Multiplexing and Demultiplexing• 15 minutes
- Recommended Reading: UDP Segment Structure• 15 minutes
- Recommended Reading: Multiplexing and Demultiplexing in UDP• 15 minutes
- Recommended Reading: TCP Services• 15 minutes
- Recommended Reading: TCP Segment Structure• 15 minutes
- Recommended Reading: Multiplexing and Demultiplexing in TCP• 15 minutes
- Recommended Reading: Connection Termination• 15 minutes
- Recommended Reading: Connection Establishment• 15 minutes
- Recommended Reading: Connection Termination• 15 minutes
- Recommended Reading: Reliable Data Transfer• 15 minutes
- Recommended Reading: TCP Timers • 15 minutes
- Recommended Reading: Flow Control • 15 minutes
- Recommended Reading: Silly Window Syndrome• 15 minutes
- Recommended Reading: Causes of Congestion• 15 minutes
- Recommended Reading: TCP Congestion Control • 15 minutes
- Recommended Reading: TCP Tahoe, Reno, and Cubic Approaches to Congestion Control• 15 minutes
- Recommended Reading: Connectionless vs Connection Oriented Services• 15 minutes
- Recommended Reading: Socket Programming Demo• 15 minutes
19 assignments• Total 168 minutes
- Test Yourself: Transport Layer Protocols• 30 minutes
- Transport Layer Services• 6 minutes
- Multiplexing and Demultiplexing• 6 minutes
- UDP Segment Structure• 9 minutes
- Multiplexing and Demultiplexing in UDP• 6 minutes
- TCP Services• 6 minutes
- TCP Segment Structure• 6 minutes
- Multiplexing and Demultiplexing in TCP• 6 minutes
- Connection Establishment• 6 minutes
- Connection Termination• 6 minutes
- Reliable Data Transfer• 6 minutes
- TCP Timers • 6 minutes
- Flow Control • 6 minutes
- Silly Window Syndrome• 6 minutes
- Causes of Congestion• 6 minutes
- TCP Congestion Control • 9 minutes
- TCP Tahoe, Reno, and Cubic Approaches to Congestion Control• 6 minutes
- Connectionless vs. Connection Oriented Services• 6 minutes
- Let's Practice: Transport Layer Protocols• 30 minutes
This module focuses on introducing the network layer by defining the services provided by this layer and discussing packet switching, including the datagram approach and network-layer performance. Then we'll look into the details of Internet Protocol version 4 (IPv4), including addressing, packet format, options, ICMPv4, mobile IP and then finally IP version 6.
What's included
16 videos15 readings17 assignments
16 videos• Total 108 minutes
- Connecting Devices• 7 minutes
- Communication at the Network Layer • 10 minutes
- Packet Switching and Performance • 12 minutes
- IPv4 Addressing• 14 minutes
- CIDR and Subnetting• 6 minutes
- IPv4 Datagram Format• 4 minutes
- Fragmentation and Reassembly• 7 minutes
- ICMPv4• 6 minutes
- IGMP• 3 minutes
- Services Performed by Middleboxes• 7 minutes
- DHCP and NAT• 9 minutes
- Debugging Tools - Ping and Traceroute • 5 minutes
- Mobile IP• 6 minutes
- Internet Protocol Version 6 (IPv6)• 7 minutes
- Transition from IPv4 to IPv6: Tunneling • 3 minutes
- Module Wrap-Up• 2 minutes
15 readings• Total 230 minutes
- Recommended Reading: Connecting Devices• 15 minutes
- Recommended Reading: Communication at the Network Layer• 15 minutes
- Recommended Reading: Packet Switching and Performance • 20 minutes
- Recommended Reading: IPv4 Addressing • 15 minutes
- Recommended Reading: CIDR and Subnetting• 15 minutes
- Recommended Reading: IPv4 Datagram Format• 15 minutes
- Recommended Reading: Fragmentation and Reassembly• 15 minutes
- Recommended Reading: ICMPv4• 15 minutes
- Recommended Reading: IGMP• 15 minutes
- Recommended Reading: Services Performed by Middleboxes• 15 minutes
- Recommended Reading: DHCP and NAT• 15 minutes
- Recommended Reading: Debugging Tools - Ping and Traceroute • 15 minutes
- Recommended Reading: Mobile IP• 15 minutes
- Recommended Reading: Internet Protocol Version 6 (IPv6)• 15 minutes
- Recommended Reading: Transition from IPv4 to IPv6: Tunneling • 15 minutes
17 assignments• Total 150 minutes
- Test Yourself: IP Network – Addressing and Data Transfer• 30 minutes
- Connecting Devices• 6 minutes
- Communication at the Network Layer• 6 minutes
- Packet Switching and Performance • 6 minutes
- IPv4 Addressing• 6 minutes
- CIDR and Subnetting• 6 minutes
- IPv4 Datagram Format• 6 minutes
- Fragmentation and Reassembly• 6 minutes
- ICMPv4• 6 minutes
- IGMP (Internet Group Management Protocol)• 6 minutes
- Services Performed by Middleboxes• 6 minutes
- DHCP and NAT• 6 minutes
- Debugging Tools - Ping and Traceroute • 6 minutes
- Mobile IP• 6 minutes
- Internet Protocol Version 6 (IPv6)• 6 minutes
- Transition from IPv4 to IPv6: Tunneling • 6 minutes
- Let's Practice: IP Network – Addressing and Data Transfer• 30 minutes
This module focuses on understanding how a router has a forwarding table to forward a packet to the appropriate next node on its way to the final destination or destinations. To make the forwarding tables of the router, the Internet needs routing protocols that will be active all the time in the background and update the forwarding tables. We’ll look into the details of the network layer decomposed into two interacting parts, the data plane and the control plane. We then move on to learn the concept of Multicasting and the SDN approach.
What's included
14 videos14 readings16 assignments
14 videos• Total 96 minutes
- Router Architecture and its Functionality• 7 minutes
- Switching Fabric• 7 minutes
- Input and Output Port Processing• 8 minutes
- Packet Scheduling• 9 minutes
- Forwarding of IP Packets• 7 minutes
- Control Plane Routing and RIB• 9 minutes
- Distance - Vector Routing• 8 minutes
- Link-State Routing• 5 minutes
- Path - Vector Routing• 4 minutes
- Intra-AS Routing - OSPF• 7 minutes
- Inter-AS Routing – BGP• 8 minutes
- Multicasting and Multicast Applications• 6 minutes
- Generalised Forwarding and SDN• 4 minutes
- SDN Controller and OpenFlow Protocol• 6 minutes
14 readings• Total 210 minutes
- Recommended Reading: Router Architecture and its Functionality• 15 minutes
- Recommended Reading: Switching Fabric • 15 minutes
- Recommended Reading: Input and Output Port Processing • 15 minutes
- Recommended Reading: Packet Scheduling• 15 minutes
- Recommended Reading: Forwarding of IP Packets• 15 minutes
- Recommended Reading: Control Plane Routing and RIB• 15 minutes
- Recommended Reading: Distance-Vector Routing • 15 minutes
- Recommended Reading: Link-State Routing• 15 minutes
- Recommended Reading: Path-Vector Routing• 15 minutes
- Recommended Reading: Intra-AS Routing – OSPF• 15 minutes
- Recommended Reading: Inter-AS Routing – BGP• 15 minutes
- Recommended Reading: Multicasting and Multicast Applications• 15 minutes
- Recommended Reading: Generalised Forwarding and SDN• 15 minutes
- Recommended Reading: SDN Controller and OpenFlow Protocol• 15 minutes
16 assignments• Total 144 minutes
- Test Yourself: Routing – Control Plane and Data Plane• 30 minutes
- Router Architecture and its Functionality• 6 minutes
- Switching Fabric• 6 minutes
- Input and Output Port Processing• 6 minutes
- Packet Scheduling• 6 minutes
- Forwarding of IP Packets• 6 minutes
- Control Plane Routing and RIB• 6 minutes
- Distance-Vector Routing• 6 minutes
- Link-State Routing• 6 minutes
- Path-Vector Routing• 6 minutes
- Intra-AS Routing – OSPF• 6 minutes
- Inter-AS Routing – BGP• 6 minutes
- Multicasting and Multicast Applications• 6 minutes
- Generalised Forwarding and SDN• 6 minutes
- SDN Controller and OpenFlow Protocol• 6 minutes
- Let's Practice: Routing – Control Plane and Data Plane• 30 minutes
This module focuses on understanding how different integrated media, such as text, images, audio, and video, are generated, stored, and transmitted digitally and can be accessed interactively. The module covers subjects that are, directly or indirectly, related to multimedia, such as compression and digitising multimedia data. Then we'll look into the details of multimedia protocols and protocols for real-time conversational applications.
What's included
13 videos12 readings14 assignments
13 videos• Total 89 minutes
- Multimedia Transmission• 6 minutes
- Multimedia Networking: Goals and Challenges• 8 minutes
- Multimedia Over IP• 9 minutes
- Compression – Encoding and Decoding• 11 minutes
- Digitising Audio and Video• 7 minutes
- Real-time Transport Protocol - RTP• 6 minutes
- Real-time Control Protocol – RTCP• 7 minutes
- Resource Reservation Protocol • 6 minutes
- Real-Time Streaming Protocol – RTSP• 6 minutes
- VOIP (Voice Over IP)• 8 minutes
- Session Initiation Protocol (SIP) • 8 minutes
- Streaming Live Audio/Video Applications • 6 minutes
- Module Wrap-Up• 1 minute
12 readings• Total 180 minutes
- Recommended Reading: Multimedia Transmission• 15 minutes
- Multimedia Networking: Goals and Challenges• 15 minutes
- Recommended Reading: Multimedia Over IP• 15 minutes
- Recommended Reading: Compression – Encoding and Decoding• 15 minutes
- Recommended Reading: Digitising Audio and Video • 15 minutes
- Recommended Reading: Real-time Transport Protocol - RTP• 15 minutes
- Recommended Reading: Real-time Control Protocol – RTCP• 15 minutes
- Recommended Reading: Resource Reservation Protocol • 15 minutes
- Recommended Reading: Real-Time Streaming Protocol – RTSP • 15 minutes
- Recommended Reading: VOIP (Voice Over IP)• 15 minutes
- Recommended Reading: Session Initiation Protocol (SIP) • 15 minutes
- Recommended Reading: Streaming Live Audio/Video Applications• 15 minutes
14 assignments• Total 132 minutes
- Test Yourself: Multimedia Transport• 30 minutes
- Multimedia Transmission• 6 minutes
- Multimedia Networking: Goals and Challenges• 6 minutes
- Multimedia Over IP• 6 minutes
- Compression – Encoding and Decoding• 6 minutes
- Digitising Audio and Video• 6 minutes
- Real-time Transport Protocol - RTP• 6 minutes
- Real-time Control Protocol – RTCP• 6 minutes
- Resource Reservation Protocol • 6 minutes
- Real-Time Streaming Protocol – RTSP• 6 minutes
- VOIP (Voice Over IP)• 6 minutes
- Session Initiation Protocol (SIP) • 6 minutes
- Streaming Live Audio/Video Applications • 6 minutes
- Let's Practice: Multimedia Transport• 30 minutes
In this module, we learn the role and functioning of the link layer. Precisely, how the link layer contributes to error detection and correction of data, three different mechanisms of coordinating the multiple access problem at the link layer and finally the working of Ethernet, the most widely used LAN technology.
What's included
19 videos18 readings20 assignments
19 videos• Total 99 minutes
- Services Provided by the Link Layer• 3 minutes
- Data-Link Control • 8 minutes
- Link Layer Addressing• 4 minutes
- Address Resolution Protocol (ARP)• 4 minutes
- Error Detection• 8 minutes
- Linear Block Codes-Parity Check• 3 minutes
- Cyclic Codes - Cyclic Redundancy Check CRC• 6 minutes
- High-level Data-Link Control (HDLC)• 5 minutes
- Point-to-Point Protocol• 6 minutes
- Random Access Method• 9 minutes
- Controlled Access Method• 5 minutes
- Channel Partitioning Protocols• 3 minutes
- Ethernet Frame Structure• 3 minutes
- Ethernet Technologies and Topology• 6 minutes
- Forwarding and Filtering• 5 minutes
- Virtual Local Area Networks (VLANs)• 8 minutes
- Multi-Protocol Label Switching (MPLS)• 5 minutes
- Data Center Architectures• 6 minutes
- Module Wrap-Up• 3 minutes
18 readings• Total 255 minutes
- Recommended Reading: Services Provided by the Link Layer • 15 minutes
- Recommended Reading: Data-Link Control• 15 minutes
- Recommended Reading: Link Layer Addressing• 15 minutes
- Recommended Reading: Address Resolution Protocol (ARP)• 15 minutes
- Recommended Reading: Error Detection• 15 minutes
- Recommended Reading: Linear Block Codes - Parity Check • 15 minutes
- Recommended Reading: Cyclic Codes - Cyclic Redundancy Check CRC• 15 minutes
- Recommended Reading: High-level Data-Link Control (HDLC)• 15 minutes
- Recommended Reading: Point-to-Point Protocol• 10 minutes
- Recommended Reading: Random Access Method• 15 minutes
- Recommended Reading: Controlled Access Method • 15 minutes
- Recommended Reading: Channel Partitioning Protocols• 15 minutes
- Recommended Reading: Ethernet Frame Structure • 10 minutes
- Recommended Reading: Ethernet Technologies and Topology • 10 minutes
- Recommended Reading: Forwarding and Filtering • 15 minutes
- Recommended Reading: Virtual Local Area Networks (VLANs)• 15 minutes
- Recommended Reading: Multi-Protocol Label Switching (MPLS)• 15 minutes
- Recommended Reading: Data Centre Architectures• 15 minutes
20 assignments• Total 168 minutes
- Test Yourself: Data Link Layer and LAN• 30 minutes
- Services Provided by the Link Layer• 6 minutes
- Data-Link Control • 6 minutes
- Link Layer Addressing• 6 minutes
- Address Resolution Protocol (ARP)• 6 minutes
- Error Detection• 6 minutes
- Linear Block Codes - Parity Check• 6 minutes
- Cyclic Codes - Cyclic Redundancy Check CRC• 6 minutes
- High-level Data-Link Control (HDLC)• 6 minutes
- Point-to-Point Protocol• 6 minutes
- Random Access Method• 6 minutes
- Controlled Access Method• 6 minutes
- Channel Partitioning Protocols• 6 minutes
- Ethernet Frame Structure• 6 minutes
- Ethernet Technologies and Topology• 6 minutes
- Forwarding and Filtering• 6 minutes
- Virtual Local Area Networks (VLANs)• 6 minutes
- Multi-Protocol Label Switching (MPLS)• 6 minutes
- Data Center Architectures• 6 minutes
- Let's Practice: Data Link Layer and LAN• 30 minutes
This module focuses on understanding how data and signals can be both analogue and digital along with their characteristics. Concentrate on how to convert digital data to digital signals and then convert analogue data to digital signals. Covers on multiplexing to benefit more from the bandwidth available. Then will discuss the transmission media that are used in data communication along with wireless and mobile networks.
What's included
13 videos12 readings14 assignments
13 videos• Total 63 minutes
- Data to Digital Signals • 5 minutes
- Digital-to-Analog Conversion• 8 minutes
- Multiplexing Techniques• 4 minutes
- Transmission Media and Physical Layer• 5 minutes
- Unguided Media: Wireless• 3 minutes
- Signals and Data Rate• 7 minutes
- Wireless LAN – Architecture • 6 minutes
- IEEE 802.11 Frame Format• 6 minutes
- WIFI IEEE 802.11 Techniques• 5 minutes
- Bluetooth Architecture• 4 minutes
- Architectural Evolution From 2G to 3G to 4G• 4 minutes
- 5G Cellular Networks• 6 minutes
- Module Wrap-Up• 1 minute
12 readings• Total 156 minutes
- Data to Digital Signals • 15 minutes
- Digital-to-Analogue Conversion• 10 minutes
- Multiplexing Techniques• 15 minutes
- Transmission Media and Physical Layer• 15 minutes
- Unguided Media: Wireless• 1 minute
- Signals and Data Rate• 10 minutes
- Wireless LAN – Architecture• 15 minutes
- IEEE 802.11 Frame Format• 15 minutes
- WIFI IEEE 802.11 Techniques• 15 minutes
- Bluetooth Architecture• 15 minutes
- Architectural Evolution From 2G to 3G to 4G• 15 minutes
- 5G Cellular Networks• 15 minutes
14 assignments• Total 132 minutes
- Test Yourself: Physical Layer and Wireless Networks• 30 minutes
- Data to Digital Signals • 6 minutes
- Digital-to-Analog Conversion• 6 minutes
- Multiplexing Techniques• 6 minutes
- Transmission Media and Physical Layer• 6 minutes
- Unguided Media: Wireless• 6 minutes
- Signals and Data Rate• 6 minutes
- Wireless LAN – Architecture • 6 minutes
- IEEE 802.11 Frame Format• 6 minutes
- WIFI IEEE 802.11 Techniques• 6 minutes
- Bluetooth Architecture• 6 minutes
- Architectural Evolution From 2G to 3G to 4G• 6 minutes
- 5G Cellular Networks• 6 minutes
- Let's Practice: Physical Layer and Wireless Networks• 30 minutes
In this module, we understand the network management in depth. Specifically, we learn the key functionalities of network management including Fault, Configuration, Accounting, Performance, and Security (FCAPS) management aspects. Once the key functions are studied, we move on to learn the workings of Simple Network Management Protocol (SNMP) in depth. Here, we focus on understanding SNMP framework, operations, and its significance in network monitoring and management. We conclude the module, by learning the role of NETCONF and YANG in the overall.
What's included
17 videos16 readings18 assignments
17 videos• Total 63 minutes
- Overview of Network Management and its Goals• 2 minutes
- Network Management Organisation and Functions• 3 minutes
- Configuration Management• 3 minutes
- Fault Management• 4 minutes
- Performance Management• 6 minutes
- Security Management• 5 minutes
- Accounting Management• 3 minutes
- Overview of Simple Network Management Protocol (SNMP) • 3 minutes
- Structure of Management Information (SMI)• 3 minutes
- Management Information Base (MIB)• 6 minutes
- SNMPv3 Operation• 4 minutes
- SNMP Messages • 5 minutes
- Overview of NETCONF• 4 minutes
- NETCONF Operations• 4 minutes
- Overview of YANG• 3 minutes
- YANG Model• 3 minutes
- Module Wrap-Up• 2 minutes
16 readings• Total 240 minutes
- Recommended Reading: Overview of Network Management and its Goals• 15 minutes
- Recommended Reading: Network Management Organisation and Functions • 15 minutes
- Recommended Reading: Configuration Management• 15 minutes
- Recommended Reading: Fault Management• 15 minutes
- Recommended Reading: Performance Management• 15 minutes
- Recommended Reading: Security management• 15 minutes
- Recommended Reading: Accounting Management• 15 minutes
- Recommended Reading: Overview of Simple Network Management Protocol (SNMP) • 15 minutes
- Recommended Reading: Structure of Management Information (SMI)• 15 minutes
- Recommended Reading: Management Information Base (MIB)• 15 minutes
- Recommended Reading: SNMPv3 Operations• 15 minutes
- Recommended Reading: SNMPv3 Messages• 15 minutes
- Recommended Reading: Overview of NETCONF• 15 minutes
- Recommended Reading: NETCONF Operations • 15 minutes
- Recommended Reading: Overview of YANG• 15 minutes
- Recommended Reading: YANG Model• 15 minutes
18 assignments• Total 156 minutes
- Test Yourself: Network Management• 30 minutes
- Overview of Network Management and its Goals• 6 minutes
- Network Management Organisation and Functions• 6 minutes
- Configuration Management• 6 minutes
- Fault Management• 6 minutes
- Performance Management• 6 minutes
- Security Management• 6 minutes
- Accounting Management• 6 minutes
- Overview of Simple Network Management Protocol (SNMP) • 6 minutes
- Structure of Management Information (SMI)• 6 minutes
- Management Information Base (MIB)• 6 minutes
- SNMPv3 Operation• 6 minutes
- SNMP Messages• 6 minutes
- Overview of NETCONF• 6 minutes
- NETCONF Operations• 6 minutes
- Overview of YANG• 6 minutes
- YANG Model• 6 minutes
- Let's Practice: Network Management• 30 minutes
In this module, we first discuss the key principles of securing network applications before moving on to know what Transport Layer Security (TLS) is and its contribution to securing HTTP applications. Precisely, we will learn the working of TLS with respect to connection establishment, handshaking, key derivation and safe data transfer. We conclude the module by understanding how the security of Email communication is achieved, and also the role of firewalls and Intrusion Detection Systems (IDS) in aiding operational security.
What's included
16 videos16 readings17 assignments
16 videos• Total 64 minutes
- Security Goals • 3 minutes
- Network Attacks• 4 minutes
- Confidentiality of Data – Private Key Cryptography• 3 minutes
- Confidentiality of Data – Public Key Cryptography • 4 minutes
- Integrity of Data with Message Digests and Hash Functions• 3 minutes
- Digital Signatures• 4 minutes
- Endpoint Authentication• 6 minutes
- E-mail Security• 3 minutes
- Pretty Good Privacy (PGP)• 4 minutes
- TLS Overview & Integrating TLS with HTTP -> HTTPS• 4 minutes
- TLS Handshake• 4 minutes
- TLS Key Derivation• 4 minutes
- TLS Record and Data Transfer• 4 minutes
- Firewalls• 5 minutes
- Intrusion Detection Systems• 5 minutes
- Module Wrap Up Video• 3 minutes
16 readings• Total 235 minutes
- Recommended Reading: Security Goals• 15 minutes
- Recommended Reading: Network Attacks• 15 minutes
- Recommended Reading: Confidentiality of Data – Private Key Cryptography• 15 minutes
- Recommended Reading: Confidentiality of Data – Public Key Cryptography • 15 minutes
- Recommended Reading: Integrity of Data with Message Digests and Hash Functions• 15 minutes
- Recommended Reading: Digital Signatures• 15 minutes
- Recommended Reading: Endpoint Authentication• 15 minutes
- Recommended Reading: E-mail Security• 15 minutes
- Recommended Reading: Pretty Good Privacy (PGP)• 15 minutes
- Recommended Reading: TLS Overview & Integrating TLS with HTTP -> HTTPS• 15 minutes
- Recommended Reading: TLS Handshake and Key Derivation• 15 minutes
- Recommended Reading: TLS Key Derivation and Data Transfer• 15 minutes
- Recommended Reading: TLS Record• 15 minutes
- Recommended Reading: Operational Security - Firewalls• 15 minutes
- Recommended Reading: Operational Security – Intrusion Detection Systems• 15 minutes
- Course Summary• 10 minutes
17 assignments• Total 150 minutes
- Test Yourself: Network Security• 30 minutes
- Security Goals • 6 minutes
- Network Attacks• 6 minutes
- Confidentiality of Data – Private Key Cryptography• 6 minutes
- Confidentiality of Data – Public Key Cryptography • 6 minutes
- Integrity of Data with Message Digests and Hash Functions• 6 minutes
- Digital Signatures• 6 minutes
- Endpoint Authentication• 6 minutes
- E-mail Security• 6 minutes
- Pretty Good Privacy (PGP)• 6 minutes
- TLS Overview & Integrating TLS with HTTP -> HTTPS• 6 minutes
- TLS Handshake and Key Derivation• 6 minutes
- TLS Key Derivation and Data Transfer• 6 minutes
- TLS Record• 6 minutes
- Operational Security - Firewalls• 6 minutes
- Operational Security – Intrusion Detection Systems• 6 minutes
- Let's Practice: Network Security• 30 minutes
Instructor

Offered by

Offered by

Birla Institute of Technology & Science, Pilani (BITS Pilani) is one of only ten private universities in India to be recognised as an Institute of Eminence by the Ministry of Human Resource Development, Government of India. It has been consistently ranked high by both governmental and private ranking agencies for its innovative processes and capabilities that have enabled it to impart quality education and emerge as the best private science and engineering institute in India. BITS Pilani has four international campuses in Pilani, Goa, Hyderabad, and Dubai, and has been offering bachelor's, master’s, and certificate programmes for over 58 years, helping to launch the careers for over 1,00,000 professionals.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Computer Science

Course
UUniversity of Colorado System
Course
YYonsei University
Course

Course
Âą Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.