Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,947 results
Review Table of Contents below. This lesson takes a detailed look at how the OSI model protocols enable TCP/IP network ...
1,273 views
2 years ago
Review the Table of Contents below. In this lesson, we explore protocol stacks and converged protocols that work across multiple ...
689 views
Most of us generally use application layer. There are some common errors that we might encounter while operating a web ...
2,016 views
4 years ago
In this lesson, we explore various ways data are sent across both private and public wide area networks. Some of this tech, such ...
355 views
1 year ago
What are the common errors that occur in network layer? How can one know more details about the network layer? Watch this ...
1,970 views
IS-IS runs on the data link layer, OSPF runs on the IP layer. So why do we keep discussing the merits of each IGP so frequently?
2,074 views
5 years ago
Taking it further we will see a request from a browser is sent to a websites server the response the server sends back in the form of ...
8,022 views
... integrated IS-IS although we just talked about IS-IS, the notable thing about IS-IS is that it runs on top of the data link layer unlike ...
3,455 views
In this lesson, I define software-defined networking and describe how it works at a very high level.
410 views
Review the Table of Contents below. In this lesson, we step through the security layers needed to protect sensitive data and highly ...
492 views
Review Table of Contents below. In this first video in the communication and network security playlist, I explore safeguards ...
2,094 views
How To: Evaluate Sources Using RADAR by the William H. Hannon library is licensed under CC BY-NC-SA 4.0.
2,874 views
0:00:00 Introduction 0:05:57 Maelstrom protocol and echo challenge 0:41:34 Unique ID generation 1:00:08 Improving initialization ...
189,304 views
In this stream, we started implementing the ubiquitous TCP protocol that underlies much of the traffic on the internet! In particular ...
207,272 views
SCHC: "Static Context Header Compression and fragmentation" Context is static for the duration of the communication Contains ...
189 views
Websockets have now been with us for several years and enjoy near universal support. WebRTC is just starting out. Chat, live ...
1,166 views
10 years ago
Timecodes: 0:00:00 Why another Q&A so soon? 0:02:06 DSLR Webcam comparison 0:08:50 wewerewondering.com 0:31:05 ...
14,958 views
Review the Table of Contents Below. In this lesson, we look at network topologies. A network topology is the arrangement of ...
375 views
Data mesh is a new way of thinking about how to use data to create organizational value. Leading edge practitioners are ...
1,879 views
The third video in the FAIR data 101 training series - Accessible #1.
699 views