Protocols

Sort options

Uso de Python para Acceder a Datos Web (Coursera)

En este curso, aprenderás cómo la Internet se puede convertir en una fuente de datos. Para esto, rasparemos, analizaremos y leeremos los datos web y también accederemos datos mediante APIs web. Trabajaremos con formatos de datos HTML, XML y JSON en Python.
0
No votes yet

Estrutura e Funcionamento das Redes de Computadores (Coursera)

Este curso foi desenvolvido para apresentar uma visão geral completa das redes de computadores. Falaremos sobre vários aspectos, desde os fundamentos das modernas tecnologias e protocolos de rede, passando por uma visão geral da nuvem, até as aplicações práticas e soluções para problemas de rede. Encerraremos discutindo como essas [...]
0
No votes yet

Software Architecture (Coursera)

The way that software components — subroutines, classes, functions, etc. — are arranged, and the interactions between them, is called architecture. In this course you will study the ways these architectures are represented, both in UML and other visual tools. We will introduce the most common architectures, [...]
7
Average: 7 ( 4 votes )

TCP/IP and Advanced Topics (Coursera)

In this course, we give an in-depth study of the TCP/IP protocols. We examine the details of how IP enables communications across a collection of networks. We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. The role [...]
10
Average: 10 ( 4 votes )

Peer-to-Peer Protocols and Local Area Networks (Coursera)

In this course, we discuss peer-to-peer protocols and local area networks. Part one in this course is to answer the question of how does a peer-to-peer protocol deliver reliable data transfer service across unreliable transmission lines or networks. We focus on several medium access control protocols and their [...]
7
Average: 7 ( 4 votes )

Interfacing with the Raspberry Pi (Coursera)

The Raspberry Pi uses a variety of input/output devices based on protocols such as HDMI, USB, and Ethernet to communicate with the outside world. In this class you will learn how to use these protocols with other external devices (sensors, motors, GPS, orientation, LCD screens etc.) to get your [...]
7
Average: 7 ( 4 votes )

System Validation (4): Modelling Software, Protocols, and other behaviour (Coursera)

Nov 22nd 2021
System Validation (4): Modelling Software, Protocols, and other behaviour (Coursera)
Course Auditing
Categories
Effort
Languages
System Validation is the field that studies the fundamentals of system communication and information processing. It allows automated analysis based on behavioural models of a system to see if a system works correctly. We want to guarantee that the systems does exactly what it is supposed to do. The [...]
0
No votes yet

Architecture, Algorithms, and Protocols of a Quantum Computer and Quantum Internet (edX)

Learn the basics of quantum algorithms, quantum error-correction, micro-architectures, compilers, and programming languages for quantum processors, and protocols for the quantum internet. In this course we will demonstrate how a large-scale quantum processor could be built using these qubits. Among the topics that we will discuss are micro-architectures, compilers, [...]
0
No votes yet

IoT Networks and Protocols (edX)

Self Paced
IoT Networks and Protocols (edX)
Course Auditing
Categories
Effort
Languages
Learn about IoT networks and the protocols and standards associated with the Internet and how these apply to the IoT. The Internet of Things (IoT) is expanding at a rapid rate, and it is becoming increasingly important for professionals to understand what it is, how it works, and how [...]
8
Average: 8 ( 2 votes )

Network Security - Protocols (edX)

Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing [...]
0
No votes yet