Introduction to Computer Networking - CS144
Textbook:
Computer Networks: A Systems Approach
Computer Networking: A Top-Down Approach


选段137P
查看全部
1-0 The Internet and IP Introduction (intro)
1-1 A day in the life of an application
1-2 The four layer Internet model
1-3 The IP service model
1-4 A Day in the Life of a Packet
1-5 Packet switching principle
1-6 Layering principle
1-7 Encapslation principle
1-8a byte order
1-8b byte order
1-8c byte order
1-8d byte order
1-9a IPv4 addresses
1-9b IPv4 addresses - Quiz Introduction
1-9c IPv4 addresses - Quiz Explanation
1-9d IPv4 addresses - Classless Inter-Domain
1-10a Longest Prefix Match (LPM) - Algorithm
1-10b Longest prefix match LPM - Quiz Introdu
1-10c Longest prefix match LPM - Quiz Explana
1-11 Address Resolution Protocol ARP
1-12 The Internet and IP Recap
1-13 Jon Peterson Interview -- SIP and Securi
2-0 Transport (intro)
2-1 TCP service model
2-2 UDP service model
2-3 ICMP service model
2-4 End to End Principle
2-5 Error detection
2-6a Finite state machines 1
2-6b Finite state machines 2 - Quiz
2-6c Finite state machines 3 - Quiz explanati
2-6d Finite state machines 4 - Quiz explanati
2-7 Reliable Communications - Stop and wait
2-8 Reliable Communications - Sliding window
2-9 Reliable Communications - Retransmission
2-10 Reliable Communications - TCP header
2-11 Reliable Communications - Connection set
2-12 Transport recap
2-13 TCPIP -- Kevin Fall
3-0 Packet Switching (intro)
3-1 The History of Networks The History of th
3-2 Packet Switching - Principles What is pac
3-3 Packet Switching - Principles Terminology
3-4 Packet Switching - Principles Playback bu
3-5 Packet Switching - Principles Simple Dete
3-5a Simple Queueing Model Example
3-6 Packet Switching - Principles Queueing Mo
3-7 Packet Switching - Practice Switching and
3-8 Packet Switching - Practice Switching and
3-9 Packet Switching - Principles Rate guaran
3-10 Packet Switching - Principles Delay Guar
3-10a Delay Guarantees Example
3-11 Packet Switching (recap)
3-12 Tom Edsall Interview -- DC Switches
4-0 Congestion Control (intro)
4-1 Congestion Control - Basics
4-2 Congestion Control - Basics 2
4-3 Congestion Control - Dynamics of a single
4-3a Single AIMD flow worked example
4-4 Congestion Control - Multiple AIMD flow
4-5 TCP Congestion Control Ⅰ - TCP Tahoe
4-6 TCP Congestion Control - RTT Estimation a
4-7 Congestion Control - TCP Reno and New Ren
4-8 Congestion Control - Why AIMD
4-9 Skills --- Reading and RFC
4-10 Congestion Control (recap)
4-11 Shortcomings and improvements of TCP and
5-0 Applications and NATs (intro)
5-1 Network Address Translation NATs - Introd
5-2 NATs - Types
5-3 NATs - Implications
5-4 Nats - Operation
5-5a HTTP
5-5b HTTP Quiz 1 Intro
5-5c HTTP Quiz 1 Explanation
5-5d HTTP Quiz 2 Intro
5-5e HTTP Quiz 2 Explanation
5-6 HTTP1.1 Keep-alive
5-7 BitTorrent
5-8 DNS 1
5-9 DNS 2
5-10 DNS 3
5-11 DHCP
5-12 Applications and NATs (recap)
6-0 Routing (intro)
6-1 Flooding, source routing and spanning tre
6-2 Routing - Bellman Ford
6-3 Routing - Dijkstra
6-4 Routing - Internet (RIP, OSPF) AS's
6-5 Routing - BGP
6-5 Routing - Multicast
6-7 Routing - Spanning Tree
6-8 IPv6
6-9 Routing (recap)
6-10 David Ward
6-11 BGP Putting the Inter in Internet. Profe
7-0 Lower Layers (intro)
7-1 Physical and Link Principles - Shannon Ca
7-2 Physical and Link Principles - Bit Errors
7-3 Physical and Link - Principles clocks
7-4 Physical and Link Principles - FEC and Re
7-5 Physical and Link - Principles MAC and CS
7-6 Physical and Link - Practice Ethernet
7-7 Wireless - How It's Different
7-8 Wireless - Principles MAC
7-9 Wireless - Principles CSMACA
7-10 Wireless - Principles RTSCTS
7-11 Wireless - Principles WiFi
7-12 IP Fragmentation and Assembly
7-13 Lower Layers (recap)
7-14 Cloud Managed Wifi -- Sanjit Biswas CEO
8-0 Security (intro)
8-1 Introduction to Network Security
8-2 Layer 2 Attacks
8-2a MAC Overflow Attack
8-2b DHCP Attack Demo
8-3 Layer 3 Attacks
8-4 Security V - Denial of Service
8-5 Security Principles
8-6a Confidentiality
8-6b Confidentiality
8-6c Confidentiality
8-6d Confidentiality
8-6e Confidentiality
8-6f Confidentiality
8-6g Confidentiality
8-6h Confidentiality
8-7 Integrity
8-8 Public Key Cryptography
8-9 Certificates
8-10a TLS 1
8-10b TLS - Quiz Introduction
8-10c TLS - Quiz Answer
8-10d TLS 2
8-11 Security (recap)
8-12 Reed Hundt on security and openness
8-13 Dan Boneh Interview -- Security

1-0 The Internet and IP Introduction (intro)
1-1 A day in the life of an application
1-2 The four layer Internet model
1-3 The IP service model
1-4 A Day in the Life of a Packet
1-5 Packet switching principle
1-6 Layering principle
1-7 Encapslation principle
1-8a byte order
1-8b byte order
1-8c byte order
1-8d byte order
1-9a IPv4 addresses
1-9b IPv4 addresses - Quiz Introduction
1-9c IPv4 addresses - Quiz Explanation
1-9d IPv4 addresses - Classless Inter-Domain
1-10a Longest Prefix Match (LPM) - Algorithm
1-10b Longest prefix match LPM - Quiz Introdu
1-10c Longest prefix match LPM - Quiz Explana
1-11 Address Resolution Protocol ARP
1-12 The Internet and IP Recap
1-13 Jon Peterson Interview -- SIP and Securi
2-0 Transport (intro)
2-1 TCP service model
2-2 UDP service model
2-3 ICMP service model
2-4 End to End Principle
2-5 Error detection
2-6a Finite state machines 1
2-6b Finite state machines 2 - Quiz
2-6c Finite state machines 3 - Quiz explanati
2-6d Finite state machines 4 - Quiz explanati
2-7 Reliable Communications - Stop and wait
2-8 Reliable Communications - Sliding window
2-9 Reliable Communications - Retransmission
2-10 Reliable Communications - TCP header
2-11 Reliable Communications - Connection set
2-12 Transport recap
2-13 TCPIP -- Kevin Fall
3-0 Packet Switching (intro)
3-1 The History of Networks The History of th
3-2 Packet Switching - Principles What is pac
3-3 Packet Switching - Principles Terminology
3-4 Packet Switching - Principles Playback bu
3-5 Packet Switching - Principles Simple Dete
3-5a Simple Queueing Model Example
3-6 Packet Switching - Principles Queueing Mo
3-7 Packet Switching - Practice Switching and
3-8 Packet Switching - Practice Switching and
3-9 Packet Switching - Principles Rate guaran
3-10 Packet Switching - Principles Delay Guar
3-10a Delay Guarantees Example
3-11 Packet Switching (recap)
3-12 Tom Edsall Interview -- DC Switches
4-0 Congestion Control (intro)
4-1 Congestion Control - Basics
4-2 Congestion Control - Basics 2
4-3 Congestion Control - Dynamics of a single
4-3a Single AIMD flow worked example
4-4 Congestion Control - Multiple AIMD flow
4-5 TCP Congestion Control Ⅰ - TCP Tahoe
4-6 TCP Congestion Control - RTT Estimation a
4-7 Congestion Control - TCP Reno and New Ren
4-8 Congestion Control - Why AIMD
4-9 Skills --- Reading and RFC
4-10 Congestion Control (recap)
4-11 Shortcomings and improvements of TCP and
5-0 Applications and NATs (intro)
5-1 Network Address Translation NATs - Introd
5-2 NATs - Types
5-3 NATs - Implications
5-4 Nats - Operation
5-5a HTTP
5-5b HTTP Quiz 1 Intro
5-5c HTTP Quiz 1 Explanation
5-5d HTTP Quiz 2 Intro
5-5e HTTP Quiz 2 Explanation
5-6 HTTP1.1 Keep-alive
5-7 BitTorrent
5-8 DNS 1
5-9 DNS 2
5-10 DNS 3
5-11 DHCP
5-12 Applications and NATs (recap)
6-0 Routing (intro)
6-1 Flooding, source routing and spanning tre
6-2 Routing - Bellman Ford
6-3 Routing - Dijkstra
6-4 Routing - Internet (RIP, OSPF) AS's
6-5 Routing - BGP
6-5 Routing - Multicast
6-7 Routing - Spanning Tree
6-8 IPv6
6-9 Routing (recap)
6-10 David Ward
6-11 BGP Putting the Inter in Internet. Profe
7-0 Lower Layers (intro)
7-1 Physical and Link Principles - Shannon Ca
7-2 Physical and Link Principles - Bit Errors
7-3 Physical and Link - Principles clocks
7-4 Physical and Link Principles - FEC and Re
7-5 Physical and Link - Principles MAC and CS
7-6 Physical and Link - Practice Ethernet
7-7 Wireless - How It's Different
7-8 Wireless - Principles MAC
7-9 Wireless - Principles CSMACA
7-10 Wireless - Principles RTSCTS
7-11 Wireless - Principles WiFi
7-12 IP Fragmentation and Assembly
7-13 Lower Layers (recap)
7-14 Cloud Managed Wifi -- Sanjit Biswas CEO
8-0 Security (intro)
8-1 Introduction to Network Security
8-2 Layer 2 Attacks
8-2a MAC Overflow Attack
8-2b DHCP Attack Demo
8-3 Layer 3 Attacks
8-4 Security V - Denial of Service
8-5 Security Principles
8-6a Confidentiality
8-6b Confidentiality
8-6c Confidentiality
8-6d Confidentiality
8-6e Confidentiality
8-6f Confidentiality
8-6g Confidentiality
8-6h Confidentiality
8-7 Integrity
8-8 Public Key Cryptography
8-9 Certificates
8-10a TLS 1
8-10b TLS - Quiz Introduction
8-10c TLS - Quiz Answer
8-10d TLS 2
8-11 Security (recap)
8-12 Reed Hundt on security and openness
8-13 Dan Boneh Interview -- Security