-
Fri 02/02 -- Lecture : Student Choice
-
Mon 01/08 -- Lecture 1: Course Overview and Introduction
-
Wed 01/10 -- Lecture 2: Names and Addresses: Hierarchical and Flat
-
Wed 01/17 -- Lecture 3: Intradomain Topology and Routing
-
Mon 01/22 -- Lecture 4: Interdomain Routing
-
Wed 01/24 -- Lecture 5: Router Design: Technologies and Trends
-
Mon 01/29 -- Lecture 6: Multihoming and Multipath Routing
-
Mon 02/05 -- Lecture 7: Troubleshooting and Fault Detection
-
Wed 02/07 -- Lecture 8: Measurement Techniques, Strategies, and Pitfalls
-
Mon 02/12 -- Lecture 9: Measurement Continued: Strategies, Pitfalls, Platforms
-
Wed 02/14 -- Lecture 10: Traffic Monitoring and Routing Behavior
-
Mon 02/19 -- Lecture 11: Traffic Estimation and Engineering
-
Mon 02/26 -- Lecture 13: Evaluation Strategies: Simulation, Emulation, etc.
-
Wed 03/07 -- Lecture 14: Routing Overlays and Virtualization
-
David G. Andersen and Hari Balakrishnan and M. Frans Kaashoek and Robert Morris
Resilient Overlay Networks
In Proc. 18th ACM Symposium on Operating Systems Principles (SOSP), Oct 2001
-
Wed 03/14 -- Lecture 16: Content Overlays
-
Mon 03/26 -- Lecture 17: Content Overlays (continued)
-
Mon 04/02 -- Lecture 18: Denial of Service: Attacks and Defenses
-
Wed 04/04 -- Lecture 19: Application-level Attacks: Resource Exhaustion, Click Fraud
-
Michael Walfish and Mythili Vutukuru and Hari Balakrishnan and David Karger and Scott Shenker
DDoS Defense by Offense
In ACM SIGCOMM 2006, 2006
-
Mon 04/09 -- Lecture 20: Network Anomaly Detection and Routing Security
-
Mon 04/16 -- Lecture 22: Wireless and Wrap-Up
Last Updated Fri May 04 17:00:41 -0400 2007