for initial details.
Lecture 1 - introduction |
quicktime pdf |
Lecture 2 - network programming and hw0 |
quicktime pdf |
Lecture 3 - core internet concepts |
quicktime pdf |
Lecture 4 - server programming and application protocols |
quicktime pdf |
Lecture 5 - application models and peer to peer |
quicktime pdf |
Lecture 6 - BitTorrent |
quicktime pdf |
Lecture 7 - Domain Name System |
quicktime pdf |
Lecture 8 - DNS and Transport Layer Services |
quicktime pdf |
Lecture 9 - hw2/3 discussion, UDP and sockets |
quicktime pdf |
Lecture 10 - reliable transport over unreliable networks |
quicktime |
Lecture 11 - transport protocol performance (1) |
quicktime |
Lecture 12 - transport protocol performance (2) |
quicktime |
Lecture 13 - TCP session management |
quicktime |
Lecture 14 - TCP congestion control |
quicktime |
Lecture 15 - TCP flow control etc. |
quicktime |
Lecture 16 - Fairness and midterm discussion |
quicktime |
Lecture 17 - Summary, and a bit of shell hacking |
quicktime |
Lecture 18 - Planetlab and hw5 |
quicktime |
Homework 5 extra video (demo) |
quicktime |
Lecture 19 - homework 5 and midterm solutions (not recorded) |
quicktime |
Lecture 20 - Network Layer. No recording due to a computer crash. |
Lecture 21 - Homework 5 solution, and network layer 2 |
quicktime |
Lecture 22 - Subnets, IP address allocations and forwarding tables |
quicktime |
Lecture 23 - Auxiliary network layer protocols and NAT |
quicktime |
Lecture 24 - A DNS mystery, hw6 and hw7 discussion |
quicktime |
Lecture 25 - NAT and Introduction to Routing |
quicktime |
Lecture 26 - Routing Algorithms |
quicktime |
Lecture 27 - Homework 7 Solution and Hierarchical Routing |
quicktime |
Lecture 28 - BGP and Mobile IP (No Audio) |
quicktime |
Lecture 29 - IPV6 and Tunneling |
quicktime |
Lecture 30 - Midterm 2 Review |
quicktime |
Lecture 31 - (very short, midterm 2 solutions not recorded) |
quicktime |
Lecture 32 - Link Layer intro (medium access control) |
quicktime |
Lecture 33 - Ethernet and CSMA |
quicktime |
Lecture 34 - More Ethernet |
quicktime |
Lecture 35 - WiFi and Wireless Communication |
quicktime |
Lecture 36 - WiFi 2 |
quicktime |
Lecture 37 - Modulation in the PHY layer |
quicktime |
Lecture 38 - Error detecting and correcting codes |
quicktime |
Lecture 39 - Cryptography |
quicktime |
Lecture 40 - System integrity and 'sploits |
quicktime |
Final Lecture - Class Summary |
quicktime |
: you can check out some handy example code from svn://bits.cs.uic.edu/cs450f10/examples