Epic Networks Lab
Epic Networks Lab
  • 77
  • 680 872
Firewalls and Intrusion Detection Systems (IDS) | Computer Networks Ep. 8.9 | Kurose & Ross
Answering the question: "How do firewalls and intrusion-detection systems work?" This video covers operational security for enterprise networks, in particular rule-based and flow-based packet filtering.
Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 9.
Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm
Background music: www.epidemicsound.com/referral/tuicuy/
Переглядів: 7 657

Відео

Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross
Переглядів 2,7 тис.3 роки тому
Answering the question: "How does cell phone encryption work?" This video covers security in wireless and mobile networks, in particular authentication and key agreement for 4G and 5G in cellular networks. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 8.2. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: g...
Secure WiFi: WPA Auth & Key Exchange in 802.11 | Computer Networks Ep 8.8.1 | Kurose & Ross
Переглядів 2,4 тис.3 роки тому
Answering the question: "How does WiFi encryption work?" This video covers security in wireless and mobile networks, in particular authentication and key agreement for WPA2 and WPA3 in 802.11 Wireless LANs. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 8.1. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: ...
IPsec: How VPNs Work - Virtual Private Network Security | Computer Networks Ep. 8.7 | Kurose & Ross
Переглядів 3,6 тис.3 роки тому
Answering the question: "How do VPNs work?" This video covers network layer security, in particular IPsec encrypted tunnels, which are commonly used for virtual private networks. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 7. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/...
TLS: Securing the Transport Layer (How HTTPS Works) | Computer Networks Ep. 8.6 | Kurose & Ross
Переглядів 4,3 тис.3 роки тому
Answering the question: "How does TLS work?" This video covers transport layer security, which is how secure websites (HTTPS) work. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 6. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm Background music: www.epidemicsound.com...
Secure Email with PGP Encryption | Computer Networks Ep. 8.5 | Kurose & Ross
Переглядів 3,8 тис.3 роки тому
Answering the question: "How do we secure email?" and "What is PGP?" This video includes email encryption for confidentiality, as well as digital signing for authentication, message integrity, and non-repudiation. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 5. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available h...
Digital Signatures, Message Integrity, and Authentication | Computer Networks Ep 8.3 | Kurose & Ross
Переглядів 6 тис.3 роки тому
Answering the question: "What are digital signatures, and how do they assure message integrity?" This video includes message integrity, digital signatures, and endpoint authentication. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Sections 3 and 4. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu...
Principles of Cryptography | Computer Networks Ep. 8.2 | Kurose & Ross
Переглядів 6 тис.3 роки тому
Answering the question: "How do networks use cryptography to achieve security?" This video includes public key cryptography (PKI) as well as symmetric key cryptography. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 2. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm Ba...
What is Network Security? | Computer Networks Ep. 8.1 | Kurose & Ross
Переглядів 10 тис.3 роки тому
Answering the question: "What do we mean by the term network security?" This video introduces a new series on Network Security, which covers the topics from the 8th chapter of Kurose & Ross. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 1. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/...
Datacenter TCP, Incast Problem & Partition-agg timing | Network Traffic Analysis Ep. 17 | CS4558
Переглядів 2,5 тис.3 роки тому
Discusses the SIGCOMM paper "Data center TCP (DCTCP)", by Mohammad Alizadeh, Albert Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, and Murari Sridharan. 2010. In Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM '10). Association for Computing Machinery, New York, NY, USA, 63-74. doi.org/10.1145/1851275.1851192 tools.ietf.org/html/rfc8257 Ba...
BGP Hijacking - Detection and Prevention | Network Traffic Analysis Ep. 16 | CS4558
Переглядів 5 тис.3 роки тому
Discusses the SIGCOMM IMC paper "Detecting Prefix Hijackings in the Internet with Argus", by Xingang Shi, Yang Xiang, Zhiliang Wang, Xia Yin, and Jianping Wu. 2012. In Proceedings of the 2012 Internet Measurement Conference (IMC '12). Association for Computing Machinery, New York, NY, USA, 15-28. doi.org/10.1145/2398776.2398779 Background music: www.epidemicsound.com/referral/tuicuy/
Nation-State Internet Censorship View from the Network | Network Traffic Analysis Ep. 15 | CS4558
Переглядів 4913 роки тому
Discusses the SIGCOMM IMC paper "Analysis of Country-wide Internet Outages Caused by Censorship", by Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé. 2011. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (IMC '11). Association for Computing Machinery, New York, NY, USA, 1-18. doi.org/10.1...
Alias Resolution: Resolving IP router interface aliases | Network Traffic Analysis Ep. 14 | CS4558
Переглядів 8614 роки тому
Discusses the ACM SIGCOMM CCR article "Internet-Scale IP Alias Resolution Techniques", by Ken Keys. 2010. In ACM SIGCOMM Computer Communication Review (CCR), vol. 40, no. 1, pp. 50 55, Jan 2010. doi.org/10.1145/1672308.1672318 Background music: www.epidemicsound.com/referral/tuicuy/
Yarrp: Traceroute to the whole Internet at once! | Network Traffic Analysis Ep. 13 | CS4558
Переглядів 5364 роки тому
Discusses the network topology discovery tool Yarrp (Yelling at Random Routers Progressively), which was first introduced in the SIGCOMM IMC paper "Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery", by Robert Beverly. 2016. In Proceedings of the Sixteenth ACM SIGCOMM Internet Measurement (IMC 2016) Conference, Santa Monica, CA, November 2016, (pp. 413-420). doi.org/10.114...
What's wrong with Traceroute? How to fix it with Paris Traceroute! | Network Traffic Analysis Ep 12
Переглядів 1,5 тис.4 роки тому
Discusses the SIGCOMM IMC paper "Avoiding traceroute anomalies with Paris traceroute", by Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, and Renata Teixeira. 2006. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06). Association for Computing Machinery, New York, NY, USA, 153-158. doi.org/10.11...
Hacking IPv6: Security and Attacks vs IPv4 | Network Traffic Analysis Ep. 11 | CS4558
Переглядів 1,8 тис.4 роки тому
Hacking IPv6: Security and Attacks vs IPv4 | Network Traffic Analysis Ep. 11 | CS4558
Measuring the Deployment of IPv6: Topology and Performance | Network Traffic Analysis Ep 10 | CS4558
Переглядів 3444 роки тому
Measuring the Deployment of IPv6: Topology and Performance | Network Traffic Analysis Ep 10 | CS4558
Pingin' in the Rain: Weather effects on Broadband Outages | Network Traffic Analysis Ep. 09 | CS4558
Переглядів 1874 роки тому
Pingin' in the Rain: Weather effects on Broadband Outages | Network Traffic Analysis Ep. 09 | CS4558
Cable vs. DSL ISPs: Broadband Internet Performance | Network Traffic Analysis Ep. 08 | CS4558
Переглядів 8474 роки тому
Cable vs. DSL ISPs: Broadband Internet Performance | Network Traffic Analysis Ep. 08 | CS4558
Every microsecond counts: tracking fine-grain latency | Network Traffic Analysis Ep. 07 | CS4558
Переглядів 6494 роки тому
Every microsecond counts: tracking fine-grain latency | Network Traffic Analysis Ep. 07 | CS4558
Monitoring Network Utilization with Zero Measurement Cost | Network Traffic Analysis Ep. 06 | CS4558
Переглядів 4894 роки тому
Monitoring Network Utilization with Zero Measurement Cost | Network Traffic Analysis Ep. 06 | CS4558
A Minimalist Approach to Network Flow Monitoring | Network Traffic Analysis Ep. 05 | CS4558
Переглядів 9374 роки тому
A Minimalist Approach to Network Flow Monitoring | Network Traffic Analysis Ep. 05 | CS4558
How does NetFlow (IPFIX) work? | Network Traffic Analysis Ep. 04 | CS4558
Переглядів 9 тис.4 роки тому
How does NetFlow (IPFIX) work? | Network Traffic Analysis Ep. 04 | CS4558
Redirecting DNS for Ads and Profit | Network Traffic Analysis Ep. 03 | CS4558
Переглядів 5444 роки тому
Redirecting DNS for Ads and Profit | Network Traffic Analysis Ep. 03 | CS4558
Drafting Behind Akamai | Reusing CDN Network Measurements | Network Traffic Analysis Ep. 02 | CS4558
Переглядів 6904 роки тому
Drafting Behind Akamai | Reusing CDN Network Measurements | Network Traffic Analysis Ep. 02 | CS4558
How do CDNs Work? All about Content Distribution Networks | Network Traffic Analysis Ep 01 | CS4558
Переглядів 3,4 тис.4 роки тому
How do CDNs Work? All about Content Distribution Networks | Network Traffic Analysis Ep 01 | CS4558
How Mobile IP Works - Wireless Networks | Computer Networks Ep. 7.5 | Kurose & Ross
Переглядів 11 тис.4 роки тому
How Mobile IP Works - Wireless Networks | Computer Networks Ep. 7.5 | Kurose & Ross
How Cellular 4G/5G Networks Work - Wireless Networks | Computer Networks Ep. 7.4 | Kurose & Ross
Переглядів 11 тис.4 роки тому
How Cellular 4G/5G Networks Work - Wireless Networks | Computer Networks Ep. 7.4 | Kurose & Ross
802.11 How WiFi Works - Wireless Networks | Computer Networks Ep. 7.3 | Kurose & Ross
Переглядів 18 тис.4 роки тому
802.11 How WiFi Works - Wireless Networks | Computer Networks Ep. 7.3 | Kurose & Ross
Wireless & Mobile Link Challenges - Wireless Networks | Computer Networks Ep. 7.1 | Kurose & Ross
Переглядів 17 тис.4 роки тому
Wireless & Mobile Link Challenges - Wireless Networks | Computer Networks Ep. 7.1 | Kurose & Ross

КОМЕНТАРІ

  • @rareshuci4467
    @rareshuci4467 3 дні тому

    sir i like your beautiful beard, it turns me on while studying!

  • @DonnaPerez-i6o
    @DonnaPerez-i6o 4 дні тому

    Very good video! I have USDT in my OKX wallet and I have my recovery phrase. [pride]-[pole]-[obtain]-[together]-[second]-[when]-[future]-[mask]-[review]-[nature]-[potato]-[bulb] How do I transfer them to Binance?

  • @bharathvarun3407
    @bharathvarun3407 8 днів тому

    He read the whole PPT without explaining the concepts properly

  • @YasinibrahimMusse
    @YasinibrahimMusse 9 днів тому

    Teacher I nee book of computer networking and security. How much can I bay?

  • @BlindAndInsane
    @BlindAndInsane 12 днів тому

    "please dont use comic sans in a professional document" hehe

  • @thechronicler7461
    @thechronicler7461 20 днів тому

    Bro, give this guy a break. I've done slide show presentation myself in high school and ppl don't appreciate how difficult it is until try it themselves. For me, unless I read off a script when presenting, I always find myself either trailing off or going off topic, if not just blank out completely. You can tell he cut part by part just to avoid screwing up. Doing it this way is a heck lot more difficult and time consuming than presenting all parts on one go. His style is not bad, it's just that Kurose is simply really really really good at presentation.

    • @deeprochakravorty
      @deeprochakravorty 12 днів тому

      I understand it's difficult and takes a lot of effort and time to cut the video so many times to make it concise and error free, but he is clearly a networks professor, and presenting should be one of the primary skills he should be having. In this case, not only is he speaking monotonously, but also making it hard to pay attention cause it's taking so much effort to understand what he's saying. Also (i dont mean to insult anyone), it would've been better if he didnt use a facecam cause his unenthusiasm is infectious :') You aren't a prof or a teacher (im assuming) and so it's alright.

  • @sassynatan
    @sassynatan Місяць тому

    Great Video!

  • @FURYCHAMP
    @FURYCHAMP Місяць тому

    to the point explanation, very helpful <3

  • @jongpac2
    @jongpac2 Місяць тому

    I am going through from the beginning to Ch3 to prepare for my midterm exam for tonight! Really helpful!

  • @user-ng4ol3sp3k
    @user-ng4ol3sp3k Місяць тому

    this is so awful

  • @praveenchaturvedi2761
    @praveenchaturvedi2761 Місяць тому

    He was more expressive in the thumbnail...

  • @fio6143
    @fio6143 Місяць тому

    how is he so still in his video

  • @fatjawns3671
    @fatjawns3671 Місяць тому

    This is LITERALLY THE EXACT SAME EXAMPLE FROM MY COLLEGE COURSE WTF BRO 😭

  • @blakerunyon09
    @blakerunyon09 Місяць тому

    Man I want to be able to pay attention so bad but I can’t.

  • @svrzaslon
    @svrzaslon Місяць тому

    People are not able to understand a lot of these lectures because their basics are not clear, if the basics are clear then these lectures are equally fun and amazing to learn about computer networks! I enjoyed it a lot!

    • @Maxikinz
      @Maxikinz Місяць тому

      No, we aren't able to understand because this professor is the worst I have ever seen at explaining concepts and making anything interesting. He stands perfectly still like a robot, cuts every 2 seconds making his language seem unnatural and abrupt, and reads off a script with no personality or interest in what is being said.

  • @sammann3577
    @sammann3577 Місяць тому

    no example for the math or formula just pure information dump on student. What is this way of teaching

  • @jaishriharivishnu
    @jaishriharivishnu 2 місяці тому

    professor 100% Knowledge 0%

  • @gracefulmango1234
    @gracefulmango1234 2 місяці тому

    I was watching Jim Kurose videos and then started watching this video and I must say this is not teaching, this is more like reading the text.

  • @charlyekerum2714
    @charlyekerum2714 3 місяці тому

    Great.

  • @joey_j218
    @joey_j218 3 місяці тому

    These videos really put into perspective how good Jim is at teaching

    • @Bushra-mk4ev
      @Bushra-mk4ev 3 місяці тому

      he makes studying computer networking fun

  • @NasNar
    @NasNar 3 місяці тому

    finished the course stronger than ever in networking

  • @NasNar
    @NasNar 3 місяці тому

    are you an AI

  • @mariahlove7357
    @mariahlove7357 4 місяці тому

    It's Chinese to my ears. Sorry

  • @saradridi573
    @saradridi573 4 місяці тому

    love from Germany, you saved my life too dear sir. great work

  • @nikos7273
    @nikos7273 5 місяців тому

    You are a lifesaver

  • @joseortega584
    @joseortega584 5 місяців тому

    Epic Networks., can I hire you for personal Network consulting .??? I'm having issues with my traceroute and I'm hoping you can help.

  • @bronsonschnitzel7493
    @bronsonschnitzel7493 5 місяців тому

    dude are you okay?

  • @יקירמעודה
    @יקירמעודה 5 місяців тому

    אפשר בעברית?

  • @Erza-nk4rn
    @Erza-nk4rn 5 місяців тому

    my prof needs an hour for this and doesnt get to the point, thank you for saving me so much time

  • @triple7triple3zero
    @triple7triple3zero 5 місяців тому

    Passing my course is in the hands of God, and in the hands of Epic Networks Lab. Jim Kurose and his textbook have forsaken me.

  • @atharva3832
    @atharva3832 5 місяців тому

    lots of love <3 from bits - yamete

  • @sevvalkaplan1819
    @sevvalkaplan1819 5 місяців тому

    USE YOUR EYES BABES

  • @selimkaraca549
    @selimkaraca549 5 місяців тому

    Please use your face

  • @gustavbrochmann
    @gustavbrochmann 6 місяців тому

    he looks ai generated

  • @tejaspatel6965
    @tejaspatel6965 6 місяців тому

    this do be scary

  • @justcurious1940
    @justcurious1940 6 місяців тому

    Thank u so much for this amazing video, could please confirm that there is a typo at 10:30 ? MAC address of the source should be H1 ?

  • @rickythewoof
    @rickythewoof 6 місяців тому

    This series helped me massively on my course on computer networking, thank you so much!

  • @frederikbh1
    @frederikbh1 6 місяців тому

    Very clear explanation. Thank you also for respecting your viewers' time as much as you do by editing the video.

  • @nickthompson7369
    @nickthompson7369 6 місяців тому

    I hope you aren't a professor. Your rate my professor reviews would be terrible

  • @dhawalpatodi2929
    @dhawalpatodi2929 7 місяців тому

    Is this video AI-generated?!

  • @JamesBiser
    @JamesBiser 7 місяців тому

    This guy is a walking W. Bro explains it so nice and "seamlessly" I wish Penn State at the Main campus had professors like him... cough cough, COMPEN 362

  • @yahya-mz9yt
    @yahya-mz9yt 7 місяців тому

    are you an AI?

  • @JamesBiser
    @JamesBiser 7 місяців тому

    What a hero. Final in 2 hours, so this is perfect.

  • @PieStreams
    @PieStreams 7 місяців тому

    Helped Me For My Uni Exams. Thanks Mate. Appreciated

  • @akbarmajidi3934
    @akbarmajidi3934 7 місяців тому

    Amazing!!!

  • @shreeshkulkarni3657
    @shreeshkulkarni3657 7 місяців тому

    No offense, but you teach like a robot. Emotionless. And that's why I like it, you get straight to the point.

  • @jonnyevans1115
    @jonnyevans1115 8 місяців тому

    00:01 Giới thiệu nguyên tắc của các giao thức truyền dữ liệu đáng tin cậy như TCP 01:07 Xây dựng giao thức truyền dữ liệu đơn giản và đáng tin cậy 03:18 Hiểu việc truyền dữ liệu đáng tin cậy trong lớp truyền tải Internet 04:16 Giới thiệu cơ chế mới để truyền dữ liệu đáng tin cậy 06:25 Quá trình truyền dữ liệu có xác nhận 07:39 Xử lý lỗi xác nhận và truyền lại 09:50 Truyền dữ liệu đáng tin cậy: Chuyển đổi trạng thái và xác nhận 10:54 Truyền dữ liệu đáng tin cậy - Lớp truyền tải Internet 13:04 Thời gian chờ để truyền dữ liệu đáng tin cậy 14:01 Những thay đổi trong quá trình truyền dữ liệu đáng tin cậy 16:21 Hiểu thông tin cơ bản về giao thức truyền dữ liệu đáng tin cậy Crafted by Merlin AI.

    • @bawfng04
      @bawfng04 2 місяці тому

      bruh, why Vietnamese here :D

  • @mett_2002
    @mett_2002 8 місяців тому

    It sure is a bot

  • @siggelicious4485
    @siggelicious4485 8 місяців тому

    Around 1:10 you say that only timeouts were used to indicate congestion in Tahoe, could you provide a source for this? According to Computer Networking-A Top-Down Approach (page 300), Tahoe did use triple ACKs as a congestion indication, but handled it in the same way as congestion indicated by timeouts.

  • @aur3nnnn
    @aur3nnnn 8 місяців тому

    old but gold! Excelent explanation. Cheers!