- 77
- 680 872
Epic Networks Lab
United States
Приєднався 24 чер 2020
University-level educational series' on the Internet and other topics in computer networking.
Firewalls and Intrusion Detection Systems (IDS) | Computer Networks Ep. 8.9 | Kurose & Ross
Answering the question: "How do firewalls and intrusion-detection systems work?" This video covers operational security for enterprise networks, in particular rule-based and flow-based packet filtering.
Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 9.
Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm
Background music: www.epidemicsound.com/referral/tuicuy/
Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 9.
Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm
Background music: www.epidemicsound.com/referral/tuicuy/
Переглядів: 7 657
Відео
Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross
Переглядів 2,7 тис.3 роки тому
Answering the question: "How does cell phone encryption work?" This video covers security in wireless and mobile networks, in particular authentication and key agreement for 4G and 5G in cellular networks. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 8.2. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: g...
Secure WiFi: WPA Auth & Key Exchange in 802.11 | Computer Networks Ep 8.8.1 | Kurose & Ross
Переглядів 2,4 тис.3 роки тому
Answering the question: "How does WiFi encryption work?" This video covers security in wireless and mobile networks, in particular authentication and key agreement for WPA2 and WPA3 in 802.11 Wireless LANs. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 8.1. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: ...
IPsec: How VPNs Work - Virtual Private Network Security | Computer Networks Ep. 8.7 | Kurose & Ross
Переглядів 3,6 тис.3 роки тому
Answering the question: "How do VPNs work?" This video covers network layer security, in particular IPsec encrypted tunnels, which are commonly used for virtual private networks. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 7. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/...
TLS: Securing the Transport Layer (How HTTPS Works) | Computer Networks Ep. 8.6 | Kurose & Ross
Переглядів 4,3 тис.3 роки тому
Answering the question: "How does TLS work?" This video covers transport layer security, which is how secure websites (HTTPS) work. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 6. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm Background music: www.epidemicsound.com...
Secure Email with PGP Encryption | Computer Networks Ep. 8.5 | Kurose & Ross
Переглядів 3,8 тис.3 роки тому
Answering the question: "How do we secure email?" and "What is PGP?" This video includes email encryption for confidentiality, as well as digital signing for authentication, message integrity, and non-repudiation. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 5. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available h...
Digital Signatures, Message Integrity, and Authentication | Computer Networks Ep 8.3 | Kurose & Ross
Переглядів 6 тис.3 роки тому
Answering the question: "What are digital signatures, and how do they assure message integrity?" This video includes message integrity, digital signatures, and endpoint authentication. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Sections 3 and 4. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu...
Principles of Cryptography | Computer Networks Ep. 8.2 | Kurose & Ross
Переглядів 6 тис.3 роки тому
Answering the question: "How do networks use cryptography to achieve security?" This video includes public key cryptography (PKI) as well as symmetric key cryptography. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 2. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm Ba...
What is Network Security? | Computer Networks Ep. 8.1 | Kurose & Ross
Переглядів 10 тис.3 роки тому
Answering the question: "What do we mean by the term network security?" This video introduces a new series on Network Security, which covers the topics from the 8th chapter of Kurose & Ross. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 1. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/...
Datacenter TCP, Incast Problem & Partition-agg timing | Network Traffic Analysis Ep. 17 | CS4558
Переглядів 2,5 тис.3 роки тому
Discusses the SIGCOMM paper "Data center TCP (DCTCP)", by Mohammad Alizadeh, Albert Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, and Murari Sridharan. 2010. In Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM '10). Association for Computing Machinery, New York, NY, USA, 63-74. doi.org/10.1145/1851275.1851192 tools.ietf.org/html/rfc8257 Ba...
BGP Hijacking - Detection and Prevention | Network Traffic Analysis Ep. 16 | CS4558
Переглядів 5 тис.3 роки тому
Discusses the SIGCOMM IMC paper "Detecting Prefix Hijackings in the Internet with Argus", by Xingang Shi, Yang Xiang, Zhiliang Wang, Xia Yin, and Jianping Wu. 2012. In Proceedings of the 2012 Internet Measurement Conference (IMC '12). Association for Computing Machinery, New York, NY, USA, 15-28. doi.org/10.1145/2398776.2398779 Background music: www.epidemicsound.com/referral/tuicuy/
Nation-State Internet Censorship View from the Network | Network Traffic Analysis Ep. 15 | CS4558
Переглядів 4913 роки тому
Discusses the SIGCOMM IMC paper "Analysis of Country-wide Internet Outages Caused by Censorship", by Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé. 2011. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (IMC '11). Association for Computing Machinery, New York, NY, USA, 1-18. doi.org/10.1...
Alias Resolution: Resolving IP router interface aliases | Network Traffic Analysis Ep. 14 | CS4558
Переглядів 8614 роки тому
Discusses the ACM SIGCOMM CCR article "Internet-Scale IP Alias Resolution Techniques", by Ken Keys. 2010. In ACM SIGCOMM Computer Communication Review (CCR), vol. 40, no. 1, pp. 50 55, Jan 2010. doi.org/10.1145/1672308.1672318 Background music: www.epidemicsound.com/referral/tuicuy/
Yarrp: Traceroute to the whole Internet at once! | Network Traffic Analysis Ep. 13 | CS4558
Переглядів 5364 роки тому
Discusses the network topology discovery tool Yarrp (Yelling at Random Routers Progressively), which was first introduced in the SIGCOMM IMC paper "Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery", by Robert Beverly. 2016. In Proceedings of the Sixteenth ACM SIGCOMM Internet Measurement (IMC 2016) Conference, Santa Monica, CA, November 2016, (pp. 413-420). doi.org/10.114...
What's wrong with Traceroute? How to fix it with Paris Traceroute! | Network Traffic Analysis Ep 12
Переглядів 1,5 тис.4 роки тому
Discusses the SIGCOMM IMC paper "Avoiding traceroute anomalies with Paris traceroute", by Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, and Renata Teixeira. 2006. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06). Association for Computing Machinery, New York, NY, USA, 153-158. doi.org/10.11...
Hacking IPv6: Security and Attacks vs IPv4 | Network Traffic Analysis Ep. 11 | CS4558
Переглядів 1,8 тис.4 роки тому
Hacking IPv6: Security and Attacks vs IPv4 | Network Traffic Analysis Ep. 11 | CS4558
Measuring the Deployment of IPv6: Topology and Performance | Network Traffic Analysis Ep 10 | CS4558
Переглядів 3444 роки тому
Measuring the Deployment of IPv6: Topology and Performance | Network Traffic Analysis Ep 10 | CS4558
Pingin' in the Rain: Weather effects on Broadband Outages | Network Traffic Analysis Ep. 09 | CS4558
Переглядів 1874 роки тому
Pingin' in the Rain: Weather effects on Broadband Outages | Network Traffic Analysis Ep. 09 | CS4558
Cable vs. DSL ISPs: Broadband Internet Performance | Network Traffic Analysis Ep. 08 | CS4558
Переглядів 8474 роки тому
Cable vs. DSL ISPs: Broadband Internet Performance | Network Traffic Analysis Ep. 08 | CS4558
Every microsecond counts: tracking fine-grain latency | Network Traffic Analysis Ep. 07 | CS4558
Переглядів 6494 роки тому
Every microsecond counts: tracking fine-grain latency | Network Traffic Analysis Ep. 07 | CS4558
Monitoring Network Utilization with Zero Measurement Cost | Network Traffic Analysis Ep. 06 | CS4558
Переглядів 4894 роки тому
Monitoring Network Utilization with Zero Measurement Cost | Network Traffic Analysis Ep. 06 | CS4558
A Minimalist Approach to Network Flow Monitoring | Network Traffic Analysis Ep. 05 | CS4558
Переглядів 9374 роки тому
A Minimalist Approach to Network Flow Monitoring | Network Traffic Analysis Ep. 05 | CS4558
How does NetFlow (IPFIX) work? | Network Traffic Analysis Ep. 04 | CS4558
Переглядів 9 тис.4 роки тому
How does NetFlow (IPFIX) work? | Network Traffic Analysis Ep. 04 | CS4558
Redirecting DNS for Ads and Profit | Network Traffic Analysis Ep. 03 | CS4558
Переглядів 5444 роки тому
Redirecting DNS for Ads and Profit | Network Traffic Analysis Ep. 03 | CS4558
Drafting Behind Akamai | Reusing CDN Network Measurements | Network Traffic Analysis Ep. 02 | CS4558
Переглядів 6904 роки тому
Drafting Behind Akamai | Reusing CDN Network Measurements | Network Traffic Analysis Ep. 02 | CS4558
How do CDNs Work? All about Content Distribution Networks | Network Traffic Analysis Ep 01 | CS4558
Переглядів 3,4 тис.4 роки тому
How do CDNs Work? All about Content Distribution Networks | Network Traffic Analysis Ep 01 | CS4558
How Mobile IP Works - Wireless Networks | Computer Networks Ep. 7.5 | Kurose & Ross
Переглядів 11 тис.4 роки тому
How Mobile IP Works - Wireless Networks | Computer Networks Ep. 7.5 | Kurose & Ross
How Cellular 4G/5G Networks Work - Wireless Networks | Computer Networks Ep. 7.4 | Kurose & Ross
Переглядів 11 тис.4 роки тому
How Cellular 4G/5G Networks Work - Wireless Networks | Computer Networks Ep. 7.4 | Kurose & Ross
802.11 How WiFi Works - Wireless Networks | Computer Networks Ep. 7.3 | Kurose & Ross
Переглядів 18 тис.4 роки тому
802.11 How WiFi Works - Wireless Networks | Computer Networks Ep. 7.3 | Kurose & Ross
Wireless & Mobile Link Challenges - Wireless Networks | Computer Networks Ep. 7.1 | Kurose & Ross
Переглядів 17 тис.4 роки тому
Wireless & Mobile Link Challenges - Wireless Networks | Computer Networks Ep. 7.1 | Kurose & Ross
sir i like your beautiful beard, it turns me on while studying!
Very good video! I have USDT in my OKX wallet and I have my recovery phrase. [pride]-[pole]-[obtain]-[together]-[second]-[when]-[future]-[mask]-[review]-[nature]-[potato]-[bulb] How do I transfer them to Binance?
He read the whole PPT without explaining the concepts properly
Teacher I nee book of computer networking and security. How much can I bay?
"please dont use comic sans in a professional document" hehe
Bro, give this guy a break. I've done slide show presentation myself in high school and ppl don't appreciate how difficult it is until try it themselves. For me, unless I read off a script when presenting, I always find myself either trailing off or going off topic, if not just blank out completely. You can tell he cut part by part just to avoid screwing up. Doing it this way is a heck lot more difficult and time consuming than presenting all parts on one go. His style is not bad, it's just that Kurose is simply really really really good at presentation.
I understand it's difficult and takes a lot of effort and time to cut the video so many times to make it concise and error free, but he is clearly a networks professor, and presenting should be one of the primary skills he should be having. In this case, not only is he speaking monotonously, but also making it hard to pay attention cause it's taking so much effort to understand what he's saying. Also (i dont mean to insult anyone), it would've been better if he didnt use a facecam cause his unenthusiasm is infectious :') You aren't a prof or a teacher (im assuming) and so it's alright.
Great Video!
to the point explanation, very helpful <3
I am going through from the beginning to Ch3 to prepare for my midterm exam for tonight! Really helpful!
this is so awful
He was more expressive in the thumbnail...
how is he so still in his video
This is LITERALLY THE EXACT SAME EXAMPLE FROM MY COLLEGE COURSE WTF BRO 😭
Man I want to be able to pay attention so bad but I can’t.
People are not able to understand a lot of these lectures because their basics are not clear, if the basics are clear then these lectures are equally fun and amazing to learn about computer networks! I enjoyed it a lot!
No, we aren't able to understand because this professor is the worst I have ever seen at explaining concepts and making anything interesting. He stands perfectly still like a robot, cuts every 2 seconds making his language seem unnatural and abrupt, and reads off a script with no personality or interest in what is being said.
no example for the math or formula just pure information dump on student. What is this way of teaching
yep
professor 100% Knowledge 0%
I was watching Jim Kurose videos and then started watching this video and I must say this is not teaching, this is more like reading the text.
Great.
These videos really put into perspective how good Jim is at teaching
he makes studying computer networking fun
finished the course stronger than ever in networking
are you an AI
It's Chinese to my ears. Sorry
bro try using caption
love from Germany, you saved my life too dear sir. great work
You are a lifesaver
Epic Networks., can I hire you for personal Network consulting .??? I'm having issues with my traceroute and I'm hoping you can help.
dude are you okay?
אפשר בעברית?
כן אחי עכשיו הוא עושה 🤣🤣🤣
@ 😂😂😂
@@zavio3199 😂😂😂
my prof needs an hour for this and doesnt get to the point, thank you for saving me so much time
Passing my course is in the hands of God, and in the hands of Epic Networks Lab. Jim Kurose and his textbook have forsaken me.
lots of love <3 from bits - yamete
USE YOUR EYES BABES
Please use your face
he looks ai generated
dude i said the same thing
this do be scary
Thank u so much for this amazing video, could please confirm that there is a typo at 10:30 ? MAC address of the source should be H1 ?
This series helped me massively on my course on computer networking, thank you so much!
Very clear explanation. Thank you also for respecting your viewers' time as much as you do by editing the video.
I hope you aren't a professor. Your rate my professor reviews would be terrible
Is this video AI-generated?!
This guy is a walking W. Bro explains it so nice and "seamlessly" I wish Penn State at the Main campus had professors like him... cough cough, COMPEN 362
are you an AI?
What a hero. Final in 2 hours, so this is perfect.
Helped Me For My Uni Exams. Thanks Mate. Appreciated
Amazing!!!
No offense, but you teach like a robot. Emotionless. And that's why I like it, you get straight to the point.
00:01 Giới thiệu nguyên tắc của các giao thức truyền dữ liệu đáng tin cậy như TCP 01:07 Xây dựng giao thức truyền dữ liệu đơn giản và đáng tin cậy 03:18 Hiểu việc truyền dữ liệu đáng tin cậy trong lớp truyền tải Internet 04:16 Giới thiệu cơ chế mới để truyền dữ liệu đáng tin cậy 06:25 Quá trình truyền dữ liệu có xác nhận 07:39 Xử lý lỗi xác nhận và truyền lại 09:50 Truyền dữ liệu đáng tin cậy: Chuyển đổi trạng thái và xác nhận 10:54 Truyền dữ liệu đáng tin cậy - Lớp truyền tải Internet 13:04 Thời gian chờ để truyền dữ liệu đáng tin cậy 14:01 Những thay đổi trong quá trình truyền dữ liệu đáng tin cậy 16:21 Hiểu thông tin cơ bản về giao thức truyền dữ liệu đáng tin cậy Crafted by Merlin AI.
bruh, why Vietnamese here :D
It sure is a bot
Around 1:10 you say that only timeouts were used to indicate congestion in Tahoe, could you provide a source for this? According to Computer Networking-A Top-Down Approach (page 300), Tahoe did use triple ACKs as a congestion indication, but handled it in the same way as congestion indicated by timeouts.
old but gold! Excelent explanation. Cheers!