【斯坦福大学】CS144 计算机网络介绍(完结·中英字幕·机翻)

25.6万
1328
2020-03-16 21:44:27
正在缓冲...
3986
1853
2.0万
1137
www.youtube.com
汇集世界一流学府教育资源
视频选集
(96/143)
自动连播
1-0 The Internet and IP Introduction
02:07
1-1 A day in the life of an application
12:12
1-2 The four layer Internet model
13:23
1-3 The IP service model
17:47
1-4 A Day in the Life of a Packet
12:01
1-5 Packet switching principle
07:54
1-6 Layering principle
09:59
1-7 Encapslation principle
08:12
1-8a byte order
02:14
1-8b byte order
00:12
1-8c byte order
01:47
1-8d byte order
05:35
1-9a IPv4 addresses
03:13
1-9b IPv4 addresses
00:09
1-9c IPv4 addresses
01:05
1-9d IPv4 addresses
03:40
1-10a Longest prefix match (LPM)
02:30
1-10b Longest prefix match (LPM)
00:09
1-10c Longest prefix match (LPM)
01:44
1-11 Address Resolution Protocol (ARP)
10:24
1-12 The Internet and IP Recap
04:17
2-0 Transport (intro)
01:40
2-1 TCP service model
16:28
2-2 UDP service model
06:42
2-3 ICMP service model
14:12
2-4 End to End Principle
10:34
2-5 Error detection
15:13
2-6a Finite state machines 1
07:52
2-6b Finite state machines 2
00:42
2-6c Finite state machines 3
00:32
2-6d Finite state machines 4
03:51
2-7 Stop and wait
08:11
2-8 Sliding window
19:26
2-9 Reliable comm --- Retransmission strategies
09:46
2-10 Reliable comm --- TCP header
07:52
2-11 Reliable comm --- Connection setup and teardown
19:50
2-12 Transport (recap)
04:32
3-0 Packet Switching
02:34
3-1 The History of Networks The History of the Internet
12:41
3-2 Packet Switching - Principles What is packet switching
16:10
3-3Packet Switching - Principles Terminology End to End Delay and Queueing delay
20:41
3-4 Packet Switching - Principles Playback buffers
14:46
3-5 Packet Switching - Principles Simple Deterministic Queue Model (revised)
17:46
3-5a Simple Queueing Model Example
06:17
3-6 Packet Switching - Principles Queueing Model Properties
18:20
3-7 Packet Switching - Practice Switching and Forwarding (1)
17:16
3-8 Packet Switching - Practice Switching and Forwarding (2)
11:54
3-9 Packet Switching - Principles Rate guarantees
19:49
3-10 Packet Switching - Principles Delay Guarantees (revised)
22:53
3-10a Delay Guarantees Example
02:46
3-11 Packet Switching (recap)
09:09
4-0 Congestion Control
03:21
4-1 Congestion Control - Basics
19:17
4-2 Congestion Control - Basics 2
19:23
4-3 Congestion Control - Dynamics of a single AIMD flow
15:42
4-3a Single AIMD flow worked example
03:54
4-4 AIMD Multiple Flows
12:39
4-5 TCP Tahoe
15:31
4-5a Congestion Control - TCP Tahoe
22:20
4-6 TCP RTT Estimation
09:35
4-6a Congestion Control - RTT Estimation and Self-Clocking
12:26
4-7 Congestion Control - TCP Reno and New Reno
15:28
4-7a TCP Reno
10:09
4-8 Congestion Control - AIMD
07:19
4-9 Skills --- Reading and RFC
12:40
4-11 Congestion Control
07:01
5-0 Applications and NATs
03:05
5-1 NATs - Introduction
12:20
5-2 NATs - Types
15:33
5-3 NATs - Implications
14:48
5-4 Nats - Operation
16:12
5-5a HTTP
13:00
5-5b HTTP Quiz 1 Intro
00:13
5-5c HTTP Quiz 1 Explanation
01:09
5-5d HTTP Quiz 2 Intro
00:15
5-5e HTTP Quiz 2 Explanation
03:22
5-6 HTTP11 Keep-alive
05:14
5-7 BitTorrent
07:57
5-8 DNS 1
15:45
5-9 DNS 2
19:18
5-10 DNS 3
11:53
5-11 DHCP
12:25
5-12 Applications and NATs (recap)
08:09
6-0 Routing
04:24
6-1 Routing - Flooding source routing and spanning trees
17:56
6-2 Routing - Bellman Ford
16:49
6-3 Routing - Dijkstra
11:34
6-4 Routing - Internet (RIP OSPF) ASs
21:57
6-5 Routing - BGP
16:39
6-6 Routing - Multicast
18:37
6-7 Routing - Spanning Tree
15:04
6-8 IPv6
12:25
6-9 Routing
07:06
7-0 Lower Layers
04:45
7-1 Physical and Link Principles - Shannon Capacity and Modulation
24:38
7-2 Physical and Link Principles - Bit Errors
13:32
7-3 Physical and Link - Principles clocks
26:24
7-4 Physical and Link Principles - FEC and Reed-Solomon
18:35
7-5 Physical and Link - Principles MAC and CSMACD
23:03
7-6 Physical and Link - Practice Ethernet
19:41
7-7 Wireless - How Its Different
13:18
7-8 Wireless - Principles MAC
04:37
7-9 Wireless - Principles CSMACA
09:09
7-10 Wireless - Principles RTSCTS
07:04
7-11 Wireless - Principles WiFi
10:15
7-11a Fragmentation
11:28
7-11b Forward Error Correction
24:30
7-12 Lower Layers (recap)
06:06
8-0 Security
03:52
8-1 Introduction to Network Security
08:16
8-2 Layer 2 Attacks
06:07
8-2a MAC Overflow Attack
02:29
8-2b DHCP Attack Demo
05:32
8-2c Demo SSH Man in the Middle Attack
04:02
8-2d TCP Hijack
03:44
8-3 Layer 3 Attacks
10:04
8-4 Security V - Denial of Service
13:28
8-5 Security Principles
08:19
8-6a Confidentiality
03:18
8-6b Confidentiality
00:26
8-6c Confidentiality
00:45
8-6d Confidentiality
04:11
8-6e Confidentiality
00:30
8-6f Confidentiality
01:13
8-6g Confidentiality
04:02
8-6h Confidentiality
00:17
8-7 Integrity
10:45
8-8 Public Key Cryptography
07:35
8-9 Certificates
07:35
8-10a TLS
07:05
8-10b TLS
01:04
8-10c TLS
00:28
8-10d TLS
02:48
8-11 Security
04:55
9-1 Jon Peterson Interview -- SIP and Security
18:48
9-2 Kevin Fall
09:36
9-3 Tom Edsall Interview -- DC Switches
22:30
9-4 Nandita Interview
18:54
9-5 David Ward
31:40
9-6 BGP Putting the Inter in Internet Professor Jennifer Rexford Princeton
19:35
9-7 Sanjit Biswas CEO of Meraki (interviewed by Nick M)
18:25
9-8 Dan Boneh Interview -- Security
14:37
9-9 Reed Hundt on security and openness
36:13
客服
顶部
赛事库 课堂 2021拜年纪