Computer Networking

Computer Networking

This content is rated 4.9333 out of 5
  • From
  • Self-paced
  • Free Access
More info
  • 12 Sequences
  • Introductive Level

Their employees are learning daily with Edflex

  • Safran
  • Air France
  • TotalEnergies
  • Generali
Learn more

Course details


Lesson 1: Introduction

- Computer Networking Overview- What This Class is Not About

Lesson 2: Architecture & Principles

- A Brief History of the Internet- Architectural Design Principles- Packet Switching- File Transfer- End to End Argument Violations

Lesson 3: Switching

- Switching and Bridging- Bootstrapping: Networking Two Hosts- ARP: Address Resolution Protocol- Interconnecting LANs with Hubs- Switches: Traffic Isolation- Spanning Tree- Switches vs. Routers- Buffer Sizing for a TCP Sender

Lesson 4: Routing

- Internet Routing- Intra-AS Topology- Distance-Vector Routing- Link State Routing- Interdomain Routing- IGP vs. iBGP- BGP Route Selection- Multiple Exit Discriminator (MEI)- Interdomain Routing Business Models

Lesson 5: Naming, Addressing & Forwarding

- IP Addressing- Pre-1994: “Classful” Addressing- IP Address Allocation- Classless Interdomain Routing (CIDR)- Multihoming Frustrates Aggregation- Address Lookup Using Tries- Memory Efficiency and Fast Lookup- Alternatives to LPM with Tries- NAT and IPv6- Network Address Translation (NAT)

Lesson 5.1: Router Design Basics

- Router Design- Basic Router Architecture- Decision: Crossbar Switching- Switching Algorithm: Maximal Matching- Head of Line Blocking- Scheduling and Fairness- Max-Min Fairness

Lesson 5.2: Domain Name System (DNS)

- Record Types- Examples (using “dig”)- Lookup IP Address

Lesson 6: Congestion Control & Streaming

- Congestion Control- AIMD (TCP Congestion Control)- Data Centers & TCP “Incast”- Barrier Synchronization & Idle Time- Multimedia & Streaming- Digitizing Audio & Video- Streaming Video- Skype

Lesson 7: Rate Limiting and Traffic Shaping

- Traffic Classification & Shaping- Source Classification - Leaky Bucket Traffic Shaping- (r, t) Traffic Shaping- Shaping Bursty Traffic Patterns- Power Boost- Effects on Latency- Buffer Bloat- Packet Monitoring

Lesson 8: Content Distribution

- The Web and Caching- HTTP Requests- Persistent Connections- Content Distribution Networks (CDNs)- Server Selection- Content Routing- Bit Torrent- Solution to Freeriding: “Choking”- Distributed Hash Tables- Consistent Hashing

Lesson 9: Software Defined Networking

- Network Management Overview- Software Defined Networking (SDN)- Control and Data Planes- Different SDN Controllers- NOX: Overview- Ryu, Floodlight, Nox and Pox- Customizing Control

Lesson 10: Traffic Engineering

- Traffic Engineering Overview- Interdomain Traffic Engineering- Measuring, Modeling and Controlling Traffic- Link Utilization Function- BGP in Interdomain Traffic Engineering- Multipath Routing- Data Center Networking- Valiant Load Balance- Jellyfish Data Center Topology

Lesson 11: Network Security

- Internet is Insecure- Resource Exhaustion - Routing Security- Origin and Path Authentication- DNS Security- DNS Cache Poisoning

Lesson 11.1: Internet Worms

- Viruses and Internet Worms- Internet Worm Lifecyle- First Worm: “Morris” Worm- Worm Outbreaks in Detail - Modeling Fast-Spreading Worms

Lesson 11.2: Spam

- Spam- IP Blacklisting

Lesson 11.3: Denial of Service (DoS) Attacks

- TCP 3-Way Handshake- Inferring Denial of Service Activity using Backscatter- Automated DoS Attack Mitigation- MTPCP




  • Nick Feamster - Nick Feamster is an associate professor in the College of Computing at Georgia Tech. He received his Ph.D. in Computer Science from MIT in 2005. His research focuses on many aspects of computer networking and networked systems, including the design, measurement, and analysis of network routing protocols, network operations and security, and anonymous communication systems. In 2008, he received the Presidential Early Career Award for Scientists and Engineers (PECASE) for his contributions to cybersecurity, notably spam filtering. His honors include the Technology Review 35 "Top Young Innovators Under 35" award, a Sloan Research Fellowship, the NSF CAREER award, the IBM Faculty Fellowship, and award papers at SIGCOMM 2006, NSDI 2005, and Usenix Security 2002 and 2001.


The Georgia Institute of Technology, also known as Georgia Tech or GT, is a co-educational public research university located in Atlanta, Georgia, USA. It is part of the wider University System of Georgia network. Georgia Tech has offices in Savannah (Georgia, USA), Metz (France), Athlone (Ireland), Shanghai (China), and Singapore.

Georgia Tech's reputation is built on its engineering and computer science programmes, which are among the best in the world5,6. The range of courses on offer is complemented by programmes in the sciences, architecture, humanities and management.


Udacity is a for-profit educational organization founded by Sebastian Thrun, David Stavens, and Mike Sokolsky offering massive open online courses (MOOCs). According to Thrun, the origin of the name Udacity comes from the company's desire to be "audacious for you, the student". While it originally focused on offering university-style courses, it now focuses more on vocational courses for professionals.

This content is rated 4.9333 out of 5
(no review)
This content is rated 4.9333 out of 5
(no review)
Complete this resource to write a review