Computer Networking: A Top-Down Approach - Jim Kurose
- 1.1 Introduction (reposted) - What is the Internet
- 1.2 The network edge
- 1.3 The network core
- 1.4 Performance
- 1.5 Layering, encapsulation
- 1.6 Networks Under Attack
- 1.7 History of Computer Networking, and Chapter 1 (Introduction to Networking) wrap-up.
- 2.1 Principles of the Application Layer
- 2.2 The Web and HTTP (part 1)
- 2.2 The Web and HTTP part 2
- 2.3 Email
- 2.4 The Domain Name System (DNS)
- 2.6 Video Streaming and Content Distribution Networks
- 2.7 Socket programming
- 3.1 Introduction and Transport-layer Services
- 3.2 Transport layer multiplexing and demultiplexing
- 3.3 Connectionless Transport: UDP
- 3.4-1 Principles of Reliable Data Transfer (Part 1)
- 3.4-2 Principles of Reliable Data Transfer (Part 2)
- 3.5-1 TCP Reliability, Flow Control, and Connection Management
- 3.5-2 TCP Reliability, Flow Control, and Congestion Control (part 2/2)
- 3.6 Principles of Congestion Control
- 3 7 TCP Congestion Control
- 3.8 Evolution of Transport-layer Functionality
- 3.9 Summary
- 4.1 Introduction to the Network Layer
- 4.2 What's inside a router? Part 1.
- 4.2 What's inside a router? Part 2.
- 4.3 The Internet Protocol, part 1
- 4.3 The Internet Protocol, part 2
- 4.4 Generalized Forwarding
- 4 5 Middleboxes, Internet architecture
- 5.1 Introduction to the Network-layer Control Plane
- 5.2 Routing algorithms: link state routing
- 5.2-2 Bellman Ford Distance Vector Routing (updated)
- 5.3 Open Shortest Path First (OSPF)
- 5.4 BGP: the Border Gateway Protocol
- 5.6 ICMP: Internet Control Message Protocol
- 6.1 Introduction to the Link Layer
- 6.2 Error detection and correction
- 6.3 Multiple Access links and protocols