Lecture 1 - P2P_Vs_Client server, Centralized indexing
Lecture 2 - SIP Telephony
Lecture 3 - Hashing, Consistent Hashing
Lecture 4 - Rendezevous Hashing and Chord
Lecture 5 - Chord-Routing Table Management
Lecture 6 - Chord Backward, Forward RTs, Finger Tables
Lecture 7 - Distance Metric Based Routing, Logarithmic Partitioning
Lecture 8 - Kademlia-Routing Example
Lecture 9 - Pastry-Introduction
Lecture 10 - Pastry-Routing Table Management and Routing
Lecture 11 - Pastry-Routing Table Construction and Maintenance and Routing
Lecture 12 - Tapestry-Introduction
Lecture 13 - Tapestry-Octal-Digits
Lecture 14 - Modified Tapestry, CAN
Lecture 15 - PKI, Random Node ID
Lecture 16 - Node ID Assignment Process
Lecture 17 - Core and Leaf Nodes
Lecture 18 - Differential Routing, Identity Certs, Mutual Authentication
Lecture 19 - Layered DHT
Lecture 20 - Resilience Mechanism
Lecture 21 - VoIP Call Setup, Message and Data Encoding
Lecture 22 - VoIP Conference Call Setup
Lecture 23 - NAT_Traversal - 1
Lecture 24 - NAT_Traversal - 2
Lecture 25 - NAT-Stun-Turn
Lecture 26 - NAT Pass Through in B4
Lecture 27 - Some Special Cases in Nat
Lecture 28 - Message Formats - 1
Lecture 29 - Message Formats - 2
Lecture 30 - File System-Basic Organisation
Lecture 31 - Distributed File System - 1
Lecture 32 - Distributed File System - 2
Lecture 33 - Reputation, Expiry Time Rest, UFS
Lecture 34 - Free Riding,Messaging
Lecture 35 - Mailing List
Lecture 36 - Broad Cast Routing
Lecture 37 - Overlaid Multicasting
Lecture 38 - Overlaid Multicast-Reputation, Layered Multicast, Video-on-demand
Lecture 39 - Anonymous Routing
Lecture 40 - ToR-Anonymous Network
Lecture 41 - ToR-Circuit Setup-Copy
Lecture 42 - ToR-Darknet Websites