Explores unstructured and structured search and routing protocols, emphasizing the importance of network structure assumptions and introducing the 'Bubble Storm' algorithm.
Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Covers layout optimization techniques for CMOS circuit design, including common-centroid layout, MOSFET sizing, gain simulation, and performance analysis.