Explores unstructured and structured search and routing protocols, emphasizing the importance of network structure assumptions and introducing the 'Bubble Storm' algorithm.
Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Explores Ant Colony Optimization (ACO) for routing and optimization, discussing constructive heuristics, local search, pheromone mechanisms, and real-world applications.