CS551 Syllabus--Spring 2004, Friday Section

John Heidemann

Class meets Friday, 9am to 11:50am, beginning January 16 and ending April 30. Spring break is March 19 and the the stop period does not intersect classroom days. The date and time of the final is Friday, May 7, 8-10am.

Changes: This syllabus may be updated over the semester. The most recent version can always be found at http://www.isi.edu/~johnh/TEACHING/CS551/SP2004/SYLLABUS (html) and http://www.isi.edu/~johnh/TEACHING/CS551/SP2004/SYLLABUS/paper.pdf (pdf).

7-Jan-04: Fix URL to syllabus.

Obtaining these papers: All of these papers are available from the CSci551 web syllabus (see URL above) in PDF format. Because they are copyrighted they are available only for classroom use. The papers on the web site are password protected to enforce this; the password will be given to you on the first day of class, or e-mail the TA to ask about it.

You are encouraged to download and print the papers. Downloaded they take up about 95MB storage. You're encouraged to print them out and make notes on them as you go. Because there are many papers and many, many pages, you are strongly encouraged to use a double-sided printer. You will need a 3-inch binder if you keep them that way. (If you have to pay for printing, you may find it cheaper to get together with other students to print one copy and photocopy additional ones.)

Some of the papers were scanned. These tend to have large (2-5MB) PDF files, and may look slightly fuzzy when printed. Some of the paper do not display well in Acrobat on the screen, but they all should look reasonable when printed.

In this syllabus ``new'' is relative to the last section of CSci551 I taught.

Reference and background

Supplementary:

All of the textbooks are optional. Peterson and Davies and Keshav provide an overview of some of the topics we talk about. They provide helpful background and are generally broader and more consistent in their coverage of networking, but less deep on the subjects we cover in class. The Stevens book is a very good for socket programming and may be useful for the projects. (The Stevens TCP/IP Illustrated books are also excellent references relating the RFCs to the BSD code, but are less useful for class.)

[1. Peterson00a]
Larry L. Peterson and Bruce S. Davie.
Computer Networks: A Systems Approach.
Morgan Kaufmann Publishers, 2000.

[2. Stevens97b]
W. Richard Stevens.
Unix Network Programming: Volume 1: Networking APIs, Sockets.
Prentice-Hall, 1997.





Class 1 (Jan. 16): intro and background.

Primary: [Hanson99a, Jamin97b, Levin83a]

[3. Hanson99a]
Michael J. Hanson.
Efficient reading of papers in science.
Brochure of unknown origin, revised 1999 by Dylan J. McNamee, 1989. [class PDF copy]

[4. Jamin97b]
Sugih Jamin.
Paper reading check list.
web page http://irl.eecs.umich.edu/jamin/courses/eecs589/papers/checklist.html, 1997. [class PDF copy]

[5. Levin83a]
Roy Levin and David D. Redell.
An evaluation of the ninth SOSP submissions, or how (and how not) to write a good systems paper.
ACM Operating Systems Review, 17(3):35-40, July 1983. [class PDF copy]

Design principles





Class 2 (Jan. 23): Network design principles. The end-to-end argument. Caching. Addressing.

Primary: [Clark88a, Deering98a, Saltzer81a, Saltzer82a]

[6. Clark88a]
David D. Clark.
The design philosophy of the DARPA internet protocols.
In Proceedings of the 1988 Symposium on Communications Architectures and Protocols, pages 106-114. ACM, August 1988. [class PDF copy]

[7. Deering98a]
Steve Deering.
Watching the waist of the protocol hourglass.
Keynote address at ICNP '98, October 1998. [class PDF copy]

[8. Saltzer81a]
J. H. Saltzer, D. P. Reed, and D. D. Clark.
End-to-end arguments in system design.
Proceedings of the 2nd International Conference on Distributed Computing Systems, pages 509-512, April 1981. [class PDF copy]

[9. Saltzer82a]
Jermome H. Saltzer.
On the naming and binding of network destinations.
In International Symposium on Local Computer Networks, pages 311-317, April 1982. [class PDF copy]

Supplementary:[Lampson83a, Tichy98a]

[10. Lampson83a]
Butler Lampson.
Hints for computer system design.
In Proceedings of the 9th Symposium on Operating Systems Principles, pages 33-48, Bretton Woods, New Hampshire, October 1983. ACM. [class PDF copy]

[11. Tichy98a]
Walter F. Tichy.
Should computer scientists experiment more?
IEEE Computer, 31(5):32-40, May 1998. [class PDF copy]

More about the end-to-end argument: [Blumenthal01a]
[12. Blumenthal01a]
Marjory S. Blumenthal and David D. Clark.
Rethinking the design of the internet: the end-to-end arguments vs. the brave new world.
ACM Transactions on Internet Technology, 1(1):70-109, August 2001. [class PDF copy]

(new SP2004)

How ``tussles'' affect network architecture: [Clark02a]
[13. Clark02a]
David D. Clark, John Wroclawski, Karen Sollins, and Robert Braden.
Tussle in cyberspace: Defining tomorrow's internet.
In Proceedings of the ACM SIGCOMM Conference, pages 347-356, Pittsburgh, PA, USA, August 2002. ACM. [class PDF copy]

(new SP2004)

Unicast Routing





Class 3 (Jan. 30): Unicast routing principles. Link-state and distance verctor routing. The importance of hierarchy.

Primary: [Papadopoulos00a, Tsuchiya88a, Labovitz00a]

[14. Papadopoulos00a]
Christos Papadopoulos and Ramesh Govindan.
Intra-domain routing.
(Slides for USC CSci551), 2000. [class PDF copy]

[15. Tsuchiya88a]
Paul F. Tsuchiya.
The landmark hierarchy: A new hierarchy for routing in very large networks.
In Proceedings of the ACM SIGCOMM Conference, pages 128-134, Stanford, CA, USA, August 1988. ACM. [class PDF copy]

[16. Labovitz00a]
Craig Labovitz, Abha Ahuja, Abhijit Abose, and Farnam Jahanian.
Delayed Internet routing convergence.
In Proceedings of the ACM SIGCOMM Conference, pages 175-187, Stockholm, Sweeden, August 2000. ACM. [class PDF copy]

Supplementary:[Rekhter95a, Floyd94b, Stewart99a]

[17. Rekhter95a]
Y. Rekhter and T. Li.
A border gateway protocol 4 (BGP-4).
RFC 1771, Internet Request For Comments, March 1995. [class PDF copy]

[18. Floyd94b]
S. Floyd and V. Jacobson.
The synchronization of periodic routing messages.
ACM/IEEE Transactions on Networking, 2(2):122-136, April 1994. [class PDF copy]

[19. Stewart99a]
John W. Stewart.
BGP4 Inter-Domain Routing in the Internet.
Addison-Wesley, 1999.

Other references: http://www.academ.com/nanog/feb1997/BGPTutorial/ and http://www.ittc.ku.edu/EECS/EECS_800.ira/bgp_tutorial/





Class 4 (Feb. 6): Routing convergence, osciallation, and stability. Policy routing.

Primary: [Gao00b, Shaikh00a, Gao02a]

[20. Gao00b]
Lixin Gao and Jennifer Rexford.
Stable Internet routing without global coordination.
In Proceedings of the ACM SIGMETRICS, pages 307-317, Santa Clara, CA, USA, June 2000. ACM. [class PDF copy]

[21. Shaikh00a]
Aman Shaikh, Lampros Kalampoukas, Rohit Dube, and Anujan Varma.
Routing stability in congested networks: Experimentation and analysis.
In Proceedings of the ACM SIGCOMM Conference, pages 163-174, Stockholm, Sweeden, August 2000. ACM. [class PDF copy]

[22. Gao02a]
Lixin Gao.
On inferring automonous system relationships in the internet.
ACM/IEEE Transactions on Networking, 9(6):733-745, December 2001. [class PDF copy]

Supplementary:NEW: [Tangmunarunkit01a, Griffin99a]

[23. Tangmunarunkit01a]
Hongsuda Tangmunarunkit, Ramesh Govindan, and Scott Shenker.
Internet path inflation due to policy routing.
In Proceedings of the SPIE ITCom, pages 188-195, Denver, CO, USA, August 2001. SPIE. [class PDF copy]

[24. Griffin99a]
Timothy G. Griffin and Gordon Wilfong.
An analysis of BGP convergence properties.
In Proceedings of the ACM SIGCOMM Conference, pages 277-288, Cambridge, MA, USA, September 1999. ACM. [class PDF copy]

Transport protocols, Congestion Control, and Queue Management





Class 5 (Feb. 13): TCP, congestion control, TCP variants including SACK and ECN.

Primary: [Jacobson88a, Ramakrishnan90a, Padhye98a, Floyd99b]

[25. Jacobson88a]
Van Jacobson.
Congestion avoidance and control.
In Proceedings of the SIGCOMM '88, pages 314-329, Stanford, California, August 1988. ACM. [class PDF copy]

[26. Ramakrishnan90a]
K. K. Ramakrishnan and Raj Jain.
A binary feedback scheme for congestion avoidance in computer networks.
ACM Transactions on Computer Systems, 8(2):158-181, May 1990. [class PDF copy]

[27. Padhye98a]
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose.
Modeling TCP throughput: A simple model and its empirical validation.
In Proceedings of the ACM SIGCOMM Conference, pages 303-314, Vancouver, Canada, September 1998. ACM. [class PDF copy]

[28. Floyd99b]
Sally Floyd and Kevin Fall.
Promoting the use of end-to-end congestion control in the Internet.
ACM/IEEE Transactions on Networking, 7(4):458-473, August 1999. [class PDF copy]

Supplementary:RFCs: [Postel81b, Allman99c, Floyd99a, Ramakrishnan99a]

[29. Postel81b]
Jon Postel.
Transmission control protocol.
RFC 793, Internet Request For Comments, September 1981. [class PDF copy]

[30. Allman99c]
M. Allman, V. Paxson, and W. Stevens.
TCP congestion control.
RFC 2581, Internet Request For Comments, April 1999. [class PDF copy]

[31. Floyd99a]
S. Floyd and T. Henderson.
The NewReno modification to TCP's fast recovery algorithm.
RFC 2582, Internet Request For Comments, April 1999. [class PDF copy]

[32. Ramakrishnan99a]
K. Ramakrishnan and S. Floyd.
A proposal to add explicit congestion notification (ECN) to IP.
RFC 2481, Internet Request For Comments, January 1999. [class PDF copy]

Other TCP variants: [Fall96a, Brakmo94a, Jin04a]

[33. Fall96a]
K. Fall and Sally Floyd.
Simulation-based comparisons of Tahoe, Reno, and SACK TCP.
ACM Computer Communication Review, 26(3):5-21, July 1996. [class PDF copy]

[34. Brakmo94a]
L. S. Brakmo, S. W. O'Malley, and L. L. Peterson.
TCP Vegas: New techniques for congestion detection and avoidance.
In Proceedings of the ACM SIGCOMM Conference, pages 24-35. ACM, September 1994. [class PDF copy]

[35. Jin04a]
Cheng Jin, David X. Wei, and Steven H. Low.
FAST TCP: Motivation, architecture, algorithms, performance.
In Proceedings of the IEEE Infocom, page to appear, Hong Kong, China, March 2004. IEEE. [class PDF copy]





Class 6 (Feb. 20): TCP follow-up. XCP and other transport protocols. Queue management. Fair queueing.

Primary: [Demers89a, Floyd93a]

[36. Demers89a]
Alan Demers, Srinivasan Keshav, and Scott Shenker.
Analysis and simulation of a fair queueing algorithm.
In Proceedings of the ACM SIGCOMM Conference '89, pages 1-12, Austin, Texas, September 1989. ACM. [class PDF copy]

[37. Floyd93a]
Sally Floyd and Van Jacobson.
Random early detection gateways for congestion avoidance.
ACM/IEEE Transactions on Networking, 1(4):397-413, August 1993. [class PDF copy]

NEW: [Katabi02a]

[38. Katabi02a]
Dina Katabi, Mark Handley, and Charlie Rohrs.
Congestion control for high bandwidth-delay product networks.
In Proceedings of the ACM SIGCOMM Conference, pages 89-102, Pittsburgh, PA, USA, August 2002. ACM. [class PDF copy]

Differentiated and Integrated Services





Class 7 (Feb. 27): QoS. Admission control. Multimedia.

Primary: [Shenker95a]

[39. Shenker95a]
Scott Shenker.
Fundamental design issues for the future internet.
IEEE Journal of Selected Areas in Communication, 13(7):1176-1188, September 1995. [class PDF copy]

NEW: [Stoica03a]

[40. Stoica03a]
Ion Stoica, Scott Shenker, and Hui Zhang.
Core-stateless fair queueing: a scalable architecture to approximate fair bandwidth allocations in high-speed networks.
ACM/IEEE Transactions on Networking, 11(1):33-46, February 2003. [class PDF copy]

Supplementary:[Hardman98a, Blake98a, Zhang93a, Nichols99a]

[41. Hardman98a]
Vicky Hardman, Martina Angela Sasse, and Isidor Kouvelas.
Successful multiparty audio communication over the Internet.
Communications of the ACM, 41(5):74-80, May 1998. [class PDF copy]

[42. Blake98a]
S. Blake, D. Black, M. Carlson, E. Davies, and W. Weiss Z. Wang.
An architecture for differentiated service.
RFC 2475, Internet Request For Comments, December 1998. [class PDF copy]

[43. Zhang93a]
L. Zhang, S. Deering, D. Estrin, and D. Zappala.
RSVP: A new resource ReSerVation Protocol.
IEEE Network Magazine, pages 8-18, September 1993. [class PDF copy]

[44. Nichols99a]
K. Nichols, V. Jacobson, and L. Zhang.
A two-bit differentiated services architecture for the Internet.
RFC 2638, Internet Request For Comments, July 1999. [class PDF copy]

Wireless and Mobile Networking





Class 8 (Mar. 5): Basestations. Mobile IP. Ad hoc routing. Sensor networking. Performance optimizations: TCP packet replay and connection splicing.

Primary: [Johnson96c, Intanagonwiwat00a, Bharghavan94a, Balakrishnan95b]

[45. Johnson96c]
David B. Johnson and David A. Maltz.
Dynamic Source Routing in Ad Hoc Wireless Networks, chapter 5, pages 153-181.
Kluwer Academic Publishers, 1996.
in Mobile Computing, edited by Tomasz Imielinski and Hank Korth. [class PDF copy]

[46. Intanagonwiwat00a]
Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin.
Directed diffusion: A scalable and robust communication paradigm for sensor networks.
In Proceedings of the ACM International Conference on Mobile Computing and Networking, pages 56-67, Boston, MA, USA, August 2000. ACM. [class PDF copy]

[47. Bharghavan94a]
Vaduvur Bharghavan, Alan Demers, Scott Shenker, and Lixia Zhang.
MACAW: A media access protocol for wireless LAN's.
In Proceedings of the ACM SIGCOMM Conference, pages 212-225, London, UK, September 1994. ACM. [class PDF copy]

[48. Balakrishnan95b]
H. Balakrishnan, S. Seshan, and R. Katz.
Improving reliable transport and handoff performance over wireless networks.
Wireless Networks Journal, 1(4):469-481, December 1995. [class PDF copy]

Supplementary:[Johnson96b, Waldo99a]

[49. Johnson96b]
David B. Johnson.
Scalable Support for Transparent Mobile Host Internetworking, in Mobile Computing, chapter 3, pages 103-128.
Kluwer Academic Publishers, 1996.
in Mobile Computing, edited by Tomasz Imielinski and Hank Korth. [class PDF copy]

[50. Waldo99a]
Jim Waldo.
The Jini architecture for network-centric computing.
Communications of the ACM, 42(10):76-82, October 1999. [class PDF copy]

Midterm and Spring Break





Class 9 (Mar. 12): midterm exam

Spring break: March 19, no class.

Modeling Network Traffic





Class 10 (Mar. 26): Self-similarity. Route stability. Topology.

Primary: [Leland94a, Paxson99b, Crovella97a]

[51. Leland94a]
W.E. Leland, M.S. Taqqu, W. Willinger, and D.V. Wilson.
On the self-similar nature of Ethernet traffic (extended version).
ACM/IEEE Transactions on Networking, 2(1):1-15, February 1994. [class PDF copy]

[52. Paxson99b]
Vern Paxson.
End-to-end internet packet dynamics.
ACM/IEEE Transactions on Networking, 7(3):277-292, June 1999. [class PDF copy]

[53. Crovella97a]
Mark E. Crovella and Azer Bestavros.
Self-similarity in world wide web traffic: evidence and possible causes.
ACM/IEEE Transactions on Networking, 5(6):835-846, December 1997. [class PDF copy]

Supplementary:[Willinger98a, Faloutsos99a, Balachandran02b, Feldmann99a]

[54. Willinger98a]
W. Willinger and V. Paxson.
Where mathematics meets the Internet.
Notices of the American Mathematical Society, 45(8):961-970, August 1998. [class PDF copy]

[55. Faloutsos99a]
Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos.
On power-law relationships of the internet topology.
In Proceedings of the ACM SIGCOMM Conference, pages 251-262, Cambridge, MA, USA, September 1999. ACM. [class PDF copy]

[56. Balachandran02b]
Anand Balachandran, Goeffrey M. Voelker, Paramvir Bahl, and Venkat Rangan.
Characterizing user behavior and network performance in a public wireless LAN.
In Proceedings of the ACM SIGMETRICS, pages 195-205, Marina del Rey, CA, USA, June 2002. ACM. [class PDF copy]

[57. Feldmann99a]
Anja Feldmann, Anna C. Gilbert, Polly Huang, and Walter Willinger.
Dynamics of IP traffic: A study of the role of variability and the impact of control.
In Proceedings of the ACM SIGCOMM Conference, pages 301-313, Cambridge, MA, USA, August 1999. ACM. [class PDF copy]

Web Protocols and Caching





Class 11 (Apr. 2): HTTP/1.0 and HTTP/1.1. Caching and cache consistency. Service location.

Primary: [Padmanabhan95a, Wolman99a]

[58. Padmanabhan95a]
Venkata N. Padmanabhan and Jeffrey C. Mogul.
Improving HTTP latency.
In Proceedings of the Second International World Wide Web Conference, October 1994. [class PDF copy]

[59. Wolman99a]
Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin, and Henry M. Levy.
On the scale and performance of cooperative web proxy caching.
In Proceedings of the 17th Symposium on Operating Systems Principles, pages 16-31, Kiawah Island, SC, USA, December 1999. ACM. [class PDF copy]

Supplementary:[Fan98a, Freier96a]

[60. Fan98a]
Li Fan, Pei Cao, Jussara Almeida, and Andrei Broder.
Summary cache: A scalable wide-area web cache sharing protocol.
In Proceedings of the ACM SIGCOMM Conference, pages 254-265, Vancouver, Canada, September 1998. ACM. [class PDF copy]

[61. Freier96a]
Alan O. Freier, Philip Karlton, and Paul C. Kocher.
The SSL protocol version 3.0.
Work in progress (Internet draft draft-freier-ssl-version3-02.txt), November 1996. [class PDF copy]

Multicast Routing, Transport, and Applications





Class 12 (Apr. 9): Multicast routing: flood-and-prune, rendezvous, source-specific.

Primary: [Deering88b, Holbrook99a]

[62. Deering88b]
Stephen E. Deering.
Multicast routing in internetworks and extended LANs.
In Proceedings of the ACM SIGCOMM Conference, pages 55-64, Stanford, CA, August 1988. ACM. [class PDF copy]

[63. Holbrook99a]
Hugh W. Holbrook and David R. Cheriton.
IP multicast channels: EXPRESS support for large-scale single-source applications.
In Proceedings of the ACM SIGCOMM Conference, pages 65-78, Cambridge, MA, USA, September 1999. ACM. [class PDF copy]

Reliable multicast (SRM, bulk file transfer). Multicast video/audio and real-time multimedia.

Primary: [Floyd97c, McCanne96a]

[64. Floyd97c]
Sally Floyd, Van Jacobson, Ching-Gung Liu, Steven McCanne, and Lixia Zhang.
A reliable multicast framework for light-weight sessions and application level framing.
ACM/IEEE Transactions on Networking, 5(6):784-803, December 1997. [class PDF copy]

[65. McCanne96a]
S. McCanne, V. Jacobson, and M. Vetterli.
Receiver-driven layered multicast.
In Proceedings of the ACM SIGCOMM Conference '96, pages 117-130, Stanford, CA, August 1996. ACM. [class PDF copy]

Supplementary:[Deering96a]

[66. Deering96a]
Stephen Deering, Deborah L. Estrin, Dino Farinacci, Van Jacobson, Ching-Gung Liu, and Liming Wei.
The PIM architecture for wide-area multicast routing.
ACM/IEEE Transactions on Networking, 4(2):153-162, April 1996. [class PDF copy]

RFCs: [Deering89a, Fenner97a, Estrin98c]

[67. Deering89a]
S. Deering.
Host extensions for IP multicasting.
RFC 1112, Internet Request For Comments, August 1989. [class PDF copy]

[68. Fenner97a]
W. Fenner.
Internet group management protocol, version 2.
RFC 2236, Internet Request For Comments, November 1997. [class PDF copy]

[69. Estrin98c]
D. Estrin, D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, and L. Wei.
Protocol independent multicast-sparse mode (pim-sm): Protocol specification.
RFC 2362, Internet Request For Comments, June 1998. [class PDF copy]

[Bolot98a, Schulzrinne96a]

[70. Bolot98a]
Jean-Chrysostome Bolot, Thierry Turlettil, and Ian Wakeman.
Scalable feedback control for multicast video distribution in the Internet.
In Proceedings of the ACM SIGCOMM Conference, pages 58-68, Vancouver, Canada, September 1998. ACM. [class PDF copy]

[71. Schulzrinne96a]
H. Schulzrinne.
RTP profile for audio and video conferences with minimal control.
RFC 1890, Internet Request For Comments, April 1996. [class PDF copy]

Security





Class 13 (Apr. 16): Denial of service attacks.

Primary: [Kuzmanovic03b, Hussain03b, Yegneswaran03a]

[72. Kuzmanovic03b]
Aleksandar Kuzmanovic and Edward W. Knightly.
Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants).
In Proceedings of the ACM SIGCOMM Conference, pages 75-86, Karlsruhe, Germany, August 2003. ACM. [class PDF copy]

[73. Hussain03b]
Alefiya Hussain, John Heidemann, and Christos Papadopoulos.
A framework for classifying denial of service attacks.
In Proceedings of the ACM SIGCOMM Conference, page to appear, Karlsruhe, Germany, August 2003. ACM. [class PDF copy]

[74. Yegneswaran03a]
Vinod Yegneswaran, Paul Barford, and Johannes Ullrich.
Internet intrusions: Global characteristics and prevalence.
In Proceedings of the ACM SIGMETRICS, pages 138-147, San Diego, California, USA, June 2003. ACM. [class PDF copy]

Supplementary:[Moore03a, Savage00a]

[75. Moore03a]
David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage.
Internet quarantine: Requirements for containing self-propagating code.
In Proceedings of the IEEE Infocom, pages 1901-1910, San Francisco, CA, USA, March 2003. IEEE. [class PDF copy]

[76. Savage00a]
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson.
Practical network support for IP traceback.
In Proceedings of the ACM SIGCOMM Conference, pages 295-306, Stockholm, Sweeden, August 2000. ACM. [class PDF copy]

Unfortunately there is not time to talk about security and network protocols in CSci551. CSci555 provides a good coverage of security from an operating systems perspective. These papers from that course provide some background on security fundamentals: [Voydock83a, Needham78a, Freier96a]

[77. Voydock83a]
V. L. Voydock and S. T. Kent.
Security mechanisms in high-level network protocols.
ACM Computing Surveys, 15(2):135-171, June 1983. [class PDF copy]

[78. Needham78a]
Roger M. Needham and Michael D. Schroeder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, December 1978. [class PDF copy]

[Freier96a]
see above.
(Please note: some of Voydock is too detailed and out of date. I suggest you omit or skim sections 3.4, 4, and 6.2.*.)

Current topics





Class 14 (Apr. 23): Peer-to-peer storage and search. Geographically distributed networks.

Primary: [Clarke00a, Stoica00a, Ratnasamy02b]

[79. Clarke00a]
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong.
Freenet: A distributed anonymous information storage retrieval system.
In Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 2000. [class PDF copy]

[80. Stoica00a]
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan.
Chord: A scalable peer-to-peer lookup service for internet applications.
In Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, September 2000. ACM. [class PDF copy]

[81. Ratnasamy02b]
Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, and Scott Shenker.
GHT: A geographic hash table for data-centric storage.
In Proceedings of the ACM Workshop on Sensor Networks and Applications, pages 78-87, Atlanta, Georgia, USA, September 2002. ACM. [class PDF copy]

NEW: [Gummadi03a]

[82. Gummadi03a]
Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, and John Zahorjan.
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload.
In Proceedings of the 19th Symposium on Operating Systems Principles, pages 314-329, Bolton Landing, NY, USA, October 2003. ACM. [class PDF copy]





Class 15 (Apr. 30): Overlay networks. Traffic engineering.

Primary: [Andersen01a]

[83. Andersen01a]
David G. Andersen, Hari Balakrishnan, M. Frans Kaashoek, and Robert Morris.
Resilient overlay networks.
In Proceedings of the Symposium on Operating Systems Principles, pages 131-145, Chateau Lake Louise, Alberta, Canada, October 2001. ACM. [class PDF copy]

NEW: [Feldmann00a, BenFredj01a]

[84. Feldmann00a]
Anja Feldmann, Albert Greenberg, Carsten Lund, Nick Reingold, and Fred True Jennifer Rexford.
Deriving traffic demands for operational ip networks: Methodology and experience.
In Proceedings of the ACM SIGCOMM Conference, pages 257-270, Stockholm, Sweeden, August 2000. ACM. [class PDF copy]

[85. BenFredj01a]
S. Ben Fredj, T. Bonald, A. Proutiere, G. Régnié, and J. W. Roberts.
Statistical bandwidth sharing: A study of congestion at flow level.
In Proceedings of the ACM SIGCOMM Conference, pages 111-122, San Diego, CA, USA, August 2001. ACM. [class PDF copy]

Supplementary:[Duffield00a]

[86. Duffield00a]
Nick Duffield and Matthias Grossglauser.
Trajectory sampling for direct traffic observation.
In Proceedings of the ACM SIGCOMM Conference, pages 179-191, Stockholm, Sweeden, August 2000. ACM. [class PDF copy]



John Heidemann 2004-01-07