CS551 Syllabus--Spring 2004, Friday Section
Class meets Friday, 9am to 11:50am,
beginning January 16
and ending April 30.
Spring break is March 19
and the the stop period does not
intersect classroom days.
The date and time of the final is Friday, May 7, 8-10am.
Changes:
This syllabus may be updated over the semester.
The most recent version can always be found at
http://www.isi.edu/~johnh/TEACHING/CS551/SP2004/SYLLABUS
(html)
and
http://www.isi.edu/~johnh/TEACHING/CS551/SP2004/SYLLABUS/paper.pdf
(pdf).
7-Jan-04: Fix URL to syllabus.
Obtaining these papers: All of these papers are available from the
CSci551 web syllabus (see URL above) in PDF format.
Because they are copyrighted they are available only for classroom use.
The papers on the web site are password protected to enforce this;
the password will be given to you on the first day of class,
or e-mail the TA to ask about it.
You are encouraged to download and print the papers.
Downloaded they take up about 95MB storage.
You're encouraged to print them out and make notes on them as you go.
Because there are many papers and many, many pages,
you are strongly encouraged to use a double-sided printer.
You will need a 3-inch binder if you keep them that way.
(If you have to pay for printing, you may find it cheaper
to get together with other students to print one copy and
photocopy additional ones.)
Some of the papers were scanned.
These tend to have large (2-5MB) PDF files,
and may look slightly fuzzy when printed.
Some of the paper do not display well in Acrobat on the screen,
but they all should look reasonable when printed.
In this syllabus ``new'' is relative to the last section of CSci551 I taught.
Supplementary:
All of the textbooks are optional.
Peterson and Davies and Keshav provide an overview of some
of the topics we talk about.
They provide helpful background and are generally broader
and more consistent in their coverage of networking,
but less deep on the subjects we cover in class.
The Stevens book is a very good for socket programming
and may be useful for the projects.
(The Stevens TCP/IP Illustrated books are also
excellent references relating the RFCs to the BSD code,
but are less useful for class.)
- [1. Peterson00a]
- Larry L. Peterson and Bruce S. Davie.
Computer Networks: A Systems Approach.
Morgan Kaufmann Publishers, 2000.
- [2. Stevens97b]
- W. Richard Stevens.
Unix Network Programming: Volume 1: Networking APIs, Sockets.
Prentice-Hall, 1997.
Class 1 (Jan. 16):
intro and background.
Primary:
[Hanson99a, Jamin97b, Levin83a]
- [3. Hanson99a]
- Michael J. Hanson.
Efficient reading of papers in science.
Brochure of unknown origin, revised 1999 by Dylan J. McNamee, 1989.
[class PDF copy]
- [4. Jamin97b]
- Sugih Jamin.
Paper reading check list.
web page
http://irl.eecs.umich.edu/jamin/courses/eecs589/papers/checklist.html,
1997.
[class PDF copy]
- [5. Levin83a]
- Roy Levin and David D. Redell.
An evaluation of the ninth SOSP submissions, or how (and how not)
to write a good systems paper.
ACM Operating Systems Review, 17(3):35-40, July 1983.
[class PDF copy]
Class 2 (Jan. 23):
Network design principles. The end-to-end argument.
Caching. Addressing.
Primary:
[Clark88a, Deering98a, Saltzer81a, Saltzer82a]
- [6. Clark88a]
- David D. Clark.
The design philosophy of the DARPA internet protocols.
In Proceedings of the 1988 Symposium on Communications
Architectures and Protocols, pages 106-114. ACM, August 1988.
[class PDF copy]
- [7. Deering98a]
- Steve Deering.
Watching the waist of the protocol hourglass.
Keynote address at ICNP '98, October 1998.
[class PDF copy]
- [8. Saltzer81a]
- J. H. Saltzer, D. P. Reed, and D. D. Clark.
End-to-end arguments in system design.
Proceedings of the 2nd International Conference on Distributed
Computing Systems, pages 509-512, April 1981.
[class PDF copy]
- [9. Saltzer82a]
- Jermome H. Saltzer.
On the naming and binding of network destinations.
In International Symposium on Local Computer Networks, pages
311-317, April 1982.
[class PDF copy]
Supplementary:[Lampson83a, Tichy98a]
- [10. Lampson83a]
- Butler Lampson.
Hints for computer system design.
In Proceedings of the 9th Symposium on Operating Systems
Principles, pages 33-48, Bretton Woods, New Hampshire, October 1983. ACM.
[class PDF copy]
- [11. Tichy98a]
- Walter F. Tichy.
Should computer scientists experiment more?
IEEE Computer, 31(5):32-40, May 1998.
[class PDF copy]
More about the end-to-end argument: [Blumenthal01a]
- [12. Blumenthal01a]
- Marjory S. Blumenthal and David D. Clark.
Rethinking the design of the internet: the end-to-end arguments vs.
the brave new world.
ACM Transactions on Internet Technology, 1(1):70-109, August
2001.
[class PDF copy]
(new SP2004)
How ``tussles'' affect network architecture: [Clark02a]
- [13. Clark02a]
- David D. Clark, John Wroclawski, Karen Sollins, and Robert Braden.
Tussle in cyberspace: Defining tomorrow's internet.
In Proceedings of the ACM SIGCOMM Conference, pages 347-356,
Pittsburgh, PA, USA, August 2002. ACM.
[class PDF copy]
(new SP2004)
Class 3 (Jan. 30):
Unicast routing principles.
Link-state and distance verctor routing.
The importance of hierarchy.
Primary:
[Papadopoulos00a, Tsuchiya88a, Labovitz00a]
- [14. Papadopoulos00a]
- Christos Papadopoulos and Ramesh Govindan.
Intra-domain routing.
(Slides for USC CSci551), 2000.
[class PDF copy]
- [15. Tsuchiya88a]
- Paul F. Tsuchiya.
The landmark hierarchy: A new hierarchy for routing in very large
networks.
In Proceedings of the ACM SIGCOMM Conference, pages 128-134,
Stanford, CA, USA, August 1988. ACM.
[class PDF copy]
- [16. Labovitz00a]
- Craig Labovitz, Abha Ahuja, Abhijit Abose, and Farnam Jahanian.
Delayed Internet routing convergence.
In Proceedings of the ACM SIGCOMM Conference, pages 175-187,
Stockholm, Sweeden, August 2000. ACM.
[class PDF copy]
Supplementary:[Rekhter95a, Floyd94b, Stewart99a]
- [17. Rekhter95a]
- Y. Rekhter and T. Li.
A border gateway protocol 4 (BGP-4).
RFC 1771, Internet Request For Comments, March 1995.
[class PDF copy]
- [18. Floyd94b]
- S. Floyd and V. Jacobson.
The synchronization of periodic routing messages.
ACM/IEEE Transactions on Networking, 2(2):122-136, April
1994.
[class PDF copy]
- [19. Stewart99a]
- John W. Stewart.
BGP4 Inter-Domain Routing in the Internet.
Addison-Wesley, 1999.
Other references:
http://www.academ.com/nanog/feb1997/BGPTutorial/
and
http://www.ittc.ku.edu/EECS/EECS_800.ira/bgp_tutorial/
Class 4 (Feb. 6):
Routing convergence, osciallation, and stability.
Policy routing.
Primary:
[Gao00b, Shaikh00a, Gao02a]
- [20. Gao00b]
- Lixin Gao and Jennifer Rexford.
Stable Internet routing without global coordination.
In Proceedings of the ACM SIGMETRICS, pages 307-317, Santa
Clara, CA, USA, June 2000. ACM.
[class PDF copy]
- [21. Shaikh00a]
- Aman Shaikh, Lampros Kalampoukas, Rohit Dube, and Anujan Varma.
Routing stability in congested networks: Experimentation and
analysis.
In Proceedings of the ACM SIGCOMM Conference, pages 163-174,
Stockholm, Sweeden, August 2000. ACM.
[class PDF copy]
- [22. Gao02a]
- Lixin Gao.
On inferring automonous system relationships in the internet.
ACM/IEEE Transactions on Networking, 9(6):733-745, December
2001.
[class PDF copy]
Supplementary:NEW: [Tangmunarunkit01a, Griffin99a]
- [23. Tangmunarunkit01a]
- Hongsuda Tangmunarunkit, Ramesh Govindan, and Scott Shenker.
Internet path inflation due to policy routing.
In Proceedings of the SPIE ITCom, pages 188-195, Denver, CO,
USA, August 2001. SPIE.
[class PDF copy]
- [24. Griffin99a]
- Timothy G. Griffin and Gordon Wilfong.
An analysis of BGP convergence properties.
In Proceedings of the ACM SIGCOMM Conference, pages 277-288,
Cambridge, MA, USA, September 1999. ACM.
[class PDF copy]
Class 5 (Feb. 13):
TCP, congestion control, TCP variants including SACK and ECN.
Primary:
[Jacobson88a, Ramakrishnan90a, Padhye98a, Floyd99b]
- [25. Jacobson88a]
- Van Jacobson.
Congestion avoidance and control.
In Proceedings of the SIGCOMM '88, pages 314-329, Stanford,
California, August 1988. ACM.
[class PDF copy]
- [26. Ramakrishnan90a]
- K. K. Ramakrishnan and Raj Jain.
A binary feedback scheme for congestion avoidance in computer
networks.
ACM Transactions on Computer Systems, 8(2):158-181, May
1990.
[class PDF copy]
- [27. Padhye98a]
- J. Padhye, V. Firoiu, D. Towsley, and J. Kurose.
Modeling TCP throughput: A simple model and its empirical
validation.
In Proceedings of the ACM SIGCOMM Conference, pages 303-314,
Vancouver, Canada, September 1998. ACM.
[class PDF copy]
- [28. Floyd99b]
- Sally Floyd and Kevin Fall.
Promoting the use of end-to-end congestion control in the Internet.
ACM/IEEE Transactions on Networking, 7(4):458-473, August
1999.
[class PDF copy]
Supplementary:RFCs: [Postel81b, Allman99c, Floyd99a, Ramakrishnan99a]
- [29. Postel81b]
- Jon Postel.
Transmission control protocol.
RFC 793, Internet Request For Comments, September 1981.
[class PDF copy]
- [30. Allman99c]
- M. Allman, V. Paxson, and W. Stevens.
TCP congestion control.
RFC 2581, Internet Request For Comments, April 1999.
[class PDF copy]
- [31. Floyd99a]
- S. Floyd and T. Henderson.
The NewReno modification to TCP's fast recovery algorithm.
RFC 2582, Internet Request For Comments, April 1999.
[class PDF copy]
- [32. Ramakrishnan99a]
- K. Ramakrishnan and S. Floyd.
A proposal to add explicit congestion notification (ECN) to IP.
RFC 2481, Internet Request For Comments, January 1999.
[class PDF copy]
Other TCP variants: [Fall96a, Brakmo94a, Jin04a]
- [33. Fall96a]
- K. Fall and Sally Floyd.
Simulation-based comparisons of Tahoe, Reno, and SACK TCP.
ACM Computer Communication Review, 26(3):5-21, July 1996.
[class PDF copy]
- [34. Brakmo94a]
- L. S. Brakmo, S. W. O'Malley, and L. L. Peterson.
TCP Vegas: New techniques for congestion detection and avoidance.
In Proceedings of the ACM SIGCOMM Conference, pages 24-35.
ACM, September 1994.
[class PDF copy]
- [35. Jin04a]
- Cheng Jin, David X. Wei, and Steven H. Low.
FAST TCP: Motivation, architecture, algorithms, performance.
In Proceedings of the IEEE Infocom, page to appear, Hong
Kong, China, March 2004. IEEE.
[class PDF copy]
Class 6 (Feb. 20):
TCP follow-up.
XCP and other transport protocols.
Queue management.
Fair queueing.
Primary:
[Demers89a, Floyd93a]
- [36. Demers89a]
- Alan Demers, Srinivasan Keshav, and Scott Shenker.
Analysis and simulation of a fair queueing algorithm.
In Proceedings of the ACM SIGCOMM Conference '89, pages
1-12, Austin, Texas, September 1989. ACM.
[class PDF copy]
- [37. Floyd93a]
- Sally Floyd and Van Jacobson.
Random early detection gateways for congestion avoidance.
ACM/IEEE Transactions on Networking, 1(4):397-413, August
1993.
[class PDF copy]
NEW:
[Katabi02a]
- [38. Katabi02a]
- Dina Katabi, Mark Handley, and Charlie Rohrs.
Congestion control for high bandwidth-delay product networks.
In Proceedings of the ACM SIGCOMM Conference, pages 89-102,
Pittsburgh, PA, USA, August 2002. ACM.
[class PDF copy]
Class 7 (Feb. 27):
QoS. Admission control.
Multimedia.
Primary:
[Shenker95a]
- [39. Shenker95a]
- Scott Shenker.
Fundamental design issues for the future internet.
IEEE Journal of Selected Areas in Communication,
13(7):1176-1188, September 1995.
[class PDF copy]
NEW:
[Stoica03a]
- [40. Stoica03a]
- Ion Stoica, Scott Shenker, and Hui Zhang.
Core-stateless fair queueing: a scalable architecture to approximate
fair bandwidth allocations in high-speed networks.
ACM/IEEE Transactions on Networking, 11(1):33-46, February
2003.
[class PDF copy]
Supplementary:[Hardman98a, Blake98a, Zhang93a, Nichols99a]
- [41. Hardman98a]
- Vicky Hardman, Martina Angela Sasse, and Isidor Kouvelas.
Successful multiparty audio communication over the Internet.
Communications of the ACM, 41(5):74-80, May 1998.
[class PDF copy]
- [42. Blake98a]
- S. Blake, D. Black, M. Carlson, E. Davies, and W. Weiss Z. Wang.
An architecture for differentiated service.
RFC 2475, Internet Request For Comments, December 1998.
[class PDF copy]
- [43. Zhang93a]
- L. Zhang, S. Deering, D. Estrin, and D. Zappala.
RSVP: A new resource ReSerVation Protocol.
IEEE Network Magazine, pages 8-18, September 1993.
[class PDF copy]
- [44. Nichols99a]
- K. Nichols, V. Jacobson, and L. Zhang.
A two-bit differentiated services architecture for the Internet.
RFC 2638, Internet Request For Comments, July 1999.
[class PDF copy]
Class 8 (Mar. 5):
Basestations. Mobile IP. Ad hoc routing. Sensor networking.
Performance optimizations: TCP packet replay and connection splicing.
Primary:
[Johnson96c, Intanagonwiwat00a, Bharghavan94a, Balakrishnan95b]
- [45. Johnson96c]
- David B. Johnson and David A. Maltz.
Dynamic Source Routing in Ad Hoc Wireless Networks, chapter 5,
pages 153-181.
Kluwer Academic Publishers, 1996.
in Mobile Computing, edited by Tomasz Imielinski and Hank Korth.
[class PDF copy]
- [46. Intanagonwiwat00a]
- Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin.
Directed diffusion: A scalable and robust communication paradigm for
sensor networks.
In Proceedings of the ACM International Conference on Mobile
Computing and Networking, pages 56-67, Boston, MA, USA, August 2000. ACM.
[class PDF copy]
- [47. Bharghavan94a]
- Vaduvur Bharghavan, Alan Demers, Scott Shenker, and Lixia Zhang.
MACAW: A media access protocol for wireless LAN's.
In Proceedings of the ACM SIGCOMM Conference, pages 212-225,
London, UK, September 1994. ACM.
[class PDF copy]
- [48. Balakrishnan95b]
- H. Balakrishnan, S. Seshan, and R. Katz.
Improving reliable transport and handoff performance over wireless
networks.
Wireless Networks Journal, 1(4):469-481, December 1995.
[class PDF copy]
Supplementary:[Johnson96b, Waldo99a]
- [49. Johnson96b]
- David B. Johnson.
Scalable Support for Transparent Mobile Host Internetworking, in
Mobile Computing, chapter 3, pages 103-128.
Kluwer Academic Publishers, 1996.
in Mobile Computing, edited by Tomasz Imielinski and Hank Korth.
[class PDF copy]
- [50. Waldo99a]
- Jim Waldo.
The Jini architecture for network-centric computing.
Communications of the ACM, 42(10):76-82, October 1999.
[class PDF copy]
Class 9 (Mar. 12):
midterm exam
Spring break: March 19, no class.
Class 10 (Mar. 26):
Self-similarity.
Route stability.
Topology.
Primary:
[Leland94a, Paxson99b, Crovella97a]
- [51. Leland94a]
- W.E. Leland, M.S. Taqqu, W. Willinger, and D.V. Wilson.
On the self-similar nature of Ethernet traffic (extended version).
ACM/IEEE Transactions on Networking, 2(1):1-15, February
1994.
[class PDF copy]
- [52. Paxson99b]
- Vern Paxson.
End-to-end internet packet dynamics.
ACM/IEEE Transactions on Networking, 7(3):277-292, June
1999.
[class PDF copy]
- [53. Crovella97a]
- Mark E. Crovella and Azer Bestavros.
Self-similarity in world wide web traffic: evidence and possible
causes.
ACM/IEEE Transactions on Networking, 5(6):835-846, December
1997.
[class PDF copy]
Supplementary:[Willinger98a, Faloutsos99a, Balachandran02b, Feldmann99a]
- [54. Willinger98a]
- W. Willinger and V. Paxson.
Where mathematics meets the Internet.
Notices of the American Mathematical Society, 45(8):961-970,
August 1998.
[class PDF copy]
- [55. Faloutsos99a]
- Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos.
On power-law relationships of the internet topology.
In Proceedings of the ACM SIGCOMM Conference, pages 251-262,
Cambridge, MA, USA, September 1999. ACM.
[class PDF copy]
- [56. Balachandran02b]
- Anand Balachandran, Goeffrey M. Voelker, Paramvir Bahl, and Venkat Rangan.
Characterizing user behavior and network performance in a public
wireless LAN.
In Proceedings of the ACM SIGMETRICS, pages 195-205,
Marina del Rey, CA, USA, June 2002. ACM.
[class PDF copy]
- [57. Feldmann99a]
- Anja Feldmann, Anna C. Gilbert, Polly Huang, and Walter Willinger.
Dynamics of IP traffic: A study of the role of variability and the
impact of control.
In Proceedings of the ACM SIGCOMM Conference, pages 301-313,
Cambridge, MA, USA, August 1999. ACM.
[class PDF copy]
Class 11 (Apr. 2):
HTTP/1.0 and HTTP/1.1.
Caching and cache consistency.
Service location.
Primary:
[Padmanabhan95a, Wolman99a]
- [58. Padmanabhan95a]
- Venkata N. Padmanabhan and Jeffrey C. Mogul.
Improving HTTP latency.
In Proceedings of the Second International World Wide Web
Conference, October 1994.
[class PDF copy]
- [59. Wolman99a]
- Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin, and
Henry M. Levy.
On the scale and performance of cooperative web proxy caching.
In Proceedings of the 17th Symposium on Operating Systems
Principles, pages 16-31, Kiawah Island, SC, USA, December 1999. ACM.
[class PDF copy]
Supplementary:[Fan98a, Freier96a]
- [60. Fan98a]
- Li Fan, Pei Cao, Jussara Almeida, and Andrei Broder.
Summary cache: A scalable wide-area web cache sharing protocol.
In Proceedings of the ACM SIGCOMM Conference, pages 254-265,
Vancouver, Canada, September 1998. ACM.
[class PDF copy]
- [61. Freier96a]
- Alan O. Freier, Philip Karlton, and Paul C. Kocher.
The SSL protocol version 3.0.
Work in progress (Internet draft draft-freier-ssl-version3-02.txt),
November 1996.
[class PDF copy]
Class 12 (Apr. 9):
Multicast routing: flood-and-prune, rendezvous, source-specific.
Primary:
[Deering88b, Holbrook99a]
- [62. Deering88b]
- Stephen E. Deering.
Multicast routing in internetworks and extended LANs.
In Proceedings of the ACM SIGCOMM Conference, pages 55-64,
Stanford, CA, August 1988. ACM.
[class PDF copy]
- [63. Holbrook99a]
- Hugh W. Holbrook and David R. Cheriton.
IP multicast channels: EXPRESS support for large-scale
single-source applications.
In Proceedings of the ACM SIGCOMM Conference, pages 65-78,
Cambridge, MA, USA, September 1999. ACM.
[class PDF copy]
Reliable multicast (SRM, bulk file transfer).
Multicast video/audio and real-time multimedia.
Primary:
[Floyd97c, McCanne96a]
- [64. Floyd97c]
- Sally Floyd, Van Jacobson, Ching-Gung Liu, Steven McCanne, and Lixia Zhang.
A reliable multicast framework for light-weight sessions and
application level framing.
ACM/IEEE Transactions on Networking, 5(6):784-803, December
1997.
[class PDF copy]
- [65. McCanne96a]
- S. McCanne, V. Jacobson, and M. Vetterli.
Receiver-driven layered multicast.
In Proceedings of the ACM SIGCOMM Conference '96, pages
117-130, Stanford, CA, August 1996. ACM.
[class PDF copy]
Supplementary:[Deering96a]
- [66. Deering96a]
- Stephen Deering, Deborah L. Estrin, Dino Farinacci, Van Jacobson, Ching-Gung
Liu, and Liming Wei.
The PIM architecture for wide-area multicast routing.
ACM/IEEE Transactions on Networking, 4(2):153-162, April
1996.
[class PDF copy]
RFCs: [Deering89a, Fenner97a, Estrin98c]
- [67. Deering89a]
- S. Deering.
Host extensions for IP multicasting.
RFC 1112, Internet Request For Comments, August 1989.
[class PDF copy]
- [68. Fenner97a]
- W. Fenner.
Internet group management protocol, version 2.
RFC 2236, Internet Request For Comments, November 1997.
[class PDF copy]
- [69. Estrin98c]
- D. Estrin, D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley,
V. Jacobson, C. Liu, P. Sharma, and L. Wei.
Protocol independent multicast-sparse mode (pim-sm): Protocol
specification.
RFC 2362, Internet Request For Comments, June 1998.
[class PDF copy]
[Bolot98a, Schulzrinne96a]
- [70. Bolot98a]
- Jean-Chrysostome Bolot, Thierry Turlettil, and Ian Wakeman.
Scalable feedback control for multicast video distribution in the
Internet.
In Proceedings of the ACM SIGCOMM Conference, pages 58-68,
Vancouver, Canada, September 1998. ACM.
[class PDF copy]
- [71. Schulzrinne96a]
- H. Schulzrinne.
RTP profile for audio and video conferences with minimal control.
RFC 1890, Internet Request For Comments, April 1996.
[class PDF copy]
Class 13 (Apr. 16):
Denial of service attacks.
Primary:
[Kuzmanovic03b, Hussain03b, Yegneswaran03a]
- [72. Kuzmanovic03b]
- Aleksandar Kuzmanovic and Edward W. Knightly.
Low-rate tcp-targeted denial of service attacks (the shrew vs. the
mice and elephants).
In Proceedings of the ACM SIGCOMM Conference, pages 75-86,
Karlsruhe, Germany, August 2003. ACM.
[class PDF copy]
- [73. Hussain03b]
- Alefiya Hussain, John Heidemann, and Christos Papadopoulos.
A framework for classifying denial of service attacks.
In Proceedings of the ACM SIGCOMM Conference, page to appear,
Karlsruhe, Germany, August 2003. ACM.
[class PDF copy]
- [74. Yegneswaran03a]
- Vinod Yegneswaran, Paul Barford, and Johannes Ullrich.
Internet intrusions: Global characteristics and prevalence.
In Proceedings of the ACM SIGMETRICS, pages 138-147, San
Diego, California, USA, June 2003. ACM.
[class PDF copy]
Supplementary:[Moore03a, Savage00a]
- [75. Moore03a]
- David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage.
Internet quarantine: Requirements for containing self-propagating
code.
In Proceedings of the IEEE Infocom, pages 1901-1910, San
Francisco, CA, USA, March 2003. IEEE.
[class PDF copy]
- [76. Savage00a]
- Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson.
Practical network support for IP traceback.
In Proceedings of the ACM SIGCOMM Conference, pages 295-306,
Stockholm, Sweeden, August 2000. ACM.
[class PDF copy]
Unfortunately there is not time to talk about security and network protocols
in CSci551. CSci555 provides a good coverage of security from
an operating systems perspective.
These papers from that course provide some background on security fundamentals:
[Voydock83a, Needham78a, Freier96a]
- [77. Voydock83a]
- V. L. Voydock and S. T. Kent.
Security mechanisms in high-level network protocols.
ACM Computing Surveys, 15(2):135-171, June 1983.
[class PDF copy]
- [78. Needham78a]
- Roger M. Needham and Michael D. Schroeder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, December 1978.
[class PDF copy]
- [Freier96a]
- see above.
(Please note: some of Voydock is too detailed and out of date.
I suggest you omit or skim sections 3.4, 4, and 6.2.*.)
Class 14 (Apr. 23):
Peer-to-peer storage and search.
Geographically distributed networks.
Primary:
[Clarke00a, Stoica00a, Ratnasamy02b]
- [79. Clarke00a]
- Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong.
Freenet: A distributed anonymous information storage retrieval
system.
In Proceedings of the ICSI Workshop on Design Issues in
Anonymity and Unobservability, Berkeley, CA, USA, July 2000.
[class PDF copy]
- [80. Stoica00a]
- Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari
Balakrishnan.
Chord: A scalable peer-to-peer lookup service for internet
applications.
In Proceedings of the ACM SIGCOMM Conference, Stockholm,
Sweden, September 2000. ACM.
[class PDF copy]
- [81. Ratnasamy02b]
- Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan,
and Scott Shenker.
GHT: A geographic hash table for data-centric storage.
In Proceedings of the ACM Workshop on Sensor Networks and
Applications, pages 78-87, Atlanta, Georgia, USA, September 2002. ACM.
[class PDF copy]
NEW:
[Gummadi03a]
- [82. Gummadi03a]
- Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M.
Levy, and John Zahorjan.
Measurement, modeling, and analysis of a peer-to-peer file-sharing
workload.
In Proceedings of the 19th Symposium on Operating Systems
Principles, pages 314-329, Bolton Landing, NY, USA, October 2003. ACM.
[class PDF copy]
Class 15 (Apr. 30):
Overlay networks.
Traffic engineering.
Primary:
[Andersen01a]
- [83. Andersen01a]
- David G. Andersen, Hari Balakrishnan, M. Frans Kaashoek, and Robert Morris.
Resilient overlay networks.
In Proceedings of the Symposium on Operating Systems
Principles, pages 131-145, Chateau Lake Louise, Alberta, Canada, October
2001. ACM.
[class PDF copy]
NEW:
[Feldmann00a, BenFredj01a]
- [84. Feldmann00a]
- Anja Feldmann, Albert Greenberg, Carsten Lund, Nick Reingold, and Fred True
Jennifer Rexford.
Deriving traffic demands for operational ip networks: Methodology and
experience.
In Proceedings of the ACM SIGCOMM Conference, pages 257-270,
Stockholm, Sweeden, August 2000. ACM.
[class PDF copy]
- [85. BenFredj01a]
- S. Ben Fredj, T. Bonald, A. Proutiere, G. Régnié, and J. W. Roberts.
Statistical bandwidth sharing: A study of congestion at flow level.
In Proceedings of the ACM SIGCOMM Conference, pages 111-122,
San Diego, CA, USA, August 2001. ACM.
[class PDF copy]
Supplementary:[Duffield00a]
- [86. Duffield00a]
- Nick Duffield and Matthias Grossglauser.
Trajectory sampling for direct traffic observation.
In Proceedings of the ACM SIGCOMM Conference, pages 179-191,
Stockholm, Sweeden, August 2000. ACM.
[class PDF copy]
John Heidemann
2004-01-07