Retro school children University of Washington Department of Computer Science & Engineering
 CSE 561 Reading List and Schedule
  CSE Home     Up  About Us    Search    Contact Info 

Instructions:

Week 1: Introduction

Wed 09/29:
Introduction: The Layering Approach and Statistical Multiplexing

Week 2: Architecture & Reliability

Mon 10/04:
Textbook: Ch 1.
submit a review read reviews D. Clark, "The Design Philosophy of the DARPA Internet Protocols," SIGCOMM 1988.
submit a review read reviews Extra: D. Clark et al. "Tussle in Cyberspace: Defining Tomorrow's Internet." SIGCOMM 2002.
submit a review read reviews Extra: B. Leiner et. al., A Brief History of the Internet, Internet Society, August 2000.


Wed 10/06:
submit a review read reviews V.G. Cerf and R.E. Kahn, "A Protocol for Packet Network Interconnection," IEEE Transactions on Communications, 22(5):637-48, May 1974.
Textbook:
  • Ch 2.4 and 2.5, Ch 5.2.
submit a review read reviews Extra (classic paper): R. Tomlinson, "Selecting Sequence Numbers," ACM SIGCOMM/SIGOPS Interprocess Communications Workshop, Santa Monica, CA, March 1975.


Week 3: Network and System Design

Mon 10/11:
submit a review read reviews J. Byers et al., "A Digital Fountain Approach to Reliable Distribution of Bulk Data,"SIGCOMM 1998.


Wed 10/13:
submit a review read reviews J.H. Saltzer, D.P. Reed, and D.D. Clark, "End-to-End Arguments in System Design," ACM Transactions on Computer Systems (4):277-88, Nov 1984.
Textbook:
  • Ch 2.1-2.3 (background), Ch 5.1 (background), Ch 1.3 (repeat)
  • 2nd Edition: In place of Ch 1.3 from the 3rd edition read Ch 1.2 (repeat).
submit a review read reviews Extra: M. Blumenthal and D. Clark, Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world,ACM Transactions on Internet Technology, 1(1):70-109, Aug. 2001.


Week 4: Congestion Control

Mon 10/18:
submit a review read reviews V. Jacobson, "Congestion Avoidance and Control," SIGCOMM 1988.
submit a review read reviews S. Floyd and V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," IEEE/ACM Transactions on Networking, 1(4), August 1993.
Textbook:
  • Ch 6.1 - 6.4.
submit a review read reviews Classic: K.K. Ramakrishnan and Raj Jain, A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer


Wed 10/20:
submit a review read reviews D. Katabi, M. Handley, and C. Rohrs, "Congestion Control for High Bandwidth-Delay Product Networks," SIGCOMM 2002.
submit a review read reviews Classic: Dah-Ming Chiu and Raj Jain, Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks


Week 5: Quality of Service

Mon 10/25:
submit a review read reviews A. Demers, S. Keshav, and S. Shenker, "Analysis and Simulation of a Fair Queueing Algorithm," SIGCOMM 1989.
Textbook:
  • Ch 6.2 (repeat).
submit a review read reviews Extra: John B.Nagle, On Packet Switches with Infinite Storage


Wed 10/27:
submit a review read reviews D. Clark, S. Shenker, and L. Zhang, "Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanisms," SIGCOMM 1992.
submit a review read reviews D. Clark and W. Fang, "Explicit Allocation of Best-Effort Packet Delivery Service," IEEE/ACM Transactions on Networking 6(4), August 1998.
Textbook:
  • Ch 6.5, Ch 9.3


Week 6: Routing and Measurement

Mon 11/01:
submit a review read reviews A. Khanna and J. Zinky, "A Revised ARPANET Routing Metric," SIGCOMM 1989.
Textbook:
  • Ch 4.2, 4.3.
submit a review read reviews Recommended: N. Feamster, J. Borkenhagen, and J. Rexford,"Techniques for interdomain traffic engineering," Unpublished, August 2002.


Wed 11/03:
submit a review read reviews N. Spring, R. Mahajan, and T. Anderson, "Quantifying the Causes of Path Inflation," SIGCOMM 2003.
Textbook:
  • Ch 4.5
  • 2nd Edition: Section on Multiprotocol Label Switching (MPLS) not available in 2nd edition. Please read photocopy of Ch 4.5 from 3rd edition.
submit a review read reviews Extra: Allen B. Downey, Using pathchar to estimate Internet link characteristics


Week 7: Measurement, P2P, and Multicast

Mon 11/08:
submit a review read reviews S. Saroiu et al., "An Analysis of Internet Content Delivery Systems," OSDI 2002.
Textbook:
  • Ch 9.4
  • 2nd Edition: Section on Overlay Networks not available in 2nd edition. Please read photocopy of Ch 9.4 from 3rd edition.
submit a review read reviews Extra: Will Leland, Muran Taqqu, Walter Willinger, Daniel Wilson, On the Self-Similar Nature of Ethernet Traffic


Wed 11/10:
submit a review read reviews S. Deering et al., "The PIM Architecture for Wide-Area Multicast Routing," IEEE/ACM Transactions on Networking, 4(2):153-62, April 1996.
submit a review read reviews S. McCanne, V. Jacobson and M. Vetterli, "Receiver-driven Layered Multicast," SIGCOMM 1996.
Textbook:
  • Ch 4.4
submit a review read reviews Extra: Stephen E. Deering, Multicast Routing in Internetworks and Extended LANs

Week 8: Evolution and Naming

Mon 11/15:
submit a review read reviews I. Stoica et al., "Internet Indirection Infrastructure," SIGCOMM 2002.
submit a review read reviews P. Patel et al., "Upgrading Transport Protocols using Untrusted Mobile Code," SOSP 2003.
submit a review read reviews Extra: Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications


Wed 11/17:
submit a review read reviews P. Mockapetris and K. Dunlap, "Development of the Domain Name System," SIGCOMM 1988.
Textbook:
  • Ch 9.1
submit a review read reviews Extra: Willian Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, Jeremy Lilley, The design and implementation of an intentional naming system

Week 9: Wireless and Ad-hoc Networks; Security

Mon 11/22:
submit a review read reviews Bharghavan et al., "MACAW:A Media Access Protocol for Wireless LANs," SIGCOMM 1994.
submit a review read reviews B. Karp and H.T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," MOBICOM 2000.
Textbook:
  • Ch 2.6 and 2.8


Wed 11/24:
submit a review read reviews N. Borisov, I. Goldberg, D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11," MOBICOM 2001.
Textbook:
  • Ch 8.1 - 8.3
submit a review read reviews Classic: Roger Needham, Michael Schroeder, Using Encryption for Authentication in Large Networks of Computers


Week 10: Security (Crypto, Worms, Viruses, Denial-of-Service)

Mon 11/29:
Textbook:
  • Ch 8.1 - 8.2 (repeat)
Wed 12/01:
submit a review read reviews S. Staniford, V. Paxson and N. Weaver, "How to 0wn the Internet in Your Spare Time," 11th USENIX Security Symposium, August 2002.
submit a review read reviews R. Mahajan et al., "Controlling High Bandwidth Aggregates in the Network," ACM SIGCOMM Computer Communication Review, 32(3), July 2002.
Textbook:
  • Ch 8.4


Week 11: Project Presentations

Mon 12/06:
Project Presentations (first 7 teams: TBA) (starting at 9:30am in the same room)


Wed 12/08:
Project Presentations (the remaining 7 teams: TBA) (starting at 9:30am in the same room)