|
CSE Home | Up | About Us | Search | Contact Info |
Instructions:
Introduction: The Layering Approach and Statistical Multiplexing |
Textbook: Ch 1. | ||
D. Clark, "The Design Philosophy of the DARPA Internet Protocols," SIGCOMM 1988. | ||
Extra: D. Clark et al. "Tussle in Cyberspace: Defining Tomorrow's Internet." SIGCOMM 2002. | ||
Extra: B. Leiner et. al., A Brief History of the Internet, Internet Society, August 2000. |
V.G. Cerf and R.E. Kahn, "A Protocol for Packet Network Interconnection," IEEE Transactions on Communications, 22(5):637-48, May 1974. | ||
Textbook:
|
||
Extra (classic paper): R. Tomlinson, "Selecting Sequence Numbers," ACM SIGCOMM/SIGOPS Interprocess Communications Workshop, Santa Monica, CA, March 1975. |
J. Byers et al., "A Digital Fountain Approach to Reliable Distribution of Bulk Data,"SIGCOMM 1998. |
J.H. Saltzer, D.P. Reed, and D.D. Clark, "End-to-End Arguments in System Design," ACM Transactions on Computer Systems (4):277-88, Nov 1984. | ||
Textbook:
|
||
Extra: M. Blumenthal and D. Clark, Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world,ACM Transactions on Internet Technology, 1(1):70-109, Aug. 2001. |
V. Jacobson, "Congestion Avoidance and Control," SIGCOMM 1988. | ||
S. Floyd and V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," IEEE/ACM Transactions on Networking, 1(4), August 1993. | ||
Textbook:
|
||
Classic: K.K. Ramakrishnan and Raj Jain, A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer |
D. Katabi, M. Handley, and C. Rohrs, "Congestion Control for High Bandwidth-Delay Product Networks," SIGCOMM 2002. | ||
Classic: Dah-Ming Chiu and Raj Jain, Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks |
A. Demers, S. Keshav, and S. Shenker, "Analysis and Simulation of a Fair Queueing Algorithm," SIGCOMM 1989. | ||
Textbook:
|
||
Extra: John B.Nagle, On Packet Switches with Infinite Storage |
D. Clark, S. Shenker, and L. Zhang, "Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanisms," SIGCOMM 1992. | ||
D. Clark and W. Fang, "Explicit Allocation of Best-Effort Packet Delivery Service," IEEE/ACM Transactions on Networking 6(4), August 1998. | ||
Textbook:
|
A. Khanna and J. Zinky, "A Revised ARPANET Routing Metric," SIGCOMM 1989. | ||
Textbook:
|
||
Recommended: N. Feamster, J. Borkenhagen, and J. Rexford,"Techniques for interdomain traffic engineering," Unpublished, August 2002. |
N. Spring, R. Mahajan, and T. Anderson, "Quantifying the Causes of Path Inflation," SIGCOMM 2003. | ||
Textbook:
|
||
Extra: Allen B. Downey, Using pathchar to estimate Internet link characteristics |
S. Saroiu et al., "An Analysis of Internet Content Delivery Systems," OSDI 2002. | ||
Textbook:
|
||
Extra: Will Leland, Muran Taqqu, Walter Willinger, Daniel Wilson, On the Self-Similar Nature of Ethernet Traffic |
S. Deering et al., "The PIM Architecture for Wide-Area Multicast Routing," IEEE/ACM Transactions on Networking, 4(2):153-62, April 1996. | ||
S. McCanne, V. Jacobson and M. Vetterli, "Receiver-driven Layered Multicast," SIGCOMM 1996. | ||
Textbook:
|
||
Extra: Stephen E. Deering, Multicast Routing in Internetworks and Extended LANs |
I. Stoica et al., "Internet Indirection Infrastructure," SIGCOMM 2002. | ||
P. Patel et al., "Upgrading Transport Protocols using Untrusted Mobile Code," SOSP 2003. | ||
Extra: Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications |
P. Mockapetris and K. Dunlap, "Development of the Domain Name System," SIGCOMM 1988. | ||
Textbook:
|
||
Extra: Willian Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, Jeremy Lilley, The design and implementation of an intentional naming system |
Bharghavan et al., "MACAW:A Media Access Protocol for Wireless LANs," SIGCOMM 1994. | ||
B. Karp and H.T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," MOBICOM 2000. | ||
Textbook:
|
N. Borisov, I. Goldberg, D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11," MOBICOM 2001. | ||
Textbook:
|
||
Classic: Roger Needham, Michael Schroeder, Using Encryption for Authentication in Large Networks of Computers |
Textbook:
|
S. Staniford, V. Paxson and N. Weaver, "How to 0wn the Internet in Your Spare Time," 11th USENIX Security Symposium, August 2002. | ||
R. Mahajan et al., "Controlling High Bandwidth Aggregates in the Network," ACM SIGCOMM Computer Communication Review, 32(3), July 2002. | ||
Textbook:
|
Project Presentations (first 7 teams: TBA) | (starting at 9:30am in the same room) |
Project Presentations (the remaining 7 teams: TBA) | (starting at 9:30am in the same room) |