Denial of service issues (contd.)
  • David Moore, Geoffrey Voelker, and Stefan Savage, "Inferring Internet Denial of Service Activity", Proceedings of the 2001 USENIX Security Symposium, Washington D.C., August 2001. (PDF)
Date Description Notes Evaluation link
01/14/2003 First day of class. General introduction and ground rules.
  • Hints on how to read research papers ( postscript )
  • Hints on how to write a good systems research paper ( postscript)
  • Refresher on network programming (for the home work projects)
HWP: #1 Assigned
PDF PowerPoint
01/16/2003 Chapter 9: Applications PDF PowerPoint
01/21/2003
  • End-to-End Arguments in System Design
    Jerome H. Saltzer, David P. Reed, and David D. Clark, M.I.T. Laboratory for Computer Science. In Second International Conference on Distributed Computing Systems (April, 1981) pages 509-512. Published with minor changes in ACM Transactions in Computer Systems 2, 4, November, 1984, pages 277-288. Reprinted in Craig Partridge, editor Innovations in internetworking. Artech House, Norwood, MA, 1988, pages 195-206. ISBN 0-89006-337-0. Also scheduled to be reprinted in Amit Bhargava, editor. Integrated broadband networks. Artech House, Boston, 1991. ISBN 0-89006-483-0. ( PDF)
Chapter 2: Direct Link Networks (Problem: Physically connecting hosts)
Section: 2.1 - 2.3 (Encoding, Framing)
PDF PowerPoint End-to-End
01/23/2003 Chapter 2: Direct Link Networks
Section: 2.4-2.6 (Error Detection, Reliable Transmission, Ethernet)
PDF PowerPoint
01/28/2003 HWA: #1 Assigned
Chapter 2: Direct Link Networks
Section: 2.7-2.8 (Token Ring, Wireless), irDA, Bluetooth, Myrinet

PDF PowerPoint
01/30/2003

Measured Capacity of an Ethernet: Myths and Reality. D. R. Boggs, J. C. Mogul, and C. A. Kent. In Proceedings of SIGCOMM, August, 1988 (PDF)

Chapter 3: Packet Switching (Problem: Not all networks are directly connected)
Section: 3.1-3.3 (Switching and Forwarding, Bridges and LAN switches, Cell Switching)

SmartBridge: A Scalable Bridge Architecture. Thomas L. Rodeheffer, Chandramohan A. Thekkath, Darrell Anderson, Proceedings of Sigcomm, August 2000. (PDF)

PDF PowerPoint Measured capacity of Ethernet,
Smart Bridge
02/04/2003 Chapter 3: Packet Switching
Section: 3.4 (Switching Hardware)

OS Support for General-Purpose Routers. Larry L. Peterson, Scott C. Karlin, and Kai Li, "" HotOS Workshop, March 1999. (PS)

Additional Info: Click Modular Router Project

Chapter 4: Internetworking (Problem: There is more than one network)
Section: 4.1-4.2 (Internetworking, Routing)

PDF PowerPoint OS Support for general purpose routers
02/06/2003 HWA: #1 Due
Chapter 4: Internetworking
PDF PowerPoint
02/11/2003 Section 4.3-4.4: Global Internet, Multicast

Internet Service Providers and Peering, William B. Norton (draft). (PDF)

PDF PowerPoint ISPs and peering
02/13/2003 HWP: #1 Due
HWP: #2 Assigned
Chapter 5: End-to-end protocols (Problem: Getting processes to communicate)
Section 5.2: TCP
PDF PowerPoint
02/18/2003 Chapter 6: Congestion Control and Resource Location (Problem: Allocating Resources)
Section: 6.1-6.3 (Resource Allocation, Queueing, TCP Congestion Control)

TCP Vegas: End to End Congestion Avoidance on a Global Internet. Brakmo and L. L. Peterson, IEEE Journal of Selected Areas in Communication, Vol. 13, No. 8, pp. 1465-1480, October 1995. (PS)

PDF PowerPoint TCP Vegas
02/20/2003 Out of town to ACM SIGCSE, course review by the TA PDF PowerPoint
02/25/2003 Chapter 6: Congestion Control and Resource Location
Section: 6.4-6.5 (Congestion avoidance, QoS)

Congestion Avoidance and Control V. Jacobson, In Proceedings of SIGCOMM '88 (Stanford, CA, August, 1988) (PS - compress)

PDF PowerPoint Congestion Avoidance
02/27/2003 Mid term exam
03/04/2003 Chapter 8: Network Security (Problem: Securing the data) (Cryptographics algorithms, Security Mechanisms, Firewalls) PDF PowerPoint
03/06/2003 HWP: #2 Due (03/07/2003 - 11:59:59 PM)
Security continued - Wireless networks (intro.)
PDF PowerPoint
03/08/2003 - 03/16/2003: Spring break
03/18/2003

Wireless Ad Hoc Networks - Routing

Wireless ad hoc networks promise flexible deployment without the need for deployed infrastructure (wireless base stations). In this lecture, we will survey some of the popular wireless ad hoc routing protocols for the IEEE 802.11 standard wireless LAN networks.
  • Elizabeth M. Royer and C.-K. Toh. "A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks." IEEE Personal Communications Magazine, April 1999, pp. 46-55. (PS)
Additional Info:
PDF PowerPoint Ad hoc routing - Royer
03/20/2003

Wireless Ad Hoc Networks - Routing (contd.)

PDF PowerPoint
03/25/2003

Wireless Ad Hoc Networks - Routing (contd.)

PDF PowerPoint
03/27/2003

Wireless Ad hoc Networks - Capacity and Performance

Given the various ad hoc routing protocols, recent research efforts have tried to analyze actual performance achieved in typical wireless ad hoc network deployments. Some of these results are discussed in the following papers
  • Jinyang Li, Charles Blake, Douglas S. J. De Couto, Hu Imm Lee, and Robert Morris, "Capacity of Ad Hoc Wireless Networks", Mobicom 2001 (PDF)
  • Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva, ``A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols''. Proc. of MobiCom '98, Oct. 1998 (PS) (PDF)
PDF PowerPoint Ad hoc routing - performance
04/01/2003 HWA: #2 Assigned

Wireless Networks - Security, Energy considerations

Next we look at security and energy consumption issues with wireless networks.
  • Christine E. Price, Krishna M. Sivalingam, Prathima Agarwal and Jyh-Cheng Chen, "A Survey of Energy Efficient Network Protocols for Wireless and Mobile Networks", Accepted for ACM/Baltzer Journal on Wireless Networks, Jan 2001. (PS)
  • Nikita Borisov (University of California, Berkeley, USA); Ian Goldberg (Zero Knowledge Systems, Canada); and David Wagner (University of California, Berkeley, USA). "Intercepting Mobile Communications: The Insecurity of 802.11", Mobicom 2001 (PDF)
PDF PowerPoint Wireless - Security Wireless - Energy Issues
04/03/2003

Security - Viruses/Worms/DOS/DDOS/..

Continuing with our discussion on wireless network security, we look at security and denial of service issues in the larger Internet.
  • Eugene H. Spafford; "The Internet Worm Program: An Analysis"; ACM COMPUTER COMMUNICATION REVIEW; ACM Press, New York,NY; 19(1), pp. 17-57, Jan 1989" ( PDF)
  • Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni, "Analysis of a Denial of Service Attack on TCP". Proceedings of the IEEE, 1997. (PS) (PDF)
PDF PowerPoint Internet Security Denial of Service attack
04/08/2003

Quality of Service - QoS

  • Aurrecoechea, C., Campbell, A.T. and L. Hauw, "A Survey of QoS Architectures", ACM/Springer Verlag Multimedia Systems Journal , Special Issue on QoS Architecture, Vol. 6 No. 3, pg. 138-151, May 1998. (PDF)
PDF PowerPoint QoS
04/10/2003

Structured P2P Systems

Peer-to-peer systems such as Napster, Gnutella have become extremely popular as mechanisms to share songs and other objects as well as a tool to circumvent censoring and content. P2P networks (just as ad hoc wireless networks work) promise to allow peers to identify other peers without the need for centralized servers. Recall that you implemented your HWP1 as a p2p network. Structured p2p assume that the objects are stored in well defined locations (that other peers know where to query). Unstructured p2p systems require you to search the network to identify interesting objects.
  • Content Distribution Networks
  • Oceanstore: An Extremely Wide-Area Storage System David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Haim Weatherspoon, Westley Weimer, Christopher Wells, Ben Zhao, and John Kubiatowicz, Proceedings of the Nine International Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), November 2000. ( PDF)
  • Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. Ion Stoica, Robert Morris, David Karger, Frans Kaashoek, Hari Balakrishnan. Proceedings of ACM Sigcomm, August 2001. (PDF)
PDF PowerPoint Oceanstore Chord
04/15/2003 HWA: #2 Due

Unstructured P2P Systems

  • Replication Strategies in Unstructured Peer-to-Peer Networks. Edith Cohen and Scott Shenker. SIGCOMM02 (PDF) (PPT)
  • A case for associative Peer to Peer Overlays . Edith Cohen, Amos Fiat, Haim Kaplan, HotNETS 02 (PS)
PDF PowerPoint Unstructured P2P
04/17/2003

TCP - Asymetric links (DSL), Satellite, ..

Recall that TCP makes assumptions regarding the forward and reverse paths. For networks such as Cable, DSL, satellite broadband networks, such assumptions do not hold. We investigate how such changes affect TCP performance.
  • Hari Balakrishnan, Venkata Padmanabhan, and Randy H. Katz, "The Effects of Asymmetry on TCP Performance", ACM Mobile Networks and Applications (MONET), 4(3), 1999. (PS)
PDF PowerPoint HTML TCP Asymmetry
04/22/2003 In this lecture, we look at a few papers on what it takes to accurately simulate the Internet. Such simulations are essential to validate new protocols before deploying them in the wide Internet. However, the scale and dynamic nature of the Internet makes this an extremely challenging task.

Network Modelling

Vern Paxson and Sally Floyd, "Why We Don't Know How To Simulate The Internet", Proceedings of the 1997 Winter Simulation Conference, December 1997 (PS)

Realistic BGP Traffic for Test Labs. Olaf Maennel and Anja Feldmann, SIGCOMM 02 (PDF)

Network Topology Generators: Degree-Based vs. Structural. H. Tangmunarunkit, R. Govindan), S. Jamin, S. Shenker and W. Willinger, SIGCOMM02 (PDF)

PDF PowerPoint Network modelling
04/24/2003 We look at some of the network experimentation tools. Given the scale of the real Internet (> 100 million nodes), such tools can help us experiment with new Network protocols in a controlled fashion.

Network Experimentation tools

Lowering the Barrier to Wireless and Mobile Experimentation, Brian White, Jay Lepreau, Shashi Guruprasad. HotNETS (PDF, PPT)

Scalability and Accuracy in a Large-Scale Network Emulator, Amin Vahdat, Ken Yocum, Kevin Walsh, Priya Mahadevan, Dejan Kostic, Jeff Chase, and David Becker. Proceedings of 5th Symposium on Operating Systems Design and Implementation (OSDI), December 2002. (PDF)

www.emulab.net

Interesting reading: NSF Report on Network Research Testbeds (PDF)

PDF PowerPoint Network experimentation tools
04/29/2003 Project Presentations

Future Challenges & Wrapup

Interesting reading: Tussle in Cyberspace: Defining Tomorrow's Internet, David Clark, John Wroclawski, Karen Sollins and Robert Braden, SIGCOMM 02 (PDF)

Surendar Chandra
Last modified: Tue Dec 27 00:07:40 PST 2011