Date | Description | Notes | Evaluation link | |
01/14/2003 |
First day of class. General introduction and
ground rules.
|
PDF PowerPoint | ||
01/16/2003 | Chapter 9: Applications | PDF PowerPoint | ||
01/21/2003 |
Section: 2.1 - 2.3 (Encoding, Framing) |
PDF PowerPoint | End-to-End | |
01/23/2003 |
Chapter 2: Direct Link Networks Section: 2.4-2.6 (Error Detection, Reliable Transmission, Ethernet) |
PDF PowerPoint | ||
01/28/2003 |
HWA: #1 Assigned Chapter 2: Direct Link Networks Section: 2.7-2.8 (Token Ring, Wireless), irDA, Bluetooth, Myrinet
Additional Info
|
PDF PowerPoint | ||
01/30/2003 |
Measured Capacity of an Ethernet: Myths and Reality. D. R. Boggs, J. C. Mogul, and C. A. Kent. In Proceedings of SIGCOMM, August, 1988 (PDF) Chapter 3: Packet Switching (Problem: Not all networks are directly connected)Section: 3.1-3.3 (Switching and Forwarding, Bridges and LAN switches, Cell Switching) SmartBridge: A Scalable Bridge Architecture. Thomas L. Rodeheffer, Chandramohan A. Thekkath, Darrell Anderson, Proceedings of Sigcomm, August 2000. (PDF) |
PDF PowerPoint | Measured capacity of Ethernet, Smart Bridge |
|
02/04/2003 |
Chapter 3: Packet Switching Section: 3.4 (Switching Hardware) OS Support for General-Purpose Routers. Larry L. Peterson, Scott C. Karlin, and Kai Li, "" HotOS Workshop, March 1999. (PS) Additional Info: Click Modular Router Project
Chapter 4: Internetworking (Problem: There is more
than one network) |
PDF PowerPoint | OS Support for general purpose routers | |
02/06/2003 |
HWA: #1 Due Chapter 4: Internetworking |
PDF PowerPoint | ||
02/11/2003 |
Section 4.3-4.4: Global Internet, Multicast
Internet Service Providers and Peering, William B. Norton (draft). (PDF) |
PDF PowerPoint | ISPs and peering | |
02/13/2003 |
HWP: #1 Due HWP: #2 Assigned Chapter 5: End-to-end protocols (Problem: Getting processes to communicate) Section 5.2: TCP |
PDF PowerPoint | ||
02/18/2003 |
Chapter 6: Congestion Control and Resource Location
(Problem: Allocating Resources) Section: 6.1-6.3 (Resource Allocation, Queueing, TCP Congestion Control) TCP Vegas: End to End Congestion Avoidance on a Global Internet. Brakmo and L. L. Peterson, IEEE Journal of Selected Areas in Communication, Vol. 13, No. 8, pp. 1465-1480, October 1995. (PS) |
PDF PowerPoint | TCP Vegas | |
02/20/2003 | Out of town to ACM SIGCSE, course review by the TA | PDF PowerPoint | ||
02/25/2003 |
Chapter 6: Congestion Control and Resource
Location Section: 6.4-6.5 (Congestion avoidance, QoS) Congestion Avoidance and Control V. Jacobson, In Proceedings of SIGCOMM '88 (Stanford, CA, August, 1988) (PS - compress) |
PDF PowerPoint | Congestion Avoidance | |
02/27/2003 | Mid term exam | |||
03/04/2003 | Chapter 8: Network Security (Problem: Securing the data) (Cryptographics algorithms, Security Mechanisms, Firewalls) | PDF PowerPoint | ||
03/06/2003 |
HWP: #2 Due (03/07/2003 - 11:59:59 PM) Security continued - Wireless networks (intro.) |
PDF PowerPoint | ||
03/08/2003 - 03/16/2003: Spring break | ||||
03/18/2003 |
Wireless Ad Hoc Networks - RoutingWireless ad hoc networks promise flexible deployment without the need for deployed infrastructure (wireless base stations). In this lecture, we will survey some of the popular wireless ad hoc routing protocols for the IEEE 802.11 standard wireless LAN networks.
|
PDF PowerPoint | Ad hoc routing - Royer | |
03/20/2003 |
Wireless Ad Hoc Networks - Routing (contd.) |
PDF PowerPoint | ||
03/25/2003 |
Wireless Ad Hoc Networks - Routing (contd.) |
PDF PowerPoint | ||
03/27/2003 |
Wireless Ad hoc Networks - Capacity and PerformanceGiven the various ad hoc routing protocols, recent research efforts have tried to analyze actual performance achieved in typical wireless ad hoc network deployments. Some of these results are discussed in the following papers
|
PDF PowerPoint | Ad hoc routing - performance | |
04/01/2003 |
HWA: #2 Assigned
Wireless Networks - Security, Energy considerationsNext we look at security and energy consumption issues with wireless networks.
|
PDF PowerPoint | Wireless - Security Wireless - Energy Issues | |
04/03/2003 |
Security - Viruses/Worms/DOS/DDOS/..Continuing with our discussion on wireless network security, we look at security and denial of service issues in the larger Internet.
| PDF PowerPoint | Internet Security Denial of Service attack | |
04/08/2003 |
Quality of Service - QoS
|
PDF PowerPoint | QoS | |
04/10/2003 |
Structured P2P SystemsPeer-to-peer systems such as Napster, Gnutella have become extremely popular as mechanisms to share songs and other objects as well as a tool to circumvent censoring and content. P2P networks (just as ad hoc wireless networks work) promise to allow peers to identify other peers without the need for centralized servers. Recall that you implemented your HWP1 as a p2p network. Structured p2p assume that the objects are stored in well defined locations (that other peers know where to query). Unstructured p2p systems require you to search the network to identify interesting objects.
|
PDF PowerPoint | Oceanstore Chord | |
04/15/2003 |
HWA: #2 Due
Unstructured P2P Systems |
PDF PowerPoint | Unstructured P2P | |
04/17/2003 |
TCP - Asymetric links (DSL), Satellite, ..Recall that TCP makes assumptions regarding the forward and reverse paths. For networks such as Cable, DSL, satellite broadband networks, such assumptions do not hold. We investigate how such changes affect TCP performance.
|
PDF PowerPoint HTML | TCP Asymmetry | |
04/22/2003 |
In this lecture, we look at a few papers on what it
takes to accurately simulate the Internet. Such
simulations are essential to validate new protocols
before deploying them in the wide Internet. However,
the scale and dynamic nature of the Internet makes
this an extremely challenging task.
Network ModellingVern Paxson and Sally Floyd, "Why We Don't Know How To Simulate The Internet", Proceedings of the 1997 Winter Simulation Conference, December 1997 (PS) Realistic BGP Traffic for Test Labs. Olaf Maennel and Anja Feldmann, SIGCOMM 02 (PDF) Network Topology Generators: Degree-Based vs. Structural. H. Tangmunarunkit, R. Govindan), S. Jamin, S. Shenker and W. Willinger, SIGCOMM02 (PDF) |
PDF PowerPoint | Network modelling | |
04/24/2003 |
We look at some of the network experimentation
tools. Given the scale of the real Internet (> 100
million nodes), such tools can help us experiment with
new Network protocols in a controlled fashion.
Network Experimentation toolsLowering the Barrier to Wireless and Mobile Experimentation, Brian White, Jay Lepreau, Shashi Guruprasad. HotNETS (PDF, PPT) Scalability and Accuracy in a Large-Scale Network Emulator, Amin Vahdat, Ken Yocum, Kevin Walsh, Priya Mahadevan, Dejan Kostic, Jeff Chase, and David Becker. Proceedings of 5th Symposium on Operating Systems Design and Implementation (OSDI), December 2002. (PDF) Interesting reading: NSF Report on Network Research Testbeds (PDF) |
PDF PowerPoint | Network experimentation tools | |
04/29/2003 | Project Presentations
Future Challenges & WrapupInteresting reading: Tussle in Cyberspace: Defining Tomorrow's Internet, David Clark, John Wroclawski, Karen Sollins and Robert Braden, SIGCOMM 02 (PDF) |