CS 395/495: Advanced
Networking: Schedule
Schedule
Date
|
Lecture Topics
|
Speakers & Notes
|
|
M 3/27
|
Intro
|
Aleksandar
|
|
W 3/29
|
Network architecture I |
Defense:
Offense: |
End-to-end Arguments in
System Design, by J. Saltzer et al. [Reference] Rethinking the
Design of the Internet: The End-to-end Arguments vs. the brave new world,
by D. Clark et al. |
M 4/3
|
Network architecture II
|
Defense: Offense: |
Internet Indirection Infrastructure, by I. Stoica et al. |
W 4/5
|
Congestion Control
I
|
Defense:
Offense: |
Analysis
of the Increase and Decrease Algorithms for Congestion Avoidance, by D.
Chiu et al.
|
M 4/10
|
Congestion Control II |
Defense:
Jessica (Ao-Yan) Offense: |
Congestion Control for High
Bandwidth-Delay Product Networks, by D. Katabi et al. |
W 4/12
|
Congestion Control III |
Defense: Offense: |
PCP:
Efficient Endpoint Congestion Control, by T. Anderson et al. |
M 4/17
|
Routing I
|
Defense: Offense: |
End-to-End Routing Behavior in the Internet,
by V. Paxson
|
W 4/19
|
Routing II
|
Defense: Offense: Jessica (Amit) |
NIRA: A
New Internet Routing Architecture, by X. Yang
|
M 4/24
|
Measurements I (with the IMRE class) |
Defense:
Offense:
|
PlanetSeer: Internet Path
Failure Monitoring and Characterization in Wide-Area Services, by M.
Zhang et al. |
W 4/26
|
Measurements II
|
Defense: Offense: |
King:
Estimating Latency between Arbitrary Internet End Hosts, by K. Gummadi et
al.
|
M 5/1
|
Measurements III |
Defense:
Offense: |
Measurement-Based
Characterization of a Collection of On-line Games, by C. Chambers et al.
|
W 5/3
|
Overlays I |
Defense: Offense: Jessica (Prasad) |
Improving Web Availability
for Clients with MONET, by D. Andersen et al. |
M 5/8
|
Overlays II |
Defense: Offense: |
ISP and Egress Path
Selection for Multihomed Networks, by A. Dhamdhere et al. |
W 5/10
|
Wireless I |
Defense: Offense: |
ExOR:
Opportunistic Multi-Hop Routing for Wireless Networks, by S. Biswas et al.
|
M 5/15
|
Wireless II |
Defense: Offense: |
Sustaining Cooperation
in Multi-Hop Wireless Networks, by R. Mahajan et al. |
W 5/17
|
Wireless III |
Defense:
Offense: |
Self-Management in
Chaotic Wireless Deployments, by A. Akella et al. |
M 5/22
|
DoS I
(with the IMRE class) |
Defense: Offense: From the IMRE class |
A
DoS-limiting Network Architecture, by X. Yang et al.
|
W 5/24
|
DoS II
|
Defense: Jessica (Yao) Offense:
|
Perils
of Transitive Trust in the Domain Name System, by V. Ramasubramanian and
E. Sirer
|
M 5/29
|
No class
|
|
|
W 5/31
|
Project presentations
|
|
|
·
How to read papers: Efficient
reading of papers in Science and Technology by Michael J. Hanson, 1990,
revised 2000 Dylan McNamee.
March,
2006, Aleksandar Kuzmanovic