Reading list for CS740 Fall 2006
Internet design and architecture
-
[Baran64] Paul Baran, "On Distributed Communications Networks," IEEE
Transactions on Communication Systems, Vol CS-12 (1), pp. 1-9, Mar 1964.
(.pdf)
-
[CK74]
V. Cerf and R. Kahn, A Protocol for Packet Network Intercommunication.
IEEE Transactions on Communications, COM-22, pp. 637-641 ,
1974.
-
[SRC84]
J. Saltzer, D. Reed, and D. Clark,
End-to-end Arguments in System Design.
ACM Transactions on Computer Systems, Vol. 2, No. 4, pp. 195-206, 1984.
-
[Cla88]
D. Clark,
Design Philosophy of the DARPA Internet Protocols,
In Proc. of ACM SIGCOMM '88.
-
[Clark90] D. Clark and D. Tennenhouse, "Architectural Consideration for a New Generation of Protocols", In Proceedings of Sigcomm '90 (Philadelphia, PA, September 1990).
(ACM Portal)
-
[FG01]
P. Francis and R. Gummadi.
"IPNL: A NAT-extended Internet architecture."
In Proceedings of ACM SIGCOMM, San Diego, CA, Aug. 2001.
pdf
-
[CWSB02]
David D. Clark, John Wroclawski, Karen R. Sollins, and Robert Braden
"Tussle in Cyberspace: Defining Tomorrow� Internet."
In Proceedings of ACM SIGCOMM, Pittsburgh, PA, Aug. 2002.
pdf
Network security
-
[PN98]
Thomas H. Ptacek and Timothy N. Newsham
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection,
Secure Networks, Inc, Tech Report, 1998
-
[Pax99]
V. Paxson,
Bro: A System for Detecting Network Intruders in Real-Time;
Computer Networks, 31(23-24), December, 1999.
-
[ZP00]
Y. Zhang and V. Paxson
Detecting Stepping Stones;
In Proc. of 9th USENIX Security Symposium, August, 2000.
-
[HPK01]
Mark Handley, Vern Paxson, and Christian Kreibich
Network Intrusion Detection: Evasion,
Traffic Normalization, and End-to-End Protocol Semantics,
In Proc. of USENIX Security Symposium '01
-
[SB01]
A. Snoeren and H. Balakrishnan,
Hash-Based IP Traceback,
In Proc. of SIGCOMM '01.
-
[SPW02]
S. Staniford, V. Paxson and N. Weaver,
How to 0wn the Internet in Your Spare Time,
In Proc. of USENIX Security Symposium '02
-
[SEVS04]
Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage
Automated Worm Fingerprinting,
In Proc. of USENIX Symposium on Operating System Design and Implementation (OSDI) '04
-
[CGAFBMS06]
Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown, Scott Shenker,
SANE: A Protection Architecture for Enterprise NetworksIn Proc. of USENIX Security Symposium '06
Quality of service
-
[DKS90] A. Demers, S. Keshav, and S. Schenker. Analysis and simulation of a fair-queueing algorithm. Journal of Internetworking Research and Experience, pages 3--26, Oct. 1990.
-
[SV95] M. Shreedhar and G. Varghese, Efficient fair queueing using deficit round robin In Proc. ACM SIGCOMM, Sept. 1995
-
[SSZ98] I. Stoica, S. Shenker, and H. Zhang, Core-Stateless Fair Queueing: Achieving Approximately Fair Allocations in High Speed Networks In Proc. of ACM SIGCOMM '98.
-
[ZDESZ93] L. Zhang, S. Deering, D. Estrin, S. Shenker, and D. Zappala, RSVP: A New Resource Reservation Protocol, IEEE Network, Vol. 7, pp. 8-18, September 1993.
-
[BBCDWW98] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. Weiss, An Architecture for Differentiated Services, RFC 2475, IETF, December 1998.
Endhost congestion control
- [JK88]
V. Jacobson and M. Karels,
Congestion Avoidance and Control, In Proc. ACM SIGCOMM '88.
- [FJ93]
S. Floyd and V. Jacobson,
Random Early Detection Gateways for Congestion Avoidance, IEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413, August 1993.
- [BOP94]
L. Brakmo, S. O'Malley and L. Peterson
TCP-Vegas: new techniques for congestion detection and avoidance, In Proc. of ACM SIGCOMM '94.
- [Flo94]
S. Floyd,
TCP and Explicit Congestion Notification, ACM Computer Communications Review, Vol. 24, No. 5 pp. 10-23, October 1994.
- [KHR02]
Dina Katabi, Mark Handley and Chalrie Rohrs
Congestion Control for High Bandwidth-Delay Product Networks, In the proceedings on ACM Sigcomm 2002.
Mobile and wireless networking
- [BDSZ94]
V. Bharghavan, A. Demers, S. Shenker, and L. Zhang.
MACAW: A Media Access Protocol for Wireless LANs,
In Proc. ACM SIGCOMM , London, U.K., September 1994, pp. 212-225.
- [BPSK97]
H. Balakrishnan, V. Padmanabhan, S. Seshan, R. Katz,
A Comparison of Mechanisms for Improving TCP Performance,
IEEE Transactions on Networking, 5(6):756-769, December 1997.
- [Per98]
Charles Perkins,
Mobile networking through Mobile IP,
IEEE Internet Computing, 1998.
- [BMJ+98]
J. Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu Jorjeta Jetcheva,
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,
In Proceedings of ACM Mobicom 1998.
- [SB00]
A. Snoeren and H. Balakrishnan,
An End-to-End Approach to Host Mobility,
In Proc. of MOBICOM '00.
- [CBC+04]
R. Chakravorty, S. Banerjee, J. Chesterfield, P. Rodriguez, I. Pratt,
Performance Optimizations for Wireless Wide-area Networks: Comparative Study and Experimental Evaluation,
In Proceedings of ACM Mobicom, 2004.
- [AJSS05]
Aditya Akella, Glenn Judd, Srinivasan Seshan and Peter Steenkiste
Self-Management in Chaotic Wireless Deployments
In Proceedings of ACM MobiCom 2005
Peer to peer networks
- [ABKM01],
D. Anderson, H. Balakrishnan, F. Kaashoek, R. Morris,
Resilient Overlay Networks;
In Proc. of SOSP '01.
- [SMK+01],
I. Stoica, R. Morris, D. Karger, F. Kaashoek, H. Balakrishnan,
Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications;
In Proc. of SIGCOMM '01.
- [BLM02],
J. Byers, M. Luby, M. Mitzenmacher,
A Digital Fountain Approach to Asynchronous Reliable Multicast,
Journal on Selected Areas of Communication, Volume 20, Number 8, October 2002.
- [CRB+03],
Y. Chawathe, S. Ratnaswamy, L. Breslau, N. Lanham, S. Shenker,
Making Gnutella-like P2P Systems Scalable,
ACM Sigcomm 2003.
- [APM+04],
Aditya Akella, Jeff Pang, Bruce Maggs, Srinivasan Seshan and Anees Shaikh,
A Comparison of Overlay Routing and Multihoming Route Control,
In the proceedings of ACM SIGCOMM 2004.
Network algorithmics
- [Bloo70],
B.H. Bloom,
Space/time trade-offs in hash coding with allowable errors
- [WVTP97]
M. Waldvogel, G. Varghese, J. Turner, and B. Plattner,
Scalable High Speed IP Routing Lookups.;
In Proc. of ACM SIGCOMM '97.
- [FCAB98]
L. Fan, P. Cao, J. Almeida, A. Broder,
Summary Cache: A Scalable Wide-Area Cache Sharing Protocol,
In Proc. of ACM SIGCOMM '98.
- [LMSS01],
Michael G. Luby, Michael Mitzenmacher, M. Amin Shokrollahi, and Daniel A. Spielman,
Efficient Erasure Correcting Codes,
ACM Symposium on Theory of Computing (STOC), 2001
Network measurement
- [CB97]
M. Crovella and A. Bestavros,
Self-Similarity in the World Wide Web: Evidence and Possible Causes,
IEEE/ACM Trans. on Networking, Vol. 5, No. 6, pp. 835--856, December 1997.
- [Pax99]
V. Paxson,
End-to-End Internet Packet Dynamics,
IEEE/ACM Trans. on Networking, Vol. 7, No. 3, pp. 277-292, June 1999.
- [BC00]
P. Barford and M. Crovella,
Critical Path Analysis of TCP Transactions,
IEEE/ACM Trans. on Networking, Vol. 9, No. 3, pp. 238-248, June 2001.
- [LABJ01]
Craig Labovitz, Abha Ahuja, Abhijit Bose and Farnam Jahanian,
Delayed Internet routing convergence,
In the proceedings of ACM Sigcomm 2001.
- [Gao01]
Lixin Gao,
On Inferring Automonous System Relationships in the Internet,
IEEE/ACM Transactions on Networking, Vol. 9, No. 6, December 2001.
- [SGG02]
Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble,
A Measurement Study of Peer-to-Peer File Sharing Systems,
In Proceedings of Multimedia Computing and Networking 2002 (MMCN'02), January 2002.