Instructor: Simon S. Lam
Packet Scheduling: Queueing Analysis
[Lam2012a]
CS 396M Lecture
Slides on Packet Scheduling: Queueing Analysis
Reference
[Kleinrock76]
Leonard Kleinrock,
Queueing Systems, Vol. 2: Computer
Applications,
Wiley Interscience, 1976.
Packet Scheduling: End-to-End Delay Bounds
[XL95]
Geoffrey G. Xie and Simon S. Lam,
Delay Guarantee of Virtual Clock Server,
IEEE/ACM Transactions on Networking,
Vol. 3, No. 6, December 1995.
[LX97]
Simon S. Lam and Geoffrey G. Xie,
Group Priority Scheduling,
IEEE/ACM Transactions on Networking, Vol. 5, No. 2,
April 1997.
[DKS89]
Demers, S.
Keshav, S. Shenker,
Analysis and
simulation of a fair queueing algorithm,
Proceedings of ACM SIGCOMM, 1989.
[Zhang90]
Lixia Zhang,
Virtual clock: a
new traffic control algorithm for packet-switching networks,
Proceedings of ACM SIGCOMM, 1990.
[PG93]
Parekh and R.
Gallager,
A generalized
processor-sharing approach to flow control in integrated services networks: the
single node case,
IEEE/ACM Trans. on Networking, June 1993.
[PG94]
Parekh and R.
Gallager,
A generalized
processor-sharing approach to flow control in integrated services networks: the
multiple node case,
IEEE/ACM Trans Networking, April 1994.
[GLV97]
Pawan Goyal,
Simon S. Lam, and Harrick Vin,
Determining
End-to-End Delay Bounds in Heterogeneous Networks,
ACM/Springer-Verlag Multimedia Systems, Vol. 5, No. 3, May
1997.
[LX97]
Simon S. Lam and
Geoffrey G. Xie,
Burst Scheduling
Networks,
Performance
Evaluation,
Special Issue on ATM Traffic Management, Vol. 31, November 1997.
Protocol Design Tool Box
[Rizzo97]
Luigi
Rizzo,
Effective Erasure Codes for Reliable Computer Communication Protocols,
ACM
SIGCOMM Computer Communication Review,
April 1997. (
pdf )
[BM04]
A.
Broder and M. Mitzenmacher,
Network
applications of Bloom filters: A survey,
Internet
Mathematics,
vol. 1 no. 4, pp. 485-509, 2004. (
pdf )
[DL07]
Dong-Young Lee and Simon S. Lam,
Protocol Design for Dynamic Delaunay Triangulation,
Proceedings of 27th IEEE ICDCS, Toronto, June 2007. ( pdf )
Reference
[DL06]
Dong-Young Lee and Simon S. Lam,
Protocol Design for Dynamic Delaunay
Triangulation,
The University of Texas at Austin, Department of Computer Sciences,
Technical Report
TR-06-48, December 1, 2006.
( pdf
)
Network Congestion Control
[Lam2012b]
[MSM97]
Matthew Mathis, Jeffrey Semke, Jamshid Mahdavi,
The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm,
ACM Computer Communicatons Review, 27(3), pp. 67-82,
1997. (
pdf
)
[PFTK98]
Jitendra Padhye, Victor Firoiu,
Don Towsley, and Jim Kurose,
Modeling TCP Throughput: A Simple Model and its Empirical Validation,
Proceedings ACM SIGCOMM,
1998. (
pdf
)
[YL00]
Y. Richard Yang and Simon Lam,
General AIMD Congestion Control
Proceedings ICNP 2000, Osaka,
Japan, November 2000. (
pdf )
Reference
[KHR02]
Dina Katabi, Mark Handley, and Charlie Rohrs,
Internet congestion control for future high bandwidth-delay product
environments,
Proceedings ACM SIGCOMM,
2002. (
pdf )
Security: Multicasts and Flows
[WGL98]
Chung Kei Wong, Mohamed Gouda, and Simon S. Lam,
Secure Group Communications Using Key Graphs,
Proceedings ACM SIGCOMM '98, Vancouver, B.C., September 1998. ( pdf , journal version )
Reference
[ZLLY03]
X. Brian Zhang, Simon S. Lam, Don-Young Lee, and Y. Richard Yang,
Protocol Design for Scalable and Reliable Group Rekeying,
IEEE/ACM Transactions on Networking, December 2003. ( pdf )
[WL99]
Chung Kei Wong and Simon S. Lam
Digital Signatures for Flows and Multicasts,
IEEE/ACM Transactions on Networking, August 1999. ( pdf )
Security: Ad Hoc and Sensor Networks
[Shamir79]
Adi Shamir, How to Share a Secret, CACM, November 1979. ( pdf )
[KZLLZ01]
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang,
Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,
Proceedings IEEE ICNP 2001. ( pdf )
[Blom85]
R. Blom, An optimal class of symmetric key generation systems,
Advances in Cryptology: Proceedings of
EUROCRYPT 84, Lecture Notes in Computer Science,
Springer-Verlag,
209:335–338, 1985. (
pdf )
[DDHV03]
Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney,
A Pairwise Key Pre-distribution
Scheme for Wireless Sensor Networks,
Proceedings of the 10th ACM Conference on Computer and Communications
Security,
Washington DC, October 2003. ( pdf )
Overlay Network Protocols
[DCKM04]
Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris,
Vivaldi: A
Decentralized Network Coordinate System,
Proceedings SIGCOMM 2004,
Portland, Oregon, Aug
2004. (
pdf
)
Seminal reference
[NZ02]
T. S. Eugene Ng and Hui Zhang,
Predicting Internet Network Distance with Coordinates-Based Approaches,
Proceedings IEEE INFOCOM '02, New York, NY, June
2002. ( pdf
)
[LL04]
Simon S. Lam and Huaiyu Liu
Failure Recovery for Structured P2P Networks: Protocol Design
and Performance Evaluation,
Proceedings ACM SIGMETRICS 2004, New York City, June 2004. ( pdf , journal version )
Reference
[LL03]
Huaiyu Liu and Simon S. Lam
Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network,
Proceedings IEEE ICDCS 2003, Providence, RI, May 2003. (
pdf )
Layer-2 Routing Protocols
[KCR08]
Changhoon Kim, Matthew Caesar, and Jennifer Rexford,
Floodless in SEATTLE: A Scalable Ethernet
Architecture for Large Enterprises,
Proceedings ACM SIGCOMM, 2008. ( pdf )
[LQ11]
Simon S. Lam and Chen Qian
Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch,
Proceedings ACM SIGMETRICS, June 2011. ( pdf , journal version)
[QL11]
Chen Qian and Simon S. Lam,
Greedy Distance Vector Routing,
Proceedings of 31st IEEE ICDCS, Minneapolis, Minnesota, June 2011. ( pdf )
[QL12]
Chen Qian and Simon S. Lam,
ROME: Routing On Metropolitan-scale Ethernet,
Proceedings IEEE ICNP 2012, Austin, TX, October 2012. ( pdf )