CS 396M (Spring 2014) Reading List and References

Instructor:  Simon S. Lam

Packet Scheduling: Queueing Analysis


CS 396M Lecture Slides on Packet Scheduling: Queueing Analysis




        Leonard Kleinrock,

        Queueing Systems, Vol. 2: Computer Applications, Wiley Interscience, 1976.

Packet Scheduling: End-to-End Delay Bounds


Geoffrey G. Xie and Simon S. Lam,

Delay Guarantee of Virtual Clock Server,

IEEE/ACM Transactions on Networking, Vol. 3, No. 6, December 1995.  ( pdf )


Pawan Goyal, Simon S. Lam, and Harrick Vin,

Determining End-to-End Delay Bounds in Heterogeneous Networks,

ACM/Springer-Verlag Multimedia Systems, Vol. 5, No. 3, May 1997.   ( pdf )


Simon S. Lam and Geoffrey G. Xie,

Group Priority Scheduling,

IEEE/ACM Transactions on Networking, Vol. 5, No. 2, April 1997.  ( pdf )



Demers, S. Keshav, S. Shenker,

Analysis and simulation of a fair queueing algorithm,

Proceedings of ACM SIGCOMM, 1989.  ( pdf )


Lixia Zhang,

Virtual clock: a new traffic control algorithm for packet-switching networks,

Proceedings of ACM SIGCOMM, 1990.  ( pdf )


Parekh and R. Gallager,

A generalized processor-sharing approach to flow control in integrated services networks: the single node case,

IEEE/ACM Trans. on Networking, June 1993.   ( pdf )


Parekh and R. Gallager,

A generalized processor-sharing approach to flow control in integrated services networks: the multiple node case,

IEEE/ACM Trans Networking, April 1994.  ( pdf )


Simon S. Lam and Geoffrey G. Xie,

Burst Scheduling Networks,

Performance Evaluation, Special Issue on ATM Traffic Management, Vol. 31, November 1997.  ( pdf )

Protocol Design Tool Box


Luigi Rizzo,

Effective Erasure Codes for Reliable Computer Communication Protocols,

ACM SIGCOMM Computer Communication Review, April 1997.  ( pdf


A. Broder and M. Mitzenmacher,

Network applications of Bloom filters: A survey,

Internet Mathematics, vol. 1 no. 4, pp. 485-509, 2004. ( pdf )


Dong-Young Lee and Simon S. Lam,

Protocol Design for Dynamic Delaunay Triangulation,

Proceedings of 27th IEEE ICDCS, Toronto, June 2007.  ( pdf )




       Dong-Young Lee and Simon S. Lam,

       Protocol Design for Dynamic Delaunay Triangulation,

       The University of Texas at Austin, Department of Computer Sciences,

       Technical Report TR-06-48, December 1, 2006. ( pdf )


Network Congestion Control


CS 396M Lecture Slides on Sliding Window Protocol and Congestion Control 


Matthew Mathis, Jeffrey Semke, Jamshid Mahdavi,            

The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm,

ACM Computer Communicatons Review, 27(3), pp. 67-82, 1997.  ( pdf )


Jitendra Padhye, Victor Firoiu, Don Towsley, and Jim Kurose, 

Modeling TCP Throughput: A Simple Model and its Empirical Validation,

Proceedings ACM SIGCOMM,  1998.   ( pdf


Y. Richard Yang and Simon Lam,                                
General AIMD Congestion Control
Proceedings ICNP 2000, Osaka, Japan, November 2000. ( pdf )


       Reference on further research


       Dina Katabi, Mark Handley, and Charlie Rohrs,

       Internet congestion control for future high bandwidth-delay product environments,

       Proceedings ACM SIGCOMM, 2002. ( pdf )

Security: Multicasts and Flows


Chung Kei Wong, Mohamed Gouda, and Simon S. Lam,   

Secure Group Communications Using Key Graphs,

Proceedings ACM SIGCOMM '98, Vancouver, B.C., September 1998. ( pdf , journal version )


        Reference on system design


X. Brian Zhang, Simon S. Lam, Don-Young Lee, and Y. Richard Yang,

Protocol Design for Scalable and Reliable Group Rekeying,

IEEE/ACM Transactions on Networking, December 2003. ( pdf )



Chung Kei Wong and Simon S. Lam

Digital Signatures for Flows and Multicasts,

IEEE/ACM Transactions on Networking, August 1999. ( pdf )


Security: Ad Hoc and Sensor Networks



Adi Shamir, How to Share a Secret, CACM, November 1979. ( pdf )


Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang,

Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,

Proceedings IEEE ICNP 2001. ( pdf )


R. Blom, An optimal class of symmetric key generation systems,

Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science,
Springer-Verlag, 209:335338, 1985. ( pdf )


Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney,

A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,
Proceedings of the 10th ACM Conference on Computer and Communications Security,

Washington DC, October 2003. ( pdf )


Overlay Network Protocols



Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris,
Vivaldi: A Decentralized Network Coordinate System,

Proceedings SIGCOMM 2004, Portland, Oregon, Aug 2004.  ( pdf )


       Seminal reference


       T. S. Eugene Ng and Hui Zhang,

       Predicting Internet Network Distance with Coordinates-Based Approaches,

       Proceedings IEEE INFOCOM '02, New York, NY, June 2002. ( pdf )    



Simon S. Lam and Huaiyu Liu                   

Failure Recovery for Structured P2P Networks: Protocol Design

and Performance  Evaluation,                                  

Proceedings ACM SIGMETRICS 2004, New York City, June 2004.  ( pdf , journal version )




       Huaiyu Liu and Simon S. Lam

       Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network,
       Proceedings IEEE ICDCS 2003, Providence, RI, May 2003. ( pdf


Greedy Routing                       



Simon S. Lam and Chen Qian

Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch,

Proceedings ACM SIGMETRICS, June 2011. ( pdf , journal version)



Chen Qian and Simon S. Lam,

Greedy Distance Vector Routing,

Proceedings of 31st IEEE ICDCS, Minneapolis, Minnesota, June 2011. ( pdf )



Scalable and Resilient Layer-2 Networks with Ethernet Compatibility



Changhoon Kim, Matthew Caesar, and Jennifer Rexford, 
Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises,  
Proceedings ACM SIGCOMM, 2008. ( pdf )



Chen Qian and Simon S. Lam,

A Scalable and Resilient Layer-2 Network with Ethernet Compatibility,

UT-Austin, Department of Computer Science, TR-13-19. October 19, 2013.  (TR-13-19.pdf)