CS 396M (Spring 2014) Reading List and References

Instructor:  Simon S. Lam

Packet Scheduling: Queueing Analysis

[Lam2012a]

CS 396M Lecture Slides on Packet Scheduling: Queueing Analysis

 

        Reference

        [Kleinrock76]

        Leonard Kleinrock,

        Queueing Systems, Vol. 2: Computer Applications, Wiley Interscience, 1976.

Packet Scheduling: End-to-End Delay Bounds

[XL95]

Geoffrey G. Xie and Simon S. Lam,

Delay Guarantee of Virtual Clock Server,

IEEE/ACM Transactions on Networking, Vol. 3, No. 6, December 1995.  ( pdf )

[GLV97]

Pawan Goyal, Simon S. Lam, and Harrick Vin,

Determining End-to-End Delay Bounds in Heterogeneous Networks,

ACM/Springer-Verlag Multimedia Systems, Vol. 5, No. 3, May 1997.   ( pdf )

[LX97]

Simon S. Lam and Geoffrey G. Xie,

Group Priority Scheduling,

IEEE/ACM Transactions on Networking, Vol. 5, No. 2, April 1997.  ( pdf )

            References

[DKS89] 

Demers, S. Keshav, S. Shenker,

Analysis and simulation of a fair queueing algorithm,

Proceedings of ACM SIGCOMM, 1989.  ( pdf )

[Zhang90]

Lixia Zhang,

Virtual clock: a new traffic control algorithm for packet-switching networks,

Proceedings of ACM SIGCOMM, 1990.  ( pdf )

[PG93]

Parekh and R. Gallager,

A generalized processor-sharing approach to flow control in integrated services networks: the single node case,

IEEE/ACM Trans. on Networking, June 1993.   ( pdf )

[PG94]

Parekh and R. Gallager,

A generalized processor-sharing approach to flow control in integrated services networks: the multiple node case,

IEEE/ACM Trans Networking, April 1994.  ( pdf )

[LX97]

Simon S. Lam and Geoffrey G. Xie,

Burst Scheduling Networks,

Performance Evaluation, Special Issue on ATM Traffic Management, Vol. 31, November 1997.  ( pdf )

Protocol Design Tool Box

[Rizzo97]

Luigi Rizzo,

Effective Erasure Codes for Reliable Computer Communication Protocols,

ACM SIGCOMM Computer Communication Review, April 1997.  ( pdf

[BM04]

A. Broder and M. Mitzenmacher,

Network applications of Bloom filters: A survey,

Internet Mathematics, vol. 1 no. 4, pp. 485-509, 2004. ( pdf )

[DL07]

Dong-Young Lee and Simon S. Lam,

Protocol Design for Dynamic Delaunay Triangulation,

Proceedings of 27th IEEE ICDCS, Toronto, June 2007.  ( pdf )

 

      Reference

       [DL06]

       Dong-Young Lee and Simon S. Lam,

       Protocol Design for Dynamic Delaunay Triangulation,

       The University of Texas at Austin, Department of Computer Sciences,

       Technical Report TR-06-48, December 1, 2006. ( pdf )

 

Network Congestion Control

[Lam2012b]

CS 396M Lecture Slides on Sliding Window Protocol and Congestion Control 

[MSM97]

Matthew Mathis, Jeffrey Semke, Jamshid Mahdavi,            

The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm,

ACM Computer Communicatons Review, 27(3), pp. 67-82, 1997.  ( pdf )

[PFTK98]

Jitendra Padhye, Victor Firoiu, Don Towsley, and Jim Kurose, 

Modeling TCP Throughput: A Simple Model and its Empirical Validation,

Proceedings ACM SIGCOMM,  1998.   ( pdf

[YL00]

Y. Richard Yang and Simon Lam,                                
General AIMD Congestion Control
Proceedings ICNP 2000, Osaka, Japan, November 2000. ( pdf )

 

       Reference on further research

       [KHR02]

       Dina Katabi, Mark Handley, and Charlie Rohrs,

       Internet congestion control for future high bandwidth-delay product environments,

       Proceedings ACM SIGCOMM, 2002. ( pdf )

Security: Multicasts and Flows

[WGL98]  

Chung Kei Wong, Mohamed Gouda, and Simon S. Lam,   

Secure Group Communications Using Key Graphs,

Proceedings ACM SIGCOMM '98, Vancouver, B.C., September 1998. ( pdf , journal version )

 

        Reference on system design

[ZLLY03] 

X. Brian Zhang, Simon S. Lam, Don-Young Lee, and Y. Richard Yang,

Protocol Design for Scalable and Reliable Group Rekeying,

IEEE/ACM Transactions on Networking, December 2003. ( pdf )

                 

[WL99]

Chung Kei Wong and Simon S. Lam

Digital Signatures for Flows and Multicasts,

IEEE/ACM Transactions on Networking, August 1999. ( pdf )

 

Security: Ad Hoc and Sensor Networks

 

[Shamir79]

Adi Shamir, How to Share a Secret, CACM, November 1979. ( pdf )

[KZLLZ01]

Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang,

Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,

Proceedings IEEE ICNP 2001. ( pdf )

[Blom85]

R. Blom, An optimal class of symmetric key generation systems,

Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science,
Springer-Verlag, 209:335338, 1985. ( pdf )

[DDHV03]

Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney,

A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,
Proceedings of the 10th ACM Conference on Computer and Communications Security,

Washington DC, October 2003. ( pdf )

 

Overlay Network Protocols

 

[DCKM04]

Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris,
Vivaldi: A Decentralized Network Coordinate System,

Proceedings SIGCOMM 2004, Portland, Oregon, Aug 2004.  ( pdf )

 

       Seminal reference

       [NZ02]

       T. S. Eugene Ng and Hui Zhang,

       Predicting Internet Network Distance with Coordinates-Based Approaches,

       Proceedings IEEE INFOCOM '02, New York, NY, June 2002. ( pdf )    

                       

[LL04]

Simon S. Lam and Huaiyu Liu                   

Failure Recovery for Structured P2P Networks: Protocol Design

and Performance  Evaluation,                                  

Proceedings ACM SIGMETRICS 2004, New York City, June 2004.  ( pdf , journal version )

 

       Reference

       [LL03]

       Huaiyu Liu and Simon S. Lam

       Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network,
       Proceedings IEEE ICDCS 2003, Providence, RI, May 2003. ( pdf

 

Greedy Routing                       

 

[LQ11]

Simon S. Lam and Chen Qian

Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch,

Proceedings ACM SIGMETRICS, June 2011. ( pdf , journal version)

 

[QL11]

Chen Qian and Simon S. Lam,

Greedy Distance Vector Routing,

Proceedings of 31st IEEE ICDCS, Minneapolis, Minnesota, June 2011. ( pdf )

 

 

Scalable and Resilient Layer-2 Networks with Ethernet Compatibility

 

[KCR08]

Changhoon Kim, Matthew Caesar, and Jennifer Rexford, 
Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises,  
Proceedings ACM SIGCOMM, 2008. ( pdf )

 

[QL13]

Chen Qian and Simon S. Lam,

A Scalable and Resilient Layer-2 Network with Ethernet Compatibility,

UT-Austin, Department of Computer Science, TR-13-19. October 19, 2013.  (TR-13-19.pdf)