CS 395T schedule (Spring 2011)

Instructor:  Simon S. Lam

  Date   Topic Review   due

Lecturer

Jan 21 Course description and overview    
Jan 21

Review of Little's Law and TCP congestion control

Matthew Mathis, Jeffrey Semke, Jamshid Mahdavi,  The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm, ACM Computer Communicatons Review, 27(3), pp. 67-82, 1997.  ( pdf )

 

No, but read first 2 pages

 SSL (slides)
Jan 28 2 p.m. Submit via email your priority list of papers to present
   
Jan 28 Jitendra Padhye, Victor Firoiu, Don Towsley, and Jim Kurose, Modeling TCP Throughput: A Simple Model and its Empirical Validation, Proceedings ACM SIGCOMM,  1998.  ( pdf )  (You can skim over the math derivations. I will show you the highlights in my lecture.)                Yes   SSL (slides)
Jan 28 Y. Richard Yang and Simon Lam, General AIMD Congestion Control Proceedings ICNP 2000, Osaka, Japan, November 2000 ( pdf ) Yes   SSL (slides)
Feb 4 University closed due to snow    
Feb  11

Chung Kei Wong, Mohamed Gouda, and Simon S. Lam, Secure Group Communications Using Key Graphs, Proceedings ACM SIGCOMM '98, Vancouver, B.C., September 1998. ( pdf , journal version )

Yes  SSL (slides)
Feb  11

Chung Kei Wong and Simon S. Lam, Digital Signatures for Flows and Multicasts, IEEE/ACM Transactions on Networking, August 1999. ( pdf )

Yes  SSL (slides)
Feb 18 Huaiyu Liu and Simon S. Lam, Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network, Proceedings IEEE ICDCS 2003, Providence, RI, May 2003. ( pdf )  Read Sections 1-3 carefully.  Try to understand the notation.  Subsection 3.3 contains the key ideas for correct protocol design.  You can read the rest of the paper quickly.  Okay to skip pseudocode in Figures 5-12 and the Lemmas and Propositions in subsection 5.1.  Proofs for this paper are in a  UTCS TR ( pdf ) Yes  SSL (slides)
Feb 18 overflow from Feb 11    
Feb 25  GradFest 2011 (class starts at 3:30 p.m.)    
Feb 25
3:30 p.m.

Dong-Young Lee and Simon S. Lam, Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn, Proceedings IEEE ICNP 2008, Orlando, Florida, October 2008.  ( pdf )

Yes Chen Q.
Mar 4

Simon S. Lam and Chen Qian, Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch, Technical Report TR-10-03, Department of Computer Science, UT-Austin, January 19, 2010; revised, October 29, 2010( pdf ); to appear in Proc. ACM SIGMETRICS, 2011.

Yes Chen Q.
Mar  4 Simon S. Lam and Huaiyu Liu, Failure Recovery for Structured P2P Networks: Protocol Design and Performance  Evaluation, Proceedings ACM SIGMETRICS 2004, New York City, June 2004. ( pdfjournal version )    SSL (slides)
Mar 11

Xiaowei Yang and David Wetherall,  Source Selectable Path Diversity via Routing Deflections, Proceedings ACM SIGCOMM, 2006. ( pdf )

Yes Arun S.
Mar 11

A. Broder and M. Mitzenmacher, Network applications of Bloom filters: A survey, Internet Mathematics, vol. 1 no. 4, pp. 485-509, 2004. ( pdf )

Yes Hongkun Y.
Mar 18   Spring Break, no class    
Mar 25  Choice-of-topic proposal due    
Mar 25

Murtaza Motiwala, Megan Elmore, Nick Feamster, and Santosh Vempala, Path Splicing, Proceedings ACM SIGCOMM, 2008. ( pdf )

Yes Song H.
Mar 25

Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang, SAVE: Source Address Validity Enforcement Protocol, Proceedings IEEE INFOCOM 2002. ( pdf )

Yes Xiuming Z.
Apr 1

Zheng Zhang, Ying Zhang, Y. Charlie Hu, Z. Morley Mao, Randy Bush, iSPY: Detecting IP Prefix Hijacking on My Own, Proceedings ACM SIGCOMM 2008.  ( pdf )

Yes Jaeyoun K.
Apr 1

Changhoon Kim, Matthew Caesar, and Jennifer Rexford,  Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises, Proceedings ACM SIGCOMM, 2008. ( pdf )

Yes Taehwan C.
Apr 8

Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC, October 2003. ( pdf )

Yes Hongkun Y.
Apr 8

Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, Proceedings IEEE ICNP 2001. ( pdf ) Reference: Adi Shamir, How to Share a Secret, CACM, November 1979. ( pdf )

Yes Arun S.
Apr 15

Haiyong Xie, Yang Richard Yang, Arvind Krishnamurthy, Yanbin Liu, and Avi Silberschatz, P4P: Provider Portal for Applications, Proceedings of ACM SIGCOMM 2008. ( pdf )

Yes Taehwan C.
Apr  15

Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard, Networking Named Content, Proceedings ACM CoNext, 2009. ( pdf )

Yes Jaeyoun K.
Apr 22

WirelessHART Protocols

No

Song. H.
Apr 22

Luigi Rizzo, Effective Erasure Codes for Reliable Computer Communication Protocols, ACM SIGCOMM Computer Communication Review, April 1997.  ( pdf )

Yes   SSL (slides)
Apr 29

Chen Qian and Simon S. Lam, Greedy Distance Vector Routing, to appear in Proc. IEEE ICDCS, 2011. ( pdf )

 No  Chen Q. 
May  4, Wednesday, 5 p.m.  Term paper due - please submit a hard copy in my mailbox in CS  department office (ACES 5.214) in case you don't find me in my office.    
May  6

Term project presentation

  Arun S.
May 6

Term project presentation

  Hongkun Y.