Search This Blog

Friday, March 12, 2010

Computer Networks and Distributed Systems pdf slides

Computer Networks and Distributed Systems



Notes slide

January 18: Chapter 1
Intro by Anda Iamnitchi.
slideshandouts

January 20Sections 2.1-2.4 and 2.7 in the Kurose and Ross textbook. We will finish up with the Internet introduction and discuss the Web and sockets.
Course intro: slideshandouts
Web intro: slideshandouts

January 25Introduction to Internet architecture
Read the classic paper End-to-end Arguments in System Design by J. Saltzer, D. Reed, and D. Clark, ACM Transactions on Computer Systems (TOCS), Vol. 2, No. 4, pp. 195-206, 1984.
End-to-end slides: slideshandouts
Tussle in Cyberspace: Defining Tomorrow's Internet (you can gloss over the examples for now: one goal for the semester is to understand all of the examples fully).
RFC 2119
Middleboxes No Longer Considered Harmful: read Sections 1-3, get flavor of 4-6. Some slides are available on the DOA site.

January 28TCP and rate control
Host: Thomas Narten
Reading: Kurose and Ross, Chapter 3
Slides: slideshandouts

February 1TCP congestion control
Host: Adolfo Rodriguez
Reading: Chapter 3 again
Slides: slideshandouts

February 3Secure communication
Reading: Kurose and Ross sections 8.1-8.5, 8.8 (emphasize 8.8.2)
Slides: slideshandouts
More crypto slides: slideshandouts

February 8More discussion of secure communication, SSL, and secure HTTP, and catch-up on scalable hierarchical trust: DNS and certificate authorities.
DNS: Kurose and Ross section 2.5

February 10High-speed TCP, OS interface, and hardware assist
TCP Implementation, by Jeff Chase. Book chapter for High-Performance TCP/IP Networking, Mahbub Hassan and Raj Jain, editors. Prentice Hall, 2003.
Slides: slideshandouts

February 15Rate control revisited (misbehaving flows)
TCP Congestion Control with a Misbehaving Receiver. By Stefan Savage, Neal Cardwell, David Wetherall and Tom Anderson. ACM Computer Communications Review, pp. 71-78, v 29, no 5, October, 1999.
Promoting the Use of End-to-End Congestion Control in the Internet. By Sally Floyd and Kevin Fall. IEEE/ACM Transactions on Networking, August 1999.
Slides on the "TCP game": slideshandouts
We also used slides from a short talk by Stefan Savage:

February 17Introduction to routers, and their role in rate control.
Sections 4.1-4.4, 7.7.
Robust Congestion Signalling. By David Ely, Neil Spring, David Wetherall, Stefan Savage, and Tom Anderson, International Conference on Network Protocols (ICNP), 2001. 
For this class and the next I used slides from a variety of sources. I used slides from courses taught by Ion Stoica (router support for congestion control) and alsoSrinivasan Seshan, and some of my own. Most of those slides are available here, with attribution for the sourced material, which is available with original formatting from the original source: slideshandouts.
We also used the ECN nonce viewgraphs from David Wetherall, and also some slides on promoting end-to-end congestion control available in PPT here.

February 22Router-based Rate Control for Flows and Aggregates
Congestion Control for High Bandwidth-Delay Product Networks. By Dina Katabi, Mark Handley, and Chalrie Rohrs. In the proceedings on ACM SIGCOMM 2002.  (Read the paper to understand the motivation and basic approach of XCP: the deep details are interesting but we won't discuss them.)
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network".  Read the CCR version from the pushback web page.
In this class we used some of Dina Katabi's SIGCOMM 2002 slides on XCP, which are available from her XCP site at the link above. Also, to answer some questions about uncertainties in TCP modeling and RED behavior, I used some slides from Sally Floyd's page on better models for Internet research (I used her NSF slides from June 2002).

February 24
Denial of Service
Kurose and Ross, sections 4.4 (if you didn't already read it) and 8.7.
D. Moore, G. Voelker, and S. Savage, Inferring Internet Denial of Service Activity, Proceedings of the 2001 USENIX Security Symposium, Washington D.C., August 2001. 
Slides: slideshandouts
I also used some backscatter slides from Geoff Voelker.
Optional Reading: Hash-Based IP Traceback. ToN version. Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer. Proc. of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2001.

March 1
Router architecture and extensible routing
The Click Modular Router. Extract the key ideas from the TOCS paper on the publications page: Eddie Kohler, Robert Morris, Benjie Chen, John Jannotti, and M. Frans Kaashoek. ACM Transactions on Computer Systems 18(3), August 2000, pages 263-297.
David J. Wetherall, "Active network vision and reality: lessons from a capsule-based system", 17th ACM Symposium on Operating System Principles (SOSP'99), Kiawah Island, SC, December 1999. pdf
For the evaluation, please compare/contrast these two approaches to making the Internet routing infrastructure extensible. 
Slides: slideshandouts

March 3
Fundamentals of Routing
Kurose and Ross, sections 4.5 and 4.6.
The Case for Separating Routing from Routers. Nick Feamster, Hari Balakrishnan, Jennifer Rexford, Aman Shaikh, Kobus van der Merwe. ACM SIGCOMM Workshop on Future Directions in Network Architecture (FDNA), Portland, OR, September 2004. (7 pages)
For the routing classes I used mostly the Srini/Andersen slides from CMU, lectures 10 and 11.
Other slides: slideshandouts

No comments:

Post a Comment

Popular Courses

Resources Higher Education Blogs - BlogCatalog Blog Directory Resources Blogs