Schedule
The schedule is tentative and will change.
Getting Started
Class Recordings
Survey Link
Week 1 - 08/23
Paper | URL | Presentation | Critical Review |
---|---|---|---|
Introduction and how to read papers | Lecture 1 | ||
A 30,000 foot overview of the Current Internet | Lecture 2 |
Fundamental Protocols
Week 2 - 08/30
Paper | URL | Presentation | Critical Review |
---|---|---|---|
J.H. Saltzer, D.P. Reed and D.D. Clark, End-to-End Arguments in System Design, ACM’s TOCS 1981 | https://dl.acm.org/doi/10.1145/357401.357402 | Lecture 3 | Sample CR1 Sample CR2 |
D.D Clark, The Design Philosophy of the DARPA Internet Protocols, ACM SIGCOMM Computer Communication Review, 1988 | https://dl.acm.org/doi/10.1145/52325.52336 | Lecture 4 |
Week 3 - 09/06
DNS, Presenter: Max Layer
Paper | URL | Presentation | Critical Review |
---|---|---|---|
P. Mockapetris, K. Dunlap, “Development of Domain Name System”, ACM SIGCOMM Computer Communication Review, 1988 | https://dl.acm.org/doi/10.1145/52324.52338 | Presentation | Due at 10AM CST, 09/08 |
Additional Paper - Matt Calder, et. al. 2015. Analyzing the Performance of an Anycast CDN. IMC 2015 | https://dl.acm.org/doi/10.1145/2815675.2815717 | ||
Additional Paper - Zhihao Li, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2018. Internet anycast: performance, problems, & potential. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication (SIGCOMM ‘18) | https://dl.acm.org/doi/10.1145/3230543.3230547 | ||
Additional Paper - Evaluating The Effects Of Anycast On DNS Root Nameservers | https://www.ripe.net/publications/docs/ripe-393 | ||
Review and Discussion |
Week 4 - 09/13
BGP, Presenter: Jordan Johnson
Paper | URL | Presentation | Critical Review |
---|---|---|---|
Labovitz, Craig, Abha Ahuja, Abhijit Bose, and Farnam Jahanian. “Delayed Internet routing convergence.” ACM SIGCOMM Computer Communication Review, 2000 | https://dl.acm.org/doi/10.1145/347059.347428 | Presentation | Sample CR3 Sample CR4 |
Additional Paper - Ratul Mahajan et. al. Understanding BGP misconfiguration. ACM SIGCOMM ‘02 | https://dl.acm.org/doi/10.1145/633025.633027 | ||
Additional Paper - Butler, Kevin, et al. “A survey of BGP security issues and solutions.” Proceedings of the IEEE 98.1 (2009): 100-122. | https://ieeexplore.ieee.org/document/5357585 | ||
Additional Paper - Li, Qi, et al. “BGP with BGPsec: Attacks and countermeasures.” IEEE Network 33.4 (2018): 194-200. | https://ieeexplore.ieee.org/document/8594708 | ||
Discussion |
Week 5 - 09/20
SDN, Presenter:Luke Lambert
Paper | URL | Presentation | Critical Review |
---|---|---|---|
N. McKeown, et al. “OpenFlow: enabling innovation in campus networks.” ACM SIGCOMM Computer Communication Review, 2008 | https://dl.acm.org/doi/10.1145/1355734.1355746 | Presentation | Due at 10AM CST, 09/20 |
Additional Paper - Pat Bosshart et. al., P4: programming protocol-independent packet processors. SIGCOMM Computer Communication Reviews, 2014 | https://doi.org/10.1145/2656877.2656890 | ||
Additional Paper - Xia, Wenfeng, et al. “A survey on software-defined networking.” IEEE Communications Surveys & Tutorials 17.1 (2014): 27-51. | https://ieeexplore.ieee.org/document/6834762 | ||
Additional Paper - Shaghaghi, Arash, et al. “Software-defined network (SDN) data plane security: issues, solutions, and future directions.” Handbook of Computer Networks and Cyber Security (2020): 341-387. | http://link.springer.com/chapter/10.1007/978-3-030-22277-2_14 | ||
Discussion |
Week 6 - 09/27
NDN, Presenter:Ryan Adamson
Paper | URL | Presentation | Critical Review |
---|---|---|---|
L. Zhang, et al., Named Data Networking”, ACM SIGCOMM CCR, 2014 | https://dl.acm.org/doi/10.1145/2656877.2656887 | Presentation | Due at 10AM CST, 09/27 |
Additional Paper - Cheng Yi et. al. A case for stateful forwarding plane. Comput. Commun. 36, 7 (April, 2013), 779–791 | https://dl.acm.org/doi/10.1016/j.comcom.2013.01.005 | ||
Additional Paper - Peter GUSEV et al., Real-Time Streaming Data Delivery over Named Data Networking. In:IEICE Transactions on Communications E99.B (Mai 2016), S. 974–991.DOI:10.1587/transcom.2015AMI0002 | http://conferences2.sigcomm.org/acm-icn/2015/proceedings/p117-gusev.pdf | ||
Additional Paper - Chengyu Fan, et al., Managing scientific data with named data networking. In Proceedings of the Fifth International Workshop on Network-Aware Data Management (NDM ‘15). Association for Computing Machinery, New York, NY, USA, Article 1, 1–7. | https://doi.org/10.1145/2832099.2832100 | ||
Discussion |
Networked Applications
Week 7 - 10/04
Content Delivery Networks, Presenter:Rajat Bhattarai
Paper | URL | Presentation | Critical Review |
---|---|---|---|
Guest Lecture | |||
J. Dilley, et al., “Globally distributed content delivery”, IEEE Internet Computing, 6(5), pp. 50-58, 2002 | https://dl.acm.org/doi/10.1109/MIC.2002.1036038 | Presentation | Due at 10AM CST, 10/04 |
Additional Paper - Böttger, Timm, et al. “Open connect everywhere: A glimpse at the internet ecosystem through the lens of the netflix cdn.” ACM SIGCOMM Computer | https://dl.acm.org/doi/10.1145/3211852.3211857 | ||
Additional Paper - “V. K. Adhikari et al., “Measurement Study of Netflix, Hulu, and a Tale of Three CDNs,” in IEEE/ACM Transactions on Networking, vol. 23, no. 6, pp. 1984-1997, Dec. 2015, doi: 10.1109/TNET.2014.2354262.” | https://10.1109/TNET.2014.2354262 | ||
Additional Paper - " Böttger, Timm, Felix Cuadrado, Gareth Tyson, Ignacio Castro, and Steve Uhlig. 2016. “Open Connect Everywhere: A Glimpse at the Internet Ecosystem through the Lens of the Netflix CDN.” ARXIV Working Paper. " | https://arxiv.org/abs/1606.05519 | ||
Discussion |
Week 8 - 10/11 (no class on 10/11)
NDN for CDNs, Presenter: Sankalpa Timilsina
Paper | URL | Presentation | Critical Review |
---|---|---|---|
Thelagathoti, Rama Krishna, et al. “Named data networking for content delivery network workflows.” IEEE CloudNet, 2020. | https://ieeexplore.ieee.org/abstract/document/9335806 | Presentation | Due at 10AM CST, 10/13 |
Additional Paper - Ghasemi, Chavoosh, Hamed Yousefi, and Beichuan Zhang. “icdn: An ndn-based cdn.” ACM ICN 2020. | https://dl.acm.org/doi/10.1145/3405656.3418716 | ||
Additional Paper - A tentative comparison on CDN and NDN | https://ieeexplore.ieee.org/abstract/document/6974369 | ||
Additional Paper - Far Cry: Will CDNs Hear NDN’s Call? | https://dl.acm.org/doi/abs/10.1145/3405656.3418708 | ||
Discussion |
Week 9 - 10/18, 10/20
IOT, Presenter: Anthony Palmer, Sina Sontowski
Paper | URL | Presentation | Critical Review |
---|---|---|---|
O. Flauzac, C. González, A. Hachani and F. Nolot, “SDN Based Architecture for IoT and Improvement of the Security,” 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, 2015, pp. 688-693, doi: 10.1109/WAINA.2015.110. | https://ieeexplore.ieee.org/document/7096257 | Presentation1, Presentation2 | Due at 10AM CST, 10/18 |
Additional Paper - Named Data Networking of Things (Invited Paper) | https://ieeexplore.ieee.org/document/7471356 | ||
Additional Paper - M. R. Schurgot, D. A. Shinberg and L. G. Greenwald, “Experiments with security and privacy in IoT networks,” 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2015, pp. 1-6 | 10.1109/WoWMoM.2015.7158207 | ||
Additional Paper - M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti and M. Jo, “Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks,” in IEEE Internet of Things Journal, vol. 5, no. 1, pp. 269-282, Feb. 2018, | 10.1109/JIOT.2017.2780232 | ||
Additional Paper -G. A. Akpakwu, B. J. Silva, G. P. Hancke and A. M. Abu-Mahfouz, “A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges,” in IEEE Access, vol. 6, pp. 3619-3647, 2018 | 10.1109/ACCESS.2017.2779844 | ||
Additional Paper - P. Schulz et al., “Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture,” in IEEE Communications Magazine, vol. 55, no. 2, pp. 70-78, February 2017 | 10.1109/MCOM.2017.1600435CM |
Week 10 - 10/25, 10/27 Networking for the Cloud, Presenter: M. Rayhan Ahmed Mithu, Allyson Jones
Paper | URL | Presentation | Critical Review |
---|---|---|---|
Jose Moura and David Hutchison. 2016. Review and analysis of networking challenges in cloud computing. J. Netw. Comput. Appl. 60, C (January 2016) | https://arxiv.org/abs/1601.05329 | Presentation1, Presentation2 | Due at 10AM CST, 11/03 |
Additional Paper - Amin, R., Vadlamudi, S. and Rahaman, M.M., 2021. Opportunities and challenges of data migration in cloud. Engineering International, 9(1), pp.41-50. | https://abc.us.org/ojs/index.php/ei/article/download/529/1030 | ||
Additional Paper - Shuaib, M., Samad, A., Alam, S. and Siddiqui, S.T., 2019. Why adopting cloud is still a challenge?—A review on issues and challenges for cloud migration in organizations. Ambient Communications and Computer Systems, pp.387-399. | https://link.springer.com/chapter/10.1007/978-981-13-5934-7_35 | ||
Additional Paper -Gholami, M.F., Daneshgar, F., Beydoun, G. and Rabhi, F., 2017. Challenges in migrating legacy software systems to the cloud—an empirical study. Information Systems, 67, pp.100-113. | https://dl.acm.org/doi/abs/10.1016/j.is.2017.03.008 | ||
Additional Paper - Abdo, J. B. (2021). Efficient and Secure Mobile Cloud Networking. arXiv | |||
preprint arXiv:2102.09051. | https://arxiv.org/pdf/2102.09051 | ||
Additional Paper - Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in Cloud Computing: Opportunities and Challenges. Information Sciences, 305, 357-383. | https://www.sciencedirect.com/science/article/abs/pii/S0020025515000638 | ||
Additional Paper - Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611. | https://onlinelibrary.wiley.com/doi/epdf/10.1002/wcm.1203 | ||
Additional Paper - Dudouet, F., Harsh, P., Ruiz, S., Gomes, A., & Bohnert, T. M. (2014, September). A Case for CDN-as-a-Service in the Cloud: A Mobile Cloud Networking Argument. In 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 651-657). IEEE. | https://ieeexplore.ieee.org/abstract/document/6968495 |
Week 11 - 11/01 Networking for the Cloud, Presenter: Adam Smithson, Guest Lecture
Paper | URL | Presentation | Critical Review |
---|---|---|---|
Jose Moura and David Hutchison. 2016. Review and analysis of networking challenges in cloud computing. J. Netw. Comput. Appl. 60, C (January 2016) | https://arxiv.org/abs/1601.05329 | Due at 10AM CST, 11/03 | |
Additional Paper - TBD | |||
Additional Paper - TBD |
Week 12 - 11/08 Edge - Presenter:Xi Wang, Vennela Vakapalli
Paper | URL | Presentation | Critical Review |
---|---|---|---|
W. Shi, et al., “Edge computing: Vision and challenges”, IEEE Internet of Things, 2016 | https://ieeexplore.ieee.org/document/7488250 | Due at 10AM CST | |
Additional Paper - Taking the Edge off with Espresso: Scale, Reliability and Programmability for Global Internet Peering” | https://dl.acm.org/doi/10.1145/3098822.3098854 | ||
Additional Paper - TBD | |||
Additional Paper - TBD | |||
Discussion |
Network Security
Week 13 - 11/15
DDoS - Presenter:Brad Northern
Paper | URL | Presentation | Critical Review |
---|---|---|---|
F. Lau, et. al. “Distributed denial of service attacks,” Smc 2000 conference proceedings. IEEE ICSMC 2000 | https://ieeexplore.ieee.org/document/886455 | Due at 10AM CST | |
Additional Paper - Vern Paxson. 2001. An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput. Commun. Rev. 31 | https://dl.acm.org/doi/10.1145/505659.505664 | ||
Additional Paper - TBD | |||
Additional Paper - TBD | |||
Discussion |
Week 14 - 11/22
NDN Security, Presenter:Katie Kacerek
Paper | URL | Presentation | Critical Review |
---|---|---|---|
D Smetters, V Jacobson - Securing network content - 2009 | https://named-data.net/wp-content/uploads/securing-network-content-tr.pdf | Due at 10AM CST | |
Additional Paper - Yingdi Yu et. al. Schematizing Trust in Named Data Networking. ACM-ICN ‘15 | https://dl.acm.org/doi/10.1145/2810156.2810170 | ||
Additional Paper - TBD | |||
Additional Paper - TBD | |||
Discussion |
Week 15 - 11/29
Vehicular Network, Presenter: David Feier
Paper | URL | Presentation | Critical Review |
---|---|---|---|
Stephen Checkoway et. al. Comprehensive experimental analyses of automotive attack surfaces, USENIX conference on Security (SEC'11) | https://dl.acm.org/doi/10.5555/2028067.2028073 | Due at 10AM CST | |
Additional Paper - M. Bozdal et. al. A Survey on CAN Bus Protocol: Attacks, Challenges, and Potential Solutions, iCCECE, 2018, pp. 201-205, doi: 10.1109/iCCECOME.2018.8658720. | https://ieeexplore.ieee.org/document/8658720 | ||
Additional Paper - TBD | |||
Additional Paper - TBD | |||
Discussion |
Week 16 - Wrap up - 12/06, 12/08