Net_I_07_syllabus

advertisement
Title: Advanced Computer Networks
高等计算机网络
2007.9 – 2008.1
Instructor: 舒炎泰,许林英
TA: 张冰怡,
邱晓红,柴华
Office:25-526, 25-704
Tel: 27406903, 27401136
Course Prerequisites: Computer Networks 本科生计算机网络课
1. Layering architecture
2. Physical layer
3. Link layer
4. Medium access sublayer
- Ethernet, Bridging, High speed LAN
5. Network layer
- IP, Routing, Building networks
6. Transport layer (UDP, TCP)
7. Application layer
- Web & HTTP, FTP, Email, DNS, P2P, Socket programming
8. Security in computer networks
Overview:
This course is a graduate course in computer networks. The goals are:
-- To understand the state of the art in network protocols, network architecture,
and networked systems.
-- To understand how to engage in networking research.
The past few years have seen a remarkable growth in the global network
infrastructure. The Internet has grown from a research curiosity to something we
all take for granted. Designing, building, and evaluating networked systems is
challenging because of the large scale, heteogeneous network conditions, and
decentralized control. This course provides a research survey of distributed
networked systems, with the goal of understanding the tradeoffs in large, complex
systems, primarily by analyzing the design and deployment of real systems.
How does this global network infrastructure work and what are the design
principles on which it is based? In what ways are these design principles
compromised in practice? How do we make it work better in today's world? How
do we ensure that it will work well in the future in the face of future demands?
We will examine these issues and more during the course.
This course assumes a basic familiarity with networking concepts. The course will
consist of reading/lecture and discussion components. The class will cover
approximately 25 research papers and some book chapters on various aspects of
computer networking. These papers will introduce students to the basic design
principles on which today's networks are based. In addition, these papers will
cover recent proposals to improve network performance, functionality and
scalability.
The topics covered in the course are in four categories: internetworking and
routing (virtual circuit switching, routing, switches and routers); resource
management (scheduling, congestion control, traffic management, quality of
service, and network measurement); application and overlay (network services,
multicasting, peer to peer, content distribution networks, and overlay networks);
and network security.
Course Teaching:
Lectures
-- Students are expected to attend all classes
Reading books and research papers (Paper reviews)
-- All students should read the papers in advance of the class and submit
one page review in Chinese printed on A4 for each paper. The goal of these
reviews is to help students synthetise the main ideas and concepts presented in
each paper. This is not a book report -- for each paper, the review should include
a summary, a discussion of the papers strengths, a discussion of the papers
weaknesses, and finally some plausible next steps in the research agenda.
FTP: /Reference for review papers etc/
howtoread.htm,
无线网络研究 Blog.mht,
CMU_How-to-ResearchWriting.zip
Homework
-- Questions and Exercises
Programming
Course Grading:
Homework/Review/Programming/Quizzes
Final exam (opened book)
40% (1/2 for lated submission)
60%
References:
1. Books
There are no official texts for the course. As background, we suggest several texts:
(1) KR: “Computer Networking: A Top-Down Approach Featuring the Internet”
3E by J. Kurose & K. Ross, 2005.
(2) PD: Computer Networks: A Systems Approach, 4-Edition, by Larry Peterson
and Bruce Davie, 2007. - Ch. 3.1+3.3+3.5+4.5 (copy)
(3) K: “An Engineering Approach to Computer Networking”
by S. Keshav, 1997. - Ch. 8, 9, 13.3, 14
(copy)
(4) MIT- Lecture:
(copy)
MIT-L3.4-sw, MIT-L4.2.6-rt, MIT-L4-interdomain, MIT-L8-fq, MIT-L6-e2ecc,
MIT-L7-routercc, MIT-L6.5-qos,
2. Papers (25)
(ftp server) (copy?)
3. Lecture notes (~150 x 6)
(ftp server) (copy?)
http://ibm.tju.edu.cn/learning/ytshu/Net_I_07/
ftp://59.67.33.8/ytshu/Net_I_07/ (cuteftppro8)
4. Books for programming
(5) TCP/IP Illustrated, Volume 1: The Protocols by W. Richard Stevens.
(6) Unix Network Programming: Networking APIs: Sockets and XTI (Volume 1)
by W. Richard Stevens, 1998.
(7) Advanced Programming in the Unix Environment by W. Richard Stevens,
Addison-Wesley, 1993.
Course Outline:
-----------------------------------------------------------------Part 1: Internetworking
-----------------------------------------------------------------Ch. 1 Introduction
2H
Ch. 2 Virtual Circuit Switching
- ATM & MPLS (MP-Lambda-S)
2H
Ref: PD 3.1+3.3+3.5+4.5, KR5.8
Ch. 3 Switching and Router Design
2H
Ref: K8.1+8.3+8.4+8.5, MIT-L3.4-sw, MIT-L4.2.6-rt,
Read/review 2:
Oct. 18 [P98] (50GbR) C. Partridge et. al., "A 50-Gb/s IP router", IEEE/ACM
Transactions on Networking, Vol. 6, No. 3 (June 1998), Pages 237-248.
Oct. 18 [B+97b] A. Brodnik, S. Carlsson, M. Degermark, and S. Pink, "Small
Forwarding Tables for Fast Routing Lookups", ACM SIGCOMM 97. Pages 3-14.
? [M99] Nick McKeown, “The iSLIP Scheduling Algorithm for Input-Queued
Switches”, IEEE/ACM Transactions On Networking, Vol. 7, No. 2, April 1999
Ch. 4 Routing
4H
- intradomain routing
- interdomain routing / BGP: Convergence, Policy, New architectures,
Ref: MIT-L4-interdomain, Exercises: PD ch4 (BGP)
Read/review 3:
Oct. 21 [GSW02] T. G. Griffin, F. B. Shepherd and G. Wilfong, "The Stable
Paths Problem and Interdomain Routing", IEEE Transactions on Networking,
April 2002.
Oct. 25 [LAJ99] C. Labovitz, A. Ahuja and F. Jahanian, "Experimental Study of
Internet Stability and Wide-Area Network Failures", Proceedings of FTCS99,
Madison, WI, June 22, 1999.
Oct. 25 [Feamster04] Nick Feamster, Hari Balakrishnan Jennifer Rexford, Aman
Shaikh, Jacobus van der Merwe, The Case for Separating Routing from Routers,
SIGCOMM'04 Workshops, Aug. 30-Sept. 3, 2004, Portland, Oregon, USA.
? [Subramanian04] Lakshminarayanan Subramanian, Matthew Caesar, Cheng
Tien Ee, Mark Handley, Morley Mao, Scott Shenker, Ion Stoic, Towards a Next
Generation Interdomain Routing Protocol
-----------------------------------------------------------------Part 2: Resource Management
-----------------------------------------------------------------Ch. 5 Scheduling and Policing
Ref: K9, K13.3, MIT-L8-fq
2H
Read/review:
? [csfq] I.Stoica, S.Shenker, H.Zhang, “Core-Stateless Fair Queueing: Achieving
Approximately Fair Bandwidth Allocations in High Speed Network,” in Proc.
ACM Sigcomm, September 1998, Vancouver, Canada.
Ch. 6 Congestion Control
- End-to-end congestion control
- Router-assisted congestion control
4H
Ref: MIT-L6-e2ecc, MIT-L7-routercc, Exercises: PD ch6
Read/review 6:
Nov. 1 [RJ90] Raj Jain, “Congestion control in computer networks: issues and
trends,” IEEE Network Magazine, May 1990, pp. 24-30.
Nov. 1 [JK88] V. Jacobson and M. Karels, “Congestion Avoidance and Control,”
In Proc. ACM SIGCOMM '88 (Stanford, CA, August, 1988).
Nov. 1 [CJ89] D.M. Chiu and R. Jain, “Analysis of the Increase and Decrease
Algorithms for Congestion Avoidance in Computer Networks,” Computer
Networks and ISDN Systems, Vol. 17, pp. 1-14, 1989.
Nov. 4 RFC 3448 or [FHPW00] TFRC
RFC 3448 M. Handley, S. Floyd, J. Pahdye and J. Widmer, "TCP Friendly Rate
Control (TFRC): Protocol Specification", RFC 3448, Proposed Standard,
January 2003.
--[FHPW00] Sally Floyd, Mark Handley, Jitendra Padhye, and Joerg Widmer,
“Equation-Based Congestion Control for Unicast Applications,” SIGCOMM
2000, August 2000.
Nov. 4 [KHR02] (XCP) Dina Katabi, Mark Handley, and Charles Rohrs,
Congestion Control for Future High Bandwidth-Delay Product Networks . ACM
Sigcomm 2002, August 2002.
Nov. 4 [FJ93] (RED-AQM) S. Floyd and V. Jacobson, "Random Early Detection
gateways for Congestion Avoidance" IEEE/ACM Transactions on Networking,
1(4):397-413 August 1993.
Ch. 7 Traffic Management
- Economic principles
- Traffic models + LRD
- Time scales – Mechanisms
4H
Ref: K14
Read/review 4:
Nov. 11 [ZXS98] Lianfang Zhang, Fei Xue, Yantai Shu, “Models of Self-Similar
Traffic on High-Speed Network and their Performance Evaluation,” Computer
Research and Development, Vol. 35, No. 6, pp. 548-552, June 1998.
Nov. 11 [LTWW94] Will E. Leland, Murad S. Taqqu, Walter Willinger, and
Daniel V. Wilson, “On the Self-Similar Nature of Ethernet Traffic (Extended
Version),” IEEE/ACM Transactions on Networking. Vol 2, No 1, February 1994.
Nov. 11 [SXJY98] Yantai Shu, Fei Xue, Zhigang Jin, Oliver Yang, “The Impact of
Self-similar Traffic on Network Delay,” in Proceedings of the IEEE Canadian
Conference on Electrical and Computer Engineering, pp. 349-352, Waterloo,
Canada, May 24-28, 1998.
Nov. 15 [SJT01] Yantai Shu, Zhigang Jin, Dongxu Tian, "Dial-up User Models
and Traffic Prediction," in Proceedings of the Future Telecommunications
Conference 2001 (FTC01), pp. 90-93, Beijing, China, Nov. 29-30, 2001.
Ch. 8 QoS
2H
- Intserv/RSVP in ch 7, Diffserv, and MPLS in ch 2
Ref: MIT-L6.5-bruce-qos, KR7.8 + 7.9
Ch. 9 Measurement
- Measurement, Routing Measurement
2H
Ref: KR9
Read/review: 2
Nov. 22 [Pax04] V. Paxson, Strategies for Sound Internet Measurement, Proc.
ACM IMC, October 2004.
Nov. 22 [Pax97] V. Paxson, End-to-End Routing Behavior in the Internet ,
IEEE/ACM Trans. on Networking , Vol. 5, No. 5, pp. 601-615, October 1997.
[Pax96] V. Paxson, "End-to-End Routing Behavior in the Internet". ACM
SIGCOMM '96, August 1996, Stanford, CA.
------------------------------------------------------------------Part 3: Application and Overlay
------------------------------------------------------------------Ch. 10 Network Services
4-6H
- IP multicasting
Ref: KR4.7
- Overlay networks
Read/review 1?:
[CRZ00] Y. Chu, S. G. Rao, and H. Zhang, "A Case For End System Multicast",
Proceedings of ACM SIGMETRICS'00, Santa Clara, CA, June 2000.
+ ???
- P2P, - DHTs, - DHT Applications
Read/review 4?:
[Balakrishnan03] (DHT Survey) Hari Balakrishnan, M. Frans Kaashoek, David
Karger, Robert Morris, and Ion Stoica, Looking up Data in P2P Sytems,
Communications of the ACM, February 2003/Vol. 46, No. 2
[SM+01] I. Stoica , R. Morris , D. Karger , M. Kaashoek , H. Balakrishnan ,
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications , Proc.
ACM SIGCOMM , San Diego, CA, August 2001.
+ ???
------------------------------------------------------------------Part 4: Security
-------------------------------------------------------------------
Ch. 11 Security
- DDoS and Traceback, Worms and Privacy
4H
Read/review 4?:
[SEV+04] Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage,
Automated Worm Fingerprinting, OSDI04
+ ???
? [SPW02] Stuart Staniford, Vern Paxsony, Nicholas Weaver, How to 0wn the
Internet in Your Spare Time, in the Proceedings of the 11th USENIX Security
Symposium (Security '02)
? [killbots] Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur W. Berger,
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds, 2nd
Symposium on Networked Systems Design and Implementation (NSDI), Boston,
MA, May 2005
====================================================
Net-II-08
Title: Hot Topics on Computer Network Research
计算机网络研究热点问题
------------------------------------------------------------------Part A - Wireless Networks
------------------------------------------------------------------1.
2.
3.
4.
Cellular systems (GSM, CDMA, UMTS)
Wireless LANs (802.11, Bluetooth); MAC layer protocols
Ad hoc wireless networks (routing, multicast, ad hoc TCP, QoS
support)
Sensor networks
Read/review: papers
------------------------------------------------------------------Part B - Internet protocols
------------------------------------------------------------------Ch.5 More about QoS
7H
- QoS, Traffic modeling, BW estimation / congestion control / TCP, QoS routing
5.1 Engineering for QoS
5.2 Traffic modeling and prediction
5.3 QoS routing
5.4 BW Estimation and TCP
Read/review: papers
2h
2h
1h
2h
Ch.6 Internet Architecture
- I3 active net Tussle OCALA
Read/review: papers
2H
Download