Title: Advanced Computer Networks 高等计算机网络 2007.9 – 2008.1 Instructor: 舒炎泰,许林英 TA: 张冰怡, 邱晓红,柴华 Office:25-526, 25-704 Tel: 27406903, 27401136 Course Prerequisites: Computer Networks 本科生计算机网络课 1. Layering architecture 2. Physical layer 3. Link layer 4. Medium access sublayer - Ethernet, Bridging, High speed LAN 5. Network layer - IP, Routing, Building networks 6. Transport layer (UDP, TCP) 7. Application layer - Web & HTTP, FTP, Email, DNS, P2P, Socket programming 8. Security in computer networks Overview: This course is a graduate course in computer networks. The goals are: -- To understand the state of the art in network protocols, network architecture, and networked systems. -- To understand how to engage in networking research. The past few years have seen a remarkable growth in the global network infrastructure. The Internet has grown from a research curiosity to something we all take for granted. Designing, building, and evaluating networked systems is challenging because of the large scale, heteogeneous network conditions, and decentralized control. This course provides a research survey of distributed networked systems, with the goal of understanding the tradeoffs in large, complex systems, primarily by analyzing the design and deployment of real systems. How does this global network infrastructure work and what are the design principles on which it is based? In what ways are these design principles compromised in practice? How do we make it work better in today's world? How do we ensure that it will work well in the future in the face of future demands? We will examine these issues and more during the course. This course assumes a basic familiarity with networking concepts. The course will consist of reading/lecture and discussion components. The class will cover approximately 25 research papers and some book chapters on various aspects of computer networking. These papers will introduce students to the basic design principles on which today's networks are based. In addition, these papers will cover recent proposals to improve network performance, functionality and scalability. The topics covered in the course are in four categories: internetworking and routing (virtual circuit switching, routing, switches and routers); resource management (scheduling, congestion control, traffic management, quality of service, and network measurement); application and overlay (network services, multicasting, peer to peer, content distribution networks, and overlay networks); and network security. Course Teaching: Lectures -- Students are expected to attend all classes Reading books and research papers (Paper reviews) -- All students should read the papers in advance of the class and submit one page review in Chinese printed on A4 for each paper. The goal of these reviews is to help students synthetise the main ideas and concepts presented in each paper. This is not a book report -- for each paper, the review should include a summary, a discussion of the papers strengths, a discussion of the papers weaknesses, and finally some plausible next steps in the research agenda. FTP: /Reference for review papers etc/ howtoread.htm, 无线网络研究 Blog.mht, CMU_How-to-ResearchWriting.zip Homework -- Questions and Exercises Programming Course Grading: Homework/Review/Programming/Quizzes Final exam (opened book) 40% (1/2 for lated submission) 60% References: 1. Books There are no official texts for the course. As background, we suggest several texts: (1) KR: “Computer Networking: A Top-Down Approach Featuring the Internet” 3E by J. Kurose & K. Ross, 2005. (2) PD: Computer Networks: A Systems Approach, 4-Edition, by Larry Peterson and Bruce Davie, 2007. - Ch. 3.1+3.3+3.5+4.5 (copy) (3) K: “An Engineering Approach to Computer Networking” by S. Keshav, 1997. - Ch. 8, 9, 13.3, 14 (copy) (4) MIT- Lecture: (copy) MIT-L3.4-sw, MIT-L4.2.6-rt, MIT-L4-interdomain, MIT-L8-fq, MIT-L6-e2ecc, MIT-L7-routercc, MIT-L6.5-qos, 2. Papers (25) (ftp server) (copy?) 3. Lecture notes (~150 x 6) (ftp server) (copy?) http://ibm.tju.edu.cn/learning/ytshu/Net_I_07/ ftp://59.67.33.8/ytshu/Net_I_07/ (cuteftppro8) 4. Books for programming (5) TCP/IP Illustrated, Volume 1: The Protocols by W. Richard Stevens. (6) Unix Network Programming: Networking APIs: Sockets and XTI (Volume 1) by W. Richard Stevens, 1998. (7) Advanced Programming in the Unix Environment by W. Richard Stevens, Addison-Wesley, 1993. Course Outline: -----------------------------------------------------------------Part 1: Internetworking -----------------------------------------------------------------Ch. 1 Introduction 2H Ch. 2 Virtual Circuit Switching - ATM & MPLS (MP-Lambda-S) 2H Ref: PD 3.1+3.3+3.5+4.5, KR5.8 Ch. 3 Switching and Router Design 2H Ref: K8.1+8.3+8.4+8.5, MIT-L3.4-sw, MIT-L4.2.6-rt, Read/review 2: Oct. 18 [P98] (50GbR) C. Partridge et. al., "A 50-Gb/s IP router", IEEE/ACM Transactions on Networking, Vol. 6, No. 3 (June 1998), Pages 237-248. Oct. 18 [B+97b] A. Brodnik, S. Carlsson, M. Degermark, and S. Pink, "Small Forwarding Tables for Fast Routing Lookups", ACM SIGCOMM 97. Pages 3-14. ? [M99] Nick McKeown, “The iSLIP Scheduling Algorithm for Input-Queued Switches”, IEEE/ACM Transactions On Networking, Vol. 7, No. 2, April 1999 Ch. 4 Routing 4H - intradomain routing - interdomain routing / BGP: Convergence, Policy, New architectures, Ref: MIT-L4-interdomain, Exercises: PD ch4 (BGP) Read/review 3: Oct. 21 [GSW02] T. G. Griffin, F. B. Shepherd and G. Wilfong, "The Stable Paths Problem and Interdomain Routing", IEEE Transactions on Networking, April 2002. Oct. 25 [LAJ99] C. Labovitz, A. Ahuja and F. Jahanian, "Experimental Study of Internet Stability and Wide-Area Network Failures", Proceedings of FTCS99, Madison, WI, June 22, 1999. Oct. 25 [Feamster04] Nick Feamster, Hari Balakrishnan Jennifer Rexford, Aman Shaikh, Jacobus van der Merwe, The Case for Separating Routing from Routers, SIGCOMM'04 Workshops, Aug. 30-Sept. 3, 2004, Portland, Oregon, USA. ? [Subramanian04] Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, Morley Mao, Scott Shenker, Ion Stoic, Towards a Next Generation Interdomain Routing Protocol -----------------------------------------------------------------Part 2: Resource Management -----------------------------------------------------------------Ch. 5 Scheduling and Policing Ref: K9, K13.3, MIT-L8-fq 2H Read/review: ? [csfq] I.Stoica, S.Shenker, H.Zhang, “Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Network,” in Proc. ACM Sigcomm, September 1998, Vancouver, Canada. Ch. 6 Congestion Control - End-to-end congestion control - Router-assisted congestion control 4H Ref: MIT-L6-e2ecc, MIT-L7-routercc, Exercises: PD ch6 Read/review 6: Nov. 1 [RJ90] Raj Jain, “Congestion control in computer networks: issues and trends,” IEEE Network Magazine, May 1990, pp. 24-30. Nov. 1 [JK88] V. Jacobson and M. Karels, “Congestion Avoidance and Control,” In Proc. ACM SIGCOMM '88 (Stanford, CA, August, 1988). Nov. 1 [CJ89] D.M. Chiu and R. Jain, “Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks,” Computer Networks and ISDN Systems, Vol. 17, pp. 1-14, 1989. Nov. 4 RFC 3448 or [FHPW00] TFRC RFC 3448 M. Handley, S. Floyd, J. Pahdye and J. Widmer, "TCP Friendly Rate Control (TFRC): Protocol Specification", RFC 3448, Proposed Standard, January 2003. --[FHPW00] Sally Floyd, Mark Handley, Jitendra Padhye, and Joerg Widmer, “Equation-Based Congestion Control for Unicast Applications,” SIGCOMM 2000, August 2000. Nov. 4 [KHR02] (XCP) Dina Katabi, Mark Handley, and Charles Rohrs, Congestion Control for Future High Bandwidth-Delay Product Networks . ACM Sigcomm 2002, August 2002. Nov. 4 [FJ93] (RED-AQM) S. Floyd and V. Jacobson, "Random Early Detection gateways for Congestion Avoidance" IEEE/ACM Transactions on Networking, 1(4):397-413 August 1993. Ch. 7 Traffic Management - Economic principles - Traffic models + LRD - Time scales – Mechanisms 4H Ref: K14 Read/review 4: Nov. 11 [ZXS98] Lianfang Zhang, Fei Xue, Yantai Shu, “Models of Self-Similar Traffic on High-Speed Network and their Performance Evaluation,” Computer Research and Development, Vol. 35, No. 6, pp. 548-552, June 1998. Nov. 11 [LTWW94] Will E. Leland, Murad S. Taqqu, Walter Willinger, and Daniel V. Wilson, “On the Self-Similar Nature of Ethernet Traffic (Extended Version),” IEEE/ACM Transactions on Networking. Vol 2, No 1, February 1994. Nov. 11 [SXJY98] Yantai Shu, Fei Xue, Zhigang Jin, Oliver Yang, “The Impact of Self-similar Traffic on Network Delay,” in Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, pp. 349-352, Waterloo, Canada, May 24-28, 1998. Nov. 15 [SJT01] Yantai Shu, Zhigang Jin, Dongxu Tian, "Dial-up User Models and Traffic Prediction," in Proceedings of the Future Telecommunications Conference 2001 (FTC01), pp. 90-93, Beijing, China, Nov. 29-30, 2001. Ch. 8 QoS 2H - Intserv/RSVP in ch 7, Diffserv, and MPLS in ch 2 Ref: MIT-L6.5-bruce-qos, KR7.8 + 7.9 Ch. 9 Measurement - Measurement, Routing Measurement 2H Ref: KR9 Read/review: 2 Nov. 22 [Pax04] V. Paxson, Strategies for Sound Internet Measurement, Proc. ACM IMC, October 2004. Nov. 22 [Pax97] V. Paxson, End-to-End Routing Behavior in the Internet , IEEE/ACM Trans. on Networking , Vol. 5, No. 5, pp. 601-615, October 1997. [Pax96] V. Paxson, "End-to-End Routing Behavior in the Internet". ACM SIGCOMM '96, August 1996, Stanford, CA. ------------------------------------------------------------------Part 3: Application and Overlay ------------------------------------------------------------------Ch. 10 Network Services 4-6H - IP multicasting Ref: KR4.7 - Overlay networks Read/review 1?: [CRZ00] Y. Chu, S. G. Rao, and H. Zhang, "A Case For End System Multicast", Proceedings of ACM SIGMETRICS'00, Santa Clara, CA, June 2000. + ??? - P2P, - DHTs, - DHT Applications Read/review 4?: [Balakrishnan03] (DHT Survey) Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica, Looking up Data in P2P Sytems, Communications of the ACM, February 2003/Vol. 46, No. 2 [SM+01] I. Stoica , R. Morris , D. Karger , M. Kaashoek , H. Balakrishnan , Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications , Proc. ACM SIGCOMM , San Diego, CA, August 2001. + ??? ------------------------------------------------------------------Part 4: Security ------------------------------------------------------------------- Ch. 11 Security - DDoS and Traceback, Worms and Privacy 4H Read/review 4?: [SEV+04] Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage, Automated Worm Fingerprinting, OSDI04 + ??? ? [SPW02] Stuart Staniford, Vern Paxsony, Nicholas Weaver, How to 0wn the Internet in Your Spare Time, in the Proceedings of the 11th USENIX Security Symposium (Security '02) ? [killbots] Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur W. Berger, Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds, 2nd Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005 ==================================================== Net-II-08 Title: Hot Topics on Computer Network Research 计算机网络研究热点问题 ------------------------------------------------------------------Part A - Wireless Networks ------------------------------------------------------------------1. 2. 3. 4. Cellular systems (GSM, CDMA, UMTS) Wireless LANs (802.11, Bluetooth); MAC layer protocols Ad hoc wireless networks (routing, multicast, ad hoc TCP, QoS support) Sensor networks Read/review: papers ------------------------------------------------------------------Part B - Internet protocols ------------------------------------------------------------------Ch.5 More about QoS 7H - QoS, Traffic modeling, BW estimation / congestion control / TCP, QoS routing 5.1 Engineering for QoS 5.2 Traffic modeling and prediction 5.3 QoS routing 5.4 BW Estimation and TCP Read/review: papers 2h 2h 1h 2h Ch.6 Internet Architecture - I3 active net Tussle OCALA Read/review: papers 2H