Special Topics
In the last few lectures, we will cover several special topics that we collectively select. Below are some example topics and papers covered in past semesters. Among the many other topics we could cover are:
- Anomaly detection
- Cellular networks
- Data center services
- Green networking
- Home networks
- Middleboxes
- Naming
- Network coding
- Network debugging and correctness
- Social networks
- Software Defined Networking (SDN) applications
- Web infrastructure
- Greater depth on any topic covered earlier in the semester
Date | Topic | Example readings and notes |
---|---|---|
Data center transport |
Hunting Mice with Microsecond Circuit Switches (Farrington et al, HotNets 2012) Jellyfish (Singla et al, NSDI 2012), Deconstructing Datacenter Packet Transport (Alizadeh et al, HotNets 2012), Less is More (Alizadeh et al, NSDI 2012), Multipath TCP (Wischik, NSDI 2011), Improving Datacenter Performance and Robustness with Multipath TCP (Wischik, SIGCOMM 2011) |
|
Botnets and Spam |
End-to-end analysis of the spam value chain (Levchenko, IEEE Symposium on Security & Privacy 2011) Measuring and Fingerprinting Click-Spam in Ad Networks (Dave, Guha, and Zhang, SIGCOMM 2012) Spamalytics: An Empirical Analysis of Spam Marketing Conversion (Kanich, CACM 2009), Show me the money (Kanich, USENIX Security 2011) |
|
Privacy and anonymity |
Tor (Dingledine, USENIX Security 2004), Telex (Wustrow, USENIX Security 2011; see also telex.cc) |
|
Wireless | Mirror Mirror on the Ceiling (Zhou et al, SIGCOMM 2012) ZigZag Decoding (Gollakota, SIGCOMM 2008), Efficient Error Estimating Coding (Chen, SIGCOMM 2010), They can hear your heartbeats (Gollakota, SIGCOMM 2011) |
|
Future Internet architectures |
Tor instead of IP (Liu, Han, Krishnamurthy, Anderson, HotNets 2011) Tussle in Cyberspace: Defining Tomorrow's Internet (Clark, Transactions in Networking, 2005), Accountable Internet Protocol (Anderson, SIGCOMM 2008), HTTP as the Narrow Waist (Popa, Hotnets 2010), Pathlets (Godfrey, SIGCOMM 2009), Data-Oriented Network Architecture (Koponen, SIGCOMM 2007), Networking Named Content (Jacobson, CoNEXT 2009), Software-Defined Internet Architecture (Raghavan et al, Hotnets 2012) |
|
Overlay and P2P |
Chord (Stoica, Karger, Kaashoek, Balakrishnan, SIGCOMM 2001) Resilient Overlay Networks (Anderson, SOSP 2001), Minimizing Churn (Godfrey, SIGCOMM 2006), Sybil-proof DHT (Lesniewski-Laas, NSDI 2010), Dynamo: Amazon's highly available key-value store (DeCandia, SOSP 2007), i3 (Stoica, SIGCOMM 2002), OpenDHT (Rhea, SIGCOMM 2005), UIA (Ford, OSDI 2006) |
|
Social networks |
SybilGuard (Yu, Kaminsky, Gibbons, Flaxman, SIGCOMM 2006) |
|
Wireless coding |
ZigZag Decoding: Combating Hidden Terminals in Wireless Networks (Gollakota, SIGCOMM 2008) Efficient Error Estimating Coding (Chen, SIGCOMM 2010) |
|
Delay and disruption tolerant networks (DTN) | Routing in a Delay Tolerant Network (Jain, SIGCOMM 2004) | |
Content-centric networks | Data-Oriented Network Architecture (Koponen, SIGCOMM 2007) Networking Named Content (Jacobson, CoNEXT 2009) |
|
Information flow control |
Securing Distributed Systems with Information Flow Control (Zeldovich, NSDI 2008) |
|
Internet measurement |
Internet Inter-Domain Traffic (Labovitz, SIGCOMM 2010), California Fault Lines (Turner, SIGCOMM 2010), Delayed Internet Routing Convergence (Labovitz, ToN 2001), Impact of Routing Events (Wang, SIGCOMM 2006), Reverse traceroute (Katz-Bassett, NSDI 2010), Broadband Internet performance: a view from the gateway (Sundaresan, SIGCOMM 2011) |