Advanced Computer Networks
cs 538 fall 2013

Special Topics

In the last few lectures, we will cover several special topics that we collectively select. Below are some example topics and papers covered in past semesters. Among the many other topics we could cover are:

DateTopicExample readings and notes
Data center transport

Hunting Mice with Microsecond Circuit Switches (Farrington et al, HotNets 2012)

Jellyfish (Singla et al, NSDI 2012), Deconstructing Datacenter Packet Transport (Alizadeh et al, HotNets 2012), Less is More (Alizadeh et al, NSDI 2012), Multipath TCP (Wischik, NSDI 2011), Improving Datacenter Performance and Robustness with Multipath TCP (Wischik, SIGCOMM 2011)

Botnets and Spam

End-to-end analysis of the spam value chain (Levchenko, IEEE Symposium on Security & Privacy 2011) Measuring and Fingerprinting Click-Spam in Ad Networks (Dave, Guha, and Zhang, SIGCOMM 2012)

Spamalytics: An Empirical Analysis of Spam Marketing Conversion (Kanich, CACM 2009), Show me the money (Kanich, USENIX Security 2011)

Privacy and anonymity

Tor (Dingledine, USENIX Security 2004), Telex (Wustrow, USENIX Security 2011; see also


Mirror Mirror on the Ceiling (Zhou et al, SIGCOMM 2012)

ZigZag Decoding (Gollakota, SIGCOMM 2008), Efficient Error Estimating Coding (Chen, SIGCOMM 2010), They can hear your heartbeats (Gollakota, SIGCOMM 2011)

Future Internet architectures

Tor instead of IP (Liu, Han, Krishnamurthy, Anderson, HotNets 2011)

Tussle in Cyberspace: Defining Tomorrow's Internet (Clark, Transactions in Networking, 2005), Accountable Internet Protocol (Anderson, SIGCOMM 2008), HTTP as the Narrow Waist (Popa, Hotnets 2010), Pathlets (Godfrey, SIGCOMM 2009), Data-Oriented Network Architecture (Koponen, SIGCOMM 2007), Networking Named Content (Jacobson, CoNEXT 2009), Software-Defined Internet Architecture (Raghavan et al, Hotnets 2012)

Overlay and P2P

Chord (Stoica, Karger, Kaashoek, Balakrishnan, SIGCOMM 2001)

Resilient Overlay Networks (Anderson, SOSP 2001), Minimizing Churn (Godfrey, SIGCOMM 2006), Sybil-proof DHT (Lesniewski-Laas, NSDI 2010), Dynamo: Amazon's highly available key-value store (DeCandia, SOSP 2007), i3 (Stoica, SIGCOMM 2002), OpenDHT (Rhea, SIGCOMM 2005), UIA (Ford, OSDI 2006)

Social networks

SybilGuard (Yu, Kaminsky, Gibbons, Flaxman, SIGCOMM 2006)

Wireless coding

ZigZag Decoding: Combating Hidden Terminals in Wireless Networks (Gollakota, SIGCOMM 2008)

Efficient Error Estimating Coding (Chen, SIGCOMM 2010)

Delay and disruption tolerant networks (DTN) Routing in a Delay Tolerant Network (Jain, SIGCOMM 2004)
Content-centric networks

Data-Oriented Network Architecture (Koponen, SIGCOMM 2007)

Networking Named Content (Jacobson, CoNEXT 2009)

Information flow control

Securing Distributed Systems with Information Flow Control (Zeldovich, NSDI 2008)

Internet measurement

Internet Inter-Domain Traffic (Labovitz, SIGCOMM 2010), California Fault Lines (Turner, SIGCOMM 2010), Delayed Internet Routing Convergence (Labovitz, ToN 2001), Impact of Routing Events (Wang, SIGCOMM 2006), Reverse traceroute (Katz-Bassett, NSDI 2010), Broadband Internet performance: a view from the gateway (Sundaresan, SIGCOMM 2011)