Advanced Computer Networks
cs 538 spring 2017

Special Topics

In the last few lectures, we will cover several special topics that we collectively select. Below are some example topics and papers covered in past semesters. Among the many other topics we could cover are:

DateTopicExample readings and notes
Wed Apr 26 SDN control frameworks and VeriFlow Composing Software-Defined Networks (Monsanto et al., NSDI 2013)
Denial of service


DDoS Defense by Offense (Walfish, SIGCOMM 2006), To Filter or to Authorize (Liu, SIGCOMM 2008), Network-level Behavior of Spammers (Ramachandran, SIGCOMM 2006), Not-a-Bot (Gummadi, NSDI 2009)

Data center optics

Integrating Microsecond Circuit Switching into the Data Center (Porter et al, SIGCOMM 2013)

c-Through (Wang et al, SIGCOMM 2010), Helios: A Hybrid Electrical/Optical Switch Architecture for Modular Data Centers (Farrington et al, SIGCOMM 2010), OSA (Chen et al, NSDI 2012)


NIRA (Yang, ToN 2007)

Compact routing (Thorup and Zwick, SPAA 2001), SEATTLE (Kim, SIGCOMM 2008), ViAggre (Ballani, NSDI 2009), Scalable routing on flat names (Singla, CoNEXT 2010)

Data center transport

Hunting Mice with Microsecond Circuit Switches (Farrington et al, HotNets 2012)

Jellyfish (Singla et al, NSDI 2012), Deconstructing Datacenter Packet Transport (Alizadeh et al, HotNets 2012), Less is More (Alizadeh et al, NSDI 2012), Multipath TCP (Wischik, NSDI 2011), Improving Datacenter Performance and Robustness with Multipath TCP (Wischik, SIGCOMM 2011)

Botnets and Spam

End-to-end analysis of the spam value chain (Levchenko, IEEE Symposium on Security & Privacy 2011) Measuring and Fingerprinting Click-Spam in Ad Networks (Dave, Guha, and Zhang, SIGCOMM 2012)

Spamalytics: An Empirical Analysis of Spam Marketing Conversion (Kanich, CACM 2009), Show me the money (Kanich, USENIX Security 2011)

Privacy and anonymity

Tor (Dingledine, USENIX Security 2004), Telex (Wustrow, USENIX Security 2011; see also


Mirror Mirror on the Ceiling (Zhou et al, SIGCOMM 2012)

DCNs with Wireless (Halperin et al, SIGCOMM 2011), ZigZag Decoding (Gollakota, SIGCOMM 2008), Efficient Error Estimating Coding (Chen, SIGCOMM 2010), They can hear your heartbeats (Gollakota, SIGCOMM 2011)

Overlay and P2P

Chord (Stoica, Karger, Kaashoek, Balakrishnan, SIGCOMM 2001)

Resilient Overlay Networks (Anderson, SOSP 2001), Minimizing Churn (Godfrey, SIGCOMM 2006), Sybil-proof DHT (Lesniewski-Laas, NSDI 2010), Dynamo: Amazon's highly available key-value store (DeCandia, SOSP 2007), i3 (Stoica, SIGCOMM 2002), OpenDHT (Rhea, SIGCOMM 2005), UIA (Ford, OSDI 2006)

Social networks

SybilGuard (Yu, Kaminsky, Gibbons, Flaxman, SIGCOMM 2006)

Wireless coding

ZigZag Decoding: Combating Hidden Terminals in Wireless Networks (Gollakota, SIGCOMM 2008)

Efficient Error Estimating Coding (Chen, SIGCOMM 2010)

Delay and disruption tolerant networks (DTN) Routing in a Delay Tolerant Network (Jain, SIGCOMM 2004)
Content-centric networks

Data-Oriented Network Architecture (Koponen, SIGCOMM 2007)

Networking Named Content (Jacobson, CoNEXT 2009)

Information flow control

Securing Distributed Systems with Information Flow Control (Zeldovich, NSDI 2008)

Internet measurement

Internet Inter-Domain Traffic (Labovitz, SIGCOMM 2010), California Fault Lines (Turner, SIGCOMM 2010), Delayed Internet Routing Convergence (Labovitz, ToN 2001), Impact of Routing Events (Wang, SIGCOMM 2006), Reverse traceroute (Katz-Bassett, NSDI 2010), Broadband Internet performance: a view from the gateway (Sundaresan, SIGCOMM 2011)