WPI Worcester Polytechnic Institute

Computer Science Department
------------------------------------------

Distributed Computer Systems Reading List

B-Term 2003


File Systems

(Appropriate File Systems chapter from Introductory OS text book)

[Flo00] J. S. Florido. Journal File Systems, Linux Gazette, Volume 55, July 2000. (slides: ppt, pdf)

[HLM02] D. Hitz, J. Lau, and M. Malcolm. File System Design for an NFS File Server Appliance, Technical Report TR3002, NetApp, 2002. (slides: ppt, pdf)


The Web

[TS02] A. Tanenbaum and M. Steen. Distributed Systems, Principles and Paradigms, Chapter 11.1, Prentice Hall, 2002. (slides: ppt, pdf)

[HJS03] F. Hernandez-Campos, K. Jeffay, and F.D. Smith. Tracing the Evolution of the Web Traffic: 1995-2003, In Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), Orlando, FL, October 2003. (slides: ppt, pdf)

Additional Reading

[SGD+02] S. Saroiu, K. Gummadi, R. Dunn, S. Gribble and H. Levy. An Analysis of Internet Content Delivery Systems, In Proceedings of the 5th Usenix Operating Systems Design and Implementation (OSDI), Boston, MA, USA, October 2002.

[GM01] L. Guo and I. Matta. The War Between Mice and Elephants, In Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), Riverside, CA, USA, November 2001.

[All00] M. Allman. A Web Server's View of the Transport Layer, ACM Computer Communication Review, Volume 30, Number 5, October 2000.

[BBK00] N. Bhatti, A. Bouch and A. Kuchinsky. Integrating User-Perceived Quality into Web Server Design, In Proceedings of the 9th International World Wide Web Conference, Amsterdam, May 2000.

[WPP02] L. Wang, V. Pai and L. Peterson. The Effectiveness of Request Redirection on CDN Robustness, ACM SIGOPS Operating Systems Review - special issue on "Network Behavior", Volume 36, Pages 345-360, Winter 2002.


Network Games

[SKH02] J. Smed, T. Kaukoranta and H. Hakonen. Aspects of Networking in Multiplayer Computer Games, The Electronic Library, Volume 20, Number 2, Pages 87-97, 2002. (slides: ppt, pdf)

[BT01] P. Bettner and M. Terrano. 1500 Archers on a 28.8: Network Programming in Age of Empires and Beyond, Gamasutra, March 22, 2001. (slides: ppt, pdf)

Additional Reading

[Ber01] Y. Bernier. Latency Compensating Methods in Client/Server In-game Protocol Design and Optimization, Proceedings of the Game Developers Conference, February 2001.

[SGB+03] N. Sheldon, E. Girard, S. Borg, M. Claypool and E. Agu. The Effect of Latency on User Performance in Warcraft III, In Proceedings of ACM NetGames, Redwood City, CA, USA, May 2003.

[PW02] L. Pantel and L. Wolf. On the Impact of Delay on Real-Time Multiplayer Games, In Proceedings of the Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Miami, FL, USA, May 2002.

[FCFW02] Wu-chang Feng, Francis Chang, Wu-chi Feng, Jonathan Walpole. Provisioning On-line Games: A Traffic Analysis of a Busy Counter-Strike Server, In Proceedings of the ACM SIGCOMM Internet Measurement Workshop (IMW), Marseille, France, November 6-8, 2002.


Peer-to-Peer Systems

[MKL+02] D. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins and Z. Xu. Peer-to-Peer Computing, Technical Report HPL-2002-57, HP Laboratories, Palo Alto, March 2002. (slides: ppt, pdf)

[SGG02] S. Saroiu, P. Gummadi, and S. Gribble. Measuring and Analyzing the Characteristics of Napster and Gnutella Hosts, Multimedia Systems Journal, Volume 8, Issue 5, November 2002. (slides: ppt, pdf)

Additional Reading

[RFI02] M. Ripeanu, I. Foster and A. Iamnitchi. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design, in IEEE Internet Computing Journal, special issue on "Peer-to-Peer Networking", Volume 6, Number 1, 2002.


Security

[MSK02] D. Moore, C. Shannon and k claffy. Code-Red: a Case Study on the Spread and Victims of an Internet Worm, In Proceedings of the 2nd Internet Measurement Workshop, Marseille, France, November 6-8, 2002.

[Res03] E. Rescorla. Security Holes . . . Who Cares?, In Proceedings of the 12th USENIX Security Symposium, Pages 75-90, Washington D.C., USA, August 2003.

Additional Reading

[Cla01] M. Claypool. `Phreak, Out!' - A Hacker's View of a Cracker, Computer Science Colloquium, Worcester Polytechnic Institute, December 2001.

[HHP03] A. Hussain, J. Heidemann and C. Papadopoulos. A Framework for Classifying Denial of Service Attacks, In Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August, 2003.


Network Operating Systems, Distributed Operating Systems, Computer Clusters, The Grid ...

(As time allows ... papers TBD)