This course is taught 'seminar style'. This implies students present papers selected from the current computer networks literature with discussion by the rest of the class. With current enrollment of six students, each student can expect to make three to four presentations.
Students must choose papers from the current list of
Computer Networks Research Topic Areas.
This semester I plan to divide the semester into four or five topics that
will each be the source of papers for a few weeks.
The List of Important Networking Journals
and Conferences is presented roughly in decreasing order of providing
quality papers for class presentations.
This course includes a Updated Course Project, and a Final Exam. Here are the set of questions for the Final Exam! PDF
Most of the material covered in this course will be taken from the current computer networking literature. However, a Computer Networks Textbooks List is provided for students seeking reference books.
The course syllabus will be constructed from the set of papers selected from the literature. The Spring 2002 Syllabus will give you an idea of the sophisticaton level of the papers.
Chris Cox's Presentation on Library Resources |   |   | |
Course Objectives | (pdf) | (ppt) | |
Hobb's Internet History |   |   | |
TCP Sliding Windows | (pdf) | (ppt) | |
General Congestion Control and Queuing | (pdf) | (ppt) | |
TCP Congestion Control | (pdf) | (ppt) | |
Random Early Detection Gateways for Congestion Avoidance | (pdf) | (ppt) | |
Tuning RED for Web Traffic | (pdf) | (ppt) | |
Core Stateless Fair Queuing | (pdf) | (ppt) | |
The War between Mice and Elephants | (pdf) | (ppt) | |
Promoting the Use of End-to-End Congestion Control in the Internet | (pdf) | (ppt) | |
A Study of Active Queue Management for Congestion Control | (pdf) | (ppt) | |
Analysis and Design of an Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management | (pdf) | (ppt) | |
Congestion Control for High Bandwidth-Delay Product Networks | (pdf) | (ppt) | |
Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments | (pdf) | (ppt) | |
End-to-End Bandwidth Estimation in TCP to Improve Wireless Link Utilization | (pdf) | (ppt) | |
Discriminating Congestion Losses from Wireless Losses using Inter-Arrival Times at the Receiver | (pdf) | (ppt) | |
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols | (pdf) | (ppt) | |
The Impact of Multihop Wireless Channel on TCP Throughput and Loss | (pdf) | (ppt) | |
Proxy-based TCP-friendly streaming over mobile networks | (pdf) | (ppt) | |
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks | (pdf) | (ppt) | |
Using Overlays to Improve Network Security | (pdf) | (ppt) | |
A Methodology for Analyzing the Performance of Authentication Protocols | (pdf) | (ppt) | |
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial | (pdf) | (ppt) | |
Hash-Based IP Traceback | (pdf) | (ppt) | |
Distributed Priority Scheduling and Medium Access in Ad-hoc Networks | (pdf) | (ppt) | |
Supporting Differentiated Services in MPLS Networks | (pdf) | (ppt) | |
Domain and Type Enforcement Firewalls | (pdf) | (ppt) | |
Controlling High Bandwidth Aggregates in the Network | (pdf) | (ppt) | |
Interposed Request Routing for Scalable Network Storage | (pdf) | (ppt) |
Bob Kinicki
Modified 6 April 2003