This course will be conducted in 'seminar style'. Except for background material, the course consists of reading and discussing technical papers taken from the current computer networks literature. Seminar style implies that the students participate in both the presentations and in the discussion.
Given that we will typically cover three papers per week, I am going to require that each student turn in a Paper Evaluation Form for each paper covered at the beginning of every class.
The course includes a Course Project, and
a Final Exam. See initial questions from Spring 2003
Final Exam.
Note - The Final Exam will be an INDIVIDUAL oral exam this semester.
The Oral Exam will feature questions related to the
List of General Topic Areas.
Each student is required to submit two hardcopies of research papers to help form the course material. One paper should come from the research literature of Wireless Protocols, and the second paper should come from the area of Network Security Issues.
Chris Cox's Presentation on Library Resources |   |   | |
Course Objectives | (pdf) | (ppt) | |
Hobb's Internet History |   |   | |
TCP Sliding Windows | (pdf) | (ppt) | |
General Congestion Control and Queuing | (pdf) | (ppt) | |
TCP Congestion Control | (pdf) | (ppt) | |
Random Early Detection Gateways for Congestion Avoidance | (pdf) | (ppt) | |
Tuning RED for Web Traffic | (pdf) | (ppt) | |
Core Stateless Fair Queuing | (pdf) | (ppt) | |
The War between Mice and Elephants | (pdf) | (ppt) | |
Promoting the Use of End-to-End Congestion Control in the Internet | (pdf) | (ppt) | |
Analysis and Design of an Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management | (pdf) | (ppt) | |
Congestion Control for High Bandwidth-Delay Product Networks | (pdf) | (ppt) | |
A State Feedback Control Approach to Stabilizing Queues for ECN-Enabled TCP Connections | (pdf) | (ppt) | |
MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network | (pdf) | (ppt) | |
Interworking Internet Telephony and Wireless Telecommunications Networks | (pdf) | (ppt) | |
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols | (pdf) | (ppt) | |
Comprehensive Performance Analysis of a TCP Session Over a Wireless Fading Link With Queueing | (pdf) | (ppt) | |
Understanding TCP fairness over Wireless LAN | (pdf) | (ppt) | |
The Impact of Multihop Wireless Channel on TCP Throughput and Loss | (pdf) | (ppt) | |
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks | (pdf) | (ppt) | |
Detecting SYN Flooding Attacks | (pdf) | (ppt) | |
A Technique for Counting NATted Hosts Protocols | (pdf) | (ppt) | |
SAVE: Source Address Validity Enforcement Protocol | (pdf) | (ppt) | |
Detecting Network Intrusions via Sampling : A Game Theoretic Approach | (pdf) | (ppt) | |
The Honeynet Project: Trapping the Hackers | (pdf) | (ppt) | |
Storage Area Networks | (pdf) | (ppt) | |
Internet2 | (pdf) | (ppt) | |
Simulating Web Traffic | (pdf) | (ppt) | |
Firewalls | (pdf) | (ppt) | |
3Com Network Measurement | (pdf) | (ppt) | |
Wireless Security | (pdf) | (ppt) |
Bob Kinicki
Modified 29 July 2003