CS/EE145b: Networking

 

Basic Information:

9 units

Time and place: MWF 13:00 - 13:55, 080 MRE

Instructors: Tracey Ho (tho@caltech.edu)

                   Lijun Chen (chen@cds.caltech.edu)

Teaching Assistant: Tao Cui (taocui@caltech.edu)

Office hours: by appointment

 

Course Description:

This course covers networking topics in areas of current research interest, including network coding, network security, peer-to-peer networks, and traffic engineering. If time allows, we will cover one or more additional topics to be determined by student interests.

 

Format:

The class will meet three times per week. The instructors will give overviews of the topics during the first several weeks.  Thereafter, students will present and discuss papers of their choice from a given reading list, interspersed with guest lectures and additional instructor lectures as needed.

 

Prerequisites:

Familiarity with networking at the level of CS/EE145a. Prior exposure to information theory and optimization theory will be useful for some of the papers, but is not required.

 

The former CS/EE145a webpage is http://www.its.caltech.edu/~eecs145/145a.html 

 

Schedule:

Students should submit their choice of papers by January 18, along with dates that they cannot present.  The instructors will then put together the class schedule.

 

The preliminary schedule:

 

Wednesday, January 9

Network Coding I

Lecture Note, download

Friday, January 11

Network Coding II

Lecture Note, download

Monday, January 14

Peer-to-Peer Networking

Lecture Note, download

Wednesday, January 16

Game Theory

Lecture Note, download

Friday, January 18

Traffic Engineering I

 

Monday, January 21

Institute Holiday

 

Wednesday, January 23

Peer-to-Peer Networking III

 

Friday, January 25

Traffic Engineering II

 

Monday, January 28

Power-saving Inside a Network Switch

 

Wednesday, January 30

Network Security I

Lecture Note, download

Friday February 1

Network Security II

 

                     

Grading:

Paper presentations and one-page writeups 60%

Final report (a critical/comparative survey of a few papers on a specific topic or a project proposal suitable for CS/EE145c) 40%

 

Grading will be based on the understanding and insight shown in the presentation and summary, and the organization and quality of the presentation.  If you are not used to giving presentations, you are encouraged to approach the instructors/TA for advice.

 

Paper Presentations and Review Summaries:

Each student will be responsible for presenting two papers from the suggested list, and writing review summaries of these and two other papers. If you have other papers in mind you'd like to present, please let the instructors know by 1/15, to give us time to look at the papers and get back to you.  Please send e-mail to the TA by Friday 1/18 listing your top five paper choices, in order of preference, and also listing any dates that you are unavailable.  Papers are assigned on a first-come first-served basis. We will then post the chosen papers and seek your preferences regarding which two other papers you'll review; assignments are again on a first-come first-served basis.

 

The presentations should be about 40 minutes long (50 minutes with questions/comments from the audience), and the review summaries should be one page or less.  Both should cover the problem addressed, main contributions, any assumptions made, etc., and give a thoroughly-considered assessment of the strengths and weaknesses of the paper.  The presentation should also cover any background material or related papers that aid understanding of the paper and its contributions.  The presentation slides or transparencies, and the review summaries, should be submitted to the TA at least 24 hours before class, to allow time for feedback if any.  The presenter and reviewer are encouraged to discuss the paper in advance, but each review should be written up independently without looking at the other. The reviews will be posted on the class webpage by the morning of class. Other students are encouraged to read the papers and summaries, and think of questions or comments to discuss in class.

 

Presentation Schedule:

 

Date

Paper

Presenter

2/4

D. Petrović, K. Ramchandran, and J. Rabaey, ¡°Overcoming Untuned Radios in Wireless Networks with Network Coding,¡± Proc. of Workshop on Network Coding, Theory, and Applications, April 2005.

Theodoros Dikaliotis

2/6

S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, ¡°XORs in The Air: Practical Wireless Network Coding,¡± in Proc. of ACM SIGCOMM, 2006.

Andrew Tan

2/8

D. Silva, F. R. Kschischang and R. Koetter, ¡°A Rank-Metric Approach to Error Control in Random Network Coding,¡± in Proc. of IEEE Information Theory Workshop, July, 2007.

Svitlana Vyetrenko

2/11

(12:30 -2pm)

M. Langberg, A. Sprintson and J. Bruck, ¡°The Encoding Complexity of Network Coding,¡± IEEE Transactions on Information Theory, June 2006.

and

C. Gkantsidis, J. Miller, P. Rodriguez, ¡°Anatomy of a P2P Content Distribution System with Network Coding,¡± in Proc. of International Workshop on Peer-to-Peer Systems, 2006.

Theodoros Dikaliotis

 

 

 

Christopher S. Chang

2/13

(12:30 -2pm)

X. Yang and G. de Veciana, "Service Capacity of Peer to Peer Networks," in Proc. of IEEE INFOCOM, 2004.

and

Saurabh Tewari and Leonard Kleinrock, "Proportional Replication in Peer-to-Peer Networks," in Proc. of IEEE INFOCOM, April 2006.

Cheng William Hong

 

 

William Clark

2/15

No class

 

2/18

Institution Holiday

 

2/20

S. A. Baset, H. Schulzrinne, ¡°An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol,¡± in Proc. of IEEE INFOCOM, April 2006.

Michelle Jiang

2/22

Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and  S. Shenker,  ¡°Making Gnutella-Like P2P Systems Scalable,¡±  in Proc. of ACM SIGCOMM, Aug. 2003.

Stephen Heumann

2/25

M. Feldman, K.Lai, I. Stoica, and J. Chuang, ¡°Robust Incentive Techniques For Peer-To-Peer Networks,¡± in Proc. of ACM Conference on Electronic Commerce, 2004.

Michelle Jiang

2/27

D. Applegate and E. Cohen, "Making Intra-Domain Routing Robust to Changing and Uncertain Traffic Demands: Understanding Fundamental Tradeoffs," in Proc. of ACM SIGCOMM, Aug. 2003.

Jayakrishnan Unnikrishnan

2/29

S. Kandula, D. Katabi, B. Davie, and A. Charny, "Walking the Tightrope: Responsive Yet Stable Traffic Engineering," in Proc. of ACM SIGCOMM, Aug. 2005.

William Clark

3/3

Nick Feamster, Jay Borkenhagen, and Jennifer Rexford, ¡°Guidelines for Interdomain Traffic Engineering,¡± ACM SIGCOMM Computer Communications Review, October 2003.

Stephen Heumann

3/5

H. Wang, H. Xie, L. Qiu, Y. R. Yang, Y. Zhang, A. Greenberg, "COPE: Traffic Engineering in Dynamic Networks," in Proc. of ACM SIGCOMM, Sep. 2006.

Jayakrishnan Unnikrishnan

3/7

(12:30-2 pm)

Fang Zhao, Ton Kalker, Muriel Medard, and Keesook J. Han, "Signatures for Content Distribution with Network Coding," in Proc. of IEEE International Symposium on Information Theory, 2007.

and

K. Sanzgiri, B. Dahill, B. N.  Levine, C. Shields, and E. Belding-Royer, ¡° A Secure Routing Protocol for Ad Hoc Networks,¡± in Proc. of  IEEE International Conference on Network Protocols, 2002.

Christopher S. Chang

 

 

 

 Cheng William Hong

3/10 (12:30-2 pm)

Aleksandar Kuzmanovic and Edward W. Knightly, ¡°Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants),¡± in Proc. of ACM SIGCOMM, Aug. 2003

and

John R. Douceur, "The Sybil Attack," in Proc. of International Workshop on Peer-to-Peer Systems, 2002.

Andrew Tan

 

 

 

Svitlana Vyetrenko

3/12

No class

 

 

Suggested Readings

 

Network Coding and Security:

1.        Y. E. Sagduyu, A. Ephremides, "Some Optimization Trade-offs in Wireless Network Coding," in Proc. Conference on Information Sciences and Systems, Mar. 2006.

2.        Alex Dimakis, Vinod Prabhakaran and Kannan Ramchandran, "Decentralized Erasure Codes for Distributed Networked Storage," IEEE Transactions on Information Theory, June 2006.

3.        Stuart Staniford, Vern Paxson, Nicholas Weaver, "How to Own the Internet in Your Spare Time," in Proc. of USENIX Security Symposium, 2002.

4.        Haowen Chan, Adrian Perrig, Dawn Song, "Random Key Predistribution Schemes for Sensor Networks," in Proc. of IEEE Symposium on Security and Privacy, 2003.

5.        Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," in Proc. of International Conference on Network Protocols, 2001

 

Peer-to-Peer

1.        Bram Cohen, ¡°Incentives Build Robustness in BitTorrent.¡±

2.        Matthias Bender, Sebastian Michel, Christian Zimmer, Peter Triantafillou, Gerhard Weikum, ¡°P2P Content Search: Give the Web Back to the People,¡± in Proc. of International Workshop on Peer-to-Peer Systems, 2006.

3.        L. Massoulie, M. Vojnovic, "Coupon Replication Systems," in Proc. of ACM SIGMETRICS, 2005.

4.        H. Balakrishnan, F. M. Kaashoek, D. Karger, R. Morris, and I. Stoica, ¡°Looking Up Data in P2P Systems,¡± Communications of the ACM, 2003,

5.        J. Shneidman, D. C. Parkes, and L. Massouli¨¦, ¡°Faithfulness in Internet Algorithms,¡± in Proc. of ACM SIGCOMM, Aug. 2004.

 

Traffic Engineering

1.        B. Fortz, J. Rexford, and M. Thorup, ¡°Traffic Engineering with Traditional IP Routing Protocols,¡± IEEE Communication Magazine, Oct. 2002.

2.        D.O. Awduche, ¡°MPLS and Traffic Engineering in IP Networks,¡± IEEE Communications Magazine, December 1999.

3.        Jennifer Rexford, ¡°Route Optimization in IP networks,¡± Chapter in Handbook of Optimization in Telecommunications, Springer, February 2006.

4.        B. Fortz and M. Thorup, "Internet Traffic Engineering by Optimizing OSPF Weights," in Proc. of IEEE INFOCOM, 2000.

5.        A. Elwalid, C. Jin, S. Low, and I. Widjaja, ¡°MATE: MPLS Adaptive Traffic Engineering,¡± in Proc. of IEEE INFOCOM, April 2001.

6.        Dahai Xu, Mung Chiang, and Jennifer Rexford, ¡°Link-State Routing with Hop-By-Hop Forwarding Can Achieve Optimal Traffic Engineering,¡± in Proc. of IEEE INFOCOM, April 2008.