You are on page 1of 2

index.

htm

http://soict.hut.edu.vn/~sonnh/course/ttmk52/

Thng tin v lch hc mn Mng th h sau: - 2/9 Ngh l - 9/9 Ch v kin trc, nguyn l c bn Internet (Ging vin) - 16/9 Bt u tho lun vi ch 2 Lecture 1: Gii thiu (slides) Danh sch ti liu cn c cho cc nhm (Mi nhm ln chia lm 2 nhm nh, chun b trnh by 2 ti liu) Topic Reading assignment 2. Naming, DNS Hari Balakrishnan et. al., A Layered Naming Architecture for the Internet, SIGCOMM 2004 Untangling the Web from DNS (Walfish, SIGCOMM 2005) HLP: A Next Generation Inter-domain Routing Protocol Internet Inter-Domain Traffic, Sigcomm 2010 Van Jacobson. Congestion Avoidance and Control. Proc. SIGCOMM 1988 Nandita Dukkipati, Nick McKeown, Why Flow-Completion Time is the Right Metric for Congestion Control, ACM SIGCOMM Computer Communication Review S Sinha et al, Harnessing TCP's Burstiness with Flowlet Switching, HotNets 2004 Nandita Dukkipati's Ph.D. Thesis, Chapter 1 - Overview of Issues with TCP, 2007 I. E. Khayat, ... "Network Virtualization: A Viable Path Towards the Future Internet," Springer Wireless Pers. Commun., vol. 45, pp. 511-520, March 2008. C. Werle,..., "Network Virtualization Architecture: Proposal and Initial Prototype," in ACM SIGCOMM VISA, Barcelona, Spain, August 2009. Mohammad Alizadeh et. al., Data Center TCP (DCTCP), SIGCOMM 2010 VL2: A Scalable and Flexible Data Center Network (Greenberg, SIGCOMM 2009) Green Networks: Opportunities and Challenges http://www.ieeelcn.org /prior/LCN34/2009_Keynote_Christensen.pdf A Survey of Green Networking Research. Aruna Prem Bianzino, Claude Chaudet A. Yaar, A. Perrig, D. Song, SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks, IEEE Security and Privacy Symposium, 2004 M. Handley and V. Paxson, Network Intrusion Detection: Evasion,

3. Inter-domain routing

3. Congestion control

4. Next generation transport protocol

5. Network virtualization

6. Enterprise & Data Center Networks

7. Green networking

8. Security 1: DDoS detection and prevention

1 of 2

01/09/2011 09:49

index.htm

http://soict.hut.edu.vn/~sonnh/course/ttmk52/

Traffic Normalization, and End-to-End Protocol Semantics, USENIX 2001 V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time, In the ACM Workshop on Hot Topics in Networks (HotNets), November 2005. Anestis Karasaridis, Brian Rexroad, David Hoeflin. Wide-scale Botnet Detection and Characterization: HotBots, 2007 Ion Stoica et. al., Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, SIGCOMM 2001 Michael Feldman et al., Robust Incentive Techniques for Peer-to-Peer Networks, Electronic commerce 2004 Jrg Ott, Dirk Kutscher, Christoph Dwertmann, Integrating DTN and MANET Routing, Proc. of ACM SIGCOMM workshop on Challenged Networks (CHANTS) Balakrishnan: A comparison of mechanisms for improving TCP performance over wireless links Ratnasamy: Revisiting IP multicast XORs in the air: practical wireless network coding

9. Security 2: Intrusion Detection & BotNet

11. Overlay & P2P networks, CDN

10. Wireless & WDM Optical networks

12. Multicast

2 of 2

01/09/2011 09:49

You might also like