Date: Tue, 05 Nov 1996 20:52:51 GMT Server: NCSA/1.5 Content-type: text/html Last-modified: Thu, 18 Apr 1996 17:06:43 GMT Content-length: 6035
* = papers to DOIT % = papers available online 1/22 - Introduction 1/24 - No Class 1/26 - No Class 1/29 - Landweber - Overview of Internet 1/31 - Landweber R. Rivest, A. Shamir, L. Adelman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," CACM 21, (February 1978), pp. 120-126. 2/2 - No Class 2/5 - No Class 2/7 - No Class *2/9 - Weiqing Huang G. Wallace, "The JPEG Still Picture Compression Standard," 2/12 - No Class *2/14 - Jim Basney S. Deering, D. Cheriton, "Multicast Routing in Datagram Internetworks and Extended LANs," TOCS 8, (May 1990), pp. 85-110. %2/16 - A. Biggs M. Peirce, D. O'Mahony, "Scalable, Secure, Cash Payment for WWW Resources with the PayMe Protocol Set," Fourth International World Wide Web Conference December 1995. Boston, Massachusetts. Peirce Paper %2/19 - A. Ogren R. Atkinson, "Security Architecture for the Internet Protocol," Request for Comments: 1825 August 1995. IP Security Paper %2/21 - Brian Cole R. Braden, L. Zhang, S.Berson, S. Herzog, J. Wroclawski, "Resource Reservation Protocol (RSVP) - Version 1 Functional Specification," Internet Draft: draft-ietf-rsvp-spec-08.ps, November 22, 1995. RSVP Paper - review pages 1-56. %2/23 - Tony Moy C. Bowman, P. Danzig, D. Hardy, U. Manber, M. Schwartz, and D. Wessels, "Harvest: A Scalable, Customizable Discovery and Access System," Technical Report CU-CS-732-94, Department of Computer Science, University of Colorado, Boulder, August 1994 (revised March 1995). Submitted for publication. Harvest Paper *2/26 - Muralidhar Krishnaprasad J. Steiner, C. Neuman, J. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Winter Usenix Conference, Dallas, 1988. *2/28 - Donko Donjerkovic S. Deering, D. Estrin, D. Farinacci, V. Jacobson, "An Architecture for Wide-area Multicast Routing," ACM SIGCOMM 94, pp. 126-135. %3/1 - Zeyu Chen S. Bellovin, "Security Problems in the TCP/IP Protocol Suite," CCR 19 (April 1989), pp. 32-48. Bellovin Paper *3/4 - Qi Jin V. Paxson, S. Floyd, "Wide Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Trans. on Networking 3 (June 1995), pp. 226-244. *3/6 Srinivasa Narayanan S. Kent, "Internet Privacy Enhanced Mail," CACM 36 (August 1993), pp. 48-59. 3/8 - No Class 3/11 - Spring Break 3/13 - Spring Break 3/15 - Spring Break 3/18 *3/20 - Maryan Stubbs L. Brakmo, L. Peterson, "TCP Vegas: End to End Congestion Avoidance on a Global Internet," IEEE JSAC 13 (October 1995), pp. 1465-1480. 3/22 - No Class *3/25 - Rob Mellencamp D. Mills, "Improved Algorithms for Synchronizing Computer Network Clocks," IEEE/ACM Trans. on Networking 3 (June 1995), pp. 245-254. %3/27 - Tim Jung C. Perkins, "IP Mobility Support," (draft-ietf-mobileip-protocol-15.txt), February 9, 1996. Mobile IP %3/29 - Bill Alford J. Scourias, "Overview of the Global System for Mobile Communications," University of Waterloo, May 19, 1995. GSM (http://ccnga.uwaterloo.ca/~jscouria/GSM/) *4/1 - Wenjun Qiu R. Banchini, H. Kim, "The Tera Project: A Hybrid Queueing ATM Switch Architecture for LANs," IEEE JSAC 13 (May 1995), pp. 673-685. %4/3 - Zhongbin Yin T. Berners-Lee, R. Fielding, H. Frystyk, "Hypertext Transfer Protocol - HTTP/1.0," Internet Draft (draft-ietf-http-v10-speci-05.txt) Expires 8/19/96. HTTP/1.0 4/5 - Good Friday 4/8 - No Class %4/10 - Nathan Bockrath J. Mogul, "The Case for Persistent-Connection HTTP," ACM Sigcomm 95, pp. 299-313. Following is DEC WRL Research Report 95/4 Mogul Paper *4/12 - Xinyi Wang S. Jamin, B. Danzig, S. Shenker, L. Zhang, "A Measurement-based Admission Control Algorithm for Integrated Services Packet Networks," ACM Sigcomm 95, pp. 2-13. %4/15 - Steven Fought P. Barham, M. Hayter, D. McAuley, I. Pratt, "Devices on the Desk Area Network," IEEE Journal on Selected Areas in Communications, May 1995. Paper *4/17 - Chengjie Liu R. Bagrodia, W. Chu, L. Kleinrock, G.Popek, "Vision, Issues, and Architecture for Nomadic Computing," IEEE Personal Communications December 1995, pp. 14-27. %4/19 - Lei Cao J. Case, K. McCloghrie, M. Rose, S. Waldbusser, " Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2)," RFC 1905, January 1996. SNMP V2 K. McCloghrie, Editor, "Administrative Infrastructure for SNMPv2," RFC 1909, February 1996. REVIEW THIS ONE *4/22 - Yufei Zhu F. Toubagi, "Fast Packet Switch Architectures for Broad-band Integrated Services Digital Networks" %4/24 - Mohamed Asgarian S. Keshav, "On the Efficient Implementation of Fair Queueing" Journal of Internetworking 2, pp. 157-173, September 1991. Fair Queuing" 4/26 - No Class %4/29 - Dan Prince C. Venkatramani, T. Chiueh, "Design, Implementation, and Evaluation of a Software-based Real-Time Ethernet Protocol," ACM Sigcomm 95, pp. 27-37. Paper %5/1 - Ben Teitelbaum Peter B. Danzig, Katia Obraczka, Anant Kumar, "An Analysis of Wide-Area Name Server Traffic". Review This One P. Mockapetris, "Doamin Name -- Concepts and Facilities", RFC 1034, November 1987. DNS REFERENCE %5/3 Dhaval Shah D. Dean, D. Wallach, "Security Flaws in the HotJava Web Browser," CS Dept. Technical Report TR-501-95, Princeton Univ., November 1995. Hot Java Paper F. Yellin, "Low Level Security in Java." Fourth International World Wide Web Conference, Boston, December 1995. Java Paper 5/6 5/8 5/10