Date | Presenter | Topics | Notes | Readings |
8/26/2013 |
Phillipa |
Administravia + Introduction |
|
Note: It is not required to summarize these papers. They are meant as a useful resource as you read other papers in the course.
|
8/28/2013 |
Phillipa |
Internet Topology (review of Internet routing + paper discussion) |
*Action item:*
- Send me a URL of your blog by end of the day.
Data sets and tools:
|
|
9/2/2013 |
Labor day | | | |
9/4/2013 |
Tzu-Wen |
Internet Topology |
|
- Quantifying the Completeness of the Observed Internet AS-level Structure. R. Oliveira, D. Pei, W. Willinger, B. Zhang, and L. Zhang. UCLA Tech Report. 2008.
- Where the Sidewalk Ends: Extending the Internet AS Graph Using Traceroutes from P2P Users. K. Chen, D. Choffnes, R. Potharaju, Y. Chen, F. Bustamante, D. Pei, and Y. Zhao. CoNEXT '09.
Optional:
|
9/9/2013 |
|
Internet Topology (Internet eXchange Points) |
Data sets/URLs:
|
|
9/11/2013 | | Improvements to Traceroute |
Data sets:
|
- Avoiding traceroute anomalies with Paris traceroute. B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira. IMC 2006.
- Reverse Traceroute.. E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wesep, A. Krishnamurthy, and T. Anderson. NSDI 2010.
Optional:
|
9/16/2013 |
Haseeb |
Transport Layer |
|
|
9/18/2013 |
|
Reliability (Edge networks) |
Interesting URL:
|
Optional
|
9/23/2013 |
| Reliability (Backbone/ISP networks) |
*Action item*:
|
Optional:
|
9/25/2013 |
|
Reliability (End-to-end) |
|
|
9/30/2013 |
Class | Project elevator pitches | | |
10/2/2013 |
|
Web workload characterization I |
Data sets:
|
Optional:
|
10/7/2013 |
|
User Generated Content |
|
Optional:
|
10/9/2013 |
James |
Online Social Networks |
|
Optional:
|
10/14/2013 |
Dung Fang |
Web workload characterization II |
|
|
10/16/2013 |
|
Peer-to-peer |
|
|
10/21/2013 |
Abbas |
Mobile (Provider's view) |
Data sets:
|
- Identifying Diverse Usage Behaviors of Smartphone Apps. Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman.
- Large-scale App-based Reporting of Customer Problems in Cellular Networks: Potential and Limitations. Y. Jin, N. Duffield, A. Gerber, P. Haffner, W. Hsu, G. Jacobson, S. Sen, S. Venkataraman, and Z. Zhang. W-MUST 2011.
|
10/23/2013 | Phillipa traveling | | | |
10/28/2013 | Class | Midterm project updates | Midterm report due | |
10/30/2013 |
Javad and Abbas |
Mobile (From the edge) |
|
- A First Look at Traffic on Smartphones. H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin. IMC 2010.
- Cell vs. WiFi: On the Performance of Metro Area Mobile Connections. J. Sommers, and P. Barford. IMC 2012.
- Meddle: Middleboxes for Increased Transparency and Control of Mobile Traffic. A. Rao, D. Choffnes, J. SHerry, A. Legout, A. Krishnamurthy, and W. Dabbous. CoNEXT Student Workshop 2012 (2 pages).
|
11/4/2013 |
|
Broadband |
|
Optional:
|
11/6/2013 |
|
Broadband |
|
- Dasu: Pushing Experiments to the Internet's Edge. M. Sanchez, J. Otto, Z. Bischof, D. Choffnes. F. Bustamante, B. Krishnamurthy, and W. Willinger. NSDI 2013.
- Broadband Internet Performance: A View from the Gateway. S. Sundaresan, W. de Donato, N. Feamster, R. Teixeira, S. Crawford, and A. Pescape. SIGCOMM 2011.
|
11/11/2013 |
|
Internet Censorship/Transparency |
|
|
11/13/2013 |
Tzu-Wen |
Internet Censorship/Transparency |
|
- Analysis of Country-wide Internet Outages Caused by Censorship. A. Dainotti, C. Squarcella, E. Aben, K. Claffy, M. Chiesa, M. Russo, and A. Pescape.
- Characterizing Censorship of Web Content Worldwide: Another Look at the OpenNet Initiative Data. P. Gill, M. Crete-Nishihata, J. Dalek, S. Goldberg, A. Senft, and G. Wiseman.
Optional:
|
11/18/2013 |
|
Security (Prefix hijacks) | |
|
11/20/2013 |
|
Security |
|
- Click Trajectories: End-to-End Analysis of the Spam Value Chain. K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. Voelker, and S. Savage. OAKLAND 2011.
- Impact of Spam Exposure on User Engagement. A. Dasgupta, K. Punera, J. Rao, and X. Wang. USENIX Security 2012.
|
11/25/2013 |
|
Data centers |
|
|
11/27/2013 | Thanksgiving | | | |
12/2/2013 | Class | Project presentations | | |
12/4/2013 | Class | Project presentations | | |
12/4/2013 | N/A | No class | Project report due at end of day. | |