Till KTH:s startsida Till KTH:s startsida

Visa version

Version skapad av Gerald Quentin Maguire Jr 2016-02-17 13:44

Visa nästa >
Jämför nästa >

Spring 2014

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<HTML LANG="en-us">
<HEAD>
<META http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<META NAME="author" CONTENT="Gerald Q. Maguire Jr.">
<meta name="Description" content="IK1550 Course Page">
<meta name="KeyWords" content="Internetworking">
<TITLE>Internetworking</TITLE>
</head>

<body>
<H1>VT 2014 Period 4, IK1550 and IK1552 Internetworking</H1>

<div align="right">
<p>
Tue Apr 29 23:17:12 CEST 2014
</p>
</div>

<hr>

<p><a NAME="announcements"></a><font size="+2" color="#CC0000"><b>Announcements</b></font>

<P>On 29 April 2014, Amir Roozbeh will give a guest (industrial) lecture "Resource
Allocation in Network Enabled Cloud: An extension to OSPF-TE" during
the first hour of class. This is the topic of his master's thesis and
his conference paper (that won a Best paper award at UCC '13).</p>


<H4>Page is still under construction - contents may be
inconsistent</H4>


<hr WIDTH="100%">

<p><b>IK1550 Internetworking</b> is a 6 ECTS credits course designed for undergraduates.</p>
<p><b>IK1552 Internetworking</b> is a 7.5 ECTS credits course designed for undergraduates.</p>

<p>Information is available on:

<ul>
<li><a href="#aim"><b>Aim</b></a></li>
<li><b><a href="#prerequisites">Prerequisites</a></b></li>
<li><b><a href="#contents">Contents</a></b></li>
<li><b><a href="#schedule">Schedule</a></b></li>
<li><b><a href="#literature">Literature and Course Material (Textbook, Reference books and
other references)</a></b></li>
<li><b><a href="#lectureplan">Lecture Plan and Lecture Material (OH slides)</a></b></li>
<li><a href="#exam"><b>Examination Requirements and Registrations</b></a></li>
<li><a href="#Teachers"><b>Staff Associated with the Course</b></a></li>
<li><b><a href="#Registering">Registering for the Course</a></b></li>
<li><b><a href="#otherMaterial">Other on-line Course Material (More References)</a></b></li>
<li><b><a href="#announcements">Announcements</a></b></li>
<li><b><a href="#evaluation">Evaluation</a></b></li>
<li><b><a href="#previous">Previous versions of the course</a></b></li>

</ul>

<hr>

<h2><a NAME="aim"></a>Aim</h2>

<p>This course will give both practical and general knowledge on the
<em>protocols</em> that are the basis of the Internet. After this
course you should have a good knowledge about Internet protocols and
internetworking architecture. You should have a general knowledge
aiding you in reading research and standardization documents in the
area.
</p>

<h3>Learning Outcomes</h3>

<P>Following this course a student should be able to:
<ul>

<li>Understand the principles on which internetworking is based -
which define the Internet (both what it is and why it has proven to be
so succesful)</li>


<LI>Understand TCP/IP protocol stack, layering, encapsulation and multiplexing
<ul>
<li>Understand multiplexing, demultiplexing, upward and downward
multiplexing</li>

<li>Encapsulation as used for Mobile IP, Virtual Private Networks (VPNs),
IP security, ... and other tunnelling protocols</li>

<li>Understand how information is encoded in headers and how the choice
of this encoding and field size may effect the use and evolution of a
protocol</li>

<li>Understand how data is encoded in the body of a packet and
how this may effect internetworking - especially in the presence of
firewall and network address translators.</li>
</ul>

<li>Understand IP Addressing, subnetting and address resolution -
including the interaction of protocols across layers</li>

<li>Understand a number of higher layer protocols including the
security risks and performance limitations of each </li>

<li>Understand the basic details of routing and routing protocols
(RIP, BGP, OSPF) - with an emphasis on their limitations and
behaviors</li>

<li>Understand autoconfiguration and naming (BOOTP, DHCP, DNS, DDNS,
DNSsec, ENUM, ... ) - with an emphasis on risks, limitations, scaling,
and evolution</li>

<li>Understand the nature and pressures on the design and operations
of internets - particularily on scaling, performance, delay bounds,
due to new Internet applications (VoIP, streaming, games,
peer-to-peer, etc.</li>

<li>Understand the advantages and disadvantages of IPv6 (in comparison
to IPv4)</li>

<li>Read the current literature at the level of conference papers in this area.
<ul>
<li>While you may not be able to understand all of the papers in
journals, magazines, and conferences in this area - you
<b>should</b> be able to read 90% or more of them
and have good comprehension. In this area it is especially
important that develop a habit of reading the journals, trade papers,
etc. <i>In addition, you should also be aware of both standardization
activities, new products/services, and public policy in the area.</i></li>
</ul>
</li>

<li>Demonstrate knowledge of this area in writing.
<ul>
<li>By <i>writing</i> a paper suitable for submission
to a trade paper or national conference in the area.</li>
</ul></li>
</ul>

<hr>

<h2><a NAME="prerequisites"></a>Prerequisites</h2>

<ul>
<li>IK1203 <tt lang="se">N&auml;tverk och kommunikation</tt>/Networks and Communication,
<tt lang="se">Datorkommunikation och datorn&auml;t</tt>/Data and
Computer Communications or
equivalent knowledge in Computer Communications</li>

<li>Students who have <em>not</em> completed the prerequisites
should obtain permission of the instructor, before registering
for the course.</li>
</ul>


<hr>

<h2><a NAME="contents"></a>Contents</h2>

<p>The course consists of 14 hours of lectures, 14 hours of recitation
(&ouml;vningar) and 40-100 hours of written assignment.</p>

<p>Lectures will be given in English. Lecture notes will be available
via the course web site in advance of the relevant lecture(s).</p>

<h3>Recitations</h3>

<p>Recitations will be based on exercises from the main literature.
Some extra recitations may be made available via the course web site.</p>


<H2>Topics</H2>

<ul>
<li> What the Internet is and why it has proven to be so succesful.
<li> What protocols are required to allow internetworking (IP, TCP, UDP, ICMP, etc.)</li>
<li> Understanding of TCP/IP protocol stack, layering, encapsulation and multiplexing</li>
<li> IP Addressing, subnetting and resolution
<li> Transport protocols, including UDP and TCP</li>
<li> Details of routing and routing protocols (RIP, BGP, OSPF)</li>
<li> Autoconfiguration and naming (BOOTP, DHCP, DNS)
<li> Internet applications (VoIP, SMTP, etc)</li>
<li> Multicasting, VPNs, Mobile IP, and security</li>
<li> IPv6 and some differences with IPv4</li>
</ul>

<hr>

<H2><a NAME="exam"></a>Examination Requirements</H2>

<ul>
<li>The basic requirement (for both courses) is the written paper, those who do not
submit an acceptable paper can take an oral exam (see
"komplettering").</li>
<li>IK1552 requires an additional written assignment. Details of this
will be presented in class.</li>
</ul>

<h3>Exam Schedule</h3>

<p>Oral exams will be scheduled individually (if necessary).</p>


<h3>Written report</h3>
<ul>
<li>An assigned paper requiring roughly 40-100h of work by each student</li>
<LI>Registration: <b>Friday 02-May-14</b>, to
<A HREF="mailto:maguire@kth.se?subject=IK1550/IK1552">maguire@kth.se</A>
with the "Subject: IK1550 topic" or "Subject: IK1552 topic" giving the topic selected</LI>

<li>Potential topics will be discussed in class.</li>

<LI>Written report
<UL>
<LI>The length of the final report should be ~7-8 pages (roughly
3,000 words) for each student; it should <em>not</em> be longer
than 8 pages for each student - papers which are longer than 8
pages will have a maximum grade of "E". (detailed measurements,
configuration scripts, etc. can be in additional pages as an
appendix or appendices).</LI>

<LI>The report should clearly describe: 1) what you have done;
2) if you have done some implementation and
measurements you should describe the methods and tools used,
along with the test or implementation results, and your
analysis.

<LI>Final Report: written report due before <b>Friday 23-May-2014 23:59</b></LI>

<LI>Send email with URL link to a PDF file to <A HREF="mailto:maguire@kth.se">maguire@kth.se</A></LI>

<LI>Late assignments will <b>not</b> be accepted (i.e., there is no guarantee that they will graded in time for the end of the term)</LI>

<LI>Note that it is pemissible to start working well in
<I>advance</I> of the deadlines! Thus send the instructor
your selection of topic as soon as you have selected one.
</LI>

<LI>Language: the report can be written in Swedish or English -
(I can provide better feedback if the report is written in English)</LI>
</UL></LI>
</ul>

<P>A sample paper is:<br>
<A HREF="http://www.ibiblio.org/mdma-release/http-prob.html">
http://www.ibiblio.org/mdma-release/http-prob.html</A> by
Simon E Spero).</P>

<p>Each of the sample papers below appears here by permision of the
authors - the copyright belongs to the respective authors.<br>
</p>

<p>From IK1550 - 2009:</p>

<ul>
<li>
Elis Kullberg, <a href="Sample-papers/IK1550_kullberg_v2.pdf">
Live migration of Virtual Machines: Sustaining active TCP-sessions</a>,
3 Sept. 2009</li>

<li>Sara Klingberg,
<a href="Sample-papers/IK1550-Sara_Klingberg-Ipred-20090527.pdf">
IPRED: En l&ouml;sning f&ouml;r framtiden?</a>, 27 May 2009 - note
that this paper provides an interesting alternative explaination for
the change in traffic after IPRED went into effect.</li>
</ul>

<p>From 2G1305 - 2006 (4 point papers):</p>
<ul>
<li>Erik Carlborg Fr&ouml;berg, Andr&eacute; Eriksson, and Polly Yeung,
<a href="Sample-papers/2G1305-BitTorrent_av_Andre_Erik_and_Polly-BitTorrent-revised-20061026.pdf">
"BitTorrent och traffic shaping"</a>, 26 October 2006</li>
</ul>

<p>Note that the papers below represent papers that were done for
1 point, rather than the 4 points which the current papers are to be worth.
</p>

<p>From 2G1305 - 2005:</p>
<ul>
<li>Stefan Lundstr&ouml;m and Daniel Hassell&ouml;f,
<a href="Sample-papers/SCTP_Lundstrom_Hassellof_2g1305.pdf">
"SCTP-performance and security</a>, 25 May 2005</li>
<li>
Henrik &Ouml;sterdahl,
<a href="Sample-papers/Henrik_Oesterdahl-sctp-20050525.pdf">
"A comparison of TCP and SCTP performance using the HTTP protocol</a>, 25 May 2005</li>

<li>Mikael Rudholm,
<a href="Sample-papers/2G1305_Written_report_Mikael_Rudholm.pdf">
"Lastbalansering f&ouml;r webbservrar"</a>, 24 May 2005</li>

<li>&Aring;sa Pehrsson,
<a href="Sample-papers/2G1305_Assignment_Asa_Pehrsson_050908.pdf">
TLS session resumption impact on HTTP performance</a>, 8 September 2005</li>
</ul>

<p>From 2G1305 - 2002:</p>
<ul>
<li>
Filip Tysk,
<a href="Sample-papers/Filip_Tysk-finishedproxy-20020926.pdf">
"Design and evaluation of a TCP proxy which provides secure tunneling to another TCP proxy."</a>
26 September 2002</li>
<li>Rodrigo Sierra,
<a href="Sample-papers/RodrigoSierra-Internetworking-20021206.pdf">
Fair queuing in data networks</a>, 6 December 2002.</li>
</ul>


<h2>Some useful information for writing your reports</h2>
<ul>
<LI>For your document, you should be sure to use A4
sized paper rather than US letter.</LI>

<LI>For those using LaTeX, you can improve the look of the document by:
<ul><li>switching to using PostScipt fonts
<A href="http://www.ctan.org/tex-archive/macros/latex/required/psnfss/psnfss2e.pdf">(instructions)</A></li>

<li>You can also turn off hyphenation or at least limit its use
with "\hyphenpenalty=5000 \tolerance=1000"</li>
<li><a href="http://webcapita.com/w3cbib/by-year">BibTex entries</a> for W3C publications</li>
<li><a href="http://www.tm.uka.de/~bless/bibrfcindex.html">BibTex entries</a> for RFCs</li>
<li>IEEE and ACM provide BibTeX entires for their publcations
via the web page for each publication</li>
<li>Use the <a href="http://www.tug.org/texlive/Contents/live/texmf-dist/doc/latex/bytefield/bytefield.pdf">
bytefield</a> package to draw packet structures</li>
</ul></LI>

<li>For those using Microsoft's Word: It is possible to convert .bib a suitable format using <a
href="http://jabref.sourceforge.net/">JabRef</a>. (see also
<a href="http://wiki.lyx.org/BibTeX/Programs">http://wiki.lyx.org/BibTeX/Programs</a>)</li>

<li>
I encourage students to use <a href="http://www.zotero.org">Zotero</a> for
their reference management. Of course you can also use a commercial
tool or other tool. The key is that you should be using a tool to
facilitate working with your references and reference material. You
can find examples of using Zotero in my II2202 lecture notes on
<a href="http://www.ict.kth.se/courses/II2202/II2202-powertools-chip-20110827.pdf">
powertools</a>. I encourage you to use my Zotero style <a href="http://www.ict.kth.se/courses/II2202/IEEElike-with-access.csl">
IEEElike-with-access</a> as it provides a rather complete reference
(including DOI, ISBN, or URL where relevant).
There are Zotero plugins for OpenOffice/LibreOffice and Microsoft's Word.</li>

</ul>

<h2>Some common flaws in reports</h2>

<UL>
<li>Incomplete references - see the references in the lecture notes
for examples of references</li>
<li>Missing important citations</li>
<li>Statements made without justification or supporting citations</li>
<li>Poor (or no) editing</li>
<li>Failure to spell check the document</li>
<li>Documents which it is clear that no one looked at after formatting
- often these have breaks in the middle of sentences, missing phrases,
... .</li>

<li>Lack of page numbers</li>
<li>Unreadable text in figures</li>
<li>Failure to label elements of figures adequately</li>
<li>Use of contractions</li>
<li>Use of acronyms or abbreviations without properly introducing
them; often failure to use these acroynms and abbreviations
consistently through the rest of the paper</li>
<li>Redundant text</li>
<li>Using figures from others without the copyright owner's permission</li>
<li>Using too few refences, so the paper looks like simply a cut an
paste edit of these references.</li>
<li>Single sentence paragraphs</li>
<li>Lack of vertical white space between paragraphs, which in some
cases makes it hard to understand where new paragraphs beging</li>
<li>Lack of a date - every document should have a date, in addition to title and author(s)</li>
<li>Lack of section, subsection, ... number - makes cross references
difficult (i.e., using hierarchically numbered headings)</li>
</UL>

<p>To cite the source of a figure that you have been inspired by you can say:
"Figure xxx: yyyyyyyyyyy (adapted from figure zzz of [z])"<br>

For examples slides: 1:43 (PDF page 86), 1:72 (PDF page 115), 6:19 (PDF page 401), and 13:62 (PDF page 841). of http://www.ict.kth.se/courses/IK1550/Internetworking-2013.pdf</p>

<p>It is also possible to directly include figures from others but on <b>if they have given you permission</b>, they you say what they required you to say when they gave you permission, for example:<br>
Figure xxx: yyyyyyyyyyy (Appears here with the permission of ZZZZ. The figure originally appeared as figure xxx on page ww of [z].)</p>

<p>For creative commons works, see <a href="http://creativecommons.org.au/content/attributingccmaterials.pdf">http://creativecommons.org.au/content/attributingccmaterials.pdf</a>
and
(also <a href="http://wiki.creativecommons.org/FAQ#How_do_I_properly_attribute_a_Creative_Commons_licensed_work.3F">http://wiki.creativecommons.org/FAQ#How_do_I_properly_attribute_a_Creative_Commons_licensed_work.3F</a>)</p>

To help track down where a figure appears see:
<a
href="http://howto.wired.com/wiki/Figure_Out_Where_a_Photo_Originated">
http://howto.wired.com/wiki/Figure_Out_Where_a_Photo_Originated</a></p>


<h3>Grading</h3>

<P>A very good paper should be either a very good review or present a
new idea, while an outstanding or excellent paper should be truely innovative.</P>

<h4>ECTS grades</h4>

<ul>
<li>To get an "A" you need to write an outstanding or excellent paper.</li>

<li>To get a "B" you need to write a very good paper, i.e., it should be
either a very good review or present a new idea.</li>

<li>To get a "C" you need to write a paper which shows that you understand
the basic ideas underlying internetworking and that you understand one
(or more) particular aspects at the level of an average undergraduate
student in the area.</li>

<li>To get a "D" you need to demonstrate that you understand the basic
ideas underlying internetworking, however, your depth of
knowledge is shallow in the topic of your paper.</li>

<li>If your paper has some errors (including incomplete references) the grade will be an "E".</li>

<li>If your paper has serious errors the grade will be an "F".</li>
</ul>

<p>If your paper is close to passing, but not at the passing level, then
you will be offered the opportunity for "komplettering", i.e.,
students whose written paper does not pass can submit a revised
version of their paper (or a completely new paper) - which will be
evaluated.</p>

<h3>Code of Honor and Regulations</h3>

<p>It is KTH policy that there is zero tolerance for cheating, plagiarism, etc. - for details see
<a href="http://www.kth.se/dokument/student/student_rights.pdf">
http://www.kth.se/dokument/student/student_rights.pdf</a>
See also the KTH <a href="http://www.kth.se/info/kth-handboken/I/7/1.html">Ethics Policies</a></p>
<hr>

<H2><a NAME="literature"></a>Literature</H2>

<h3>Main Text-Book</H3>

<P>The course will mainly be based on the book:
James F. Kurose and Keith W. Ross,
<em>Computer Networking: A Top-Down Approach</em>, Sixth Edition,
Pearson Education, 2012, ISBN-13: 9780273768968, ISBN-10 0-27376-896-4</p>

<p>Available from Kårbokhandeln KTH campus or in Kista. Also available from internet booksellers.</p>

<p>Note that there is <a href="http://wps.pearsoned.com/ecs_kurose_compnetw_6/216/55463/14198700.cw/index.html">
on-line material</a> for the 6th edition of the textbook; this includes animations and
other useful material. <a href="http://wps.pearsoned.co.uk/wps/media/access/Pearson_Default/14698/15050912/login.html">
Additional material</a> (access requires the code
from your textbook).
</p>

<p>Differences from the 2nd edition are list on page xxxi of the 3rd edition.
The most significant for this course is that the 3rd edition covers:
SCTP, more about security, and more examples (using ping, netstat, etc.).</p>

<p>Reading guide: read the <b>entire</b> book.</p>

<H3>Additional Reference Books</H3>

<UL>
<li>Behrouz A. Forouzan, <em>TCP/IP Protocol Suite</em>, 3rd edition,
McGraw-Hill, publication date January 2005, (Copyright 2006) 896 pages, ISBN 0-07-296772-2 (hardbound)
or 0-07-111583-8 (softbound)</li>

<li>Russell Bradford, The Art of Computer Networking, Pearson
Education Limited, Prentice Hall, 2007, 304 pages, ISBN 978-0-321-30676-0
(<a href="http://people.bath.ac.uk/masrjb/AOCN/links.html"> links</a>
collected by the textbook's author)
</li>

<LI><em>Mobile IP: Design Principles and Practices</em>
by Charles E. Perkins, Addison-Wesley,
1998, ISBN 0-201-63469-4. </LI>

<LI><em>Mobile IP: the Internet Unplugged</em> by James
D. Solomon, <A HREF="http://www.prenhall.com">Prentice Hall</A>, 1998, ISBN 0-13-856246-6.
</LI>

<li>Muhhub Hassan and Raj Jain,
<em>Higher Performance TCP/IP Networking: Concepts, Issues, and Solutions</em>
Pearson Prentice-Hall, 2004, ISBN 0-13-127257-8.
</UL>

<h3>Supplementary readings</h3>

<p>Every student should read: R. Bush and D. Meyer,
<a href="http://www.rfc-editor.org/rfc/rfc3439.txt">
"Some Internet Architectural Guidelines and Philosophy"</a>,
Internet Request for Comments, ISSN 2070-1721,
RFC 3439 (Informational), RFC Editor, December 2002.</p>

<p>For socket programming see:</p>
<ul>
<LI>Richard Stevens, <em><A HREF="http://www.kohala.com/start/unpv12e.html">
UNIX Network Programming, Volume 1, Second Edition:
Networking APIs: Sockets and XTI</A></em>, Prentice Hall, 1998, ISBN
0-13-490012-X.<em>Comment:</em> An excellent book on programming network
software. The <A HREF="http://www.kohala.com/start/unpv12e/unpv12e.tar.gz">
source code</A> and
<A HREF="http://www.kohala.com/start/typos.unpv12e.html">
errata list</A>.</LI>

<li>Brian "Beej" Hall,
"<a href="http://www.ecst.csuchico.edu/~beej/guide/net/">Beej's Guide to Network Programming: Using
Internet Sockets</a>", 04/08/2004 07:22:02 PM</li>

<li>"Prepared Statement of Vinton G. Cerf, Vice President and Chief
Internet Evangelist, Google Inc.", at U.S. Senate Committee on
Commerce, Science, and Transportation Hearing on
<a href="http://commerce.senate.gov/pdf/cerf-020706.pdf">
"Network Neutrality"</a>,
February 7, 2006
</li>

<li>J. Scott Marcus, Pieter Nooren, Jonathan Cave, and Kenneth R. Carter,
<a href="http://www.europarl.europa.eu/document/activities/cont/201108/20110825ATT25266/20110825ATT25266EN.pdf">
"Network Neutrality: Challenges and responses in the EU and in the
U.S."</a>, IP/A/IMCO/ST/2011-02, May 2001.</li>

<li>S. Kurkowski, T. Camp, and M. Coagrosso.
<a href="http://www.cs.cornell.edu/People/egs/syslunch-spring06/papers/evaluation.pdf">
MANET simulation studies: the Incredibles</a>. ACM SIGMOBILE Mobile Computing and Communications Review,
9(4), October 2005.</li>

<li>Christian Benvenuti,
<em>Understanding Linux Network Internals</em>,
O'Reilly, 2006, ISBN 0-596-00255-6</li>

<li>Katie Hafner and Mathew Lyon,
<em>Where Wizards Stay Up Late: The Origins of the Internet</em>,
1996, Simon & Schuster, ISBN 0-684-81201-0</li>

<li>Robert Malmgren, <em>Praktisk n&auml;ts&auml;kerhet</em>, Internet
Academy Press, Stockholm, Sweden, 2003, ISBN 91-85035-02-5</li>

<li>Anurag Kumar, D. Manjunath, and Joy Kuri, <em>Communication
Networking: An Analytical Approach</em>, Elsevier Morgan Kaufmann
Publishers, 2004, ISBN 0-12-428751-4, ISBN-13: 978-0124287518</li>

<li>Russell Bradford, Rob Simmonds, and Brian Unger.
<a href=" http://doi.ieeecomputersociety.org/10.1109/MASCOT.2001.948864">
"Packet Reading for Network Emulation"</a>, Proceedings MASCOTS 2001: The IEEE/ACM International Symposium on
Modeling, Analysis and Simulation of Computer and Telecommunication Systems,
August 2001, pp. 150-157. [An excellent source for learning about
reading and writing link layer frames and raw packets.]
(<a href="http://people.bath.ac.uk/masrjb/Papers/mascots01.pdf">link
to paper</a> from the first author's home page)
</li>

<li>Chris Sanders, <a href="http://www.nostarch.com/frameset.php?startat=packet_cs">
"Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems"</a>,
No Starch Press, May 2008, 172 pp.</li>

<li>Kevin D. Mitnick and William L. Simon, <em>The Art of Deception:
Controlling the Human Element of Security</em>, Wiley Publishing, 2002, 0-7645-4280-X.</li>

<li>Andrew Lih, The Wikipedia Revolution: How a Bunch of Nobodies
Created the World's Greatest Encyclopedia, Hyperion 2009, 272 pages,
ISBN-10: 1401303714 and ISBN-13: 978-1401303716 http://wikipediarevolution.com/The_Book.html </li>

<li>William Cheswick, Steven M. Bellovin, and Aviel D. Rubin,
Firewalls and Internet Security: Repelling the Wily Hacker,
Second Edition, Addison-Wesley, 2003, 464 pages.
ISBN-10: 020163466X, ISBN-13: 978-0201634662
<a href="http://www.wilyhacker.com/">http://www.wilyhacker.com/</a></li>

<li>Gary R. Wright and W. Richard Stevens, <em>TCP/IP Illustrated, Volume 2: The Implementation</em>, Addison-Wesley, 1995, ISBN 0-201-63354-X</li>

</ul>


<h3>Useful URLs</h3>

<p>Note that ethereal is now <a href="http://www.wireshark.org/">Wireshark</a>. For an interesting
BLOG which has excellent examples of using Wireshark for network care
and maintenance see Chris Sander's <a href="http://www.chrissanders.org/">Blog</a></p>

<p>Shawn Ostermann's <a href="http://www.tcptrace.org/">tcptrace</a>
is a very useful tool for looking at the details of TCP traffic.</p>

<p><a href="http://gull.sourceforge.net">Seagull</a> - multi-protocol traffic generator</p>

<hr WIDTH="100%">

<H2><a NAME="lectureplan"></a>Lecture Plan and Lecture Material (OH slides)</H2>

<H3><a NAME="schedule"></a>Schedule</H3>


<P>Note that in the following "xx" means "xx:00", <em>not</em>
"xx:15", i.e., the lectures and recitations begin on the hour (as noted
in their schedules).</P>

<P>Lecture notes for 2014:
<ul>
<li><a href="./IK1550-Module1-notes-20140325.pdf">Module 1</a></li>
<li><a href="./IK1550-Module2-notes-20140326.pdf">Module 2</a></li>
<li><a href="./IK1550-Module3-notes-20140326.pdf">Module 3</a></li>
<li><a href="./IK1550-Module4-notes-20140326.pdf">Module 4</a></li>
<li><a href="./IK1550-Module5-notes-20140331.pdf">Module 5</a></li>
<li><a href="./IK1550-Module6-notes-20140413.pdf">Module 6 (corrected)</a></li>
<li><a href="./IK1550-Module7-notes-20140413.pdf">Module 7</a></li>
<li><a href="./IK1550-Module8-notes-20140414.pdf">Module 8</a></li>
<li><a href="./IK1550-Module9-notes-20140420.pdf">Module 9</a></li>
<li><a href="./IK1550-Module10-notes-20140421.pdf">Module 10</a></li>
<li><a href="./IK1550-Module11-notes-20140422.pdf">Module 11</a></li>
<li><a href="./IK1550-Module12-notes-20140423.pdf">Module 12</a></li>
<li><a href="./IK1550-Module13-notes-20140425.pdf">Module 13</a></li>

</ul>

<!--
<P>The <a href="Internetworking-2013.pdf">lectures notes for
2013</a>(~9MB). These lecture notes are in PDF format. (Note that the
lecture notes for 2014 will be added when they are available.)</P>
-->

<p>Schedule for Period 4 2014 (see <a href="https://www.kth.se/social/course/IK1552/calendar/">
https://www.kth.se/social/course/IK1552/calendar/</a>):</p>

<!-- student group: CINTE_3, TIDAB_DDNB_2, TKOMK_3 -->
<table>
<TR><TH>Week</TH><TH>Day of week</TH><TH>Date</TH><TH>Time</TH><TH>Room</TH><TH>Notes</TH></TR>
<TR><TD>13</TD><TD>Tuesday</TD><TD>2014-03-25</TD><TD>13:00-15:00</TD><TD>Ka-431</TD><TD>Lecture 1</TD></TR>
<TR><TD></TD><TD>Thursday</TD><TD>2014-03-27</TD><TD>08:00-10:00</TD><TD>Ka-431</TD><TD>Lecture 2</TD>
<td>(<a
href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module1b-20140327-720MP4-with-player/IK1550-Module1b-20140327-720MP4-with-player.html">recording
1b</a>)</td><td>via <a href="https://www.dreambroker.com/channel/ak6zqf94/ppkv9mc4">Dream Broker</a></td></TR>
<TR><TD></TD><TD>Friday</TD><TD>2014-03-28</TD><TD>10:00-12:00</TD><TD>Ka-431</TD><TD>Lecture 3</TD></TR>
<TR><TD>14</TD><TD>Tuesday</TD><TD>2014-04-01</TD><TD>13:00-15:00</TD><TD>Ka-431</TD><TD>Lecture 4</TD>
<td>(<a
href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module3-20140401ab/IK1550-Module3-20140401ab_player.html
">recording
3a</a>) and (<a
href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module3-20140401ab-wide/IK1550-Module3-20140401ab-wide_player.html
">recording
3a - wide</a>)
</td>
<td>via <a href="https://dreambroker.com/channel/ak6zqf94/c438rcd0">Dream Broker</a>
<a href=" https://dreambroker.com/channel/ak6zqf94/gxpfbsuc">(wide)</a></td></TR>
<TR><TD></TD><TD>Wednesday</TD><TD>2014-04-02</TD><TD>15:00-17:00</TD><TD>Ka-530</TD><TD>Lecture 5</TD></TR>
<TR><TD></TD><TD>Thursday</TD><TD>2014-04-03</TD><TD>13:00-15:00</TD><TD>Ka-530</TD><TD>Lecture 6</TD></TR>
<TR><TD>16</TD><TD>Tuesday</TD><TD>2014-04-15</TD><TD>13:00-15:00</TD><TD>Ka-431</TD><TD>Lecture 7</TD></TR>
<TR><TD></TD><TD>Wednesday</TD><TD>2014-04-16</TD><TD>15:00-17:00</TD><TD>Ka-431</TD><TD>Lecture 8</TD>
<td>(<a
href="./IK1550-20140416-TCP-last-part/IK1550-20140416-TCP-last-part_player.html">Module
5 TCP last)</a> and (<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-module6-20140416/IK1550-module6-20140416_player.html
">module 6 recording</a>)</td>
<td><a href="https://dreambroker.com/channel/ak6zqf94/qq9bztej"> Module5 TCP last</a>
and <a href="https://dreambroker.com/channel/ak6zqf94/7adnnewf">Module 6</a>
via DreamBroker</td>
</TR>
<TR><TD></TD><TD>Thursday</TD><TD>2014-04-17</TD><TD>13:00-15:00</TD><TD>Ka-530</TD><TD>Lecture 9</TD>
<td>(<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module7-20140417/IK1550-Module7-20140417_player.html">recording</a>)</td><td> <a href="https://dreambroker.com/channel/ak6zqf94/08rgtxea">Module 7</a>
via DreamBroker</td>
</TR>
<TR><TD>17</TD><TD>Tuesday</TD><TD>2014-04-22</TD><TD>08:00-10:00</TD><TD>Ka-530</TD><TD>Lecture 10</TD>
<td>(<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/Module8-20140422/Module8-20140422_player.html">recording</a>)</td><td> <a href="https://dreambroker.com/channel/ak6zqf94/2eh1fzfl">Module 8</a>
via DreamBroker</td>
</TR>
<TR><TD></TD><TD>Wednesday</TD><TD>2014-04-23</TD><TD>15:00-17:00</TD><TD>Ka-431</TD><TD>Lecture 11</TD>
<td>(<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module9-20140423/IK1550-Module9-20140423_player.html">recording</a>)</td><td> <a href="https://dreambroker.com/channel/ak6zqf94/o4ua4rn8">Module 9</a>
via DreamBroker</td>
</TR>
<TR><TD></TD><TD>Thursday</TD><TD>2014-04-24</TD><TD>13:00-15:00</TD><TD>Ka-438</TD><TD>Lecture 12</TD>
<td>(<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module10-20140424/IK1550-Module10-20140424_player.html">recording
- Module 10</a>)
and
(<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module11-20140424/IK1550-Module11-20140424_player.html">recording
- Module 11</a>)
</td><td> <a href="https://dreambroker.com/channel/ak6zqf94/jcwnjlxx">Module 10</a>
and
<a href="https://dreambroker.com/channel/ak6zqf94/961gqafz">Module 11</a>
via DreamBroker</td>
</TR>
</TR>
<TR><TD>18</TD><TD>Monday</TD><TD>2014-04-28</TD><TD>10:00-12:00</TD><TD>Ka-530</TD><TD>Lecture 13</TD>
<td>
(<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-2014/IK1550-Module12-20140428/IK1550-Module12-20140428_player.html">recording
- Module 12</a>)
and
(<a href="http://web.it.kth.se/~maguire/Class-recordings/IK1550-2014/IK1550-Module13-firsh-half-20140428/IK1550-Module13-firsh-half-20140428_player.html">recording
- Module 13 first half</a>)</td><td> <a
href="https://dreambroker.com/channel/ak6zqf94/y2o33ny4">Module 12</a>
and
<a href="https://dreambroker.com/channel/ak6zqf94/z9molbg4">Module 13
- first half</a>
via DreamBroker</td></TR>
<TR><TD></TD><TD>Tuesday</TD><TD>2014-04-29</TD><TD>10:00-12:00</TD><TD>Ka-431</TD><TD>Lecture
14</TD>
<td>(<a href="./IK1550-Amir-20140429/IK1550-Amir-20140429_player.html">recording
Guest lecture</a>)
and
(<a href="IK1550-2014/IK1550-Module13-last-half-20140429/IK1550-Module13-last-half-20140429_player.html">recording
- Module 13 (second half)</a>)
</td><td> <a href="https://dreambroker.com/channel/ak6zqf94/boofn16u">Guest lecture</a>
and
<a href="https://dreambroker.com/channel/ak6zqf94/j40b0hk6">Module 13
second half</a>
via DreamBroker</td>

</TR>
</table>

<p>Note that the classroom for the spring session is in the Forum
building on the Kista campus.<br>
A set of make up lectures can potentially be given for students who
have a difficult time attending the above sessions.</p>


<p>Note also that the lectures and recitations (&Ouml;vningar) are intermixed</p>

<hr WIDTH="100%">

<H2><a NAME="Teachers"></a>Staff Associated with the Course</H2>

<UL>
<LI>Lecturer (kursansvarig, f&ouml;rel&auml;sare): Prof. <a href="http://www.it.kth.se/~maguire">
Gerald Q. Maguire Jr.</a> (<a href="mailto:maguire@kth.se&quot;">maguire@kth.se</a>)</LI>
</UL>

<hr>

<H2><a NAME="Registering"></a>Registering</H2>

<P>Use the normal process for registering. For most students this
means you should speak with your study advisor (studiev&auml;gledare).</P>

<P> For Industrial Economics (I) students see the program for KSI (A), year 3.</P>
<hr>

<p><a NAME="previous"></a><font size="+2" color="#CC0000"><b>Previous
versions of the course</b></font>

<ul>
<li><a href="http://www.it.kth.se/courses/IK1550/Coursepage-Spring-2013.html">Spring 2013</a></li>
<li><a href="http://www.it.kth.se/courses/IK1550/Coursepage-Spring-2012.html">Spring 2012</a></li>
<li><a href="http://www.it.kth.se/courses/IK1550/Coursepage-Spring-2011.html">Spring 2011</a></li>
<li><a href="http://www.it.kth.se/courses/IK1550/Coursepage-Spring-2010.html">Spring 2010</a></li>
<li><a href="http://www.it.kth.se/courses/IK1550/Coursepage-Spring-2009.html">Spring 2009</a></li>
<li><a href="http://www.it.kth.se/courses/IK1550/Coursepage-Spring-2008.html">Spring 2008</a></li>
<li><a href="http://www.it.kth.se/courses/2G1305/Coursepage-Fall-2006-and-Spring-2007.html">Fall 2006 and Spring 2007</a></li>
<li><a href="http://www.it.kth.se/courses/2G1305/Coursepage-Spring-2006.html">Spring 2006</a></li>
<li><a href="http://www.it.kth.se/courses/2G1305/Coursepage-Spring-2005.html">Spring 2005</a></li>
</ul>


<H2><a NAME="otherMaterial"></a>Other on-line Course Material</H2>

<hr>

<H2>Sources for Further Information</H2>
<ul>
<li><a href="http://isoc.org/wp/worldipv6day/">World IPv6 Day</a>', June 8, 2011 </li>

<li>Local <a href="http://www.lan.kth.se/">KTH network</a> information</li>

<li>Dynamically updated information about <a href="http://www.myndighetermedipv6.se/mipv6/">
which Swedish agencies have IPv6 DNS entries</a></li>
<li>The <a href="http://www.packetfactory.net/Projects/Libnet/">Libnet Packet Construction Library</a> for easily creating packets</li>

<li>J&ouml;rg Liebeherr and Magda El Zarki's <a href="http://www.cs.virginia.edu/~itlab/book/">
Mastering Networks: An Internet Lab Manual</a>, Addison-Wesley, 2004, ISBN: 0-201-78134-4.

<li>Radia Perlman,
<a href="http://www.usenix.org/publications/library/proceedings/usenix01/invitedtalks/perlman.pdf">
Myths, missteps, and folklore in protocol design</a>, Invited talk, USENIX 01, June 30, 2001.</li>

<li>Tim Deegan, Jon Crowcroft, and Andrew Warfield.
<a href="http://www.cl.cam.ac.uk/%7Etjd21/words/ccr05-main.pdf">The main name system:
An exercise in centralized computing</a> ACM SIGCOMM CCR, 35(5):5-13,October 2005</li>

<li>A useful tool for emulating a network with a given throughput,
error rate, etc. is <a href="snad.ncsl.nist.gov/nistnet/">NISTnet</a>
see also <a href="http://info.iet.unipi.it/~luigi/ip_dummynet/">dummynet</a></li>

<li><a href="nistnet-under-ubuntu-20061012.html">How to set up NISNET
under Ubuntu</a></li>


<li><a href="http://icann.org/announcements/factsheet-dns-attack-08mar07.pdf">
ICANN Factsheet: Root server attack on 6 February 2007</a>, 1 March 2007</li>

<li>Edith Cohen and Haim Kaplan, <a href="http://www.research.att.com/~edith/Talks/dns_talk.ppt">
"Proactive DNS caching: Addressing a Performance Bottleneck"</a>, see
also
E. Cohen and H. Kaplan, "Proactive caching of DNS records: Addressing
a performance bottleneck", in Proc. of Symposium on Applications and
the Internet (2001).
</li>

<li>KyoungSoo Park, Vivek S. Pai, Larry Peterson, and Zhe Wang,
<a href="http://www.cs.princeton.edu/~kyoungso/papers/codns.pdf">
"CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups"</a>
</li>

<li>For information on packet filtering on a popular OS - see
<a href="http://www.ndis.com/papers/winpktfilter.htm">
Windows Network Data and Packet Filtering</a>, Printing Communications Assoc., Inc. (PCAUSA),
Last modified: January 20, 2007</li>

<li>If you are thinking about packet tracing on the Symbian platform
you need access to the <em>IP Hook API</em>. Which appears to only be
available to "Platinum" developers.</li>

<li><a href="http://www.rheingold.com/">Howard Rheingold</a> talking
about cooperation theory (<a href="http://www.rheingold.com/HowardSpeaks.mp3">an 80 meg MP3</a>,
with an interesting section about why new services and protocols can
be created</li>

<li><a href="http://www.cisco.com/web/about/ac50/ac47/2.html">Cisco
Network Topology Icons</a> are freely available for use when drawing
network diagrams.</li>

<li>A very interesting analysis of the realities of
<A href="http://www.compuphase.com/tftp.htm">TFTP</a> by
Thiadmer Riemersma, ITB CompuPhase, 2006. See the use of TFTP in
Preboot Execution Environment (PXE).</li>

<li>Laura Chappell has a very nice <a
href="http://novellevents.novell.com/t/2261821/56771533/6387/0/">animated
article</a> in the October 2007 issue of <em>Novell Connection
Magazine</em> on how to use the advanced graphing features of
Wireshark</li>

<li>SCTP<ul>
<li>There were some measurements of <a href="http://datatag.web.cern.ch/datatag/WP3/sctp/tests.htm">
SCTP vs. TCP</a> report on 1 March 2004</li>

<li>There is a kernel implmentation of SCTP, see:
<a href="http://lksctp.sourceforge.net/">
Linux Kernel Stream Control Transmission Protocol (lksctp)</a> project

<a href="http://lwn.net/2001/features/OLS/pdf/pdf/sctp.pdf">
Background paper</a> about this project.</li>

<li>A <a href="http://www.ibm.com/developerworks/linux/library/l-sctp/">
multistreaming example of SCTP</a> with a pointer to their code.</li>

<li> Some SCTP performance measurement papers:<br>
Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh,
<a href="http://www.springerlink.com/content/cww07nhwtxuregyn/">
"Performance Comparison of SCTP and TCP over Linux Platform"</a>,
In Advances in Intelligent Computing,
Lecture Notes in Computer Science, Springer Berlin / Heidelberg,
ISSN 0302-9743 (Print) 1611-3349 (Online), Volume 3645, 2005, pp. 396-404.
DOI 10.1007/11538356, ISBN 978-3-540-28227-3, DOI 10.1007/11538356_41<br>

Andreas Jungmaier and Erwin P. Rathgeb,
<a href="http://www.springerlink.com/content/m44421l644h30510/">
On SCTP multi-homing performance</a>,
Journal Telecommunication Systems, Springer Netherlands, Volume 31,
Numbers 2-3, March, 2006, pp. 141-161.
ISSN 1018-4864 (Print) 1572-9451 (Online), DOI 10.1007/s11235-006-6517-7<br>

<a href="http://www.cs.ubc.ca/labs/dsg/mpi-sctp/">
MPI-SCTP: Using the Stream Control Transmission Protocol (SCTP) for parallel programs
written using the Message Passing Interface (MPI)</a>, web page, last modified Sept 1, 2008.<li>


<li>An <a href="http://forum.soft32.com/linux2/FYI-SCTPperf-linux-kernel-SCTP-ftopict34097.html">
SCTP performance measurement tool</a>,
(the link to the source does not work - so you will have to find it yourself)<br>

see the related doctoral dissertation (in French):
Pawel Hadam,
<a href="http://hal.archives-ouvertes.fr/docs/00/04/86/32/PDF/tel-00010643.pdf">
Transports nouvelle generation dans les reseaux `a tr`es haut</a>,
Institut National Polytechnique de Grenoble, 29 June 2005</li>

<li>
Christopher L. Lydick,
<a href="http://www.osti.gov/bridge/servlets/purl/912922-t5TdGq/912922.PDF">
Optimizing the ASC WAN: Evaluating Network Performance
Tools for Comparing Transport Protocols</a>, Technical report, Sandia National
Laboratories, Report number SAND2007-4526, July 2007</li>

<li>Tan Chang Hu and Larwrence F. Tolendino,
<a href="http://www.osti.gov/bridge/servlets/purl/923153-X8vEIU/923153.PDF">
Network Protocol Changes Can Improve DisCom WAN Performance: Evaluating TCP
Modifications and SCTP in the ASC Tri-lab Environment</a>, Technical report, Sandia National
Laboratories, Report number fSAND2005-3132, June 2005</li>

<li>Jon Pedersen,
<a href="http://heim.ifi.uio.no/~paalh/students/JonPedersen.pdf">
Evaluation of SCTP retransmission delays</a>,
Master thesis, University of Oslo, Department of Informatics, 24th May 2006</li>


<li>Jinyang Shi, Yuehui Jin, Wei Guo, Shiduan Cheng, Hui Huang, and Dajiang Zhang,
Performance evaluation of SCTP as a transport layer solution for wireless multi-access networks,
In proceedings of Wireless Communications and Networking Conference (WCNC 2004),
Volume 1, 21-25 March 2004, pp. 453 - 458.</li>

<li>Jinyang Shi, Yuehui Jin, Hui Huang, and Dajiang Zhang,
Experimental performance studies of SCTP in wireless access networks,
In proceeding of the International Conference on Communication Technology
Proceedings (ICCT 2003), Volume 1, 9-11 April 2003, pp. 392 - 395.
Digital Object Identifier 10.1109/ICCT.2003.1209105</li>


<li>
Johan Eklund & Anna Brunstrom,
<a href="http://www.kau.se/forskning/forskdb/index.lasso?id=4850">
Performance of Network Redundancy Mechanisms in SCTP</a>, Karlstads universitet,
2005, ISBN: 9170630194, ISSN: 14038099</li>

<li>
Alberto Dainotti, Salvatore Loreto, Antonio Pescap&eacute;, and Giorgio Ventre,
<a href="http://dx.doi.org/10.1002/cpe.1159">
SCTP performance evaluation over heterogeneous networks</a>,
In Concurrency and Computation: Practice and Experience, John Wiley &amp;
Sons, Ltd., Vol. 19, No. 8, 2007, pp 1207-1218</li>

<li>Elvis Pf&uuml;tzenreuter,
<a href="http://epx.com.br/mestrado/msc-epx-2004.pdf">
Applicability and performance of the SCTP transport protocol</a>,
Masters thesis, Santa Catarina Federal University, Brazil<br>[Note that the thesis in in Brazilian Portugues!]
However, the <a href="http://epx.com.br/mestrado/index_en.php">
defense slides</a> are in English.
</li>
</ul></li>

<li>James Messer, <a href="http://www.networkuptime.com/nmap/index.shtml">
Secrets of Network Cartography: A Comprehensive Guide to nmap</a>,
Second Edition, Revision 2, Published by
Professor Messer, LLC,
2910 Kerry Forest Parkway, #D4-230, Tallahassee, Florida 32309, March 2007
</li>
<li>Gordon Fyodor Lyon,
Nmap Network Scanning: The Official Nmap Project Guide to
Network Discovery and Security Scanning, Nmap Project, January 1,
2009, 468 pages*, ISBN-10:* 0979958717*, ISBN-13:* 978-0979958717</li>

<li>ajiv Chakravorty, Joel Cartwright, and Ian Pratt,
"<a href=" http://www.cl.cam.ac.uk/~rc277/globe02.pdf">Practical experience with TCP over GPRS</a>",
Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE,
Volume 2, 17-21 Nov. 2002, pages: 1678 - 1682<br>
Digital Object Identifier 10.1109/GLOCOM.2002.1188483<br>
http://ieeexplore.ieee.org/iel5/8454/26646/01188483.pdf
</li>

<li>David A. Hayes, Jason But, and Grenville Armitage,
<a href="http://ccr.sigcomm.org/online/?q=node/443">Issues with
Network Address Translation for SCTP</a>,
ACM SIGCOMM Computer Communications Review, Volume 39, Number 1,
January 2009, pages 24-33.</li>

<li>Arbor Networks, Inc.'s <A href="http://atlas.arbor.net/">
Active Threat Level Analysis System (ATLAS)</a> Dashboard</li>

<li>Hao Shang,
<a href="http://www.wpi.edu/Pubs/ETD/Available/etd-040606-025621/unrestricted/thesis.pdf">
Exploiting Flow Relationships to Improve the
Performance of Distributed Applications</a>, Dissertation,
Worcester Polytechnic Institute, Computer Science,
January 1, 2006</li>

<li>Kevin Fall and Steve McCanne,
<a href="http://queue.acm.org/detail.cfm?id=1066069">
"You Don't Know Jack about Network Performance"</a>, ACMqueue,
June 7, 2005</li>

<li>Martin Duke, Thomas R. Henderson, and Jeff Meegan.
<a href="http://ccr.csail.mit.edu/issues/v34n3/academicpaper.2004-08-05.1146654855">
Experience with "Link-Up Notification" Over a Mobile Satellite Link</a>.
SIGCOMM Computer Communication Review, Volume 34, 3, July 2004, pp. 93-104. DOI= http://doi.acm.org/10.1145/1031134.1031136</li>

<li>Jonathan M. Smith, Fighting Physics: A Tough Battle, Communication
of the ACM, Volume 52, Number 7, July 2009, pp. 60-65.</li>

<li>Paul Vixie, What DNS Is Not", Communications of the ACM, Volume 52,
Number 12, December 2009, pages 43-47.</li>

<li>Paul McFedries,
<em>Twitter Tips, Tricks, and Tweets</em>,
Wiley, 11 May 2009, 272 pages,
ISBN-10: 0470529695 and ISBN-13: 978-0470529690.
</li>

<li><a href="http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment">
Cloud Computing: Benefits, risks and recommendations for information
security</a>, European Network and Information Security Agency (ENISA), Nov. 2009</li>

<li>
Erik Brynjolfsson, Paul Hofmann, and John Jordan,
Cloud computing and electricity: beyond the utility model,
Communications of the ACM, ACM, New York, NY, USA,Volume 53, Number 5, May 2010,
ISSN 0001-0782, pp 32-34, http://doi.acm.org/10.1145/1735223.1735234
</li>

<li>
Dave Durkee, Why cloud computing will never be free,
Communications of the ACM, ACM, New York, NY, USA,Volume 53, Number 5, May 2010,
ISSN 0001-0782, pp 62-69, http://doi.acm.org/10.1145/1735223.1735242
</li>

<li>
Julien Ridoux and Darryl Veitch, Principles of robust timing over the internet
Communications of the ACM, ACM, New York, NY, USA,Volume 53, Number 5, May 2010,
ISSN 0001-0782, pp 54--61, http://doi.acm.org/10.1145/1735223.1735241
</li>

<li>Daily script produced <a href="http://www.potaroo.net/tools/ipv4/">report on IPv4 address allocations</a></li>

<li>David Newman, "10 Gig access switches: Not just packet-pushers
anymore", Network World, Volume 25, Number 12, 24 March 2008, 6 page
<a href="http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps5023/article_1-2370949__Eprint.pdf">reprint</a></li>

<li>Speading up the web:
<ul>
<li>Faster DNS lookups - see efforts such as
<a href="http://code.google.com/speed/public-dns/">
Google Public DNS</a>, <a href="http://www.opendns.com/">OpenDNS</a>,
<a href="http://www.scrubit.com/">ScrubIT</a>, ...</li>
<li><a href="http://www.chromium.org/spdy/spdy-whitepaper">SPDY: An experimental protocol for a faster web</a><li>
<li>HTTP over Stream Control Transmission Protocol (SCTP), see for
example Jonathan Leighton, <a href="http://www.cis.udel.edu/~leighton/">Comparison of
HTTP over TCP and SCTP in High Delay Networks</a>, web page, University of Delaware, Computer and
Information Sciences Department Newark, DE and
P. Natarajan, P. Amer, J. Leighton, and F. Baker,
<a href="http://tools.ietf.org/html/draft-natarajan-http-over-sctp-02">
"Using SCTP as a Transport Layer Protocol for HTTP"</a>,
Internet-Draft, IETF Network Working Group, July 9, 2009,
Expires: January 10, 2010
</li>
<li>using <a href="http://pdos.csail.mit.edu/uia/sst/">Structured Stream Transport (SST)</a></li>
<li>using <a href="http://www.w3.org/Protocols/MUX/">MUX</a> and
<a href="http://www.w3.org/Protocols/MUX/WD-mux-980708.html">SMUX</a></li>
<li>using <a href="http://beepcore.org/">Blocks Extensible Exchange Protocol
(BEEP)</a>, see also RFCs <a
href="http://www.rfc-editor.org/rfc/rfc3080.txt">3080</a> and
<a href="http://www.rfc-editor.org/rfc/rfc3081.txt">3081</a></li>
</ul></li>

<li>IPv6
<ul>
<li><a href="http://test-ipv6.com/">test</a> you IPV6 readiness</li>

<li>To determine your IPv6 address, try the command http://www.whatismyipv6.net/?s=IPv6_traceroute</li>

<li><a href="http://www.lan.kth.se/ipv6/">IPv6</a> at KTH</li>

<li>Yi Wang, Shaozhi Ye, Xing Li, "<a href="http://www.cs.princeton.edu/~yiwang/papers/iscc05.pdf">
Understanding Current IPv6 Performance: A Case Study from CERNET</a>", In proceedings of the 10th IEEE Symposium
on Computers and Communications (ISCC'05), Cartagena, Murcia, Spain,
June 27-June 30, ISBN: 0-7695-2373-0, http://doi.ieeecomputersociety.org/10.1109/ISCC.2005.151
</li>

<li>Kim Davies, <a href="http://www.iana.org/about/presentations/davies-sofia-dnssec+ipv6-080909.pdf">
Saving the Internet from doom (DNSSEC and IPv6)</a>, Slides, Sofia, Bulgaria, September 2008
</li>

<li>Steinar H. Gunderson,
<a href="http://www.ripe.net/ripe/meetings/ripe-57/presentations/Colitti-Global_IPv6_statistics_-_Measuring_the_current_state_of_IPv6_for_ordinary_users_.7gzD.pdf">
Global IPv6 statistics: Measuring the current state of
IPv6 for ordinary users</a>, Slides from presentation at RIPE57, 26-30 October
2008</li>


<li>Sheila Frankel, Richard Graveman, John Pearce, and Mark Rooks,
<a href="http://csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf">
Guidelines for the Secure Deployment of IPv6</a>,
Recommendations of the National Institute of Standards and Technology,
Special Publication 800-119, Computer Security Division,
Information Technology Laboratory,
National Institute of Standards and Technology, Gaithersburg, MD
20899-8930, 188 pages, December 2010</li>
</ul>

<li>Elaine Barker and Allen Roginsky,
Transitions: Recommendation for Transitioning the Use of Cryptographic
Algorithms and Key Lengths, U.S. Department of Commerce,
National Institute of Standards and Technology,
Computer Security Division, Information Technology Laboratory,
NIST Special Publication 800-131A, January 2011
<a href="http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf">
http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf</a></li>


<li><a href="http://blog.spoofed.org/2009/11/racket-106-released.html">racket</A>
a tool for generating packets
</li>

<li><a href="http://sylv1.tuxfamily.org/projects/scruby.html">scruby</A> a nother tool for generating packets
This seems to be less developed than racket.</li>

<li>Useful list of acronyms and abbreviations -
IETF RFC Editor <a href="http://www.rfc-editor.org/rfc-style-guide/abbrev.expansion.txt">
Abbreviations List</a>, January 2011</li>

<li>Vinton G. Cerf and Robert E. Kahn, A Protocol for Packet Network Intercommunication,
IEEE Transactions on Communications, ISSN 0090-6778, Volume 22, Number 5, May 1974,
pp. 637 - 648, doi 10.1109/TCOM.1974.1092259</li>

<li>Fernando Gont,
<a href="http://www.rfc-editor.org/rfc/rfc6274.txt">
Security Assessment of the Internet Protocol Version 4</a>,
RFC Editor, ISSN: 2070-1721, Request for Comments 6274, July 2011</li>

<li>Converting a PCAP file to LaTeX can be done with
<a href="http://www.wireshark.org/lists/wireshark-users/201007/msg00258.html">
pcap2tex</a></li>

<li>Traffic control next generation - <a
href="http://tcng.sourceforge.net/">tcng</a></li>

<li>Barath Raghavan and Justin Ma,
<a href="http://www.cs.berkeley.edu/~jtma/papers/emergy-hotnets2011.pdf">
The Energy and Emergy of the Internet</a>,
Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets), November 2011.

<li>Daniel Suarez, <em>Daemon</em>, Dutton, 2009, ISBN-10: 0525951113,
ISBN-13: 978-0525951117 (Interneting related techno-thriller novel);
see also <a href="http://thedaemon.com/">thedaemon.com</a></li>

<li> Luigi Rizzo, &ldquo;Revisiting Network I/O APIs: The netmap Framework&rdquo;,
Queue, vol. 10, no. 1, pp. 30:30-30:39, January 2012, DOI:10.1145/2090147.2103536,
Available at http://doi.acm.org/10.1145/2090147.2103536. </li>
<li>Luigi Rizzo, &ldquo;Revisiting network I/O APIs&rdquo;, Communications of the ACM,
vol. 55, no. 3, pp. 45-51, March 2012, DOI:10.1145/2093548.2093565,
Available at http://dl.acm.org/citation.cfm?doid=2093548.2093565. </li>

<li>Luigi Rizzo,
<a href="http://info.iet.unipi.it/~luigi/netmap/">
The netmap project</a>, netmap - a novel framework for fast packet I/O,
Università di Pisa</li>

<li><a href="http://getfirebug.com/">Firebug</a> - a tools for use
with Firefox, Chrome, and other browsers - includes some measurement
tools</li>

<li><a
href="http://wiki.networksecuritytoolkit.org/nstwiki/index.php/LAN_Ethernet_Maximum_Rates,_Generation,_Capturing_%26_Monitoring">maximum
ethernet data rates for UDP and TCP over IEEE 802.3u and IEEE 802.3ab</a></li>

<li>Lorenzo Colitti, Steinar H. Gunderson, Erik Kline, and Tiziana
Refice, "<a href="http://pam2010.ethz.ch/papers/full-length/15.pdf">
Evaluating IPv6 Adoption in the Internet</a>", Proceedings of the 11th
international conference on Passive and active measurement (PAM'10), Zurich,
Switzerland, Springer-Verlag, Berlin, Heidelberg, ISBN 3-642-12333-3,
978-3-642-12333-7, April 2010, pp. 141-150</li>


<li>For a very nice description of how to realize covert channels
using TCP/IP (includes source code) see: Craig H. Rowland, "Covert
Channels in the TCP/IP Protocol Suite", First Monday, vol. 2, no. 5,
May 1997, Available at
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/528/449.</li>

<li>Paul O'Steen,
<a href="http://cs.baylor.edu/~donahoo/practical/CSockets/WindowsSockets.pdf">
Transitioning from UNIX to Windows Socket Programming</a>, 19 October
2003 - nice parallel examples of UNIX and Windows socket programming</li>

<li>Two very interesting and useful tools for DNSSEC testing:
Sandia National Laboratories <a href="dnsviz.net">DNSViz: A DNS visualization tool</a>
and VeriSign Labs' <a href="http://dnssec-debugger.verisignlabs.com">DNSSEC debugger</a></li>

<li><a href="http://www.netkit.org/index.html">
Netkit</a>: The poor man's system to experiment computer networking</li>

<li>Tyler J. Wagner, <a href="http://www.tolaris.com/2012/05/16/using-host-networking-and-nat-with-virtualbox-v2-0/">
"Using host networking and NAT with VirtualBox, v2.0"</a>,
tolaris.com, 16-May-2012. A nice feature of this description is the
detailed description of how to use the linux birdge-utils to create a
new brdiged interface and then utilize this from Virtual Box.
</li>

<li>Performance Applications Engineering group at Sun Microsystems' <a
href="http://www.uperf.org/">uPerf</a>: A network performance
tool. Can be configured with XML, see: user12608726, <a href="https://blogs.oracle.com/hotnets/entry/introducing_uperf_an_open_source">
"Introducing UPERF - an open source network performance measurement tool (Hot Networking Technologies)"</a>, 06-May-2008. [Online]</li>

<li>Radim Ro&scaron;ka, Performance evaluation of GNU/Linux network bridge, Master's
Thesis, Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science and Engineering, May 13, 201,
<a href="https://dip.felk.cvut.cz/browse/pdfcache/roskarad_2011dipl.pdf">
https://dip.felk.cvut.cz/browse/pdfcache/roskarad_2011dipl.pdf</a></li>

<p>To looking at per route metrics - see
Vincent Bernat, <a href"http://vincent.bernat.im/en/blog/2011-ipv4-route-cache-linux.html">Tuning
Linux IPv4 route cache</a>, Blog, 13 December 2011.</p>

<p>Bruce Schneier,
<a href="http://www.wired.com/opinion/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/">
The Internet of Things Is Wildly Insecure -- Often Unpatchable</a>,
Wired, 6 January 2014</p>


</ul>


<hr>


<H2>Page History</H2>


<table BORDER="3">
<tr><th>Date</th><th>Update</th></tr>
<tr><td>2014.04.29</td><td>added recording sof modules 12 and 13 and
guest lecture</td></tr>
<tr><td>2014.04.25</td><td>added lecture notes for module 13 and added recording for module 11</td></tr>
<tr><td>2014.04.24</td><td>added recording for module 10</td></tr>
<tr><td>2014.04.23</td><td>added lecture notes for module 12 and added recording for module 9</td></tr>
<tr><td>2014.04.22</td><td>added lecture notes for module 11 and recordings for Module 8</td></tr>
<tr><td>2014.04.21</td><td>added lecture notes for module 10</td></tr>
<tr><td>2014.04.20</td><td>added lecture notes for module 9</td></tr>
<tr><td>2014.04.19</td><td>added recording via DreamBroker for modules last of 5, 6, and 7</td></tr>
<tr><td>2014.04.17</td><td>added recording for modules 6 and 7</td></tr>
<tr><td>2014.04.14</td><td>added lecture notes for modules 7 and 8</td></tr>
<tr><td>2014.04.13</td><td>corrected headings on Module 6 notes file</td></tr>
<tr><td>2014.04.02</td><td>added wide recording of yesterday's class</td></tr>
<tr><td>2014.04.01</td><td>added recording of today's class</td></tr>
<tr><td>2014.03.31</td><td>added lecture notes for modules 5 and 6</td></tr>
<tr><td>2014.03.27</td><td>added recording of today's class</td></tr>
<tr><td>2014.03.27</td><td>shifted location of the lecture notes for modules 1..4</td></tr>
<tr><td>2014.03.26</td><td>added lecture notes for modules 2,3, and 4</td></tr>
<tr><td>2014.03.25</td><td>added lecture notes for module 1</td></tr>
<tr><td>2013.11.20</td><td>added times and dates for lectures & recitations for 2014</td></tr>
<tr><td>2013.11.07</td><td>added reference Vincent Bernat's blog entry about ip route cache</td></tr>
<tr><td>2012.09.30</td><td>correct a spelling error</td></tr>
<tr><td>2012.07.29</td><td>added reference to network bridge performance measurement thesis</td></tr>
<tr><td>2012.05.27</td><td>first version for 2014</td></tr>
</table>

<hr>

<p>&copy; Copyright 2014 <i>G.Q.Maguire Jr.</i> (<A HREF="mailto:maguire@kth.se">maguire@kth.se</a>) <br>
All Rights Reserved. <br>
Last modified: Tue Apr 29 23:17:12 CEST 2014
</p>

<p>
<a href="http://validator.w3.org/check/referer">
<img border="0" src="http://www.it.kth.se/~maguire/valid-html401.gif" alt="Valid HTML 4.01!" height="31" width="88"></a>
</p>
</body>
</html>