Schedule
May 31 – Jun 4
Jun 7 – 11
Historical Papers

Several papers showing development of the Internet and its protocols.

D. Clark, “The design philosophy of the DARPA internet protocols.” SIGCOMM Comput. Commun. Rev. 18, 4 (Aug 1988), pp. 106–114 dld
P. Karn and C. Partridge, “Improving round-trip time estimates in reliable transport protocols.” In Proc. SIGCOMM ’87, Stowe, Vermont, United States, Aug 11–13, 1987 dld
Lot of math for a simple idea. But also good introduction for the problem and terminology.
V. Jacobson, “Congestion avoidance and control.” In Proc. SIGCOMM ’88, Stanford, California, United States, Aug 16–18, 1988 dld
W. Stevens, “RFC 2001: TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms.” dld
Kevin Fall and Sally Floyd, “Simulation-based comparisons of Tahoe, Reno and SACK TCP.” SIGCOMM Comput. Commun. Rev. 26, 3 (Jul 1996), pp. 5–21 dld
Jun 14 – 18
Jun 21 – 25
Measurement
Bernhard Ager, Wolfgang Mühlbauer, Georgios Smaragdakis and Steve Uhlig, “Comparing DNS resolvers in the wild.” In Proc. IMC ’10, Melbourne, Australia, Nov 1–30, 2010 dld
Jianer Zhou, Zhenyu Li, Qinghua Wu, Peter Steenkiste, Steve Uhlig, Jun Li and Gaogang Xie, “TCP Stalls at the Server Side: Measurement and Mitigation.” IEEE/ACM Trans. Networking 27, 1 (Feb 2019), pp. 272–287 dld [MC]
Franziska Lichtblau, Florian Streibelt, Thorben Krüger, Philipp Richter and Anja Feldmann, “Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses.” In Proc. IMC ’17, London United Kingdom, Nov 2017 dld [DR]
Donghui Yang, Zhenyu Li and Gareth Tyson, “A Deep Dive into DNS Query Failures.” In Proc. of the 2020 USENIX Annual Technical Conference (USENIX ATC 20), 2020, pp. 507–514 dld
Andra Lutu, Byungjin Jun, Fabián E. Bustamante, Diego Perino, Marcelo Bagnulo and Carlos Gamboa Bontje, “A first look at the IP eXchange ecosystem.” SIGCOMM Comput. Commun. Rev. 50, 4 (Oct 26, 2020), pp. 25–34 dld [EP]
Jun 28 – Jul 2
Jul 5 – 9
More Congestion
J. Martin, A. Nilsson and Injong Rhee, “Delay-based congestion avoidance for TCP.” IEEE/ACM Trans. Networking 11, 3 (Jun 2003), pp. 356–369 dld
This paper is old, but very unusual: It reports a negative.
Radhika Mittal, Justine Sherry, Sylvia Ratnasamy and Scott Shenker, “Recursively Cautious Congestion Control.” In Proc. of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), Seattle, WA, 2014, pp. 373–385 dld
Qingxi Li, Mo Dong and P. Brighten Godfrey, “Halfback: running short flows quickly and safely.” In Proc. CoNEXT ’15, Heidelberg Germany, Dec 2015 dld
Akshay Narayan, Frank Cangialosi, Prateesh Goyal, Srinivas Narayana, Mohammad Alizadeh and Hari Balakrishnan, “The Case for Moving Congestion Control Out of the Datapath.” In Proc. HotNets-XVI, Palo Alto CA USA, Nov 30, 2017 dld [DR]
Jul 12 – 16
Routing
Sharon Goldberg, “Why is it taking so long to secure internet routing?.” Commun. ACM 57, 10 (Sep 23, 2014), pp. 56–63 dld [EP]
Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti and Xenofontas Dimitropoulos, “A Survey among Network Operators on BGP Prefix Hijacking.” SIGCOMM Comput. Commun. Rev. 48, 1 (Apr 27, 2018), pp. 64–69 dld [DR]
Siva Kesava Reddy Kakarla, Alan Tang, Ryan Beckett, Karthick Jayaraman, Todd Millstein, Yuval Tamir and George Varghese, “Finding Network Misconfigurations by Automatic Template Inference .” In Proc. of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), Santa Clara, CA, 2020, pp. 999–1013 dld
Jul 19 – 23
HTTP-2, etc.
Anne-Sophie Brylinski and Aniruddha Bhattacharjya, “Overview of HTTP/2.” In Proc. ICC ’17, Cambridge United Kingdom, Mar 22, 2017 dld
Poul-Henning Kamp, “HTTP/2.0: the IETF is phoning it in.” Commun. ACM 58, 3 (Feb 23, 2015), pp. 40–42 dld [EP]
Konrad Wolsing, Jan Rüth, Klaus Wehrle and Oliver Hohlfeld, “A performance perspective on web optimized protocol stacks: TCP+TLS+HTTP/2 vs. QUIC.” In Proc. ANRW ’19, Montreal Quebec Canada, Jul 22, 2019 dld [MC]
Jul 26 – 30
Security
Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk and Yuval Shavitt, “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.” In Proc. of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, 2019, pp. 1029–1046 dld
Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta and Zakir Durumeric, “All Things Considered: An Analysis of IoT Devices on Home Networks.” In Proc. of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, 2019, pp. 1169–1185 dld [MC]
This is part of a section on IoT security at the indicated conference. You might want to check out the program if that subject is a particular interest.
Aug 2 – 6
Just Interesting
Sam Kumar, Michael P Andersen, Hyung-Sin Kim and David E. Culler, “Performant TCP for Low-Power Wireless Networks .” In Proc. of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), Santa Clara, CA, 2020, pp. 911–932 dld
Alireza Ameli Renani, Jun Huang, Guoliang Xing, Abdol-Hossein Esfahanian and Weiguo Wu, “Harnessing Hardware Defects for Improving Wireless Link Performance.” IEEE/ACM Trans. Networking 28, 5 (Oct 2020), pp. 1913–1924 dld
Aug 6
Anniversary
Tim Berners-Lee posted the first web page on Aug. 6, 1991.