Reading list in Computer Networking
Content
Notes about the reading lists
- Papers fall roughly into three categories:
- Historical: Provided for historical perspective.
- Tutorial: Provide detailed description/informationon topics; this category includes protocol standards.
- Research: Current research topics.
- Not all papers will be discussed in class. Papers to be discussed in class are listed on the module web page. Papers not listed on the module web page provide additional
information on topics.
- Papers/readings listed on the module web page could be used for examen.
- This reading list is still under construction; additional papers may be added.
Internet
- Aguiar, R.L.. (2008). ACM Computer Communication Review, Vol. 38, n. 5, October.
Some Comments on Hourglasses.
- Allman, E.. (2011). ACM Communications of the ACM, Vol. 54, n. 6, url.
The Robustness Principle Reconsidered.
- Anderson, T.; Shenker, S.; Stoica, I. and Wetherall, D.. (2003). ACM SIGCOMM Computer Communication Review, Vol. 33, n. 1, January.
Design Guidelines for Robust Internet Protocols.
- Carpenter, B. and Partridge, C.. (2010). ACM Computer Communication Review, Vol. 40, n. 1, January.
Internet Requests for Comments (Rfcs) as Scholarly Publications.
- Cerf, V.. (2008). Cisco Internet Protocol Journal, Vol. 11, n. 2.
A Decade of Internet Evolution.
- Cerf, V.. (2013). Cisco Internet Protocol Journal, Vol. 16, n. 2, url.
Looking Forward.
- Cerf, V. and Kahn, R.E.. (1974). Transactions on Communications, Vol. 22, n. 5, pp. 637-648, May.
A Protocol for Packet Network Intercommunication.
- Chandranmenon, G.P. and Varghese, G.. (1996), url.
Reconsidering Fragmentation and Reassembly.
- Clark, D.. (2000), TPRC, September, url.
Rethinking the Design of the Internet: End to End Arguments vs. The Brave New World.
- Clark, D.; Wroclawski, J.; Sollins, K. and Braden, R.. (2002), SIGCOMM, August, url.
Tussle in Cyberspace: Defining Tomorrow's Internet.
- Clark, D.D.. (1988). ACM Computer Communication Review, Vol. 18, n. 4, pp. 106-114, August, url.
The Design Philosophy of the Darpa Internet Protocols.
- Crowcroft, J.. (2007). ACM Computer Communication Review, Vol. 37, n. 1.
Net Neutrality: The Technical Side of the Debate.
- Floyd, S. and Allman, M.. (2008), RFC 5290, July, url.
Comments on the Usefulness of Simple Best-Effort Traffic.
- Frejborg, P.. (2011), RFC 6306, July, url.
Hierarchical Ipv4 Framework.
- Green, P.J.. (1980). IEEE Transactions on Communications, Vol. 28, n. 4, pp. 413-424, April.
An Introduction to Network Architectures and Protocols.
- Guédon, J.-C.. (2000). La Recherche, n. 328, Février.
La Force De L'intelligence Distribuée.
- Huston, G.. (2004). Cisco Internet Protocol Journal, Vol. 7, n. 3, pp. 2-33, September.
Anatomy: A Look inside Network Address Translators.
- Huston, G.. (2008). Cisco Internet Protocol Journal, Vol. 11, n. 2.
A Decade in the Life of the Internet.
- Huston, G.. (2013). Cisco Internet Protocol Journal, Vol. 16, n. 2, June, url.
Network Service Models.
- Karn, P.; Bormann, C.; Fairhurst, G.; Grossman, D.; Ludwig, R., et al.. (2004), RFC 3819, url.
Advice for Internet Subnetwork Designers.
- Karrenberg, D.; Ross, G.; Wilson, P. and Nobile, L.. (2001). Cisco Internet Protocol Journal, Vol. 4, n. 4, December.
Development of the Regional Internet Registry System.
- Kent, C.A. and Mogul, J.C.. (1995). ACM SIGCOMM Computer Communication Review, Vol. 25, n. 1, pp. 75-87, January, url.
Fragmentation Considered Harmful.
- Kleinrock, L.. (2008). IEEE Wireless Communications, Vol. 15, n. 1, pp. 8-18, February.
History of the Internet and Its Flexible Future.
- Leine, B.M.; Kahn, R.E.; Postel, J.; Cerf, V.G.; Kleinrock, L., et al.. (2009). ACM Computer Communication Review, Vol. 39, n. 5, pp. 10, October.
A Brief History of the Internet.
- Monnier, E.. (2013). Science & Vie, n. 1144, Janvier.
Protocole: Les 7 Secrets Du Transfert Par Paquets.
- Muller, A. and Carle, G.. (2008). IEEE Network.
Behavior and Classification of Nat Devices and Implications for Nat Traversal.
- Padlipsky, M.A.. (1982), RFC 871, url.
A Perspective on the Arpanet Reference Model.
- Pan, J.; Paul, S. and Jain, R.. (2011). IEEE Communications Magazine, Vol. 49, n. 7, July, url.
A Survey of the Research on Future Internet Architectures.
- Postel, B.J.. (1980). IEEE Transactions on Communications, Vol. 28, n. 4, April.
Internetwork Protocol Approaches.
- Postel, J.. (1981), RFC 792, September, url.
Internet Control Message Protocol.
- Postel, J.. (1981), RFC 791, September, url.
Internet Protocol.
- Recherche, L.. (2000). La Recherche, n. 328, Février.
La Gouvernance Internet.
- Saltzer, J.H.; Reed, D.P. and Clark, D.D.. (1984). ACM Transactions on Computer Systems, Vol. 2, n. 4, pp. 277-288, November, url.
End-to-End Arguments in System Design.
- Semeria, C.. (2001), white paper.
Understanding IP Addressing: Everything You Ever Wanted to Know.
- Socolofsky, T. and Kale, C.. (1991), RFC 1180, January, url.
A TCP/IP Tutorial.
- Thaler, D.. (2011), RFC 6250, 26 pages, May, url.
Evolution of the IP Model.
- Viennot, L.. (2009). Interstices.
Les Réseaux Ont La Fibre De L'information.
- Viennot, L.. (2009). Interstices.
Web Et Internet, C'est La Même Chose !.
- White, R.. Cisco Internet Protocol Journal.
Working with IP Address.
- Zimmerman, H.. (1980). IEEE Transactions on Communications, Vol. 28, n. 4, pp. 425-432, April.
OSI Reference Model : The ISO Model of Architecture for Open Systems Interconnection.
Congestion control
- Allman, M.; Paxson, V. and Stevens, W.. (1999), RFC 2581, url.
TCP Congestion Control..
- Bastian, C.; Klieber, T.; Livingood, J.; Mills, J. and Woundy, R.. (2010), RFC 6057, December, url.
Comcast's Protocol-Agnostic Congestion Management System.
- Bennett, J.C.R. and Zhang, H.. (1997). ACM, Transactions on Networking, Vol. 5, n. 5, pp. 675-689, October, url.
Hierarchical Packet Fair Queueing Algorithms. - Braden, B.; Clark, D.; Crowcroft, J.; Davie, B.; Deering, S., et al.. (1998), RFC 2309, April, url.
Recommendations on Queue Management and Congestion Avoidance in the Internet.
- Briscoe, B.; Woundy, R.; Moncaster, T. and Leslie, J.. (2012), RFC 6789, December, url.
Conex Concepts and Use Cases.
- Chiu, D.M. and Jain, R.. (1989). Computer Networks and ISDN Systems, Vol. 17, pp. 1-14.
Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks.
- Cruz, R.L.. (1995). IEEE Journal on Selected Areas in Communications, August, url.
Quality of Service Guarantees in Virtual Circuit Switched Networks.
- Demers, A.; Keshav, S. and Shenker, S.. (1989). ACM Computer Communication Review, Vol. 19, n. 4, September.
Analysis and Simulation of a Fair Queueing Algorithm.
- Ely, D.; Spring, N.; Wetherall, D.; Savage, S. and Anderson, T.. (2001), ICNP, url.
Robust Congestion Signaling.
- Floyd, S. and Allman, M.. (2007), RFC 5033, August, url.
Specifying New Congestion Control Algorithms.
- Floyd, S. and Jacobson, V.. (1993). IEEE/ACM Transactions on Networking, Vol. 1, n. 4, pp. 397-413, August, url.
Random Early Detection Gateways for Congestion Avoidance.
- Gerla, M. and Kleinrock, L.. (1980). IEEE Transactions on Communications, Vol. 28, n. 4, April.
Flow Control: A Comparative Survey.
- Gettys, J. and Nichols, K.. (2012). ACM Communications of the ACM, Vol. 55, n. 1, pp. 57-65, January, url.
Bufferbloat: Dark Buffers in the Internet.
- Gevros, P.; Crowcroft, J.; Kirstein, P. and Bhatti, S.. (2001). IEEE Network, Vol. 15, n. 3, May.
Congestion Control Mechanisms and the Best Effort Service Model.
- Jain, R.. (1989). ACM Computer Communication Review, Vol. 19, n. 5, pp. 56-71, October, url.
A Delay-Based Approach for Congestion Avoidance in Interconnected Heterogeneous Computer Networks.
- Jain, R.. (1992), 4th Conference on Information Networks and Data Communication.
Myths About Congestion Management in High-Speed Networks.
- Katabi, D.; Handley, M. and Rohrs, C.. (2002), SIGCOMM, url.
Congestion Control for High Bandwidth-Delay Product Networks.
- Keshav, S.. (1991), SIGCOMM.
A Control-Theoretic Approach to Flow Control.
- Key, P.; Massoulié, L. and Towsley, D.. (2011). ACM Communications of the ACM, Vol. 54, n. 1, January, url.
Path Selection and Multipath Congestion Control.
- Kuo, F.-C. and Fu, X.. (2008). ACM Computer Communication Review, Vol. 38, n. 1, January.
Probe-Aided Multcp: An Aggregate Congestion Control Mechanism.
- Mahajan, R.; Bellovin, S.M.; Floyd, S.; Ioannidis, J.; Paxson, V., et al.. (2001). ACM Computer Communication Review, url.
Controlling High Bandwidth Aggregates in the Network.
- Nagle, J.. (1995). ACM Computer Communication Review, Vol. 25, n. 1, pp. 61-65, January, url.
Congestion Control in IP/TCP Internetworks.
- Nichols, K. and Jacobson, V.. (2012). ACM Queue, url.
Controlling Queue Delay: A modern AQM is just one piece of the solution to bufferbloat..
- Paasch, C. and Bonaventure, O.. (2014). ACM Queue, March, url.
Multipath TCP.
- Raghavan, B. and Snoeren, A.. (2006), HotNets, Workshop on Hot Topics in Networks, November, url.
Decongestion Control Workshop on Hot Topics in Networks.
- Ramakrishnan, K.; Chiu, D. and Jain, R.. (1988), SIGCOMM, pp. 303-313, url.
Congestion Avoidance in Computer Networks with a Connectionless Network Layer.
- Ramakrishnan, K.; Floyd, S. and Black, D.. (2001), RFC 3168, 63 pages, September, url.
The Addition of Explicit Congestion Notification (ECN) to IP.
- Ramakrishnan, K.K. and Jain, R.. (1990). ACM Transactions on Computer Systems, Vol. 8, n. 2, pp. 158-181, May.
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks.
- Roberts, J.. (1998), url.
Engineering for Quality of Service.
- Ros, D. and Welzl, M.. (2012). IEEE Communications Surveys & Tutorials, url.
Less-Than-Best-Effort Service: A Survey of End-to-End Approaches.
- Ryu, S.; Rump, C. and Qiao, C.. (2003). IEEE Communications Surveys & Tutorials, Vol. 5, n. 1, pp. 28-39, Third Quarter.
Advances in Internet Congestion Control.
- Sariowan, H.; Cruz, R.L. and Polyzos, G.C.. (1995), ICCCN, September, pp. 512-320, url.
Scheduling for Quality of Service Guarantees Via Service Curves.
- Shalunov, S.. (2012), RFC 6817, December, url.
Low Extra Delay Background Transport (Ledbat).
- Stoica, I.; Shenker, S. and Zhang, H.. (1998), Proceedings of SIGCOMM'98, pp. 118-130., url.
Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks.
- Stoica, I. and Zhang, H.. (1999), SIGCOMM, September, pp. 14, url.
Providing Guaranteed Services without Per Flow Management.
- Tang, A.; Wang, J. and Low, S.H.. (2006). IEEE/ACM Transactions on Networking, Vol. 14, n. 2, April, url.
Counter-Intuitive Throughput Behaviors in Networks under End-to-End Control.
- Welzl, M.; Papadimitriou, D.; Scharf, M. and Briscoe, B.. (2011), RFC 6077, February, url.
Open Research Issues in Internet Congestion Control.
- Wischik, D.; Handley, M. and Braun, H.. (2008). ACM Computer Communication Review.
The Resource Pooling Principle.
- Wischik, D.; Raiciu, C.; Greenhalgh, A. and Handley, M.. (2009), pp. 4, url.
Design, Implementation and Evaluation of Congestion Control for Multipath TCP.
TCP - Transport
- Alizadeh, M. and And Al.. (2010), SIGCOMM, September, url.
Data Center TCP (Dctcp).
- Allman, M.. (1998). ACM Computer Communication Review, October, url.
On the Generation and Use of TCP Acknowledgments.
- Allman, M. and Falk, A.. (1999). ACM SIGCOMM Computer Communication Review, Vol. 29, n. 5, October.
On the Effective Evaluation of TCP.
- Balakrishnan, H.; Padmanabhan, V.N.; Seshan, S.; Stemm, M. and Katz, R.. (1998), Infocom, March, url.
TCP Behavior of a Busy Web Server: Analysis and Improvements.
- Barakat, C.; Altman, E. and Dabbous, W.. (2000). IEEE Communications Magazine, Vol. 38, n. 1, pp. 40-46, January, url.
On TCP Performance in a Heterogeneous Network: A Survey.
- Blanton, E. and Allman, M.. (2002). ACM SIGCOMM Computer Communication Review, Vol. 32, n. 1, pp. 20-30, January, url.
On Making TCP More Robust to Packet Reordering.
- Brakmo, L.S.; O’malley, S.W. and Peterson, L.L.. (1994), SIGCOMM, August, url.
TCP Vegas: New Techniques for Congestion Detection and Avoidance.
- Bruyeron, R.; Hemon, B. and Zhang, L.. (1998). ACM Computer Communication Review, Vol. 28, n. 2, pp. 54 - 77, April, url.
Experimentations with TCP Selective Acknowledgment.
- Chase, J.S.; Gallatin, A.J. and Yocum, K.G.. (2001). Communications Magazine, Vol. 39, n. 4, pp. 68 - 74.
End System Optimizations for High-Speed TCP.
- Fall, K. and Floyd, S.. (1996). ACM Computer Communication Review, Vol. 26, n. 3, July, url.
Comparisons of Tahoe, Reno, and SACK TCP.
- Floyd, S. and Fall, K.. (1999). IEEE/ACM Transactions on Networking, Vol. 7, n. 4, pp. 458-472, August, url.
Promoting the Use of End-to-End Congestion Control in the Internet.
- Floyd, S. and Henderson, T.. (2004), RFC 3782, April, url.
The Newreno Modification to Tcp's Fast Recovery Algorithm..
- Guo, L. and Matta, I.. (2001), ICNP, 9th International Conference on Network Protocols, November, url.
The War between Mice and Elephants.
- Handley, M. and Floyd, S.. (2003), RFC 3448, January, url.
TCP Friendly Rate Control (TFRC).
- Huston, G.. (2006). Internet Protocol Journal, Vol. 9, n. 2, June.
Gigabit TCP.
- Huston, G.. (2000). Cisco Internet Protocol Journal, Vol. 3, n. 2, url.
TCP Performance.
- Iren, S.; Amer, P.D. and Conrad, P.T.. (1999). ACM Computing Surveys, Vol. 31, n. 4, December, url.
The Transport Layer: Tutorial and Survey.
- Jacobson, V.. (1990), April.
Email to End2end-Interest Mailing List.
- Jacobson, V. and Karels, M.J.. (1988), SIGCOMM, August, pp. 314-329, url.
Congestion Avoidance and Control.
- Karandikar, S.; Kalyanaraman, S.; Bagal, P. and Packer, B.. (2000). Computer Communication Review, Vol. 30, n. 1, January, url.
TCP Rate Control.
- Karn, P. and Partridge, C.. (1987). ACM Computer Communication Review, Vol. 17, n. 5, pp. 2-7, August, url.
Improving Round-Trip Time Estimates in Reliable Transport Protocols.
- Lin, D. and Kung., H.T.. (1998), Infocom, March, url.
TCP Fast Recovery Strategies: Analysis and Improvements.
- Martin, J.; Nilsson, A. and Rhee, I.. (2003). IEEE/ACM Transactions on Networking, Vol. 11, n. 3, pp. 356 - 369, June, url.
Delay-Based Congestion Avoidance for TCP.
- Moktan, G.R.; Siikavirta, S.; Sarela, M. and Manner, J.. (2012).
Favoring the Short.
- Paxson, V. and Allman, M.. (2000), RFC 2988, url.
Computing Tcp's Retransmission Timer.
- Paxson, V. and Allman, M.. (1999), RFC 2525, url.
Known TCP Implementation Problems.
- Psaras, I. and Tsaoussidis, V.. (2006). Elsevier Computer Networks, Vol. 51, n. 8, June, url.
Why TCP Timers (Still) Don’t Work Well.
- Postel, J.. (1981), RFC 793, September, url.
Transmission Control Protocol.
- Ros, D.. (2005). Techniques de l'ingénieur.
Protocole De Transport TCP.
- Ros, D.. (2007). Techniques de l'ingénieur, Mai.
TCP - Impact Des Caractéristiques Des Liaisons.
- Ros, D.. (2006). Techniques de l'ingénieur, Mai.
TCP: Performance Et Évaluation Du Protocole.
- Savage, S.; Cardwell, N.; Wetherall, D. and Anderson, T.. (1999). ACM Computer Communication Review, Vol. 29, n. 5, pp. 71-78, October, url.
TCP Congestion Control with a Misbehaving Receiver.
- Tang, A.; Andrew, L.; Chiang, M. and Low, S.H.. (2008). John Wiley & Sons Wiley Encyclopedia of Computer Science and Engineering, December, url.
Transport Layer.
- Tomlinson, R.S.. (1995). ACM Computer Communication Review, Vol. 25, n. 1, pp. 45 - 53, January, url.
Selecting Sequence Numbers.
- Wang, R.; Taleb, T.; Jamalipour, A. and Sun, B.. (2009). IEEE Communications Surveys & Tutorials, Vol. 11, n. 2, pp. 21-32, Second quarter.
Protocols for Reliable Data Transport in Space Internet.
Internet traffic & metrology
- Allman, M. and Paxson, V.. (1999). ACM SIGCOMM Computer Communication Review, Vol. 29, n. 4, pp. 263-274, October, url.
"On Estimating End-to-End Network Path Properties".
- Bennett, J.C.R.; Partridge, C. and Shectman, N.. (1999). IEEE/ACM Transactions on Networking, Vol. 7, n. 6, pp. 789-798, December, url.
"Packet Reordering Is Not Pathological Network Behavior".
- Boggs, D.R.; Mogul, J.C. and Kent, C.A.. (1995). ACM SIGCOMM Computer Communication Review, Vol. 25, n. 1, pp. 123-136, January.
"Measured Capacity of an Ethernet: myths and Reality".
- Callado, A.; Kamienski, C.; Szabó, G.; Gero, B.P.; Kelner, J.; Fernandes, S. and Sadok, D. (2009). IEEE Communications Surveys & Tutorials, Vol. 11, No. 3, pp. 37-52, Third quarter 2009.
A Survey on Internet Traffic Identification.
- Gueye, B.; Ziviani, A.; Crovella, M. and Fdida, S.. (2005), CFIP, January.
"Vers La Localisation Géographique D'hôtes Dans L'internet Basée Sur La Multilatération".
- Medina, A.; Allman, M. and Floyd, S.. (2005). ACM Computer Communication Review, Vol. 35, n. 2, April.
"Measuring the Evolution of Transport Protocols in the Internet".
- Prasad, R.; Dovrolis, C.; Murray, M. and Claffy, K.. (2003). IEEE Network, November.
"Bandwidth Estimation: Metrics, Measurement Techniques, and Tools".
- Shannon, C.; Moore, D. and Claffy, K.. (2002). IEEE/ACM Transactions on Networking, Vol. 10, n. 6, pp. 709 - 720, December, url.
"Beyond Folklore: Observations on Fragmented Traffic".
- Strowes, S.D.. ACM Queue, url.
Passively Measuring TCP Round-Trip Times.
- Thompson, K.; Miller, G.J. and Wilder, R.. (1997). IEEE Network, Vol. 11, n. 6, pp. 10-23, November.
"Wide-Area Internet Traffic Patterns and Characteristics".
- Wei, H.-Y. and Lin, Y.-D.. (2003). IEEE Communications Surveys & Tutorials, Vol. 5, n. 2, pp. 10-21, Fourth quarter.
"A Survey and Measurement-Based Comparison of Bandwidth Management Techniques".
Internet routing
- Augustin, B.; Cuvellier, X.; Orgogozo, B.; Viger, F.; Friedman, T., et al.. (2006), IMC, October.
Avoiding Traceroute Anomalies with Paris Traceroute.
- Brodnik, A.; Carlsson, S.; Degermark, M. and Pink, S.. (1997), SIGCOMM, url.
Small Forwarding Tables for Fast Routing Lookups.
- Chiappa, J.N.. (2012), Internet-draft url, October.
An Architectural Perspective on the Lisp Location-Identity Separation System.
- Cisco. url.
Open Shortest Path First (Ospf).
- Donnet, B. and Friedman, T.. (2007). IEEE Communications Surveys & Tutorials, Vol. 9, n. 4, Fourth quarter.
Internet Topology Discovery: A Survey.
- Dube, R.. (1999). ACM SIGCOMM Computer Communication Review, Vol. 29, n. 3, pp. 44-46, July, url.
A Comparison of Scaling Techniques for Bgp.
- Gill, P.; Arlitt, M.; Li, Z. and Mahanti, A.. (2008), PAM.
The Flattening Internet Topology: Natural Evolution, Unsightly Barnacles or Contrived Collapse?.
- Griffin, T.G.; Shepherd, F.B. and Wilfong, G.. (2002). IEEE Transactions on Networking, April, url.
The Stable Paths Problem and Interdomain Routing.
- Gupta, P. and Mckeown, N.. (1999), SIGCOMM, pp. 147-160, url.
Packet Classification on Multiple Fields.
- Huston, G.. (2001). Cisco Internet Protocol Journal, Vol. 4, n. 1, March, url.
Analyzing the Internet BGP Routing Table.
- Huston, G.. Cisco Internet Protocol Journal.
Exploring Autonomous System Numbers.
- Huston, G.. (1999). Cisco Internet Protocol Journal, Vol. 2, n. 1, March.
Peering and Settlements.
- Huston, G.. (2006). Internet Protocol Journal.
Scaling Inter-Domain Routing: A view forward.
- Huston, G.. (2001). Cisco Internet Protocol Journal, Vol. 4, n. 4, March.
Scaling Inter-Domain Routing: A View Forward.
- Karol, M.J.; Hluchyj, M. and Morgan, S.P.. (1987). Transactions on Communications, Vol. 35, n. 12, December.
Input Versus Output Queueing on a Space-Division Packet Switch.
- Labovitz, C.; Ahuja, A.; Bose, A. and Jahanian, F.. (2001). IEEE/ACM Transactions on Networking, Vol. 9, n. 3, April.
Delayed Internet Routing Convergence.
- Labovitz, C.; Ahuja, A. and Jahanian, F.. (1999), FTCS, June, url.
Experimental Study of Internet Stability and Wide-Area Network Failures.
- Labovitz, C.; Malan, G.R. and Jahanian, F.. (1997), Proceedings of ACM SIGCOMM '97, pp. 115 - 126, url.
Internet Routing Instability.
- Labovitz, C.; Malan, G.R. and Jahanian, F.. (1999), Infocom, March, pp. 17, url.
Origins of Internet Routing Instability.
- Limoncelli, T.A.. (2012). ACM Queue.
Openflow: A Radical New Idea in Networking.
- Magoni, D. and Pansiot, J.J.. (2001). ACM SIGCOMM Computer Communication Review, Vol. 31, n. 3, pp. 26-37, July, url.
Analysis of the Autonomous System Network Topology.
- Maihofer, C.. (2004). IEEE Communications Surveys & Tutorials, Vol. 6, n. 2, Second quarter.
A Survey of Geocast Routing Protocols.
- Meng, X.; Xu, Z.; Zhang, B.; Huston, G.; Lu, S., et al.. (2005). ACM Computer Communication Review, Vol. 35, n. 1, January, url.
Ipv4 Address Allocation and the Bgp Routing Table Evolution.
- Norton, W.B.. (2000), url.
Internet Service Providers and Peering.
- Partridge, C.. (1998). IEEE/ACM Transactions on Networking, Vol. 6, n. 3, pp. 237-248, June, url.
A Fifty Gigabit Per Second IP Router.
- Paxson, V.. (1996). ACM SIGCOMM Computer Communication Review, Vol. 26, n. 4, pp. 25-38, October, url.
End-to-End Routing Behavior in the Internet.
- Roberts, L.. (2009). IEEE Spectrum, Vol. 46, n. 7, July, url.
A Radical New Router.
- Savage, S.; Collins, A.; Hoffman, E.; Snell, J. and Anderson, T.. (1999), SIGCOMM, url.
The End-to-End Effects of Internet Path Selection.
- Shaikh, A. and Greenberg, A.. (2004), USENIX, Symposium on Networked System Design and Implementation (NSDI), March, url.
Ospf Monitoring: Architecture, Design and Deployment Experience.
- Shaikh, A.; Isett, C.; Greenberg, A.; Roughan, M. and Gottlieb, J.. (2002), IMW, SIGCOMM Internet Measurement Workshop, November, url.
A Case Study of Ospf Behavior in a Large Enterprise Network.
- Srinivasan, V.; Suri, S. and Varghese, G.. (1999), SIGCOMM, url.
Packet Classification Using Tuple Space Search.
- Teixeira, R. and Rexford, J.. (2006). Communications Magazine, Vol. 44, n. 3, March.
Managing Routing Disruptions in Internet Service Provider Networks.
- White, R.. (2004). Cisco Internet Protocol Journal.
High Availability in Routing.
- Younis, O. and Fahmy, S.. (2003). Communications Surveys & Tutorials, Vol. 5, n. 1, pp. 2-13, Third quarter.
Constraint-Based Routing in the Internet: Basic Principles and Recent Research.
- Zhang, B.; Massey, D. and Zhang, L.. (2005). ACM Computer Communication Review, Vol. 35, n. 1, January.
Collecting the Internet Aslevel Topology.
- Chu, Y.-H.; Rao, S.G.; Seshan, S. and Zhang, H.. (2002). IEEE Journal on Selected Areas in Communications, Vol. 20, n. 8, pp. 1456-1471, October, url.
A Case for End System Multicast.
- Deering, S. and Cheriton, D.. (1988), SIGCOMM, August.
Multicast Routing in Internetworks and Extended Lans.
- Diot, C.; Dabbous, W. and Crowcroft, J.. (1997). IEEE Journal on Selected Areas in Communications, Vol. 15, n. 3, pp. 277-290, April.
Multipoint Communication: A Survey of Protocols, Functions, and Mechanisms.
- Diot, C.; Levine, B.N.; Lyles, B.; Kassem, H. and Balensiefen, D.. (2000). IEEE Network, January.
Deployment Issues for the IP Multicast Service and Architecture.
- Floyd, S.; Jacobson, V.; Mccanne, S.; Liu, C.G. and Zhang, L.. (1995), SIGCOMM, url.
A Reliable Multicast Framework for Light-Weight Sessions and Application Level Framing.
- Gemmell, J.; Montgomery, T.; Speakman, T.; Bhaskar, N. and Crowcroft, J.. (2003). IEEE Network, url.
The Pgm Reliable Multicast Protocol.
- Handley, M. and Crowcroft, J.. (1999). Cisco Internet Protocol Journal, Vol. 2, n. 4, December.
Internet Multicast Today.
- Hosseini, M.; Ahmed, D.T.; Shirmohammadi, S. and Georganas, N.D.. (2007). IEEE Communications Surveys & Tutorials, Vol. 9, n. 3, Third quarter, url.
A Survey of Application-Layer Multicast Protocols.
- Jannotti, J.; Gifford, D.K.; Johnson, K.L.; Kaashoek, M.F. and O'toole, J.W.. (2000), OSDI, url.
Overcast: Reliable Multicasting with an Overlay Network.
- Jin, X.; Tu, W. and Gary Chan, S.-H.. (2009). IEEE Communications Magazine, Vol. 47, n. 6.
Challenges and Advances in Using IP Multicast for Overlay Data Delivery.
- Loye, S.. (2005). techniques de l'ingénieur, Novembre, url.
Le Multicast IP.
- Loye, S.. (2006). techniques de l'ingénieur, url.
Protocoles De Routage IP Multicast.
- Mccanne, S. and Jacobson, V.. (1996), SIGCOMM, August, url.
Receiver-Driven Layered Multicast.
- Sahasrabuddhe, L.H. and Mukherjee, B.. (2000). IEEE Network, January.
Multicast Routing Algorithms and Protocols: A Tutorial.
- Xu, R.; Myers, A.C.; Zhang, H. and Yavatkar, R.. (1998), NOSDAV, url.
Resilient Multicast Support for Continuous-Media Applications.
- Zhang, B.; Jamin, S. and Zhang, L.. (2002), INFOCOM, url.
Host Multicast: A Framework for Delivering Multicast to End Users.
- Bernardos, C.; Soto, I. and Calderon, M.. (2007). Cisco Internet Protocol Journal, Vol. 10, n. 2, June.
IPv6 Network Mobility.
- Campbell, A.T.; Gomez, J. and Valko, A..
An Overview of Cellular IP.
- Eddy, W.M.. (2004). IEEE Communications Magazine, Vol. 42, n. 10, October, url.
At What Layer Does Mobility Belong?.
- Forman, G.H. and Zahorjan, J.. (1994). IEEE Computer, Vol. 27, n. 4, pp. 38-47, April, url.
The Challenge of Mobile Computing.
- Gurtov, A. and Komu, M.. (2009). Internet Protocol Journal, Vol. 12, n. 1, url.
Host Identity Protocol: Identifier/Locator Split for Host Mobility and Multihoming.
- Hang, L.; Wenming, W. and Jun, F.. (2004). ZTE Communications, n. 2, url.
Problems with Mobile IP and Their Solutions.
- Hoefling, M.; Menth, M. and Hartmann, M.. (2013). IEEE Communications Surveys & Tutorials, Vol. 15, n. 4, Fourth quarter, url.
A Survey of Mapping Systems for Locator/Identifier Split Internet Routing.
- Johnson, D.. (1995). Mobile Computing and Communications Review, Vol. 1, October, url.
Scalable Support for Transparent Mobile Host Internetworking.
- Meyer, D.. (2008). Cisco Internet Protocol Journal, Vol. 11, n. 1.
The Locator Identifier Separation Protocol (Lisp).
- Noel, T.. (2002). Techniques de l'ingénieur.
IP Mobile.
- Moceri, P.. url.
Enabling Network Mobility: A Survey of NEMO.
- Perkins, C.E.. (1997). IEEE Computer Communications, Vol. 35, n. 5, pp. 84-86, May.
Mobile IP.
- Reinbold, P. and Bonaventure, O.. (2003). Communications Surveys & Tutorials, Vol. 5, n. 1, pp. 40-57, Third quarter.
IP Micro-Mobility Protocols.
- Salkintzis, A.K.. (1999). IEEE Communications Surveys & Tutorials, Vol. 2, n. 3, pp. 2-18, Third quarter.
A Survey of Mobile Data Networks.
- Snoeren, A. and Balakrishnan, H.. (2000), Mobicom, August, url.
An End-to-End Approach to Host Mobility.
- Zave, P. and Rexford, J.. (2013). ACM SIGCOMM Recent Advances in Networking, pp. 379-412, url.
The Design Space of Network Mobility.
- Zhu, Z.; Wakikawg, R. and Zhang, L.. (2011), RFC 6301, url.
A Survey of Mobility Support in the Internet.
Applications
- Afergan, M. and Beverly, R.. (2005). ACM Computer Communication Review, Vol. 35, n. 1, January, url.
The State of the Email Address.
- Bassoli, R.; Marques, H.; Rodriguez, J.; Shum, K.W. and Tafazolli, R.. (2013). IEEE Communications Surveys & Tutorials, Vol. 15, n. 4, Fourth quarter, url.
Network Coding Theory: A Survey.
- Crocker, D.. (2009), RFC 5598, July, url.
Internet Mail Architecture.
- Damas, J. and Neves, F.. (2008), RFC 5358, October, url.
Preventing Use of Recursive Nameservers in Reflector Attacks.
- Fragouli, C.; Boudec, J.-Y.L. and Widmer, J.. (2005).
Network Coding: An Instant Primer.
- Gibbard, S.. (2007). Internet Protocol Journal, Vol. 10, n. 1, March.
Geographic Implications of DNS Infrastructure Distribution.
- Klensin, J. and Ko, Y.. (2012), RFC 6530, February, url.
Overview and Framework for Internationalized Email.
- Mockapetris, P.V. and Dunlap, K.J.. (1995). ACM Computer Communication Review, Vol. 25, n. 1, pp. 112-122, January, url.
Development of the Domain Name System.
- Mogul, J.C.. (1995), SIGCOMM, url.
A Case for Persistent-Connection HTTP.
- Neville-Neil, G.V.. (2009). ACM Queue, February.
Have Sockets Run Their Course?.
- Neville-Neil, G.V.. (2009). ACM Communications of the ACM, Vol. 52, n. 6, url.
Whither Sockets?.
- Rizzo, L.. (2012). ACM Communications of the ACM, Vol. 55, n. 3, March, url.
Revisiting Network I/O API: The Netmap Framework.
- The Chromium Projects. url.
SPDY: An Experimental Protocol for a Faster Web.
- Boucadair, M. and Jacquenet, C.. (2014), RFC 7149, url.
Software-Defined Networking: A Perspective from within a Service Provider Environment.
- Caceres, R.; Douglis, F.; Feldmann, A.; Glass, G. and Rabinovich, M.. (1998), Workshop on Internet Server Performance, url.
Web Proxy Caching: The Devil Is in the Details.
- Chawathe, Y.; Mccanne, S. and Brewer, E.. (2000), url.
An Architecture for Internet Content Distribution as an Infrastructure Service.
- Deleuze, C.. (2004). Cisco Internet Protocol Journal, Vol. 7, n. 2, June.
Content Networks.
- Ghodsi, A.; Koponen, T.; Raghavan, B. and Shenker, S.. (2011), HotNets, November, url.
Information-Centric Networking: Seeing the Forest for the Trees.
- Jacobson, V.; Smetters, D.K.; Thornton, J.D.; Plass, M.F.; Briggs, N.H., et al.. (2012). ACM Communications of the ACM, Vol. 55, n. 1, January, url.
Networking Named Content.
- Jokela, P.; Zahemszky, A.; Arianfar, S. and Nikander, P.. (2009).
Lipsin: Line Speed Publish/Subscribe Inter-Networking.
- Lara, A.; Kolasani, A. and Ramamurthy, B.. (2014). IEEE Communications Surveys & Tutorials, Vol. 16, n. 1, First quarter.
Network Innovation Using Openflow: A Survey.
- Leighton, T.. (2008). ACM Queue, url.
Improving Performance on the Internet.
- Pathan, A.-M.K. and Buyya, R.. (2007), The University of Melbourne, Technical Report, February.
A Taxonomy and Survey of Content Delivery Networks,.
- Seedorf, J. and Burger, E.. (2009), RFC 5693, October, url.
Application-Layer Traffic Optimization (Alto) Problem Statement.
- Wang, J.. (1999). ACM SIGCOMM Computer Communication Review, Vol. 2ç, n. 5, pp. 36-46, October, url.
A Survey of Web Caching Schemes for the Internet.
- Yin, H.; Liu, X.; Min, G. and Lin, C.. (2010). IEEE Network, Vol. 24, n. 4, July, url.
Content Delivery Networks: A Bridge between Emerging Applications and Future IP Networks.
- Zahariadis, T.; Daras, P. and Bouwen, J.. (2010). IOS Press Towards the Future Internet.
Towards a Content-Centric Internet.
Peer-to-peer Applications
- Ahmed, R. and Boutaba, R.. (2011). IEEE Communications Surveys & Tutorials, Vol. 13, n. 2.
A Survey of Distributed Search Techniques in Large Scale Distributed Systems.
- Androutsellis-Heotokis, S. and Spinellis, D.. (2004). ACM Computing Surveys, Vol. 36, n. 4, pp. 335-371, December, url.
A Survey of Peer-to-Peer Content Distribution Technologies.
- Balakrishnan, H.; Kaashoek, M.F.; Karger, D.; Morris, R. and Stoica, I.. (2003). ACM Communications of the ACM, Vol. 46, n. 2, pp. 43-48, February, url.
Looking up Data in P2p Systems.
- Castro, M.; Costa, M. and Rowstron, A.. (2005), url.
Debunking Some Myths About Structured and Unstructured Overlays.
- Chopra, D.; Schulzrinne, H.; Marocco, E. and Ivov, E.. (2009). IEEE Communications Surveys & Tutorials, Vol. 11, n. 1, pp. 4-12, First quarter.
Peer-to-Peer Overlays for Real-Time Communication: Security Issues and Solutions.
- Clarke, I.; Sandberg, O.; Wiley, B. and Hong, T.W.. (2000), ICSIWorkshop on Design Issues in Anonymity and Unobservability, url.
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
- Hei, X.; Luiu, Y. and Ross, K.. (2008). IEEE Communications Magazine, February.
IPTV over P2p Streaming Networks the Mesh-Pull Approach.
- Hightower, J. and Borriello, G.. (2001). Computer, pp. 57-64, August.
Location Systems for Ubiquitous Computing.
- Ivkovic, I..
Improving Gnutella Protocol: Protocol Analysis and Research Proposals.
- Jurca, D.; Chakareski, J.; Wagner, J.P. and Frossard, P.. (2007). IEEE Communications Magazine, Vol. 45, n. 6, June.
Enabling Adaptive Video Streaming in P2p Systems.
- Kalogeraki, V. and Chen, F.. (2004). IEEE Network, January.
Managing Distributed Objects in Peer-to-Peer Systems.
- Keong Lua, E.; Crowcroft, J.; Pias, M.; Sharma, R. and Lim, S.. (2005). IEEE Communications Surveys & Tutorials, Vol. 7, n. 2, pp. 72-93, Second quarter, url.
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes.
- Lei Xia, R. and Muppala, J.K.. (2010). IEEE Communications Surveys & Tutorials, Vol. 12, n. 2, Second quarter, url.
A Survey of Bittorrent Performance.
- Li, B. and Yin, H.. (2007). IEEE Communications Magazine, Vol. 45, n. 6, June, url.
Peer to Peer Live Video Streaming on the Internet: Issues, Existing Approaches and Challenges.
- Liu, J.; Rao, S.G.; Li, B. and Zhang, H.. (2008). Proceedings of the IEEE, url.
Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast.
- Mischke, J. and Stiller, B.. (2004). IEEE Network, Vol. 18, n. 1, January.
A Methodology for the Design of Distributed Search in P2p Middleware.
- Oram, A.. (2000). The O'Reilly Network, December, url.
Gnutella and Freenet Represent True Technical Inovation.
- Ratnasamy, S.; Francis, P.; Handley, M.; Karp, R. and Shenker, S.. (2001), SIGCOMM, August, url.
A Scalable Content-Addressable Network.
- Rodrigues, R. and Druschel, P.. (2010). ACM Communications of the ACM, Vol. 53, n. 10, url.
Peer-to-Peer Systems.
- Rooney, S.; Bauer, D. and Deydier, R.. (2004). IEEE Communications Magazine, Vol. 42, n. 5, May.
A Federated Peer-to-Peer Network Game Architecture.
- Sentinelli, A.; Marfia, G.; Gerla, M. and Kleinrock, L.. (2007). IEEE Communications Magazine, June.
Will IPTV Ride the Peer-to-Peer Stream?.
- Stoica, I.; Adkins, D.; Zhuang, S.; Shenker, S. and Surana, S.. (2002), SIGCOMM, url.
An Internet Indirection Infrastructure.
- Stoica, I.; Morris, R.; Karger, D.; Kaashoek, M.F. and Balakrishnan, H.. (2001), SIGCOMM, August, pp. 149-160, url.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications.
- Viennot, L. and Lausecker, O.. (2005). Interstices, url.
Les Réseaux De Pair à Pair.
- Zou, L. and Ammar, M.H.. (2003), ICNP'03.
A File-Centric Model for Peer-to-Peer File Sharing Systems.
Internet Security
- Almomani, A.; Gupta, B.B.; Atawneh, S.; Meulenberg, A. and Almomani, E.. (2013). IEEE Communications Surveys & Tutorials, Vol. 15, n. 4, Fourth quarter, url.
A Survey of Phishing Email Filtering Techniques.
- Bellovin, S.M.. (1989). Computer Communication Review, Vol. 19, n. 2, April, url.
Security Problems in the TCP/IP Protocol Suite.
- Bellovin, S.M. and Cheswick, W.R.. (1994). IEEE Communications Magazine.
Network Firewalls.
- Cooke, E.; Jahanian, F. and Mcpherson, D.. (2005).
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.
- Eddy, W.. (2007), RFC 4987, url.
TCP Syn Flooding Attacks and Common Mitigations.
- Gao, Z. and Ansari, N.. (2005). IEEE Communications Magazine, May.
Tracing Cyber Attacks from Thepractical Perspective.
- Gont, F. and Liu, W.. (2014), RFC 7123, February, url.
Security Implications of IPv6 on Ipv4 Networks.
- Igure, V.M. and Williams, R.D.. (2008). IEEE Communications Surveys & Tutorials, Vol. 10, n. 1.
Taxonomies of Attacks and Vulnerabilities in Computer Systems.
- Ioannidis, J. and Blaze, M.. (1993), USENIX, Security Symposium, October, url.
The Architecture and Implementation of Network-Layer Security under Unix.
- Laurent-Maknavicius, M.. (2004). Techniques de l'ingénieur.
Pare-Feu.
- Laurent-Maknavicius, M.. (2003). Techniques de l'ingénieur.
Protocole Ipsec.
- Li, P.; Salour, M. and Su, X.. (2008). IEEE Communications Surveys & Tutorials, Vol. 10, n. 1.
A Survey of Internet Worm Detection and Containment.
- Mirkovic, J. and Reiher, P.. (2004). ACM SIGCOMM Computer Communication Review, Vol. 34, n. 2, pp. 39-53, April.
A Taxonomy of Ddos Attack and Ddos Defense Mechanisms.
- Moore, D.; Voelker, G. and Savage, S.. (2001), USENIX, Security Symposium, August, url.
Inferring Internet Denial of Service Activity.
- Needham, R.M. and Schroeder, M.D.. (1978). Communications of the ACM, Vol. 21, n. 12, pp. 993-999, December.
Using Encryption for Authentication in Large Networks of Computers.
- Parameswaran, M.; Zhao, X.; Whinston, A. and Fang, F.. (2007). Computer.
Reengineering the Internet for Better Security.
- Paxson, V.. (1999). Computer Networks, Vol. 31, December.
Bro: A System for Detecting Network Intruders in Real-Time.
- Peng, T.; Leckie, C. and Ramamohanarao, K.. (2007). ACM Computing Surveys, Vol. 39, n. 1, url.
Survey of Network-Based Defense Mechanisms Countering the DOS and DDOS Problems.
- Qing, S. and Wen, W.. (2005). Computers & Security, Vol. 24, pp. 334-346.
A Survey and Trends on Internet Worms.
- Schulzrinne, H.; Marocco, E. and Ivov, E.. (2010), RFC 5765, February, url.
Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications.
- Sperotto, A.; Schaffrath, G.; Sadre, R.; Morariu, C.; Pras, A., et al.. (2010). IEEE Communications Surveys & Tutorials, Vol. 12, n. 3, url.
An Overview of IP Flow-Based Intrusion Detection.
- Stallings, W.. (2009). Cisco Internet Protocol Journal, Vol. 12, n. 4, December.
SSH.
- Zargar, S.T.; Joshi, J. and Tipper, D.. (2013). IEEE Communications Surveys & Tutorials, Vol. 15, n. 4, Fourth quarter, url.
A Survey of Defense Mechanisms
against Distributed Denial of Service (Ddos)
Flooding Attacks.
Networks Economics
- Dasilva, L.A.. (2000). IEEE Communications Surveys & Tutorials, Vol. 3, n. 2, pp. 2-8, Second quarter.
"Pricing for QoS-Enabled Networks: A Survey".
- Mackie-Mason, J.K. and Varian, H.R.. (1994).
"Pricing the Internet".
Future ?
- Akyildiz, I.F.; Akan, Ö.B.; Chen, C.; Fang, J. and Su, W.. (2004). IEEE Communications Magazine, Vol. 42, n. 7, July.
The State of the Art in Interplanetary Internet.
- Atzori, L.; Iera, A. and Morabito, G.. (2010). Computer Networks, Vol. 54, pp. 2787-2805.
The Internet of Things: A Survey.
- Bagnulo, M.; Garcia-Martinez, A. and Van Beijnum, I.. (2012). IEEE Communications Magazine, Vol. 50, n. 7, July, url.
The NAT64/DNS64 Tool Suite for IPv6 Transition.
- Bianzino, A.P.; Chaudet, C.; Rossi, D. and Rougier, J.-L.. (2012). IEEE Communications Surveys & Tutorials, Vol. 14, n. 1, url.
A Survey of Green Networking Research.
- Boucadair, M.; Binet, D. and Jacquenet, C.. (2011). Techniques de l'ingénieur.
Transition IPv6 - Outils Et Stratégies De Migration.
- Caicedo, C.; Joshi, J. and Tuladhar, S.. (2009). IEEE Computer, Vol. 42, n. 2, February.
IPv6 Security Challenges.
- Cerf, V.; Burleigh, S.; Hooke, A.; Torgerson, L.; Durst, R., et al.. (2007), RFC 4838, url.
Delay-Tolerant Networking Architecture.
- Christensen, K.J.; Gunaratne, C.; Nordman, B. and George, A.D.. (2004). Elsevier Computer Communications, Vol. 27, n. 18, pp. 1758-1770, December, url.
The Next Frontier for Communications Networks: Power Management.
- Cocquet, P.. (2004). Techniques de l'ingénieur.
IPv6, La Nouvelle Génération Du Protocole IP.
- Fall, K.. (2003), SIGCOMM.
A Delay-Tolerant Network Architecture for Challenged Internets.
- Huston, G.. (2008). Cisco Internet Protocol Journal, Vol. 11, n. 3.
IPv4 Address Exhaustion.
- Huston, G.. (2011). Cisco Internet Protocol Journal, Vol. 14, n. 4, December.
Networking @ Home.
- Jackson, J.. (2007). Spectrum, url.
The Interplanetary Internet.
- Jacquenet, C.. (2011). IETF Journal, Vol. 6, n. 3, March.
Zero Addresses, One Solution, Two Problems.
- Jiang, S.; Liu, B. and Carpenter, B.. (2013), RFC 6879, February, url.
IPv6 Enterprise Network Renumbering Scenarios, Considerations, and Methods.
- Mcpherson, D.; Oran, D.; Thaler, D. and Osterweil, E.. (2014), RFC 7094, January, url.
Architectural Considerations of IP Anycast.
- Moerman, K.; Fishburn, J.; Lasserre, M. and Ginsburg, D.. (2005). IEEE Communications Magazine, Vol. 43, n. 11, November, url.
Utopia: An Ethernet-Based Mpls/Vpls Triple Play Deployment.
- Murphy, N. and Wilson, D.. (2008). Cisco Internet Protocol Journal, Vol. 11, n. 4.
The End of Eternity: Part I and II.
- Prem Bianzino, A.; Chaudet, C.; Rossi, D. and Rougier, J.-L.. (2012). IEEE Communications Surveys & Tutorials, Vol. 14, n. 1.
A Survey of Green Networking Research.
- Schulzrinne, H.; Wu, X.; Sidiroglou, S. and Berger, S.. (2003). IEEE Communications Magazine, Vol. 41, n. 11, pp. 128-135, November.
Ubiquitous Computing in Home Networks.
- Sridhar, T.. (2009). Cisco Internet Protocol Journal, Vol. 12, n. 3, September, url.
Cloud Computing: Part 1: Models and technologies.
- Warthman. (2003).
Delay-Tolerant Networks (DTN).
- Zada Khan, W.; Xiang, Y.; Aalsalem, M.Y. and Arshad, Q.. (2013). IEEE Communications Surveys & Tutorials, Vol. 15, n. 1, January, url.
Mobile Phone Sensing Systems: A Survey.
Other reading lists
Books
Magazines
You can find out many good papers from this list:
- Communications of the ACM url
- Internet Protocol Journal url
- IEEE Communications Magazine url
- IEEE Networks url
- Elsevier Computer communications url
- Elsevier Computer Networks url
- IEEE Communications Surveys & Tutorials url
- ACM Computer Communication Review url
- ACM computing survey url
- Lecture notes by Springer url
- IETF journal url
- ACM queue url
- Request for comments (RFC) url
- ACM sigcomm conferences url
- IEEE Spectrum url