T-110.6130 Systems Engineering in Data Communications Software P (2-10 cr)

Topic references


Related references:

  1. Eng Keong Lua; Crowcroft, J.; Pias, M.; Sharma, R.; Lim, S.; , "A survey and comparison of peer-to-peer overlay network schemes," Communications Surveys & Tutorials, IEEE , vol.7, no.2, pp. 72- 93, Second Quarter 2005.
  2. Sabu M. Thampi ; Chandra Sekaran. K, Survey of Search and Replication Schemes in Unstructured P2P Networks, Journal on Network Protocols and Algorithms, Macrothink Inst.,  vol. 2, no. 1, pp. 93-131, 2010.
  3. Go Hasegawa and  Masayuki Murata, Survey on Fairness Issues in TCP Congestion Control Mechanisms, IEICE TRANS. B, VOL. E00–A, NO. 1, JANUARY 2001.
  4. Christine E. Jones, Krishna M. Sivalingam, Prathima Agrawal, and Jyh Cheng Chen. 2001. A Survey of Energy Efficient Network Protocols for Wireless Networks. Wirel. Netw. 7, 4 (September 2001), 343-358.
  5. Rimal, B.P.; Eunmi Choi; Lumb, I.; , "A Taxonomy and Survey of Cloud Computing Systems," INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on , vol., no., pp.44-51, 25-27 Aug. 2009.
  6. Ian F. Akyildiz, Xudong Wang, Weilin Wang, Wireless mesh networks: a survey, Computer Networks, Volume 47, Issue 4, 15 March 2005, Pages 445-487, ISSN 1389-1286.
  7. Akyildiz, I.F.; Weilian Su; Sankarasubramaniam, Y.; Cayirci, E.; , "A survey on sensor networks," Communications Magazine, IEEE , vol.40, no.8, pp. 102- 114, Aug 2002.
  8. Mauve, M.; Widmer, A.; Hartenstein, H.; , "A survey on position-based routing in mobile ad hoc networks," Network, IEEE , vol.15, no.6, pp.30-39, Nov/Dec 2001.
  9. Guido Urdaneta, Guillaume Pierre, and Maarten Van Steen. 2011. A survey of DHT security techniques. ACM Comput. Surv. 43, 2, Article 8 (February 2011), 49 pages. 
  10. Krishna Kant, Data center evolution: A tutorial on state of the art, issues, and challenges, Computer Networks, Volume 53, Issue 17, Virtualized Data Centers, 3 December 2009, Pages 2939-2965.
  11. Xia, R.L.; Muppala, J.K.; , "A Survey of BitTorrent Performance," Communications Surveys & Tutorials, IEEE , vol.12, no.2, pp.140-158, Second Quarter 2010.
  12. Butler, K.; Farley, T.R.; McDaniel, P.; Rexford, J.; , "A Survey of BGP Security Issues and Solutions," Proceedings of the IEEE , vol.98, no.1, pp.100-122, Jan. 2010.
  13. Patrick Th. Eugster, Pascal A. Felber, Rachid Guerraoui, and Anne-Marie Kermarrec. 2003. The many faces of publish/subscribe. ACM Comput. Surv. 35, 2 (June 2003), 114-131. 
  14. Sergio Marti, Hector Garcia-Molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, Volume 50, Issue 4, Management in Peer-to-Peer Systems, 15 March 2006, pp. 472-484.
  15. Giuseppe Anastasi, Marco Conti, Mario Di Francesco, Andrea Passarella, Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks, Volume 7, Issue 3, May 2009, pp. 537-568.
  16. Jelena Mirkovic and Peter Reiher. 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34, 2 (April 2004), 39-53. 
  17. Pragyansmita Paul and S. V. Raghavan. 2002. Survey of multicast routing algorithms and protocols. In Proceedings of the 15th international conference on Computer communication (ICCC '02), Washington, DC, USA, 902-926.