References

A note on URLs. In the references below, we have provided URLs for Web pages, Web-only documents, and other material that has not been published in a confer- ence or journal (when we have been able to locate a URL for such material). We have not provided URLs for conference and journal publications, as these docu- ments can usually be located via a search engine, from the conference Web site (e.g., papers in all ACM SIGCOMM conferences and workshops can be located via http://www.acm.org/sigcomm), or via a digital library subscription. While all URLs provided below were valid (and tested) in Jan. 2020, URLs can become out of date.

A note on Internet Request for Comments (RFCs): Copies of Internet RFCs are available at many sites. The RFC Editor of the Internet Society (the body that over- sees the RFCs) maintains the site, http://www.rfc-editor.org. This site allows you to search for a specific RFC by title, number, or authors, and will show updates to any RFCs listed. Internet RFCs can be updated or obsoleted by later RFCs. Our favorite site for getting RFCs is the original source—http://www.rfc-editor.org.

[3GPP 2020] 3GPP, 3GPP Specification Set, https://www.3gpp.org/dynareport/ SpecList.htm

[3GPP GTPv1-U 2019] 3GPP, “Tunnelling Protocol User Plane (GTPv1-U),” 3GPP Technical Specification 29.281version 15.3.0, 2018.

[3GPP PDCP 2019] 3GPP, “Packet Data Convergence Protocol (PDCP) Specifica- tion,” 3GPP Technical Specification 36.323 version 15.4.0, 2019.

[3GPP RLCP 2018] 3GPP, “Radio Link Control (RLC) protocol specification,” 3GPP Technical Specification 25.322 version 15.0.0, 2018.

[3GPP SAE 2019] 3GPP, “System Architecture Evolution (SAE); Security archi- tecture,” Technical Specification 33.401, version 15.9.0, October 2019.”

[Abramson 1970] N. Abramson, “The Aloha System—Another Alternative for Computer Communications,” Proc. 1970 Fall Joint Computer Conference, AFIPS Conference, p. 37, 1970.

[Abramson 1985] N. Abramson, “Development of the Alohanet,” IEEE Transac- tions on Information Theory, Vol. IT-31, No. 3 (Mar. 1985), pp. 119–123.

[Abramson 2009] N. Abramson, “The Alohanet—Surfing for Wireless Data,” IEEE Communications Magazine, Vol. 47, No. 12, pp. 21–25. REFERENCES

[Adhikari 2011a] V. K. Adhikari, S. Jain, Y. Chen, Z. L. Zhang, “Vivisecting YouTube: An Active Measurement Study,” Technical Report, University of Minnesota, 2011.

[Adhikari 2012] V. K. Adhikari, Y. Gao, F. Hao, M. Varvello, V. Hilt, M. Steiner, Z. L. Zhang, “Unreeling Netflix: Understanding and Improving Multi-CDN Movie Delivery,” Technical Report, University of Minnesota, 2012.

[Afanasyev 2010] A. Afanasyev, N. Tilley, P. Reiher, L. Kleinrock, “Host-to-Host Congestion Control for TCP,” IEEE Communications Surveys & Tutorials, Vol. 12, No. 3, pp. 304–342.

[Agarwal 2009] S. Agarwal, J. Lorch, “Matchmaking for Online Games and Other Latency-sensitive P2P Systems,” Proc. 2009 ACM SIGCOMM.

[Ager 2012] B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, W. Willinger, “Anatomy of a Large European ISP,” Proc. 2012 ACM SIGCOMM.

[Akamai 2020] Akamai homepage, http://www.akamai.com

[Akella 2003] A. Akella, S. Seshan, A. Shaikh, “An Empirical Evaluation of Wide- Area Internet Bottlenecks,” Proc. 2003 ACM Internet Measurement Conference (Miami, FL, Nov. 2003).

[Akhshabi 2011] S. Akhshabi, A. C. Begen, C. Dovrolis, “An Experimental Evalu- ation of Rate-Adaptation Algorithms in Adaptive Streaming over HTTP,” Proc. 2011 ACM Multimedia Systems Conf.

[Akhshabi 2011] S. Akhshabi, C. Dovrolis, “The evolution of layered protocol stacks leads to an hourglass-shaped architecture,” Proceedings 2011 ACM SIGCOMM, pp. 206–217.

[Akyildiz 2010] I. Akyildiz, D. Gutierrex-Estevez, E. Reyes, “The Evolution to 4G Cellular Systems, LTE Advanced,” Physical Communication, Elsevier, 3 (2010), pp. 217–244.

[Albitz 1993] P. Albitz and C. Liu, DNS and BIND, O’Reilly & Associates, Petaluma, CA, 1993.

[Alexandris 2016] K. Alexandris, N. Nikaein, R. Knopp and C. Bonnet, “Analyzing X2 handover in LTE/LTE-A,” 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Tempe, AZ, pp. 1–7.

[Alizadeh 2010] M. Alizadeh, A. Greenberg, D. Maltz, J. Padhye, P. Patel, B. Prabhakar, S. Sengupta, M. Sridharan. “Data center TCP (DCTCP),” Proc. 2010 ACM SIGCOMM Conference, ACM, New York, NY, USA, pp. 63–74.

[Alizadeh 2013] M. Alizadeh, S. Yang, M. Sharif, S. Katti, N. McKeown, B. Prabhakar, S. Shenker, “pFabric: Minimal Near-Optimal Datacenter Transport,” Proc. 2013 ACM SIGCOMM Conference. REFERENCES

[Alizadeh 2014] M. Alizadeh, T. Edsall, S. Dharmapurikar, K. Chu, A. Fingerhut, V. T. Lam, F. Matus, R. Pan, N. Yadav, G. Varghese , “CONGA: Distributed Congestion-Aware Load Balancing for Datacenters,” Proc. 2014 ACM SIGCOMM Conference.

[Allman 2011] E. Allman, “The Robustness Principle Reconsidered: Seeking a Middle Ground,” Communications of the ACM, Vol. 54, No. 8 (Aug. 2011), pp. 40–45.

[Almers 2007] P. Almers, et al., “Survey of Channel and Radio Propagation Models for Wireless MIMO Systems,” Journal on Wireless Communications and Networking, 2007.

[Amazon 2014 ] J. Hamilton, “AWS: Innovation at Scale, YouTube video, https:// www.youtube.com/watch?v=JIQETrFC_SQ

[Anderson 1995] J. B. Andersen, T. S. Rappaport, S. Yoshida, “Propagation Mea- surements and Models for Wireless Communications Channels,” IEEE Communi- cations Magazine, (Jan. 1995), pp. 42–49.

[Appenzeller 2004 ] G. Appenzeller, I. Keslassy, N. McKeown, “Sizing Router Buffers,” Proc. 2004 ACM SIGCOMM Conference (Portland, OR, Aug. 2004).

[Arkko 2012] J. Arkko, “Analysing IP Mobility Protocol Deployment Difficulties,” 83rd IETF meeting, March, 2012.

[ASO-ICANN 2020] The Address Supporting Organization homepage, http://www.aso.icann.org

[AT&T 2019] A, Fuetsch, “From Next-Gen to Now: SDN, White Box and Open Source Go Mainstream,” https://about.att.com/innovationblog/2019/09/sdn_white_ box_and_open_source_go_mainstream.html

[Atheros 2020] Atheros Communications Inc., “Atheros AR5006 WLAN Chipset Product Bulletins,” http://www.atheros.com/pt/AR5006Bulletins.htm

[Ayanoglu 1995] E. Ayanoglu, S. Paul, T. F. La Porta, K. K. Sabnani, R. D. Gitlin, “AIRMAIL: A Link-Layer Protocol for Wireless Networks,” ACM ACM/Baltzer Wireless Networks Journal, 1: 47–60, Feb. 1995.

[Bakre 1995] A. Bakre, B. R. Badrinath, “I-TCP: Indirect TCP for Mobile Hosts,” Proc. 1995 Int. Conf. on Distributed Computing Systems (ICDCS) (May 1995), pp. 136–143.

[Baldauf 2007] M. Baldauf, S. Dustdar, F. Rosenberg, “A Survey on Context- Aware Systems,” Int. J. Ad Hoc and Ubiquitous Computing, Vol. 2, No. 4 (2007), pp. 263–277.

[Baran 1964] P. Baran, “On Distributed Communication Networks,” IEEE Trans- actions on Communication Systems, Mar. 1964. Rand Corporation Technical report REFERENCES

with the same title (Memorandum RM-3420-PR, 1964). http://www.rand.org/publi- cations/RM/RM3420/

[Bardwell 2004] J. Bardwell, “You Believe You Understand What You Think I Said . . . The Truth About 802.11 Signal and Noise Metrics: A Discussion Clarify- ing Often-Misused 802.11 WLAN Terminologies,” http://www.connect802.com/ download/techpubs/2004/you_believe_D100201.pdf

[Barford 2009] P. Barford, N. Duffield, A. Ron, J. Sommers, “Network Perfor- mance Anomaly Detection and Localization,” Proc. 2009 IEEE INFOCOM (Apr. 2009).

[Beck 2019] M. Beck, “On the hourglass model,” Commun. ACM, Vol. 62, No. 7 (June 2019), pp. 48–57.

[Beheshti 2008] N. Beheshti, Y. Ganjali, M. Ghobadi, N. McKeown, G. Salmon, “Experimental Study of Router Buffer Sizing,” Proc. ACM Internet Measurement Conference (Oct. 2008, Vouliagmeni, Greece).

[Bender 2000] P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushayana, A. Viterbi, “CDMA/HDR: A Bandwidth-Efficient High-Speed Wireless Data Service for Nomadic Users,” IEEE Commun. Mag., Vol. 38, No. 7 (July 2000), pp. 70–77.

[Berners-Lee 1989] T. Berners-Lee, CERN, “Information Management: A Proposal,” Mar. 1989, May 1990. http://www.w3.org/History/1989/proposal.html

[Berners-Lee 1994] T. Berners-Lee, R. Cailliau, A. Luotonen, H. Frystyk Nielsen, A. Secret, “The World-Wide Web,” Communications of the ACM, Vol. 37, No. 8 (Aug. 1994), pp. 76–82.

[Bertsekas 1991] D. Bertsekas, R. Gallagher, Data Networks, 2nd Ed., Prentice Hall, Englewood Cliffs, NJ, 1991.

[Biersack 1992] E. W. Biersack, “Performance Evaluation of Forward Error Cor- rection in ATM Networks,” Proc. 1999 ACM SIGCOMM Conference (Baltimore, MD, Aug. 1992), pp. 248–257.

[BIND 2020] Internet Software Consortium page on BIND, http://www.isc.org/ bind.html

[Bisdikian 2001] C. Bisdikian, “An Overview of the Bluetooth Wireless Technol- ogy,” IEEE Communications Magazine, No. 12 (Dec. 2001), pp. 86–94.

[Bishop 2003] M. Bishop, Computer Security: Art and Science, Boston: Addison Wesley, Boston MA, 2003.

[Bishop 2004] M. Bishop, Introduction to Computer Security, Addison-Wesley, 2004.

[Björnson 2017] E. Björnson, J. Hoydis, L. Sanguinetti, Massive MIMO Networks: Spectral, Energy, and Hardware Efficiency, Now Publishers, 2017. REFERENCES

[Black 1995] U. Black, ATM Volume I: Foundation for Broadband Networks, Prentice Hall, 1995.

[Bluetooth 2020] The Bluetooth Special Interest Group, http://www.bluetooth.com/

[Blumenthal 2001] M. Blumenthal, D. Clark, “Rethinking the Design of the Internet: The End-to-end Arguments vs. the Brave New World,” ACM Transactions on Internet Technology, Vol. 1, No. 1 (Aug. 2001), pp. 70–109.

[Bochman 1984] G. V. Bochmann, C. A. Sunshine, “Formal Methods in Commu- nication Protocol Design,” IEEE Transactions on Communications, Vol. 28, No. 4 (Apr. 1980) pp. 624–631.

[Bosshart 2013] P. Bosshart, G. Gibb, H. Kim, G. Varghese, N. McKeown, M. Izzard, F. Mujica, M. Horowitz, “Forwarding Metamorphosis: Fast Program- mable Match-Action Processing in Hardware for SDN,” Proc. 2013 SIGCOMM Conference, pp. 99–110.

[Bosshart 2014] P. Bosshart, D. Daly, G. Gibb, M. Izzard, N. McKeown, J. Rexford, C. Schlesinger, D. Talayco, A. Vahdat, G. Varghese, D. Walker, “P4: Programming Protocol-Independent Packet Processors,” Proc. 2014 ACM SIGCOMM Conference, pp. 87–95.

[Bottger 2018] T. Böttger, F. Cuadrado, G. Tyson, I. Castro, S. Uhlig, Open connect everywhere: A glimpse at the internet ecosystem through the lens of the Netflix CDN, Proc. 2018 ACM SIGCOMM Conference.

[Brakmo 1995] L. Brakmo, L. Peterson, “TCP Vegas: End to End Congestion Avoidance on a Global Internet,” IEEE Journal of Selected Areas in Communica- tions, Vol. 13, No. 8 (Oct. 1995), pp. 1465–1480.

[Bryant 1988] B. Bryant, “Designing an Authentication System: A Dialogue in Four Scenes,” http://web.mit.edu/kerberos/www/dialogue.html

[Bush 1945] V. Bush, “As We May Think,” The Atlantic Monthly, July 1945. http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm

[Byers 1998] J. Byers, M. Luby, M. Mitzenmacher, A. Rege, “A Digital Fountain Approach to Reliable Distribution of Bulk Data,” Proc. 1998 ACM SIGCOMM Conference (Vancouver, Canada, Aug. 1998), pp. 56–67.

[Cable Labs 2019] Cable Labs, “A Comparative Introduction to 4G and 5G Authentication,” https://www.cablelabs.com/insights/a-comparative-introduction- to-4g-and-5g-authentication

[Caesar 2005b] M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, J. van der Merwe, “Design and implementation of a Routing Control Platform,” Proc. Networked Systems Design and Implementation (May 2005). REFERENCES

[Caesar 2005b] M. Caesar, J. Rexford, “BGP Routing Policies in ISP Networks,” IEEE Network Magazine, Vol. 19, No. 6 (Nov. 2005).

[CAIDA 2020] Center for Applied Internet Data Analysis, www.caida.org

[Caldwell 2020] C. Caldwell, “The Prime Pages,” http://www.utm.edu/research/ primes/prove

[Cardwell 2017] N. Cardwell, Y. Cheng, C. S. Gunn, S. H. Yeganeh, V. Jacobson. “BBR: congestion-based congestion control,” Commun. ACM, Vol. 60, No. 2 (Jan. 2017), pp. 58–66.

[Casado 2007] M. Casado, M. Freedman, J. Pettit, J. Luo, N. McKeown, S. Shenker, “Ethane: Taking Control of the Enterprise,” Proc. 2007 ACM SIGCOMM Conference, New York, pp. 1–12. See also IEEE/ACM Trans. Networking, Vol. 17, No. 4 (Aug. 2007), pp. 270–1283.

[Casado 2009] M. Casado, M. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, S. Shenker, “Rethinking Enterprise Network Control,” IEEE/ACM Transactions on Networking (ToN), Vol. 17, No. 4 (Aug. 2009), pp. 1270–1283.

[Casado 2014] M. Casado, N. Foster, A. Guha, “Abstractions for Software- Defined Networks,” Communications of the ACM, Vol. 57, No. 10, (Oct. 2014), pp. 86–95.

[Cerf 1974] V. Cerf, R. Kahn, “A Protocol for Packet Network Interconnection,” IEEE Transactions on Communications Technology, Vol. COM-22, No. 5, pp. 627–641.

[CERT 2001–09] CERT, “Advisory 2001–09: Statistical Weaknesses in TCP/IP Initial Sequence Numbers,” http://www.cert.org/advisories/CA-2001-09.html

[CERT 2003–04] CERT, “CERT Advisory CA-2003-04 MS-SQL Server Worm,” http://www.cert.org/advisories/CA-2003-04.html

[CERT 2020] The CERT division of the Software Engineering Institute, https:// www.sei.cmu.edu/about/divisions/cert, 2020

[CERT Filtering 2012] CERT, “Packet Filtering for Firewall Systems,” http:// www.cert.org/tech_tips/packet_filtering.html

[Cert SYN 1996] CERT, “Advisory CA-96.21: TCP SYN Flooding and IP Spoof- ing Attacks,” http://www.cert.org/advisories/CA-1998-01.html

[Chandra 2007] T. Chandra, R. Greisemer, J. Redstone, “Paxos Made Live: an Engineering Perspective,” Proc. of 2007 ACM Symposium on Principles of Distrib- uted Computing (PODC), pp. 398–407. REFERENCES

[Chao 2011] C. Zhang, P. Dunghel, D. Wu, K. W. Ross, “Unraveling the BitTorrent Ecosystem,” IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7 (July 2011).

[Chen 2011] Y. Chen, S. Jain, V. K. Adhikari, Z. Zhang, “Characterizing Roles of Front-End Servers in End-to-End Performance of Dynamic Content Distribu- tion,” Proc. 2011 ACM Internet Measurement Conference (Berlin, Germany, Nov. 2011).

[Chiu 1989] D. Chiu, R. Jain, “Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks,” Computer Networks and ISDN Systems, Vol. 17, No. 1, pp. 1–14. http://www.cs.wustl.edu/~jain/papers/cong_ av.htm

[Christiansen 2001] M. Christiansen, K. Jeffay, D. Ott, F. D. Smith, “Tuning Red for Web Traffic,” IEEE/ACM Transactions on Networking, Vol. 9, No. 3 (June 2001), pp. 249–264.

[Cichonski 2017] J. Cichonski, J. Franklin, M. Bartock, Guide to LTE Security, NIST Special Publication 800–187, Dec. 2017.

[Cisco 2012] Cisco 2012, Data Centers, http://www.cisco.com/go/dce

[Cisco 2020] Cisco Visual Networking Index: Forecast and Trends, 2017–2022 White Paper.

[Cisco 6500 2020] Cisco Systems, “Cisco Catalyst 6500 Architecture White Paper,” http://www.cisco.com/c/en/us/products/collateral/switches/ catalyst-6500-series-switches/prod_white_paper0900aecd80673385.html

[Cisco 7600 2020] Cisco Systems, “Cisco 7600 Series Solution and Design Guide,” http://www.cisco.com/en/US/products/hw/routers/ps368/prod_technical_ reference09186a0080092246.html

[Cisco 8500 2020] Cisco Systems Inc., “Catalyst 8500 Campus Switch Router Architecture,” http://www.cisco.com/univercd/cc/td/doc/product/l3sw/8540/ rel_12_0/w5_6f/softcnfg/1cfg8500.pdf

[Cisco 12000 2020] Cisco Systems Inc., “Cisco XR 12000 Series and Cisco 12000 Series Routers,” http://www.cisco.com/en/US/products/ps6342/index.html

[Cisco Queue 2016] Cisco Systems Inc., “Congestion Management Overview,” http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfconmg.html

[Cisco SYN 2016] Cisco Systems Inc., “Defining Strategies to Protect Against TCP SYN Denial of Service Attacks,” http://www.cisco.com/en/US/tech/tk828/ technologies_tech_note09186a00800f67d5.shtml REFERENCES

[Cisco TCAM 2014] Cisco Systems Inc., “CAT 6500 and 7600 Series Routers and Switches TCAM Allocation Adjustment Procedures,” http://www.cisco.com/c/en/ us/support/docs/switches/catalyst-6500-series-switches/117712-problemsolution- cat6500-00.html

[Cisco VNI 2020] Cisco Systems Inc., “Visual Networking Index,” https://www. cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index- vni/white-paper-c11-741490.html

[Claise 2019] B. Calise, J. Clarke, J. Lindblad, Network Programmability with YANG, Pearson, 2019.

[Clark 1988] D. Clark, “The Design Philosophy of the DARPA Internet Proto- cols,” Proc. 1988 ACM SIGCOMM Conference (Stanford, CA, Aug. 1988).

[Clark 1997] D. Clark, “ Interoperation, open interfaces and protocol architecture,” in The Unpredictable Certainty, The National Academies Press, 1997, pp. 133–144.

[Clark 2005] D. Clark, J. Wroclawski, K. R. Sollins, R. Braden, “Tussle in cyber- space: defining tomorrow’s internet,” IEEE/ACM Trans. Networking, Vol. 13, No. 3 (June 2005), pp. 462–475.

[Clos 1953] C. Clos, “A study of non-blocking switching networks,” Bell System Technical Journal, Vol. 32, No. 2 (Mar. 1953), pp. 406–424.

[Cohen 2003] B. Cohen, “Incentives to Build Robustness in BitTorrent,” First Workshop on the Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.

[Colbach 2017] G. Colbach, Wireless Technologies: An introduction to Bluetooth and WiFi, 2017.

[Condoluci 2018] M. Condoluci, T. Mahmoodi,, “Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges,” Computer Networks, Vol. 146 (2018), pp. 65–84.

[Cormen 2001] T. H. Cormen, Introduction to Algorithms, 2nd Ed., MIT Press, Cambridge, MA, 2001.

[Crow 1997] B. Crow, I. Widjaja, J. Kim, P. Sakai, “IEEE 802.11 Wireless Local Area Networks,” IEEE Communications Magazine (Sept. 1997), pp. 116–126.

[Cusumano 1998] M. A. Cusumano, D. B. Yoffie, Competing on Internet Time: Lessons from Netscape and Its Battle with Microsoft, Free Press, New York, NY, 1998.

[Czyz 2014] J. Czyz, M. Allman, J. Zhang, S. Iekel-Johnson, E. Osterweil, M. Bai- ley, “Measuring IPv6 Adoption,” Proc. ACM SIGCOMM 2014 Conference, ACM, New York, NY, USA, pp. 87–98. REFERENCES

[Dahlman 2018] E. Dahlman, S. Parkvall, J. Skold, 5G NR: The Next Generation Wireless Access Technology, Academic Press, 2018.

[DAM 2020] Digital Attack Map, http://www.digitalattackmap.com

[Davie 2000] B. Davie and Y. Rekhter, MPLS: Technology and Applications, Morgan Kaufmann Series in Networking, 2000.

[DEC 1990] Digital Equipment Corporation, “In Memoriam: J. C. R. Licklider 1915–1990,” SRC Research Report 61, Aug. 1990. http://www.memex.org/ licklider.pdf

[DeClercq 2002] J. DeClercq, O. Paridaens, “Scalability Implications of Virtual Private Networks,” IEEE Communications Magazine, Vol. 40, No. 5 (May 2002), pp. 151–157.

[Demers 1990] A. Demers, S. Keshav, S. Shenker, “Analysis and Simulation of a Fair Queuing Algorithm,” Internetworking: Research and Experience, Vol. 1, No. 1 (1990), pp. 3–26.

[dhc 2020] IETF Dynamic Host Configuration working group homepage, https://datatracker.ietf.org/wg/dhc/about/

[Diffie 1976] W. Diffie, M. E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol IT-22 (1976), pp. 644–654.

[Diggavi 2004] S. N. Diggavi, N. Al-Dhahir, A. Stamoulis, R. Calderbank, “Great Expectations: The Value of Spatial Diversity in Wireless Networks,” Proceedings of the IEEE, Vol. 92, No. 2 (Feb. 2004).

[Dilley 2002] J. Dilley, B. Maggs, J. Parikh, H. Prokop, R. Sitaraman, B. Weihl, “Globally Distributed Content Delivery,” IEEE Internet Computing (Sept.–Oct. 2002).

[Dmitiropoulos 2007] X. Dmitiropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, K. C. Claffy, G. Riley, “AS Relationships: Inference and Validation,” ACM Computer Communication Review, Vol. 37, No. 1 (Jan. 2007).

[DOCSIS3.1 2014] Data-Over-Cable Service Interface Specification, MAC and Upper Layer Protocols Interface Specification DOCSIS 3.1 (CM-SP-MUL- PIv3.1-104-141218), and Data-Over-Cable Service Interface Specification, Physical Layer Specification DOCSIS 3.1 (CM-SP-PHYv3.1-104-141218), Dec. 2014.

[Donahoo 2001] M. Donahoo, K. Calvert, TCP/IP Sockets in C: Practical Guide for Programmers, Morgan Kaufman, 2001.

[Droms 2002] R. Droms, T. Lemon, The DHCP Handbook, 2nd edition, SAMS Publishing, 2002. REFERENCES

[Eckel 2017] C. Eckel, Using OpenDaylight, https://www.youtube.com/ watch?v=rAm48gVv8_A

[Economides 2017] N. Economides, “A Case for Net Neutrality,” IEEE Spectrum, Dec. 2017, https://spectrum.ieee.org/tech-talk/telecom/internet/a-case-for-net-neutrality

[Edney 2003] J. Edney and W. A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i, Addison-Wesley Professional, 2003.

[Eduroam 2020] Eduroam, https://www.eduroam.org/

[Eisenbud 2016] D. Eisenbud, C. Yi, C. Contavalli, C. Smith, R. Kononov, E. Mann-Hielscher, Cilingiroglu, and B. Cheyney, W. Shang, J.D. Hosein, “Maglev: A Fast and Reliable Software Network Load Balancer,” NSDI 2016.

[Ellis 1987] H. Ellis, “The Story of Non-Secret Encryption,” http://jya.com/ellis- doc.htm

[Erickson 2013] D. Erickson, “ The Beacon Openflow Controller,” 2nd ACM SIG- COMM Workshop on Hot Topics in Software Defined Networking (HotSDN ’13). ACM, New York, NY, USA, pp. 13–18.

[Facebook 2014] A. Andreyev, “Introducing Data Center Fabric, the Next- Generation Facebook Data Center Network,” https://code.facebook.com/ posts/360346274145943/introducing-data-center-fabric-the-next-generation-face- book-data-center-network

[Faloutsos 1999] C. Faloutsos, M. Faloutsos, P. Faloutsos, “What Does the Internet Look Like? Empirical Laws of the Internet Topology,” Proc. 1999 ACM SIG- COMM Conference (Boston, MA, Aug. 1999).

[Farrington 2010] N. Farrington, G. Porter, S. Radhakrishnan, H. Bazzaz, V. Subramanya, Y. Fainman, G. Papen, A. Vahdat, “Helios: A Hybrid Electrical/Opti- cal Switch Architecture for Modular Data Centers,” Proc. 2010 ACM SIGCOMM Conference.

[Faulhaber 2012] G. Faulhaber, “The Economics of Network Neutrality: Are ‘Prophylactic’ Remedies to Nonproblems Needed?,” Regulation, Vol. 34, No. 4, p. 18, Winter 2011–2012.

[FB 2014] Facebook, “Introducing data center fabric, the next-generation Facebook data center network.” https://engineering.fb.com/production-engineering/introduc- ing-data-center-fabric-the-next-generation-facebook-data-center-network/

[FB 2019] Facebook, “Reinventing Facebook’s Data Center Network,” https://engineering.fb.com/data-center-engineering/f16-minipack/

[FCC 2008] US Federal Communications Commission, Memorandum Opinion and Order: Formal Complaint of Free Press and Public Knowledge Against REFERENCES

Comcast Corporation for Secretly Degrading Peer-to-Peer Applications, FCC 08-083.

[FCC 2015] US Federal Communications Commission, Protecting and Promoting the Open Internet, Report and Order on Remand, Declaratory Ruling, and Order, GN Docket No. 14-28. (March 12, 2015), https://apps.fcc.gov/edocs_public/attach- match/FCC-15-24A1.pdf

[FCC 2017] Restoring Internet Freedom, Declaratory Ruling, Report and Order and Order, WC Docket No. 17-108, December 14, 2017. https://transition.fcc.gov/ Daily_Releases/Daily_Business/2018/db0105/FCC-17-166A1.pdf

[Feamster 2004] N. Feamster, H. Balakrishnan, J. Rexford, A. Shaikh, K. van der Merwe, “The Case for Separating Routing from Routers,” ACM SIGCOMM Work- shop on Future Directions in Network Architecture, Sept. 2004.

[Feamster 2004] N. Feamster, J. Winick, J. Rexford, “A Model for BGP Routing for Network Engineering,” Proc. 2004 ACM SIGMETRICS Conference (New York, NY, June 2004).

[Feamster 2005] N. Feamster, H. Balakrishnan, “Detecting BGP Configuration Faults with Static Analysis,” NSDI (May 2005).

[Feamster 2013] N. Feamster, J. Rexford, E. Zegura, “The Road to SDN,” ACM Queue, Volume 11, Issue 12, (Dec. 2013).

[Feamster 2018] N. Feamster, J. Rexford, “Why (and How) Networks Should Run Themselves,” Proc. 2018 ACM Applied Networking Research Workshop (ANRW ’18).

[Feldmeier 1995] D. Feldmeier, “Fast Software Implementation of Error Detection Codes,” IEEE/ACM Transactions on Networking, Vol. 3, No. 6 (Dec. 1995), pp. 640–652.

[Fiber Broadband 2020] Fiber Broadband Association https://www .fiberbroadband.org/

[Fielding 2000] R. Fielding, “Architectural Styles and the Design of Network- based Software Architectures,” 2000. PhD Thesis, UC Irvine, 2000.

[FIPS 1995] Federal Information Processing Standard, “Secure Hash Standard,” FIPS Publication 180-1. http://www.itl.nist.gov/fipspubs/fip180-1.htm

[Floyd 1999] S. Floyd, K. Fall, “Promoting the Use of End-to-End Congestion Control in the Internet,” IEEE/ACM Transactions on Networking, Vol. 6, No. 5 (Oct. 1998), pp. 458–472.

[Floyd 2000] S. Floyd, M. Handley, J. Padhye, J. Widmer, “Equation-Based Congestion Control for Unicast Applications,” Proc. 2000 ACM SIGCOMM Conference (Stockholm, Sweden, Aug. 2000). REFERENCES

[Floyd 2016] S. Floyd, “References on RED (Random Early Detection) Queue Management,” http://www.icir.org/floyd/red.html

[Floyd Synchronization 1994] S. Floyd, V. Jacobson, “Synchronization of Peri- odic Routing Messages,” IEEE/ACM Transactions on Networking, Vol. 2, No. 2 (Apr. 1997) pp. 122–136.

[Floyd TCP 1994] S. Floyd, “TCP and Explicit Congestion Notification,” ACM SIGCOMM Computer Communications Review, Vol. 24, No. 5 (Oct. 1994), pp. 10–23.

[Fluhrer 2001] S. Fluhrer, I. Mantin, A. Shamir, “Weaknesses in the Key Schedul- ing Algorithm of RC4,” Eighth Annual Workshop on Selected Areas in Cryptogra- phy (Toronto, Canada, Aug. 2002).

[Ford 2005] Bryan Ford, Pyda Srisuresh, and Dan Kegel. 2005. Peer-to-peer communication across network address translators. In Proceedings of the annual conference on USENIX Annual Technical Conference (ATEC ’05).

[Fortz 2000] B. Fortz, M. Thorup, “Internet Traffic Engineering by Optimizing OSPF Weights,” Proc. 2000 IEEE INFOCOM (Tel Aviv, Israel, Apr. 2000).

[Fortz 2002] B. Fortz, J. Rexford, M. Thorup, “Traffic Engineering with Traditional IP Routing Protocols,” IEEE Communication Magazine, Vol. 40, No. 10 (Oct. 2002).

[Frost 1994] J. Frost, “BSD Sockets: A Quick and Dirty Primer,” http://world.std .com/~jimf/papers/sockets/sockets.html

[Gao 2001] L. Gao, J. Rexford, “Stable Internet Routing Without Global Coordination,” IEEE/ACM Transactions on Networking, Vol. 9, No. 6 (Dec. 2001), pp. 681–692.

[Garfinkel 2003] S. Garfinkel, “The End of End-to-End?,” MIT Technology Review, July 2003.

[Gauthier 1999] L. Gauthier, C. Diot, and J. Kurose, “End-to-End Transmission Control Mechanisms for Multiparty Interactive Applications on the Internet,” Proc. 1999 IEEE INFOCOM (New York, NY, Apr. 1999).

[Gieben 2004] M. Gieben, “DNSSEC,” The Internet Protocol Journal, 7 [2] (June 2004), http://ipj.dreamhosters.com/internet-protocol-journal/issues/back-issues/

[Giust 2015] F. Giust, L. Cominardi and C. J. Bernardos, “Distributed mobility management for future 5G networks: overview and analysis of existing approaches,” in IEEE Communications Magazine, Vol. 53, No. 1, pp. 142–149, January 2015.

[Goldsmith 2005] A. Goldsmith, Wireless Communications, Cambridge University Press, 2005. REFERENCES

[Goodman 1997] David J. Goodman, Wireless Personal Communications Systems, Prentice-Hall, 1997.

[Google CDN 2020] Google Data Center Locations https://cloud.google.com/cdn/ docs/locations

[Google IPv6 2020] Google Inc. “IPv6 Statistics,” https://www.google.com/intl/en/ ipv6/statistics.html

[Google Locations 2020] Google data centers. http://www.google.com/corporate/ datacenter/locations.html

[Goralski 1999] W. Goralski, Frame Relay for High-Speed Networks, John Wiley, New York, 1999.

[Greenberg 2009a] A. Greenberg, J. Hamilton, D. Maltz, P. Patel, “The Cost of a Cloud: Research Problems in Data Center Networks,” ACM Computer Communica- tions Review (Jan. 2009).

[Greenberg 2009b] A. Greenberg, N. Jain, S. Kandula, C. Kim, P. Lahiri, D. Maltz, P. Patel, S. Sengupta, “VL2: A Scalable and Flexible Data Center Network,” Proc. 2009 ACM SIGCOMM Conference.

[Greenberg 2015] A. Greenberg, “SDN for the Cloud,” 2015 ACM SIGCOMM Conference 2015 Keynote Address, http://conferences.sigcomm.org/sigcomm/2015/ pdf/papers/keynote.pdf

[GSMA 2018a] GSM Association, “Guidelines for IPX Provider networks,” Docu- ment IR.34, Version 14.0, August 2018.

[GSMA 2018b] GSM Association, “Migration from Physical to Virtual Network Functions: Best Practices and Lessons Learned,” July 2019.

[GSMA 2019a] GSM Association, “LTE and EPC Roaming Guidelines,” Docu- ment IR.88, June 2019.

[GSMA 2019b] GSM Association, “IMS Roaming, Interconnection and Interwork- ing Guidelines,” Document IR.65, April 2019.

[GSMA 2019c] GSM Association, “5G Implementation Guidelines,” July 2019.

[Gude 2008] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, “NOX: Towards an Operating System for Networks,” ACM SIG- COMM Computer Communication Review, July 2008.

[Guo 2009] C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, S. Lu, “BCube: A High Performance, Server-centric Network Architecture for Modular Data Centers,” Proc. 2009 ACM SIGCOMM Conference. REFERENCES

[Guo 2016] C. Guo, H. Wu, Z. Deng, G. Soni, J. Ye, J. Padhye, M. Lipshteyn, “RDMA over Commodity Ethernet at Scale,” Proc. 2016 ACM SIGCOMM Conference.

[Gupta 2001] P. Gupta, N. McKeown, “Algorithms for Packet Classification,” IEEE Network Magazine, Vol. 15, No. 2 (Mar./Apr. 2001), pp. 24–32.

[Gupta 2014] A. Gupta, L. Vanbever, M. Shahbaz, S. Donovan, B. Schlinker, N. Feamster, J. Rexford, S. Shenker, R. Clark, E. Katz-Bassett, “SDX: A Software Defined Internet Exchange, “ Proc. 2014 ACM SIGCOMM Conference (Aug. 2014), pp. 551–562.

[Ha 2008] S. Ha, I. Rhee, L. Xu, “CUBIC: A New TCP-Friendly High-Speed TCP Variant,” ACM SIGOPS Operating System Review, 2008.

[Halabi 2000] S. Halabi, Internet Routing Architectures, 2nd Ed., Cisco Press, 2000.

[Hamzeh 2015] B. Hamzeh, M. Toy, Y. Fu and J. Martin, “DOCSIS 3.1: scaling broadband cable to Gigabit speeds,” IEEE Communications Magazine, Vol. 53, No. 3, pp. 108–113, March 2015.

[Hanabali 2005] A. A. Hanbali, E. Altman, P. Nain, “A Survey of TCP over Ad Hoc Networks,” IEEE Commun. Surveys and Tutorials, Vol. 7, No. 3 (2005), pp. 22–36.

[He 2015] K. He , E. Rozner , K. Agarwal , W. Felter , J. Carter , A. Akella, “Presto: Edge-based Load Balancing for Fast Datacenter Networks,” Proc. 2015 ACM SIGCOMM Conference.

[Heidemann 1997] J. Heidemann, K. Obraczka, J. Touch, “Modeling the Perfor- mance of HTTP over Several Transport Protocols,” IEEE/ACM Transactions on Networking, Vol. 5, No. 5 (Oct. 1997), pp. 616–630.

[Held 2001] G. Held, Data Over Wireless Networks: Bluetooth, WAP, and Wireless LANs, McGraw-Hill, 2001.

[Holland 2001] G. Holland, N. Vaidya, V. Bahl, “A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks,” Proc. 2001 ACM Int. Conference of Mobile Computing and Networking (Rome, Italy, July 2001).

[Hollot 2002] C.V. Hollot, V. Misra, D. Towsley, W. Gong, “Analysis and Design of Controllers for AQM Routers Supporting TCP Flows,” IEEE Transactions on Automatic Control, Vol. 47, No. 6 (June 2002), pp. 945–959.

[Hong 2012] C.Y. Hong, M. Caesar, P. B. Godfrey, “Finishing Flows Quickly with Preemptive Scheduling,” Proc. 2012 ACM SIGCOMM Conference.

[Hong 2013] C. Hong, S, Kandula, R. Mahajan, M.Zhang, V. Gill, M. Nanduri, R. Wattenhofer, “Achieving High Utilization with Software-driven WAN,” Proc. ACM SIGCOMM Conference (Aug. 2013), pp.15–26. REFERENCES

[Hong 2018] C. Hong et al., “B4 and after: managing hierarchy, partitioning, and asymmetry for availability and scale in Google’s software-defined WAN,” Proc. 2018 ACM SIGCOMM Conference, pp. 74–87.

[HTTP/3 2020] M. Bishop. Ed, “Hypertext Transfer Protocol Version 3 (HTTP/3),” Internet Draft draft-ietf-quic-http-23, expires March 15, 2020.

[Huang 2002] C. Haung, V. Sharma, K. Owens, V. Makam, “Building Reliable MPLS Networks Using a Path Protection Mechanism,” IEEE Communications Magazine, Vol. 40, No. 3 (Mar. 2002), pp. 156–162.

[Huang 2008] C. Huang, J. Li, A. Wang, K. W. Ross, “Understanding Hybrid CDN-P2P: Why Limelight Needs Its Own Red Swoosh,” Proc. 2008 NOSSDAV, Braunschweig, Germany.

[Huang 2013] J. Huang, F. Qian, Y. Guo, Yu. Zhou, Q. Xu, Z. Mao, S. Sen, O. Spatscheck, “An in-depth study of LTE: effect of network protocol and application behavior on performance,” Proc. 2013 ACM SIGCOMM Conference.

[Huitema 1998] C. Huitema, IPv6: The New Internet Protocol, 2nd Ed., Prentice Hall, Englewood Cliffs, NJ, 1998.

[Huston 1999a] G. Huston, “Interconnection, Peering, and Settlements—Part I,” The Internet Protocol Journal, Vol. 2, No. 1 (Mar. 1999).

[Huston 2004] G. Huston, “NAT Anatomy: A Look Inside Network Address Translators,” The Internet Protocol Journal, Vol. 7, No. 3 (Sept. 2004).

[Huston 2008b] G. Huston, G. Michaelson, “IPv6 Deployment: Just where are we?” http://www.potaroo.net/ispcol/2008-04/ipv6.html

[Huston 2011a] G. Huston, “A Rough Guide to Address Exhaustion,” The Internet Protocol Journal, Vol. 14, No. 1 (Mar. 2011).

[Huston 2011b] G. Huston, “Transitioning Protocols,” The Internet Protocol Jour- nal, Vol. 14, No. 1 (Mar. 2011).

[Huston 2012] G. Huston, “A Quick Primer on Internet Peering and Settlements,” April 2012, http://www.potaroo.net/ispcol/2012-04/interconnection-primer.html

[Huston 2017] G. Huston, “BBR, the new kid on the TCP block,” https://blog. apnic.net/2017/05/09/bbr-new-kid-tcp-block/

[Huston 2017] G. Huston, “An Opinion in Defence of NAT,” https://www.potaroo. net/ispcol/2017-09/natdefence.html

[Huston 2019] G. Huston, “Addressing 2018,” https://www.potaroo.net/ispcol/2019-01/ addr2018.html

[Huston 2019a] G. Huston, “Happy Birthday BGP,” June 2019, http://www.potaroo.net/ispcol/2019-06/bgp30.html REFERENCES

[Huston 2019b] G. Huston, “BGP in 2018, Part 1 - The BGP Table,” https://www.potaroo.net/ispcol/2019-01/bgp2018-part1.html

[Hwang 2009] T. Hwang, C. Yang, G. Wu, S. Li and G. Ye Li, “OFDM and Its Wireless Applications: A Survey,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 4, pp. 1673–1694, May 2009.

[IAB 2020] Internet Architecture Board homepage, http://www.iab.org/

[IANA 2020] Internet Assigned Names Authority, https://www.iana.org/

[IANA Protocol Numbers 2016] Internet Assigned Numbers Authority, Protocol Numbers, http://www.iana.org/assignments/protocol-numbers/protocol- numbers.xhtml

[ICANN 2020] The Internet Corporation for Assigned Names and Numbers homepage, http://www.icann.org

[IEEE 802 2020] IEEE 802 LAN/MAN Standards Committee homepage, http:// www.ieee802.org/

[IEEE 802.11 1999] IEEE 802.11, “1999 Edition (ISO/IEC 8802-11: 1999) IEEE Standards for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Network— Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification,” http://standards.ieee.org/getieee802/ download/802.11-1999.pdf

[IEEE 802.1q 2005] IEEE, “IEEE Standard for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks,” http://standards.ieee.org/ getieee802/download/802.1Q-2005.pdf

[IEEE 802.3 2020] IEEE, “IEEE 802.3 CSMA/CD (Ethernet),” http://grouper.ieee. org/groups/802/3/

[IEEE 802.5 2012] IEEE, IEEE 802.5 homepage, http://www.ieee802.org/5/ www8025org/

[IEEE 802.11 2020] IEEE 802.11 Wireless Local Area Networks, the Working Group for WLAN Standards, http://www.ieee802.org/11/

[IETF 2020] Internet Engineering Task Force homepage, http://www.ietf.org

[IETF QUIC2020] Internet Engineering Task Force, QUIC Working Group, https://datatracker.ietf.org/wg/quic/about/

[Intel 2020] Intel Corp., “Intel 710 Ethernet Adapter,” http://www.intel.com/ content/www/us/en/ethernet-products/converged-network-adapters/ethernet-xl710 .html REFERENCES

[ISC 2020] Internet Systems Consortium homepage, http://www.isc.org

[ITU 2005a] International Telecommunication Union, “ITU-T X.509, The Direc- tory: Public-key and attribute certificate frameworks” (Aug. 2005).

[ITU 2014] ITU, “G.fast broadband standard approved and on the market,” http://www.itu.int/net/pressoffice/press_releases/2014/70.aspx

[ITU 2020] The ITU homepage, http://www.itu.int/

[Iyer 2008] S. Iyer, R. R. Kompella, N. McKeown, “Designing Packet Buffers for Router Line Cards,” IEEE/ACM Transactions on Networking, Vol. 16, No. 3 (June 2008), pp. 705–717.

[Jacobson 1988] V. Jacobson, “Congestion Avoidance and Control,” Proc. 1988 ACM SIGCOMM Conference (Stanford, CA, Aug. 1988), pp. 314–329.

[Jain 1986] R. Jain, “A Timeout-Based Congestion Control Scheme for Window Flow-Controlled Networks,” IEEE Journal on Selected Areas in Communications SAC-4, 7 (Oct. 1986).

[Jain 1989] R. Jain, “A Delay-Based Approach for Congestion Avoidance in Interconnected Heterogeneous Computer Networks,” ACM SIGCOMM Computer Communications Review, Vol. 19, No. 5 (1989), pp. 56–71.

[Jain 1994] R. Jain, FDDI Handbook: High-Speed Networking Using Fiber and Other Media, Addison-Wesley, Reading, MA, 1994.

[Jain 1996] R. Jain. S. Kalyanaraman, S. Fahmy, R. Goyal, S. Kim, “Tutorial Paper on ABR Source Behavior,” ATM Forum/96-1270, Oct. 1996. http://www.cse. wustl.edu/~jain/atmf/ftp/atm96-1270.pdf

[Jain 2013] S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S.Venkata, J. Wanderer, J. Zhou, M. Zhu, J. Zolla, U. Hölzle, S. Stuart, A, Vahdat, “B4: Experience with a Globally Deployed Software Defined Wan,” Proc. 2013 ACM SIGCOMM Conference, pp. 3–14.

[Jimenez 1997] D. Jimenez, “Outside Hackers Infiltrate MIT Network, Compro- mise Security,” The Tech, Vol. 117, No. 49 (Oct. 1997), p. 1, http://www-tech.mit. edu/V117/N49/hackers.49n.html

[Juniper MX2020 2020] Juniper Networks, “MX2020 and MX2010 3D Universal Edge Routers,” https://www.juniper.net/us/en/products-services/routing/mx-series/ mx2020/

[Kaaranen 2001] H. Kaaranen, S. Naghian, L. Laitinen, A. Ahtiainen, V. Niemi, Networks: Architecture, Mobility and Services, New York: John Wiley & Sons, 2001.

[Kahn 1967] D. Kahn, The Codebreakers: The Story of Secret Writing, The Macmillan Company, 1967. REFERENCES

[Kahn 1978] R. E. Kahn, S. Gronemeyer, J. Burchfiel, R. Kunzelman, “Advances in Packet Radio Technology,” Proc. IEEE, Vol. 66, No. 11 (Nov. 1978), pp. 1468–1496.

[Kamerman 1997] A. Kamerman, L. Monteban, “WaveLAN-II: A High– Performance Wireless LAN for the Unlicensed Band,” Bell Labs Technical Journal (Summer 1997), pp. 118–133.

[Kar 2000] K. Kar, M. Kodialam, T. V. Lakshman, “Minimum Interference Rout- ing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applica- tions,” IEEE J. Selected Areas in Communications (Dec. 2000).

[Karn 1987] P. Karn, C. Partridge, “Improving Round-Trip Time Estimates in Reliable Transport Protocols,” Proc. 1987 ACM SIGCOMM Conference.

[Karol 1987] M. Karol, M. Hluchyj, A. Morgan, “Input Versus Output Queuing on a Space-Division Packet Switch,” IEEE Transactions on Communications, Vol. 35, No. 12 (Dec. 1987), pp. 1347–1356.

[Kaufman 2002] C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, 2nd edition, Prentice Hall, 2002.

[Kelly 1998] F. P. Kelly, A. Maulloo, D. Tan, “Rate Control for Communication Networks: Shadow Prices, Proportional Fairness and Stability,” J. Operations Res. Soc., Vol. 49, No. 3 (Mar. 1998), pp. 237–252.

[Kim 2008] C. Kim, M. Caesar, J. Rexford, “Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises,” Proc. 2008 ACM SIGCOMM Conference (Seattle, WA, Aug. 2008).

[Kleinrock 1961] L. Kleinrock, “Information Flow in Large Communication Networks,” RLE Quarterly Progress Report, July 1961.

[Kleinrock 1964] L. Kleinrock, 1964 Communication Nets: Stochastic Message Flow and Delay, McGraw-Hill, New York, NY, 1964.

[Kleinrock 1975] L. Kleinrock, Queuing Systems, Vol. 1, John Wiley, New York, 1975.

[Kleinrock 1975b] L. Kleinrock, F. A. Tobagi, “Packet Switching in Radio Channels: Part I—Carrier Sense Multiple-Access Modes and Their Throughput- Delay Characteristics,” IEEE Transactions on Communications, Vol. 23, No. 12 (Dec. 1975), pp. 1400–1416.

[Kleinrock 1976] L. Kleinrock, Queuing Systems, Vol. 2, John Wiley, New York, 1976.

[Kleinrock 2004] L. Kleinrock, “The Birth of the Internet,” http://www.lk.cs.ucla. edu/LK/Inet/birth.html REFERENCES

[Kleinrock 2018] L. Kleinrock, “Internet congestion control using the power metric: Keep the pipe just full, but no fuller,” Ad Hoc Networks, Vol. 80, 2018, pp. 142–157.

[Kohler 2006] E. Kohler, M. Handley, S. Floyd, “DDCP: Designing DCCP: Congestion Control Without Reliability,” Proc. 2006 ACM SIGCOMM Conference (Pisa, Italy, Sept. 2006).

[Kohlios 2018] C. Kohlios, T. Hayajneh, “A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3,” Electronics, Vol. 7, No. 11, 2018.

[Kolding 2003] T. Kolding, K. Pedersen, J. Wigard, F. Frederiksen, P. Mogensen, “High Speed Downlink Packet Access: WCDMA Evolution,” IEEE Vehicular Technology Society News (Feb. 2003), pp. 4–10.

[Koponen 2010] T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, S. Shenker, “Onix: A Distributed Control Platform for Large-Scale Production Networks,” 9th USENIX conference on Operating systems design and implementation (OSDI’10), pp. 1–6.

[Koponen 2011] T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, P. B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, D. Kuptsov, “Architecting for Innovation,” ACM Computer Communications Review, 2011.

[Korhonen 2003] J. Korhonen, Introduction to 3G Mobile Communications, 2nd edition, Artech House, 2003.

[Koziol 2003] J. Koziol, Intrusion Detection with Snort, Sams Publishing, 2003.

[Kreutz 2015] D. Kreutz, F.M.V. Ramos, P. Esteves Verissimo, C. Rothenberg, S. Azodolmolky, S. Uhlig, “Software-Defined Networking: A Comprehensive Survey,” Proceedings of the IEEE, Vol. 103, No. 1 (Jan. 2015), pp. 14–76. This paper is also being updated at https://github.com/SDN-Survey/latex/wiki

[Krishnamurthy 2001] B. Krishnamurthy, J. Rexford, Web Protocols and Practice: HTTP/1.1, Networking Protocols, and Traffic Measurement, Addison- Wesley, Boston, MA, 2001.

[Kühlewind 2013] M. Kühlewind, S. Neuner, B, Trammell, “On the state of ECN and TCP options on the internet,” Proc. 14th International Conference on Passive and Active Measurement (PAM’13), pp. 135–144.

[Kulkarni 2005] S. Kulkarni, C. Rosenberg, “Opportunistic Scheduling: General- izations to Include Multiple Constraints, Multiple Interfaces, and Short Term Fair- ness,” Wireless Networks, 11 (2005), pp. 557–569. REFERENCES

[Kumar 2006] R. Kumar, K.W. Ross, “Optimal Peer-Assisted File Distribution: Single and Multi-Class Problems,” IEEE Workshop on Hot Topics in Web Systems and Technologies (Boston, MA, 2006).

[Labovitz 1997] C. Labovitz, G. R. Malan, F. Jahanian, “Internet Routing Instability,” Proc. 1997 ACM SIGCOMM Conference (Cannes, France, Sept. 1997), pp. 115–126.

[Labovitz 2010] C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, “Internet Inter-Domain Traffic,” Proc. 2010 ACM SIGCOMM Conference.

[Labrador 1999] M. Labrador, S. Banerjee, “Packet Dropping Policies for ATM and IP Networks,” IEEE Communications Surveys, Vol. 2, No. 3 (Third Quarter 1999), pp. 2–14.

[Lacage 2004] M. Lacage, M.H. Manshaei, T. Turletti, “IEEE 802.11 Rate Adapta- tion: A Practical Approach,” ACM Int. Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM) (Venice, Italy, Oct. 2004).

[Lakhina 2005] A. Lakhina, M. Crovella, C. Diot, “Mining Anomalies Using Traf- fic Feature Distributions,” Proc. 2005 ACM SIGCOMM Conference.

[Lakshman 1997] T. V. Lakshman, U. Madhow, “The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss,” IEEE/ACM Transactions on Networking, Vol. 5, No. 3 (1997), pp. 336–350.

[Lakshman 2004] T. V. Lakshman, T. Nandagopal, R. Ramjee, K. Sabnani, T. Woo, “The SoftRouter Architecture,” Proc. 3nd ACM Workshop on Hot Topics in Networks (Hotnets-III), Nov. 2004.

[Lam 1980] S. Lam, “A Carrier Sense Multiple Access Protocol for Local Networks,” Computer Networks, Vol. 4 (1980), pp. 21–32.

[Lamport 1989] L. Lamport, “The Part-Time Parliament,” Technical Report 49, Systems Research Center, Digital Equipment Corp., Palo Alto, Sept. 1989.

[Lampson 1983] Lampson, Butler W. “Hints for computer system design,” ACM SIGOPS Operating Systems Review, Vol. 17, No. 5, 1983.

[Lampson 1996] B. Lampson, “How to Build a Highly Available System Using Consensus,” Proc. 10th International Workshop on Distributed Algorithms (WDAG ’96), Özalp Babaoglu and Keith Marzullo (Eds.), Springer-Verlag, pp. 1–17.

[Langley 2017] A. Langley, A. Riddoch, A. Wilk, A. Vicente, C. Krasic, D. Zhang, F. Yang, F. Kouranov, I. Swett, J. Iyengar, J. Bailey, J. Dorfman, J. Roskind, J. Kulik, P. Westin, R. Tenneti, R. Shade, R. Hamilton, V. Vasiliev, W. Chang, Z. Shi, “The QUIC Transport Protocol: Design and Internet-Scale Deployment,” Proc. 2017 ACM SIGCOMM Conference. REFERENCES

[Lawton 2001] G. Lawton, “Is IPv6 Finally Gaining Ground?” IEEE Computer Magazine (Aug. 2001), pp. 11–15.

[Leighton 2009] T. Leighton, “Improving Performance on the Internet,” Communi- cations of the ACM, Vol. 52, No. 2 (Feb. 2009), pp. 44–51.

[Leiner 1998] B. Leiner, V. Cerf, D. Clark, R. Kahn, L. Kleinrock, D. Lynch, J. Postel, L. Roberts, S. Woolf, “A Brief History of the Internet,” http://www.isoc. org/internet/history/brief.html

[Leung 2006] K. Leung, V. O. K. Li, “TCP in Wireless Networks: Issues, Approaches, and Challenges,” IEEE Commun. Surveys and Tutorials, Vol. 8, No. 4 (2006), pp. 64–79.

[Levin 2012] D. Levin, A. Wundsam, B. Heller, N. Handigol, A. Feldmann, “Logi- cally Centralized?: State Distribution Trade-offs in Software Defined Networks,” Proc. First Workshop on Hot Topics in Software Defined Networks (Aug. 2012), pp. 1–6.

[Li 2004] L. Li, D. Alderson, W. Willinger, J. Doyle, “A First-Principles Approach to Understanding the Internet’s Router-Level Topology,” Proc. 2004 ACM SIG- COMM Conference (Portland, OR, Aug. 2004).

[Li 2007] J. Li, M. Guidero, Z. Wu, E. Purpus, T. Ehrenkranz, “BGP Routing Dynamics Revisited.” ACM Computer Communication Review (Apr. 2007).

[Li 2015] S. Q. Li, “Building Softcom Ecosystem Foundation,” Open Networking Summit, 2015.

[Li 2017] Z. Li, W. Wang, C. Wilson, J. Chen, C. Qian, T. Jung, L. Zhang, K. Liu, X.Li, Y. Liu, “FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild,” ISOC Symposium on Network and Distributed System Security (NDSS), February 2017.

[Li 2018] Z. Li, D. Levin, N. Spring, B. Bhattacharjee, “Internet anycast: perfor- mance, problems, & potential,” Proc. 2018 ACM SIGCOMM Conference, pp. 59–73.

[Lin 2001] Y. Lin, I. Chlamtac, Wireless and Mobile Network Architectures, John Wiley and Sons, New York, NY, 2001.

[Liogkas 2006] N. Liogkas, R. Nelson, E. Kohler, L. Zhang, “Exploiting BitTor- rent for Fun (but Not Profit),” 6th International Workshop on Peer-to-Peer Systems (IPTPS 2006).

[Liu 2003] J. Liu, I. Matta, M. Crovella, “End-to-End Inference of Loss Nature in a Hybrid Wired/Wireless Environment,” Proc. WiOpt’03: Modeling and Optimiza- tion in Mobile, Ad Hoc and Wireless Networks. REFERENCES

[Locher 2006] T. Locher, P. Moor, S. Schmid, R. Wattenhofer, “Free Riding in BitTorrent is Cheap,” Proc. ACM HotNets 2006 (Irvine CA, Nov. 2006).

[Madhyastha 2017] H. Madhyastha, “A Case Against Net Neutrality,” IEEE Spectrum, Dec. 2017, https://spectrum.ieee.org/tech-talk/telecom/internet/a-case- against-net-neutrality

[Mahdavi 1997] J. Mahdavi, S. Floyd, “TCP-Friendly Unicast Rate-Based Flow Control,” unpublished note (Jan. 1997).

[Mao 2002] Z. Mao, C. Cranor, F. Douglis, M. Rabinovich, O. Spatscheck, J. Wang, “A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers,” 2002 USENIX Annual Technical Conference, pp. 229–242.

[Mathis 1997] M. Mathis, J. Semke, J. Mahdavi, T. Ott, T. 1997, “The macro- scopic behavior of the TCP congestion avoidance algorithm,” ACM SIGCOMM Computer Communication Review, 27(3): pp. 67–82.

[MaxMind 2020] http://www.maxmind.com/app/ip-location

[McKeown 1997a] N. McKeown, M. Izzard, A. Mekkittikul, W. Ellersick, M. Horowitz, “The Tiny Tera: A Packet Switch Core,” IEEE Micro Magazine (Jan.–Feb. 1997).

[McKeown 1997b] N. McKeown, “A Fast Switched Backplane for a Gigabit Switched Router,” Business Communications Review, Vol. 27, No. 12. http://tiny- tera.stanford.edu/~nickm/papers/cisco_fasts_wp.pdf

[McKeown 2008] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turner. 2008. OpenFlow: Enabling Innova- tion in Campus Networks. SIGCOMM Comput. Commun. Rev. 38, 2 (Mar. 2008), pp. 69–74.

[McQuillan 1980] J. McQuillan, I. Richer, E. Rosen, “The New Routing Algo- rithm for the Arpanet,” IEEE Transactions on Communications, Vol. 28, No. 5 (May 1980), pp. 711–719.

[Metcalfe 1976] R. M. Metcalfe, D. R. Boggs. “Ethernet: Distributed Packet Switching for Local Computer Networks,” Communications of the Association for Computing Machinery, Vol. 19, No. 7 (July 1976), pp. 395–404.

[Meyers 2004] A. Myers, T. Ng, H. Zhang, “Rethinking the Service Model: Scal- ing Ethernet to a Million Nodes,” ACM Hotnets Conference, 2004.

[Mijumbi 2016] R. Mijumbi, J. Serrat, J. Gorricho, N. Bouten, F. De Turck and R. Boutaba, “Network Function Virtualization: State-of-the-Art and Research Challenges,” IEEE Communications Surveys & Tutorials, Vol. 18, No. 1, pp. 236–262, 2016. REFERENCES

[MIT TR 2019] MIT Technology Review, “How a quantum computer could break 2048-bit RSA encryption in 8 hours,” May 2019, https://www.technologyreview .com/s/613596/how-a-quantum-computer-could-break-2048-bit-rsa-encryption- in-8-hours/

[Mittal 2015] R. Mittal, V. Lam, N. Dukkipati, E. Blem, H. Wassel, M. Ghobadi, A. Vahdat, Y. Wang, D. Wetherall, D. Zats, “TIMELY: RTT-based Congestion Control for the Datacenter,” Proc. 2015 ACM SIGCOMM Conference, pp. 537–550.

[Mockapetris 1988] P. V. Mockapetris, K. J. Dunlap, “Development of the Domain Name System,” Proc. 1988 ACM SIGCOMM Conference (Stanford, CA, Aug. 1988).

[Mockapetris 2005] P. Mockapetris, Sigcomm Award Lecture, video available at http://www.postel.org/sigcomm

[Molinero-Fernandez 2002] P. Molinaro-Fernandez, N. McKeown, H. Zhang, “Is IP Going to Take Over the World (of Communications)?” Proc. 2002 ACM Hotnets.

[Molle 1987] M. L. Molle, K. Sohraby, A. N. Venetsanopoulos, “Space-Time Models of Asynchronous CSMA Protocols for Local Area Networks,” IEEE Journal on Selected Areas in Communications, Vol. 5, No. 6 (1987), pp. 956–968.

[Moshref 2016] M. Moshref, M. Yu, R, Govindan, A. Vahdat, “Trumpet: Timely and Precise Triggers in Data Centers,” Proc. 2016 ACM SIGCOMM Conference.

[Motorola 2007] Motorola, “Long Term Evolution (LTE): A Technical Overview,” http://www.motorola.com/staticfiles/Business/Solutions/Industry%20Solutions/ Service%20Providers/Wireless%20Operators/LTE/_Document/Static%20 Files/6834_MotDoc_New.pdf

[Mouly 1992] M. Mouly, M. Pautet, The GSM System for Mobile Communications, Cell and Sys, Palaiseau, France, 1992.

[Moy 1998] J. Moy, OSPF: Anatomy of An Internet Routing Protocol, Addison- Wesley, Reading, MA, 1998.

[Mysore 2009] R. N. Mysore, A. Pamboris, N. Farrington, N. Huang, P. Miri, S. Radhakrishnan, V. Subramanya, A. Vahdat, “PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric,” Proc. 2009 ACM SIGCOMM Conference.

[Nahum 2002] E. Nahum, T. Barzilai, D. Kandlur, “Performance Issues in WWW Servers,” IEEE/ACM Transactions on Networking, Vol 10, No. 1 (Feb. 2002).

[Narayan 2018] A. Narayan, F. Cangialosi, D. Raghavan, P. Goyal, S. Narayana, R. Mittal, M. Alizadeh, H. Balakrishnan, “Restructuring endpoint congestion con- trol,” Proc. ACM SIGCOMM 2018 Conference, pp. 30–43.

[Netflix Open Connect 2020] Netflix Open Connect CDN, 2016, https:// openconnect.netflix.com/ REFERENCES

[Netflix Video 1] Designing Netflix’s Content Delivery System, D. Fulllager, 2014, https://www.youtube.com/watch?v=LkLLpYdDINA

[Netflix Video 2] Scaling the Netflix Global CDN, D. Temkin, 2015, https://www .youtube.com/watch?v=tbqcsHg-Q_o

[Neumann 1997] R. Neumann, “Internet Routing Black Hole,” The Risks Digest: Forum on Risks to the Public in Computers and Related Systems, Vol. 19, No. 12 (May 1997). http://catless.ncl.ac.uk/Risks/19.12.html#subj1.1

[Neville-Neil 2009] G. Neville-Neil, “Whither Sockets?” Communications of the ACM, Vol. 52, No. 6 (June 2009), pp. 51–55.

[Nguyen 2016] T. Nguyen, C. Bonnet and J. Harri, “SDN-based distributed mobil- ity management for 5G networks,” 2016 IEEE Wireless Communications and Networking Conference, Doha, 2016, pp. 1–7.

[Nichols 2012] K. Nichols, V. Jacobson. Controlling Queue Delay. ACM Queue, Vol. 10, No. 5, May 2012.

[Nicholson 2006] A Nicholson, Y. Chawathe, M. Chen, B. Noble, D. Wetherall, “Improved Access Point Selection,” Proc. 2006 ACM Mobisys Conference (Uppsala Sweden, 2006).

[Nielsen 1997] H. F. Nielsen, J. Gettys, A. Baird-Smith, E. Prud’hommeaux, H. W. Lie, C. Lilley, “Network Performance Effects of HTTP/1.1, CSS1, and PNG,” W3C Document, 1997 (also appears in Proc. 1997 ACM SIGCOM Conference (Cannes, France, Sept 1997), pp. 155–166.

[NIST 2001] National Institute of Standards and Technology, “Advanced Encryp- tion Standard (AES),” Federal Information Processing Standards 197, Nov. 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

[NIST IPv6 2020] US National Institute of Standards and Technology, “Estimating IPv6 & DNSSEC Deployment SnapShots,” http://fedv6-deployment.antd.nist.gov/ snap-all.html

[Nmap 2020] Nmap homepage, https://nmap.org

[Nonnenmacher 1998] J. Nonnenmacher, E. Biersak, D. Towsley, “Parity-Based Loss Recovery for Reliable Multicast Transmission,” IEEE/ACM Transactions on Networking, Vol. 6, No. 4 (Aug. 1998), pp. 349–361.

[Noormohammadpour 2018] M. Noormohammadpour, C. Raghavendra, Cauligi, “Datacenter Traffic Control: Understanding Techniques and Trade-offs,” IEEE Communications Surveys & Tutorials, Vol. 20 (2018), pp. 1492–1525.

[Nygren 2010] Erik Nygren, Ramesh K. Sitaraman, and Jennifer Sun, “The Aka- mai Network: A Platform for High-performance Internet Applications,” SIGOPS Oper. Syst. Rev. 44, 3 (Aug. 2010), pp. 2–19. REFERENCES

[ONF 2020] Open Networking Foundation, Specification, https://www.opennet- working.org/software-defined-standards/specifications/

[ONOS 2020] ONOS, https://onosproject.org/collateral/

[OpenDaylight 2020] OpenDaylight, https://www.opendaylight.org/

[OpenDaylight 2020] OpenDaylight, https://www.opendaylight.org/what-we-do/ current-release/sodium

[OpenSignal 2019] Opensignal, https://www.opensignal.com/

[Ordonez-Lucena 2017] J. Ordonez-Lucena, P. Ameigeiras, D. Lopez, J. J. Ramos-Munoz, J. Lorca and J. Folgueira, “Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges,” IEEE Communications Magazine, Vol. 55, No. 5, pp. 80–87, May 2017.

[Osterweil 2012] E. Osterweil, D. McPherson, S. DiBenedetto, C. Papadopoulos, D. Massey, “Behavior of DNS Top Talkers,” Passive and Active Measurement Confer- ence, 2012.

[P4 2020] P4 Language Consortium, https://p4.org/

[Padhye 2000] J. Padhye, V. Firoiu, D. Towsley, J. Kurose, “Modeling TCP Reno Performance: A Simple Model and Its Empirical Validation,” IEEE/ACM Transac- tions on Networking, Vol. 8, No. 2 (Apr. 2000), pp. 133–145.

[Padhye 2001] J. Padhye, S. Floyd, “On Inferring TCP Behavior,” Proc. 2001 ACM SIGCOMM Conference (San Diego, CA, Aug. 2001).

[Palat 2009] S. Palat, P. Godin, “The LTE Network Architecture: A Comprehensive Tutorial,” in LTE—The UMTS Long Term Evolution: From Theory to Practice. Also available as a standalone Alcatel white paper.

[Panda 2013] A. Panda, C. Scott, A. Ghodsi, T. Koponen, S. Shenker, “CAP for Networks,” Proc. 2013 ACM HotSDN Conference, pp. 91–96.

[Parekh 1993] A. Parekh, R. Gallagher, “A Generalized Processor Sharing Ap- proach to Flow Control in Integrated Services Networks: The Single-Node Case,” IEEE/ACM Transactions on Networking, Vol. 1, No. 3 (June 1993), pp. 344–357.

[Partridge 1998] C. Partridge, et al. “A Fifty Gigabit per second IP Router,” IEEE/ ACM Transactions on Networking, Vol. 6, No. 3 (Jun. 1998), pp. 237–248.

[Patel 2013] P. Patel, D. Bansal, L. Yuan, A. Murthy, A. Greenberg, D. Maltz, R. Kern, H. Kumar, M. Zikos, H. Wu, C. Kim, N. Karri, “Ananta: Cloud Scale Load Balancing,” Proc. 2013 ACM SIGCOMM Conference.

[Pathak 2010] A. Pathak, Y. A. Wang, C. Huang, A. Greenberg, Y. C. Hu, J. Li, K. W. Ross, “Measuring and Evaluating TCP Splitting for Cloud Services,” Pas- sive and Active Measurement (PAM) Conference (Zurich, 2010). REFERENCES

[Peering DB 2020] “The Interconnection Database,” https://www.peeringdb.com/

[Peha 2006] J. Peha, “The Benefits and Risks of Mandating Network Neutral- ity, and the Quest for a Balanced Policy,” Proc. 2006 Telecommunication Policy Research Conference (TPRC), https://ssrn.com/abstract=2103831

[Perkins 1994] A. Perkins, “Networking with Bob Metcalfe,” The Red Herring Magazine (Nov. 1994).

[Perkins 1998b] C. Perkins, Mobile IP: Design Principles and Practice, Addison- Wesley, Reading, MA, 1998.

[Perkins 2000] C. Perkins, Ad Hoc Networking, Addison-Wesley, Reading, MA, 2000.

[Perlman 1999] R. Perlman, Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2nd edition, Addison-Wesley Professional Computing Series, Reading, MA, 1999.

[PGP 2020] Symantec PGP, https://www.symantec.com/products/encryption, 2020

[Phifer 2000] L. Phifer, “The Trouble with NAT,” The Internet Protocol Journal, Vol. 3, No. 4 (Dec. 2000), http://www.cisco.com/warp/public/759/ipj_3-4/ipj_ 3-4_nat.html

[Piatek 2008] M. Piatek, T. Isdal, A. Krishnamurthy, T. Anderson, “One Hop Reputations for Peer-to-peer File Sharing Workloads,” Proc. NSDI (2008).

[Pickholtz 1982] R. Pickholtz, D. Schilling, L. Milstein, “Theory of Spread Spec- trum Communication—a Tutorial,” IEEE Transactions on Communications, Vol. 30, No. 5 (May 1982), pp. 855–884.

[PingPlotter 2020] PingPlotter homepage, http://www.pingplotter.com

[Pomeranz 2010] H. Pomeranz, “Practical, Visual, Three-Dimensional Pedagogy for Internet Protocol Packet Header Control Fields,” https://righteousit.wordpress. com/2010/06/27/practical-visual-three-dimensional-pedagogy-for-internet-protocol- packet-header-control-fields/, June 2010.

[Quagga 2012] Quagga, “Quagga Routing Suite,” http://www.quagga.net/

[Qualcomm 2019] Qualcomm, “Everything you want to know about 5G,” https://www.qualcomm.com/invention/5g/what-is-5g

[Qazi 2013] Z. Qazi, C. Tu, L. Chiang, R. Miao, V. Sekar, M. Yu, “SIMPLE-fying Middlebox Policy Enforcement Using SDN,” Proc. ACM SIGCOMM Conference (Aug. 2013), pp. 27–38.

[Quic 2020] https://quicwg.org/ REFERENCES

[QUIC-recovery 2020] J. Iyengar, Ed.,I. Swett, Ed., “QUIC Loss Detection and Congestion Control,” Internet Draft draft-ietf-quic-recovery-latest, April 20, 2020.

[Quittner 1998] J. Quittner, M. Slatalla, Speeding the Net: The Inside Story of Netscape and How It Challenged Microsoft, Atlantic Monthly Press, 1998.

[Quova 2020] www.quova.com

[Raiciu 2010] C. Raiciu, C. Pluntke, S. Barre, A. Greenhalgh, D. Wischik, M. Handley, “Data Center Networking with Multipath TCP,” Proc. 2010 ACM SIGCOMM Conference.

[Ramakrishnan 1990] K. K. Ramakrishnan, R. Jain, “A Binary Feedback Scheme for Congestion Avoidance in Computer Networks,” ACM Transactions on Com- puter Systems, Vol. 8, No. 2 (May 1990), pp. 158–181.

[Raman 2007] B. Raman, K. Chebrolu, “Experiences in Using WiFi for Rural In- ternet in India,” IEEE Communications Magazine, Special Issue on New Directions in Networking Technologies in Emerging Economies (Jan. 2007).

[Ramjee 1994] R. Ramjee, J. Kurose, D. Towsley, H. Schulzrinne, “Adaptive Playout Mechanisms for Packetized Audio Applications in Wide-Area Networks,” Proc. 1994 IEEE INFOCOM.

[Rescorla 2001] E. Rescorla, SSL and TLS: Designing and Building Secure Systems, Addison-Wesley, Boston, 2001.

[RFC 001] S. Crocker, “Host Software,” RFC 001 (the very first RFC!).

[RFC 768] J. Postel, “User Datagram Protocol,” RFC 768, Aug. 1980.

[RFC 791] J. Postel, “Internet Protocol: DARPA Internet Program Protocol Speci- fication,” RFC 791, Sept. 1981.

[RFC 792] J. Postel, “Internet Control Message Protocol,” RFC 792, Sept. 1981.

[RFC 793] J. Postel, “Transmission Control Protocol,” RFC 793, Sept. 1981.

[RFC 801] J. Postel, “NCP/TCP Transition Plan,” RFC 801, Nov. 1981.

[RFC 826] D. C. Plummer, “An Ethernet Address Resolution Protocol—or— Converting Network Protocol Addresses to 48-bit Ethernet Address for Transmis- sion on Ethernet Hardware,” RFC 826, Nov. 1982.

[RFC 829] V. Cerf, “Packet Satellite Technology Reference Sources,” RFC 829, Nov. 1982.

[RFC 854] J. Postel, J. Reynolds, “TELNET Protocol Specification,” RFC 854, May 1993.

[RFC 950] J. Mogul, J. Postel, “Internet Standard Subnetting Procedure,” RFC 950, Aug. 1985.

[RFC 959] J. Postel and J. Reynolds, “File Transfer Protocol (FTP),” RFC 959, Oct. 1985. REFERENCES

[RFC 1034] P. V. Mockapetris, “Domain Names—Concepts and Facilities,” RFC 1034, Nov. 1987.

[RFC 1035] P. Mockapetris, “Domain Names—Implementation and Specifica- tion,” RFC 1035, Nov. 1987.

[RFC 1071] R. Braden, D. Borman, and C. Partridge, “Computing the Internet Checksum,” RFC 1071, Sept. 1988.

[RFC 1122] R. Braden, “Requirements for Internet Hosts—Communication Layers,” RFC 1122, Oct. 1989.

[RFC 1191] J. Mogul, S. Deering, “Path MTU Discovery,” RFC 1191, Nov. 1990.

[RFC 1320] R. Rivest, “The MD4 Message-Digest Algorithm,” RFC 1320, Apr. 1992.

[RFC 1321] R. Rivest, “The MD5 Message-Digest Algorithm,” RFC 1321, Apr. 1992.

[RFC 1422] S. Kent, “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management,” RFC 1422.

[RFC 1546] C. Partridge, T. Mendez, W. Milliken, “Host Anycasting Service,” RFC 1546, 1993.

[RFC 1584] J. Moy, “Multicast Extensions to OSPF,” RFC 1584, Mar. 1994.

[RFC 1633] R. Braden, D. Clark, S. Shenker, “Integrated Services in the Internet Architecture: an Overview,” RFC 1633, June 1994.

[RFC 1752] S. Bradner, A. Mankin, “The Recommendations for the IP Next Gen- eration Protocol,” RFC 1752, Jan. 1995.

[RFC 1918] Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, E. Lear, “Address Allocation for Private Internets,” RFC 1918, Feb. 1996.

[RFC 1930] J. Hawkinson, T. Bates, “Guidelines for Creation, Selection, and Registration of an Autonomous System (AS),” RFC 1930, Mar. 1996.

[RFC 1945] T. Berners-Lee, R. Fielding, H. Frystyk, “Hypertext Transfer Protocol—HTTP/1.0,” RFC 1945, May 1996.

[RFC 1958] B. Carpenter, “Architectural Principles of the Internet,” RFC 1958, June 1996.

[RFC 2003] C. Perkins, “IP Encapsulation Within IP,” RFC 2003, Oct. 1996.

[RFC 2004] C. Perkins, “Minimal Encapsulation Within IP,” RFC 2004, Oct. 1996. REFERENCES

[RFC 2018] M. Mathis, J. Mahdavi, S. Floyd, A. Romanow, “TCP Selective Acknowledgment Options,” RFC 2018, Oct. 1996.

[RFC 2104] H. Krawczyk, M. Bellare, R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, Feb. 1997.

[RFC 2131] R. Droms, “Dynamic Host Configuration Protocol,” RFC 2131, Mar. 1997.

[RFC 2136] P. Vixie, S. Thomson, Y. Rekhter, J. Bound, “Dynamic Updates in the Domain Name System,” RFC 2136, Apr. 1997.

[RFC 2328] J. Moy, “OSPF Version 2,” RFC 2328, Apr. 1998.

[RFC 2420] H. Kummert, “The PPP Triple-DES Encryption Protocol (3DESE),” RFC 2420, Sept. 1998.

[RFC 2460] S. Deering, R. Hinden, “Internet Protocol, Version 6 (IPv6) Specifica- tion,” RFC 2460, Dec. 1998.

[RFC 2578] K. McCloghrie, D. Perkins, J. Schoenwaelder, “Structure of Manage- ment Information Version 2 (SMIv2),” RFC 2578, Apr. 1999.

[RFC 2579] K. McCloghrie, D. Perkins, J. Schoenwaelder, “Textual Conventions for SMIv2,” RFC 2579, Apr. 1999.

[RFC 2580] K. McCloghrie, D. Perkins, J. Schoenwaelder, “Conformance State- ments for SMIv2,” RFC 2580, Apr. 1999.

[RFC 2581] M. Allman, V. Paxson, W. Stevens, “TCP Congestion Control,” RFC 2581, Apr. 1999.

[RFC 2663] P. Srisuresh, M. Holdrege, “IP Network Address Translator (NAT) Terminology and Considerations,” RFC 2663.

[RFC 2702] D. Awduche, J. Malcolm, J. Agogbua, M. O’Dell, J. McManus, “Re- quirements for Traffic Engineering Over MPLS,” RFC 2702, Sept. 1999.

[RFC 2827] P. Ferguson, D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing,” RFC 2827, May 2000.

[RFC 2865] C. Rigney, S. Willens, A. Rubens, W. Simpson, “Remote Authentica- tion Dial In User Service (RADIUS),” RFC 2865, June 2000.

[RFC 2992] C. Hopps, “Analysis of an Equal-Cost Multi-Path Algorithm,” RFC 2992, Nov 2000.

[RFC 3007] B. Wellington, “Secure Domain Name System (DNS) Dynamic Update,” RFC 3007, Nov. 2000. REFERENCES

[RFC 3022] P. Srisuresh, K. Egevang, “Traditional IP Network Address Translator (Traditional NAT),” RFC 3022, Jan. 2001.

[RFC 3031] E. Rosen, A. Viswanathan, R. Callon, “Multiprotocol Label Switching Architecture,” RFC 3031, Jan. 2001.

[RFC 3032] E. Rosen, D. Tappan, G. Fedorkow, Y. Rekhter, D. Farinacci, T. Li, A. Conta, “MPLS Label Stack Encoding,” RFC 3032, Jan. 2001.

[RFC 3168] K. Ramakrishnan, S. Floyd, D. Black, “The Addition of Explicit Con- gestion Notification (ECN) to IP,” RFC 3168, Sept. 2001.

[RFC 3209] D. Awduche, L. Berger, D. Gan, T. Li, V. Srinivasan, G. Swallow, “RSVP-TE: Extensions to RSVP for LSP Tunnels,” RFC 3209, Dec. 2001.

[RFC 3232] J. Reynolds, “Assigned Numbers: RFC 1700 Is Replaced by an On- line Database,” RFC 3232, Jan. 2002.

[RFC 3234] B. Carpenter, S. Brim, “Middleboxes: Taxonomy and Issues,” RFC 3234, Feb. 2002.

[RFC 3261] J. Rosenberg, H. Schulzrinne, G. Carmarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, “SIP: Session Initiation Protocol,” RFC 3261, July 2002.

[RFC 3272] J. Boyle, V. Gill, A. Hannan, D. Cooper, D. Awduche, B. Christian, W. S. Lai, “Overview and Principles of Internet Traffic Engineering,” RFC 3272, May 2002.

[RFC 3286] L. Ong, J. Yoakum, “An Introduction to the Stream Control Transmis- sion Protocol (SCTP),” RFC 3286, May 2002.

[RFC 3346] J. Boyle, V. Gill, A. Hannan, D. Cooper, D. Awduche, B. Christian, W. S. Lai, “Applicability Statement for Traffic Engineering with MPLS,” RFC 3346, Aug. 2002.

[RFC 3390] M. Allman, S. Floyd, C. Partridge, “Increasing TCP’s Initial Window,” RFC 3390, Oct. 2002.

[RFC 3410] J. Case, R. Mundy, D. Partain, “Introduction and Applicability Statements for Internet Standard Management Framework,” RFC 3410, Dec. 2002.

[RFC 3439] R. Bush, D. Meyer, “Some Internet Architectural Guidelines and Philosophy,” RFC 3439, Dec. 2003.

[RFC 3447] J. Jonsson, B. Kaliski, “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,” RFC 3447, Feb. 2003. REFERENCES

[RFC 3468] L. Andersson, G. Swallow, “The Multiprotocol Label Switching (MPLS) Working Group Decision on MPLS Signaling Protocols,” RFC 3468, Feb. 2003.

[RFC 3469] V. Sharma, Ed., F. Hellstrand, Ed, “Framework for Multi-Protocol Label Switching (MPLS)-based Recovery,” RFC 3469, Feb. 2003. ftp://ftp.rfc-editor.org/in-notes/rfc3469.txt

[RFC 3535] J. Schönwälder, “Overview of the 2002 IAB Network Management Workshop,” RFC 3535, May 2003.

[RFC 3550] H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications,” RFC 3550, July 2003.

[RFC 3588] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko, “Diameter Base Protocol,” RFC 3588, Sept. 2003.

[RFC 3746] L. Yang, R. Dantu, T. Anderson, R. Gopal, “Forwarding and Control Element Separation (ForCES) Framework,” Internet, RFC 3746, Apr. 2004.

[RFC 3748] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Ed., “Extensible Authentication Protocol (EAP),” RFC 3748, June 2004.

[RFC 4022] R. Raghunarayan, Ed., “Management Information Base for the Transmission Control Protocol (TCP),” RFC 4022, March 2005.

[RFC 4033] R. Arends, R. Austein, M. Larson, D. Massey, S. Rose, “DNS Security Introduction and Requirements, RFC 4033, March 2005.

[RFC 4113] B. Fenner, J. Flick, “Management Information Base for the User Datagram Protocol (UDP),” RFC 4113, June 2005.

[RFC 4213] E. Nordmark, R. Gilligan, “Basic Transition Mechanisms for IPv6 Hosts and Routers,” RFC 4213, Oct. 2005.

[RFC 4271] Y. Rekhter, T. Li, S. Hares, Ed., “A Border Gateway Protocol 4 (BGP-4),” RFC 4271, Jan. 2006.

[RFC 4291] R. Hinden, S. Deering, “IP Version 6 Addressing Architecture,” RFC 4291, Feb. 2006.

[RFC 4293] S. Routhier, Ed., “Management Information Base for the Internet Protocol (IP),” RFC 4293, April 2006.

[RFC 4340] E. Kohler, M. Handley, S. Floyd, “Datagram Congestion Control Protocol (DCCP),” RFC 4340, Mar. 2006.

[RFC 4346] T. Dierks, E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.1,” RFC 4346, Apr. 2006. REFERENCES

[RFC 4514] K. Zeilenga, Ed., “Lightweight Directory Access Protocol (LDAP): String Representation of Distinguished Names,” RFC 4514, June 2006.

[RFC 4632] V. Fuller, T. Li, “Classless Inter-domain Routing (CIDR): The Inter- net Address Assignment and Aggregation Plan,” RFC 4632, Aug. 2006.

[RFC 4960] R. Stewart, ed., “Stream Control Transmission Protocol,” RFC 4960, Sept. 2007.

[RFC 4987] W. Eddy, “TCP SYN Flooding Attacks and Common Mitigations,” RFC 4987, Aug. 2007.

[RFC 5128] P. Srisuresh, B. Ford, D. Kegel, “State of Peer-to-Peer (P2P) Commu- nication across Network Address Translators (NATs),” March 2008, RFC 5128.

[RFC 5246] T. Dierks, E. Rescorla, “The Transport Layer Security (TLS) Protocol, Version 1.2,” RFC 5246, Aug. 2008.

[RFC 5277] S. Chisholm H. Trevino, “NETCONF Event Notifications,” RFC 5277, July 2008.

[RFC 5321] J. Klensin, “Simple Mail Transfer Protocol,” RFC 5321, Oct. 2008.

[RFC 5389] J. Rosenberg, R. Mahy, P. Matthews, D. Wing, “Session Traversal Utilities for NAT (STUN),” RFC 5389, Oct. 2008.

[RFC 5681] M. Allman, V. Paxson, E. Blanton, “TCP Congestion Control,” RFC 5681, Sept. 2009.

[RFC 5944] C. Perkins, Ed., “IP Mobility Support for IPv4, Revised,” RFC 5944, Nov. 2010.

[RFC 6020] M. Bjorklund, “YANG—A Data Modeling Language for the Network Configuration Protocol (NETCONF),” RFC 6020, Oct. 2010.

[RFC 6241] R. Enns, M. Bjorklund, J. Schönwälder, A. Bierman, “Network Con- figuration Protocol (NETCONF),” RFC 6241, June 2011.

[RFC 6265] A Barth, “HTTP State Management Mechanism,” RFC 6265, Apr. 2011.

[RFC 6298] V. Paxson, M. Allman, J. Chu, M. Sargent, “Computing TCP’s Re- transmission Timer,” RFC 6298, June 2011.

[RFC 6582] T. Henderson, S. Floyd, A. Gurtov, Y. Nishida, “The NewReno Modification to TCP’s Fast Recovery Algorithm,” RFC 6582, April 2012.

[RFC 6733] V. Fajardo, J. Arkko, J. Loughney, G. Zorn, “Diameter Base Proto- col,” RFC 6733, Oct. 2012. REFERENCES

[RFC 7020] R. Housley, J. Curran, G. Huston, D. Conrad, “The Internet Numbers Registry System,” RFC 7020, Aug. 2013.

[RFC 7094] D. McPherson, D. Oran, D. Thaler, E. Osterweil, “Architectural Con- siderations of IP Anycast,” RFC 7094, Jan. 2014.

[RFC 7230] R. Fielding, Ed., J. Reschke, “Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing,” RFC 7230, June 2014.

[RFC 7232] R. Fielding, Ed., J. Reschke, Ed., “Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests,” RFC 7232, June 2014.

[RFC 7234] R. Fielding, Ed., M. Nottingham, Ed., J. Reschke, Ed., “Hypertext Transfer Protocol (HTTP/1.1): Caching,” RFC 7234, June 2014.

[RFC 7323] D. Borman, S. Braden, V. Jacobson, R. Scheffenegger, “TCP Exten- sions for High Performance,” RFC 7323, Sept. 2014.

[RFC 7540] M. Belshe, R. Peon, M. Thomson (Eds), “Hypertext Transfer Protocol Version 2 (HTTP/2),” RFC 7540, May 2015.

[RFC 8033] R. Pan, P. Natarajan, F. Baker, G. White, “Proportional Integral Con- troller Enhanced (PIE): A Lightweight Control Scheme to Address the Bufferbloat Problem,” RFC 8033, Feb. 2017.

[RFC 8034] G. White, R. Pan, “Active Queue Management (AQM) Based on Pro- portional Integral Controller Enhanced (PIE) for Data-Over-Cable Service Interface Specifications (DOCSIS) Cable Modems,” RFC 8034, Feb. 2017.

[RFC 8257] S. Bensley, D. Thaler, P. Balasubramanian, L. Eggert, G. Judd, “Data Center TCP (DCTCP): TCP Congestion Control for Data Centers, RFC 8257, October 2017.

[RFC 8312] L. Xu, S. Ha, A. Zimmermann,L. Eggert, R. Scheffenegger, “CUBIC for Fast Long-Distance Networks,” RFC 8312, Feb. 2018.

[Richter 2015] P. Richter, M. Allman, R. Bush, V. Paxson, “A Primer on IPv4 Scarcity,” ACM SIGCOMM Computer Communication Review, Vol. 45, No. 2 (Apr. 2015), pp. 21–32.

[Roberts 1967] L. Roberts, T. Merril, “Toward a Cooperative Network of Time- Shared Computers,” AFIPS Fall Conference (Oct. 1966).

[Rom 1990] R. Rom, M. Sidi, Multiple Access Protocols: Performance and Analy- sis, Springer-Verlag, New York, 1990.

[Rommer 2019] S. Rommer, P. Hedman, M. Olsson, L. Frid, S. Sultana, C. Mulligan, 5G Core Networks: Powering Digitalization, Academic Press, 2019.

[Root Servers 2020] Root Servers home page, http://www.root-servers.org/ REFERENCES

[Roy 2015] A. Roy, H.i Zeng, J. Bagga, G. Porter, A. Snoeren, “Inside the Social Net- work’s (Datacenter) Network,” Proc. 2015 ACM SIGCOMM Conference, pp. 123–137.

[RSA 1978] R. Rivest, A. Shamir, L. Adelman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2 (Feb. 1978), pp. 120–126.

[Rubenstein 1998] D. Rubenstein, J. Kurose, D. Towsley, “Real-Time Reliable Multicast Using Proactive Forward Error Correction,” Proceedings of NOSSDAV ’98 (Cambridge, UK, July 1998).

[Ruiz-Sanchez 2001] M. Ruiz-Sánchez, E. Biersack, W. Dabbous, “Survey and Taxonomy of IP Address Lookup Algorithms,” IEEE Network Magazine, Vol. 15, No. 2 (Mar./Apr. 2001), pp. 8–23.

[Saltzer 1984] J. Saltzer, D. Reed, D. Clark, “End-to-End Arguments in System Design,” ACM Transactions on Computer Systems (TOCS), Vol. 2, No. 4 (Nov. 1984).

[Saroiu 2002] S. Saroiu, P. K. Gummadi, S. D. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proc. of Multimedia Computing and Network- ing (MMCN) (2002).

[Sauter 2014] M. Sauter, From GSM to LTE-Advanced, John Wiley and Sons, 2014.

[Savage 2015] D. Savage, J. Ng, S. Moore, D. Slice, P. Paluch, R. White, “Enhanced Interior Gateway Routing Protocol,” Internet Draft, draft- savage-eigrp-04.txt, Aug. 2015.

[Saydam 1996] T. Saydam, T. Magedanz, “From Networks and Network Man- agement into Service and Service Management,” Journal of Networks and System Management, Vol. 4, No. 4 (Dec. 1996), pp. 345–348.

[Schiller 2003] J. Schiller, Mobile Communications, 2nd edition, Addison Wesley, 2003.

[Schneier 2015] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, 2015.

[Schönwälder 2010] J. Schönwälder, M. Björklund, P. Shafer, “Network configu- ration management using NETCONF and YANG,” IEEE Communications Magazine, 2010, Vol. 48, No. 9, pp. 166–173.

[Schwartz 1977] M. Schwartz, Computer-Communication Network Design and Analysis, Prentice-Hall, Englewood Cliffs, NJ, 1997.

[Schwartz 1980] M. Schwartz, Information, Transmission, Modulation, and Noise, McGraw Hill, New York, NY 1980. REFERENCES

[Schwartz 1982] M. Schwartz, “Performance Analysis of the SNA Virtual Route Pacing Control,” IEEE Transactions on Communications, Vol. 30, No. 1 (Jan. 1982), pp. 172–184.

[Scourias 2012] J. Scourias, “Overview of the Global System for Mobile Commu- nications: GSM.” http://www.privateline.com/PCS/GSM0.html

[Segaller 1998] S. Segaller, Nerds 2.0.1, A Brief History of the Internet, TV Books, New York, 1998.

[Serpanos 2011] D. Serpanos, T. Wolf, Architecture of Network Systems, Morgan Kaufmann Publishers, 2011.

[Shacham 1990] N. Shacham, P. McKenney, “Packet Recovery in High-Speed Networks Using Coding and Buffer Management,” Proc. 1990 IEEE Infocom (San Francisco, CA, Apr. 1990), pp. 124–131.

[Shaikh 2001] A. Shaikh, R. Tewari, M. Agrawal, “On the Effectiveness of DNS- based Server Selection,” Proc. 2001 IEEE INFOCOM.

[Sherry 2012] J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, V. Sekar, “Making middleboxes someone else’s problem: network processing as a cloud service,” Proc. 2012 ACM SIGCOMM Conference.

[Singh 1999] S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scotsto Quantum Cryptography, Doubleday Press, 1999.

[Singh 2015] A. Singh et al., “Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network,” Proc. 2015 ACM SIGCOMM Conference, pp. 183–197.

[Smith 2009] J. Smith, “Fighting Physics: A Tough Battle,” Communications of the ACM, Vol. 52, No. 7 (July 2009), pp. 60–65.

[Smithsonian 2017] Smithsonian Magazine, “How Other Countries Deal with Net Neutrality,” https://www.smithsonianmag.com/innovation/how-other-countries- deal-net-neutrality-180967558/

[Snort 2012] Sourcefire Inc., Snort homepage, http://www.snort.org/

[Solensky 1996] F. Solensky, “IPv4 Address Lifetime Expectations,” in IPng: Internet Protocol Next Generation (S. Bradner, A. Mankin, ed.), Addison-Wesley, Reading, MA, 1996.

[Speedtest 2020] https://www.speedtest.net/

[Spragins 1991] J. D. Spragins, Telecommunications Protocols and Design, Addison-Wesley, Reading, MA, 1991. REFERENCES

[Srikant 2012] R. Srikant, The mathematics of Internet congestion control, Springer Science & Business Media, 2012.

[Statista 2019] “Mobile internet usage worldwide - Statistics & Facts,” https:// www.statista.com/topics/779/mobile-internet/

[Steinder 2002] M. Steinder, A. Sethi, “Increasing Robustness of Fault Localiza- tion Through Analysis of Lost, Spurious, and Positive Symptoms,” Proc. 2002 IEEE INFOCOM.

[Stevens 1990] W. R. Stevens, Unix Network Programming, Prentice-Hall, Engle- wood Cliffs, NJ.

[Stevens 1994] W. R. Stevens, TCP/IP Illustrated, Vol. 1: The Protocols, Addison- Wesley, Reading, MA, 1994.

[Stevens 1997] W. R. Stevens, Unix Network Programming, Volume 1: Networking APIs-Sockets and XTI, 2nd edition, Prentice-Hall, Englewood Cliffs, NJ, 1997.

[Stewart 1999] J. Stewart, BGP4: Interdomain Routing in the Internet, Addison- Wesley, 1999.

[Stone 1998] J. Stone, M. Greenwald, C. Partridge, J. Hughes, “Performance of Checksums and CRC’s Over Real Data,” IEEE/ACM Transactions on Networking, Vol. 6, No. 5 (Oct. 1998), pp. 529–543.

[Stone 2000] J. Stone, C. Partridge, “When Reality and the Checksum Disagree,” Proc. 2000 ACM SIGCOMM Conference (Stockholm, Sweden, Aug. 2000).

[Strayer 1992] W. T. Strayer, B. Dempsey, A. Weaver, XTP: The Xpress Transfer Protocol, Addison-Wesley, Reading, MA, 1992.

[Stubblefield 2002] A. Stubblefield, J. Ioannidis, A. Rubin, “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP,” Proceedings of 2002 Network and Distributed Systems Security Symposium (2002), pp. 17–22.

[Subramanian 2000] M. Subramanian, Network Management: Principles and Practice, Addison-Wesley, Reading, MA, 2000.

[Subramanian 2002] L. Subramanian, S. Agarwal, J. Rexford, R. Katz, “Charac- terizing the Internet Hierarchy from Multiple Vantage Points,” Proc. 2002 IEEE INFOCOM.

[Sundaresan 2006] K. Sundaresan, K. Papagiannaki, “The Need for Cross-layer Information in Access Point Selection,” Proc. 2006 ACM Internet Measurement Conference (Rio De Janeiro, Oct. 2006).

[Sunshine 1978] C. Sunshine, Y. Dalal, “Connection Management in Transport Protocols,” Computer Networks, North-Holland, Amsterdam, 1978. REFERENCES

[Tan 2006] K. Tan, J. Song, Q. Zhang and M. Sridharan, “A Compound TCP Approach for High-Speed and Long Distance Networks,” Proc. 2006 IEEE INFOCOM.

[Tariq 2008] M. Tariq, A. Zeitoun, V. Valancius, N. Feamster, M. Ammar, “An- swering What-If Deployment and Configuration Questions with WISE,” Proc. 2008 ACM SIGCOMM Conference (Aug. 2008).

[Teixeira 2006] R. Teixeira, J. Rexford, “Managing Routing Disruptions in Internet Service Provider Networks,” IEEE Communications Magazine Vol. 44, No. 3 (Mar. 2006) pp. 160–165.

[Think 2012] Technical History of Network Protocols, “Cyclades,” http://www.cs.utexas.edu/users/chris/think/Cyclades/index.shtml

[Tian 2012] Y. Tian, R. Dey, Y. Liu, K. W. Ross, “China’s Internet: Topology Mapping and Geolocating,” IEEE INFOCOM Mini-Conference 2012 (Orlando, FL, 2012).

[TLD list 2020] TLD list maintained by Wikipedia, https://en.wikipedia.org/wiki/ List_of_Internet_top-level_domains

[Tobagi 1990] F. Tobagi, “Fast Packet Switch Architectures for Broadband Integrated Networks,” Proc. IEEE, Vol. 78, No. 1 (Jan. 1990), pp. 133–167.

[TOR 2020] Tor: Anonymity Online, http://www.torproject.org

[Torres 2011] R. Torres, A. Finamore, J. R. Kim, M. M. Munafo, S. Rao, “Dissect- ing Video Server Selection Strategies in the YouTube CDN,” Proc. 2011 Int. Conf. on Distributed Computing Systems.

[Tourrilhes 2014] J. Tourrilhes, P. Sharma, S. Banerjee, J. Petit, “SDN and Open- flow Evolution: A Standards Perspective,” IEEE Computer Magazine, Nov. 2014, Vol. 47, No. 11, pp. 22–29.

[Turner 1988] J. S. Turner, “Design of a Broadcast packet switching network,” IEEE Transactions on Communications, Vol. 36, No. 6 (June 1988), pp. 734–743.

[Turner 2012] B. Turner, “2G, 3G, 4G Wireless Tutorial,” http://blogs.nmscom- munications.com/communications/2008/10/2g-3g-4g-wireless-tutorial.html

[van der Berg 2008] R. van der Berg, “How the ’Net Works: An Introduction to Peering and Transit,” http://arstechnica.com/guides/other/peering-and-transit.ars

[van der Merwe 1998] J. van der Merwe, S. Rooney, I. Leslie, S. Crosby, “The Tempest: A Practical Framework for Network Programmability,” IEEE Network, Vol. 12, No. 3 (May 1998), pp. 20–28.

[Vanhoef 2017] M. Vanhoef, F. Piessens, “ Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2,” 2017 ACM SIGSAC Conference on Computer and Com- munications Security (CCS ’17), pp. 1313–1328. REFERENCES

[Varghese 1997] G. Varghese, A. Lauck, “Hashed and Hierarchical Timing Wheels: Efficient Data Structures for Implementing a Timer Facility,” IEEE/ACM Transactions on Networking, Vol. 5, No. 6 (Dec. 1997), pp. 824–834.

[Vasudevan 2005] S. Vasudevan, C. Diot, J. Kurose, D. Towsley, “Facilitating Ac- cess Point Selection in IEEE 802.11 Wireless Networks,” Proc. 2005 ACM Internet Measurement Conference, (San Francisco CA, Oct. 2005).

[Venkataramani 2014] A. Venkataramani, J. Kurose, D. Raychaudhuri, K. Naga- raja, M. Mao, S. Banerjee, “MobilityFirst: A Mobility-Centric and Trustworthy Internet Architecture,” ACM Computer Communication Review, July 2014.

[Villamizar 1994] C. Villamizar, C. Song. “High Performance TCP in ANSNET,” ACM SIGCOMM Computer Communications Review, Vol. 24, No. 5 (1994), pp. 45–60.

[Viterbi 1995] A. Viterbi, CDMA: Principles of Spread Spectrum Communication, Addison-Wesley, Reading, MA, 1995.

[Vixie 2009] P. Vixie, “What DNS Is Not,” Communications of the ACM, Vol. 52, No. 12 (Dec. 2009), pp. 43–47.

[Wakeman 1992] I. Wakeman, J. Crowcroft, Z. Wang, D. Sirovica, “Is Layering Harmful (remote procedure call),” IEEE Network, Vol. 6, No. 1 (Jan. 1992), pp. 20–24.

[Waldrop 2007] M. Waldrop, “Data Center in a Box,” Scientific American (July 2007).

[Walfish 2004] M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, “Middleboxes No Longer Considered Harmful,” USENIX OSDI 2004 San Francisco, CA, December 2004.

[Wang 2011] Z. Wang, Z. Qian, Q. Xu, Z. Mao, M. Zhang, “An untold story of middleboxes in cellular networks,” Proc. 2011 ACM SIGCOMM Conference.

[Wei 2006] D. X. Wei, C. Jin, S. H. Low and S. Hegde, “FAST TCP: Motivation, Architecture, Algorithms, Performance,” IEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1246–1259, Dec. 2006.

[Wei 2006] W. Wei, C. Zhang, H. Zang, J. Kurose, D. Towsley, “Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks,” Proc. Active and Passive Measurement Workshop (Adelaide, Australia, Mar. 2006).

[Weiser 1991] M. Weiser, “The Computer for the Twenty-First Century,” Scientific American (Sept. 1991): 94–10. http://www.ubiq.com/hypertext/weiser/ SciAmDraft3.html

[Wifi 2019] The WiFi Alliance, “WPA3™ Security Considerations Overview,” April 2019. REFERENCES

[WiFi 2020] The WiFi Alliance, https://www.wi-fi.org/

[Williams 1993] R. Williams, “A Painless Guide to CRC Error Detection Algorithms,” http://www.ross.net/crc/crcpaper.html

[Wireshark 2020] Wireshark homepage, http://www.wireshark.org

[Wischik 2005] D. Wischik, N. McKeown, “Part I: Buffer Sizes for Core Routers,” ACM SIGCOMM Computer Communications Review, Vol. 35, No. 3 (July 2005).

[Woo 1994] T. Woo, R. Bindignavle, S. Su, S. Lam, “SNP: an interface for secure network programming,” Proc. 1994 Summer USENIX (Boston, MA, June 1994), pp. 45–58.

[Wright 2015] J. Wright, J., Hacking Exposed Wireless, McGraw-Hill Education, 2015.

[Wu 2005] J. Wu, Z. M. Mao, J. Rexford, J. Wang, “Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network,” Proc. USENIX NSDI (2005).

[W3Techs] World Wide Web Technology Surveys, 2020. https://w3techs.com/ technologies/details/ce-http2/all/all.

[Xanadu 2012] Xanadu Project homepage, http://www.xanadu.com/

[Xiao 2000] X. Xiao, A. Hannan, B. Bailey, L. Ni, “Traffic Engineering with MPLS in the Internet,” IEEE Network (Mar./Apr. 2000).

[Xu 2004] L. Xu, K Harfoush, I. Rhee, “Binary Increase Congestion Control (BIC) for Fast Long-Distance Networks,” IEEE INFOCOM 2004, pp. 2514–2524.

[Yang 2014] P. Yang, J. Shao, W. Luo, L. Xu, J. Deogun, Y. Lu, “TCP congestion avoidance algorithm identification,” IEEE/ACM Trans. Netw. Vol. 22, No. 4 (Aug. 2014), pp. 1311–1324.

[Yavatkar 1994] R. Yavatkar, N. Bhagwat, “Improving End-to-End Performance of TCP over Mobile Internetworks,” Proc. Mobile 94 Workshop on Mobile Com- puting Systems and Applications (Dec. 1994).

[YouTube 2009] YouTube 2009, Google container data center tour, 2009.

[Yu 2004] Yu, Fang, H. Katz, Tirunellai V. Lakshman. “Gigabit Rate Packet Pattern-Matching Using TCAM,” Proc. 2004 Int. Conf. Network Protocols, pp. 174–183.

[Yu 2011] M. Yu, J. Rexford, X. Sun, S. Rao, N. Feamster, “A Survey of VLAN Usage in Campus Networks,” IEEE Communications Magazine, July 2011.

[Zegura 1997] E. Zegura, K. Calvert, M. Donahoo, “A Quantitative Comparison of Graph-based Models for Internet Topology,” IEEE/ACM Transactions on Networking, REFERENCES

Vol. 5, No. 6, (Dec. 1997). See also http://www.cc.gatech.edu/projects/gtitm for a software package that generates networks with a transit-stub structure.

[Zhang 2007] L. Zhang, “A Retrospective View of NAT,” The IETF Journal, Vol. 3, No. 2 (Oct. 2007).

[Zheng 2008] N. Zheng and J. Wigard, “On the Performance of Integrator Handover Algorithm in LTE Networks,” 2008 IEEE 68th Vehicular Technology Conference, Calgary, BC, 2008, pp. 1–5.

[Zhu 2015] Y. Zhu, H. Eran, D. Firestone, D. Firestone, C. Guo, M. Lipshteyn, Y. Liron, J. Padhye, S. Raindel Mohamad, H. Yahia, M. Zhang, J. Padhye, “Congestion Control for Large-Scale RDMA Deployments,” Proc. 2015 ACM SIGCOMM Conference.

[Zilberman 2019] N. Zilberman, G. Bracha, G. Schzukin. “Stardust: Divide and conquer in the data center network,” 2019 USENIX Symposium on Networked Systems Design and Implementation.

[Zink 2009] M. Zink, K. Suh, Y. Gu, J. Kurose, “Characteristics of YouTube Network Traffic at a Campus Network—Measurements, Models, and Implications,” Computer Networks, Vol. 53, No. 4, pp. 501–514, 2009.

[Zou 2016] Y. Zou, J. Zhu, X. Wang, L. Hanzo, “A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends,” Proceedings of the IEEE, Vol. 104, No. 9, 2016.


Classes
Quiz
Videos
References
Books