Internet Protocol Case Study


Suggested Topics | Case Study Guidelines | Guidelines | Evaluation Criteria | Suggested Resources

Suggested Topics

Back to Top
Note: you are free to suggest your own topic for inclusion here or for your case study. Each topic is for one sutdent's study except those explicitly said for 2. If you want to take on a single-person topic for two people, it should ultimately have commensurate depth; and you should interact with the prof to determine what "commensurate" means.

Case study guidelines

Back to Top

The case study is an creative exercise in:

  1. synthesizing a picture of an area, its relevance, structure and core ideas; and identifying what problems are worth working on going forward.
  2. integrating the concepts learnt in class, with an in-depth focus in a single area.
  3. understanding the *research* and *engineering* issues in a focus area and a crisp articulation of state-of-the-art and research/engineering directions being investigated in the community. No fluff. Suggested length ~ about 10 pages.
  4. reading key technical research papers, IETF RFCs and drafts, participating in IETF mailing lists etc
  5. making a creative attempt at any open research problems to suggest solution directions/approaches. Well articulated solution approaches/breakthroughs can get upto 5 bonus points.

Guidelines

Back to Top
  1. The case study proposal should have:
  2. The final case study writeup (of about 10 pages) should clearly specify:

Evaluation Criteria

Back to Top
  1. the depth/breadth of issues investigated
  2. clarity of thought and presentation. Problem definition and scope before solution presentation.
  3. quality of critique of the state-of-the-art and insight in presenting open issues
  4. Well articulated solution approaches/breakthroughs can get upto 5 bonus points. Badly written reports or reports with more "fluff" than clear technical exposition will lose points in the evaluation.

Suggested Resources

Back to Top

Unicast Congestion Control: (Topic for Group of 2 Students)

Back to Top

  1. End-to-end and Edge-to-Edge Flow Control
  2. Buffer Management
  3. Rate/Credit-Based Schemes

Security I: IPSec, Kerberos

Back to Top

Required reading:

Reference:


Security II

Back to Top

Required reading:

Reference:


Routing I: Inter Domain Routing (BGP)

Back to Top

Required reading:

Reference:


Routing II: Intra Domain Routing  (IS-IS & OSPF)

Back to Top

Required reading:

Reference:


Multicast (Topic for Group of 2 Students)

Back to Top

Required reading:

Optional reading


Beyond best effort (Topic for Group of 2 Students)

Back to Top

Required reading

Optional reading


Virtual private networks

Back to Top

Required reading

Reference


Reliability and Error control (Topic for Group of 2 Students)

Back to Top

Required reading


Optical Networking (Topic for Group of 2 Students)

Back to Top

Required reading

Optical Networking Books

Optional reading


Mobile routing

Back to Top

Required Reading:

Reference:


Wireless(Topic for Group of 2 Students)

Back to Top

Required readings

Wireless Network Books

Optional readings


Internet Pricing

Back to Top

Required reading

Optional reading


Naming

Back to Top

Required reading:

Reference:


IPv6

Back to Top

Required reading:

Reference


IP-ATM convergence/internetworking

Back to Top

Required reading:

Reference:


Internet content distribution

Back to Top

Required reading:

Reference:


Big Fast Routers

Back to Top

Required reading:


Internet Simulation, Measurement and Modeling Issues

Back to Top

Required reading:

Reference:


TCP performance

Back to Top

Required reading:

Reference


TCP and WWW modeling

Back to Top

Required reading

Reference

http://www.ecse.rpi.edu/Homepages/shivkuma/research/cong-papers.htm