- Honor Code:
Feel free to discuss approaches to solving homework problems with
others. However, you are required to work out the details of a
solution yourself. Copying solutions from others will be treated as
a serious honor code violation.
- On-time submissions:
Homeworks turned in late are likely to be penalized.
Please typeset your submission in a font no smaller than 12 pt.
Instructions for Using the Course Testbed
A diagram of the experimental testbed available for the course is available here.
- The testbed reservation system is available
here (accessible only from
CS department machines).
Instructions for using the testbed, the Apache web server, and
the Surge http client request generator are available here.
- Note: The speedy30 network is currently down. Please use
only the brain10 network.
- A sample gnuplot script is available here.
The slides for the LTT tutorial given by Sushant Rewaskar are
More LTT documentation can be found here
and by following the links within.
Paper choices for critical review:
K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan,
Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload",
in Proceedings of the 19th ACM Symposium on Operating Systems
Principles, Bolton Landing, NY, Oct 2003.
V. Yegneswaran, P. Barford, and J. Ullrich, "Internet
Intrusions: Global Characteristics and Prevalence", in Proceedings
of the ACM SIGMETRICS International Conference on Measurement and
Modeling of Computer Systems, San Diego, CA, June 2003.