http://www.cse.wustl.edu/~jain/

Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation

Recent Talks: 
Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation and a related paper 
Wireless Access Networks: Recent Developments, Issues and Trends, Keynote at AccessNets 2007, Ottawa.
Sprint 2010 Course: CSE 574S: Wireless and Mobile Networking
Audio/Video Recordings of Lectures 
CSE567M - Computer Systems Analysis (20082006) | CSE 574S: Wireless and Mobile Networking ( 20082006) |CSE571S - Network Security ( 20092007) | CSE 473S: Introduction to Computer Networking ( 2009 | 2005) | Hot Topics in Networking (May 2002) | Introduction to Optical Networks (2002) | CIS 788 - Recent Advances in Networking (19991997) | CIS 777 - Telecommunications Networks | Internet Protocols
Books
High Performance TCP/IP Networking | The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling ( Instruction SlidesErrata) | FDDI Handbook: High-Speed Networking with Fiber and Other Media | Control-theoretic Formulation of Operating Systems Resource Management Policies
Class Lectures on Computer System Analysis 
Course Introduction | Common Mistakes | Selection of Techniques and Metrics | Types of Workloads | Workload Selection |Workload Characterization | Data Presentation | Ratio Games | Summarizing Measured Data | Comparing Systems Using Random Data | Simple Linear Regression Models | Other Regression Models | Experimental Designs | 2k Experimental Designs |Factorial Designs with Replication | Fractional Factorial Designs | One Factor Experiments | Two Factor Full Factorial Design w/o Replications | Two Factor Full Factorial Designs with Replications | General Full Factorial Designs |Introduction to Simulation | Analysis of Simulation Results | Random Number Generation | Testing Random Number Generators |Random Variate Generation | Introduction to Queueing Theory | Analysis of Single Queue | Queueing Networks | Operational Laws | Mean-Value Analysis | Convolution Algorithm 
Student Reports on Performance Analysis
OpenVPN | Sorting | Real-time Scan Conversion | Network Tracker for BitTorrent | 6LoWPAN | Statistical Modeling Tools |FPGA Benchmarks | Network Topology and Analysis | FPGA Programming Languages | Database Systems | Hardware Performance Analysis Tools | Beyond Visual Range Air Combat | Network Simulation Tools | Data Encryption Algorithms | Gamma-Ray Event Parameterization Application | MAC protocols | Network Traffic Monitoring and Analysis Techniques | Network Performance Monitoring Tools | Network Performance Monitoring Tools II | Network Performance Monitoring Tools | Network Traffic Monitoring and Analysis Tools II | Operating System and Process Monitoring Tools | Performance Analysis Tools | Processor workloads | Diversified Router | Wireless Sensor Networks | Software Performance Analysis Tools | Software Monitoring and Profiling Tools | Network Traffic Models | Network Traffic Models II | Network Traffic Models III | X-Sim: A Trace-Based Simulator | Thermally Adaptive Application
Class Lectures on Network Security 
Course Overview | Security Concepts | TCP/IP Security Attacks | Operating Systems Security Attacks | Secret Key Cryptography | Modes of Operation | Hashes and Message Digest | Number Theory and Public Key Cryptography | Number Theory and Public Key Cryptography (Cont) | Authentication | Kerberos V4 | Kerberos V5 | Public Key Infrastructure | IPsec |Internet Key Exchange (IKE) | Web Security: SSL/TLS | Email Security | Virtual Private Networks (VPNs) | Authentication, Authorization, and Accounting (AAA) | Wireless LAN Security I: WEP Overview and Tools | Wireless LAN Security II: WEP Attacks, WPA and WPA2 | DNS Security | Intrusion Detection 
Network Security Tools by Students
Steganography | E-ZeePass: Web-based password hash | Cafe Crack: A Wireless Attack Tool | Net Vigilant: Network Monitor Tool | Secure Data Exchange Tool 
Student Reports on Recent Advances in Network Security
WiMAX security 1 | WiMAX Security 2 | Social Network Security | Kerberos V | Sensors and Actuators Security | Service Oriented Architecture (SOA) Security | Worms | Security of Virtual Machines | Cloud Computing Security | Hacking Organizations, Conferences, and Publications | Secure Ballots Using Quantum Cryptography | Quantum Key Distribution Protocols | Web Single Sign-On Systems | Wireless Hacking Tools | Peer-to-Peer Network Security | Intrusion Detection Techniques | GSS-API
Class Lectures on Wireless and Mobile Networking
Course Overview | Wireless Networking Trends | Key Wireless Physical Layer Concepts | Wireless Local Area Networks (WLANs) Part IPart II | Wireless Personal Area Networks: Part IPart II | WiMAX Part I: PHYPart II: MACPart III: Mobility and Networking | IEEE 802.22 Wireless Regional Area Networks (WRANs) | IEEE 802.21 Media Independent Handover (MIH) |Wireless Cellular Networks: 1G and 2G | Wireless Cellular Networks II: 2.5G and 3G | Mobile IP Part I: IPv4 | Mobile IPv6 |TCP over Wireless Networks | Ad Hoc Networks: Issues and Routing | Wireless Sensor Networks | Wireless Mesh and Multi-Hop Relay Networks | Radio Frequency Identification (RFID) | Quality of Service in Data Networks | Network Security Concepts: Review | Wireless Network Security | Energy Management in Ad Hoc Wireless Networks | 
Student Reports on Recent Advances in Wireless and Mobile Networking
Body Area Networks (BAN) | OSPF Extensions for Mobile Ad-hoc Networks | 4G IMT-Advanced | The 700 MHz Band | Wireless for Rural America | Long Term Evolution (LTE) & Ultra-Mobile Broadband (UMB) | Medical Applications of UWB | Medical Applications of Wireless Networks | Energy Efficient Wireless Protocols | Satellite Networking | Metropolitan and Regional Wireless Networks: 802.16, 802.20 and 802.22 | Wireless Personal Area Networks | RFID | Recent Advances in the Wireless Physical Layer | Location Management in Wireless Data Networks | Location Management in Wireless Cellular Networks | Time Synchronization in Wireless Networks | Power Management in Wireless Networks | Energy Efficient Routing in Wireless Networks | Mobile IP | Network Mobility | Network Architectures for Mobility | IEEE802.21 Media Independent Handover Services | QoS over WiMAX | QoS in Wireless Data Networks | QoS in Cellular Networks | TCP Optimizations for Wireless |VoIP/Multimedia over WiMAX | Voice over Wireless | Security in Wireless Data Networks | Security In Wireless Cellular Networks | Aircraft Wireless Networks | Inter/Intra-Vehicle Wireless Communication | Medical Applications of Wireless Networks

Class Lectures on Introduction to Computer Networks 2009 
Course Overview | Internet: Core and Edge, History | Application Layer: HTTP, FTP, SMTP, Domain Name System (DNS), Peer to Peer (P2P) Networking | Transport Layer: Design Issues, Universal Datagram Protocol (UDP) and Transmission Control Protocol (TCP), TCP Congestion Control | Network Layer: IP4, ICMP, IPv6, Routing Algorithms, Internet Routing Protocols: OSPF, RIP, BGP | Link Layer: Error correction, LLC, VLANs, PPP, MPLS | Wireless and Mobile Networks: WiFi 802.11, Bluetooth, WiMAX, Cellular wireless Networks, Mobile IP and Cellular Mobility | Multimedia Networking | Security in Computer Networks:Cryptography, IPSec | Network Management

Class Lectures on Introduction to Computer Networks 2005
Course Overview | Data Communications and Networking Overview | Data Transmission | Transmission Media | Signal Encoding Techniques | Digital Communications Techniques | Data Link Control Protocols | High-Speed LANs | High-Speed LANs Part II: 1G and 10G Ethernets and Token Ring | High-Speed LANs Part III: LLC and Bridges | Wireless LANs | Cellular Wireless Networks | Internet Protocol | Internet Protocol Version 6 (IPv6) | Routing in Switched Networks | Transport Protocols |Network Security Part I: Concepts | Network Security Part II: Standards | Network Management (SNMP) | Hypertext Transfer Protocol(HTTP) | ATM Networks: An overview

Class Lectures on Recent Advances in Networking (1999) 
Course OverviewA Review of Networking ConceptsATM IntroductionNetworking TrendsIP Switching, Multiprotocol Label SwitchingOptical DWDM NetworksQoS over Data NetworksVirtual Private NetworksVoice over IPResidential Broadband: Cable Modesm and ADSLIP Over DWDMIP Over SONET

Class Lectures on Recent Advances in Networking (1997) 
Networking Trends and Their ImpactATM Networks - An IntroductionLAN Emulation, ATM Emulation, Classical IP over ATM|MPOA, NHRP, MPOA, IP SwitchingLabel/Tag SwitchingLAN Switching and Traffic ClassesVirtual LANsGigabit Ethernet|Cable Modems and ADSLMulticast over IP and ATMProtocols for Multimedia on the InternetWireless Data NetworkingIP over SONETQoS in IP NetworksVoice over IP


Seminars on Recent Advances in Networking (1995-96)
High-Speed Networking: Trends and IssuesATM Networking: An OverviewATM Networking: Issues and ChallengesMultimedia Networks: An IntroductionMultimedia Networking over IP and ATMWireless Data Networking: An IntroductionNetwork Issues for Mobile ComputingTraffic Management in ATM Networks100 Mbps Networking Technologies: 100BASE-TxAll-Optical Networks | Internet Protocol: The next generation | Gigabit Networking Standards: Fibre Channel and HIPPI
Student Reports on Recent Advances in Networking (1999)
10 Gigabit Ethernet3G Wireless NetworksAd-Hoc Mobile RoutingVideo CompressionOptical DWDMH.323Home Networking|IP over DWDMIP QOS over ATMLMDSQoS ProductsQoS ProtocolsQoS RoutingTCP Extensions for WirelessTerabit Switches and RoutersHigh-Speed TestbedsVoice over IP ProductsVoice over IP ProtocolsVoice Over ATMWeb Caching and ReplicationWireless LANsWireless Data Networking

Student Reports on Recent Advances in Networking (1997)
Active NetworksATM ProductsATM SecurityCable ModemsGigabit EthernetGigabit NetsIntegrated ServicesInternet TelephonyIP MulticastIP MultimediaIP over ATMIP SecurityIP SwitchingLAN SwitchingNetwork MonitoringADSL and Cable ModemsSatellite Data NetworksSatellite NetworksTCP Over ATMVideo Over ATMVirtual LANsWireless ATM|Wireless LANs

Student Reports on Recent Advances in Networking (1995)
Congestion Control in ATM NetworksATM SwitchingDistributed ComputingFiber ChannelFrame RelayHIPPIISDNIP Next Generation (IPng)Mobile ComputingMobile IPMultimedia ProductsSwitched Multimegabit Data Service (SMDS)Congestion Control Algorithms for TCP/IPHigh Performance Transports


Tutorials on ATM Networks
OverviewAdaptations LayersTraffic Management | Issues and Challenges AheadPhysical Layers (Phy)Multiprotocol over ATM (MPOA)Signaling (UNI)Private Network to Node Interface (PNNI)Broadband Inter-Carrier Interface (B-ICI)|Residential Broadband (RBB)Voice and Telephony over ATM (VTOA)Wireless ATM (WATM)Audiovisual Multimedia Services (AMS)Name Service (ANS)Application Programming Interface (API)
Tutorials on Internet Protocols: ( Video Recordingsare also available.) 
Fundamentals (OSI Reference Model, Coding, Ethernet)Data Link Control (Flow Control, Error Control, HDLC, PPP)Internet Protocol (IP, IP Addressing)Address Resolution Protocol (ARP)IP Next Generation (IPv6)Internet Control Message Protocol (ICMP)Transmission Control Protocol (TCP)The Domain Name System (DNS)Network Management (SNMP)Network Security (Firewalls)Routing Algorithms (Dijkstra and Bellman-Ford)Route Discovery Protocols (RIP, OSPF, BGP)Mobile IPMultipoint Communication Over IP (IP Multicasting)ATM Networks | LAN Emulation, IP Switching and Label Switching|Protocols for Multimedia on the Internet (Integrated Services, RSVP, Differentiated Services)Voice over IPIP over SONET
Courses Taught at OSU
CIS 677: Introduction to Computer Networking (Class Handouts Fall'96Spring'96Fall'98Spring'00)| CIS 678: Internetworking ( Winter'96 Class Handouts) | CIS 777: Telecommunication Networks (Class Handouts Spring'97 | Spring'98 |Spring'99 | Spring'00) | CIS 788.08Q: Recent Advances in Networking ( Summer'97 Class HandoutsFall'99 Class Handouts) |CIS 752: Simulation Modeling and Analysis ( Autumn'97 Class Handouts

For Networking Instructors: Lab Exercises for Networking Courses 
Interlayer CommunicationSliding Window Protocol and Go-back-N ARQCSMA/CD Media Access Control, Ethernet (IEEE 802.3)|Token RingTransparent BridgeInternet Protocol (IP)Transmission Control Protocol (TCP)Leaky Bucket (Traffic Management)ATM PNNI Routing 

Recent/Upcoming Conference/Seminar Appearances
Co-Chair, Broadband Access Communication Technologies Conference IV 2010, January 27, 2010 | CDAC-ACCS Foundation LectureADCOM 2009 | Tutorial Speaker, Globecom 2009 | Keynote SpeakerNBiS 2009 | Keynote SpeakerNetworking Architecture Symposium 1969-2009: Fourty years of Internetworking Research | Co-Chair, Broadband Access Communication Technologies Conference III 2009 | Keynote SpeakerICON 2008 | Keynote SpeakerACM Multimedia 2008 | Keynote SpeakerICCBN 2008 | Keynote SpeakerICCCE 2008 | Co-ChairBroadband Access Communication Technologies III 2009 |Co-Chair, Broadband Access Communication Technologies Conference II 2008 | Tutorial Presenter, Photonics West 2008 |Invited SpeakerANTS 2008 | General ChairICCBN 2008 ...
Recent Participation in Conference Program Committees 
  •  MICS 2010 | EMERGING 2010 | EDOC 2010 | ICCCN 2010 | ICAIT 2010 | ONPlan 2010 | MOPAS 2010 | AICCSA 2010 | ICCCE 2010 |ICISA 2010 | AINA 2010 | ICCC 2010 | Broadband Access Communication Technologies IV 2010 | MICC 2009 | ADCOM 2009 | AH-ICI 2009 | DRCN 2009 | ICFIN 2009 | BWIA 2009 | EMERGING 2009 | Ad-Hoc Nets 2009 | ITC-21 2009 | EDOC 2009 | NAP Track at ICCCN 2009 | ICAIT 2009 | PlanNet2009 | WYNSYS 2009 | HotAC IV 2009 | AICCSA-2009 | WOCN2009 | NetEval 2009 | Broadband Access Communication Technologies III 2009 | WIPcom 2009 ...
    Current StudentsChakchai SoinAbdel Karim Al-TamimiJianli Pan, and Subharthi Paul 
    Past PhD StudentsProf. Shivkumar Kalayanaraman, Rensaeler Polytechnic Institute/IBM India | Prof. Sonia Fahmy, Purdue University | Dr. Rohit Goyal, Founder and VP of Engineering, NeoSaej | Dr. Bobby Vandalore, Juniper Networks| Prof. Chun Lei Liu, Valdosta State University
    About WUSTL and CSE Dept
    WUSTL Web PageWUSTL Admission InfoCS Department Web Page | Applying to our Research Program | Contacting Raj Jain |Directions to Raj Jain's Office
  •  

    posted on 2010-04-21 22:49  服务学习  阅读(297)  评论(0编辑  收藏  举报