Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleAugust 2003
Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 395–406https://doi.org/10.1145/863955.863999This paper examines graph-theoretic properties of existing peer-to-peer architectures and proposes a new infrastructure based on optimal diameter de Bruijn graphs. Since generalized de Bruijn graphs possess very short average routing distances and high ...
- ArticleAugust 2003
The impact of DHT routing geometry on resilience and proximity
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 381–394https://doi.org/10.1145/863955.863998The various proposed DHT routing algorithms embody several different underlying routing geometries. These geometries include hypercubes, rings, tree-like structures, and butterfly networks. In this paper we focus on how these basic geometric approaches ...
- ArticleAugust 2003
Towards an accurate AS-level traceroute tool
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 365–378https://doi.org/10.1145/863955.863996Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes) along the forwarding path would make traceroute even more valuable to ...
- ArticleAugust 2003
A measurement-based analysis of multihoming
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 353–364https://doi.org/10.1145/863955.863995Multihoming has traditionally been employed by stub networks to enhance the reliability of their network connectivity. With the advent of commercial "intelligent route control" products, stubs now leverage multihoming to improve performance. Although ...
- ArticleAugust 2003
A high-level programming environment for packet trace anonymization and transformation
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 339–351https://doi.org/10.1145/863955.863994Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive information. Current trace anonymization technology leaves only the packet ...
-
- ArticleAugust 2003
Estimating flow distributions from sampled flow statistics
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 325–336https://doi.org/10.1145/863955.863992Passive traffic measurement increasingly employs sampling at the packet level. Many high-end routers form flow statistics from a sampled substream of packets. Sampling is necessary in order to control the consumption of resources by the measurement ...
- ArticleAugust 2003
Making intra-domain routing robust to changing and uncertain traffic demands: understanding fundamental tradeoffs
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 313–324https://doi.org/10.1145/863955.863991Intra-domain traffic engineering can significantly enhance the performance of large IP backbone networks. Two important components of traffic engineering are understanding the traffic demandsand configuring the routing protocols. These two components ...
- ArticleAugust 2003
An information-theoretic approach to traffic matrix estimation
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 301–312https://doi.org/10.1145/863955.863990Traffic matrices are required inputs for many IP network management tasks: for instance, capacity planning, traffic engineering and network reliability analysis. However, it is difficult to measure these matrices directly, and so there has been recent ...
- ArticleAugust 2003
Persistent dropping: an efficient control of traffic aggregates
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 287–298https://doi.org/10.1145/863955.863988Flash crowd events (FCEs) present a real threat to the stability of routers and end-servers. Such events are characterized by a large and sustained spike in client arrival rates, usually to the point of service failure. Traditional rate-based drop ...
- ArticleAugust 2003
Design of a robust active queue management algorithm based on feedback compensation
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 277–285https://doi.org/10.1145/863955.863987Active Queue Management (AQM) is a very active research area in networking. The main objective of an AQM mechanism is to provide low delay and low loss service in best-effort service networks. In this paper we propose a new AQM algorithm based on the ...
- ArticleAugust 2003
The effects of active queue management on web performance
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 265–276https://doi.org/10.1145/863955.863986We present an empirical study of the effects of active queue management (AQM) on the distribution of response times experienced by a population of web users. Three prominent AQM schemes are considered: the Proportional Integrator (PI) controller, the ...
- ArticleAugust 2003
A comparison of hard-state and soft-state signaling protocols
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 251–262https://doi.org/10.1145/863955.863984One of the key infrastructure components in all telecommunication networks, ranging from the telephone network, to VC-oriented data networks, to the Internet, is its signaling system. Two broad approaches towards signaling can be identified: so-called ...
- ArticleAugust 2003
Stratified round Robin: a low complexity packet scheduler with bandwidth fairness and bounded delay
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 239–250https://doi.org/10.1145/863955.863983Fair queuing is a well-studied problem in modern computer networks. However, there remains a gap between scheduling algorithms that have provably good performance, and those that are feasible and practical to implement in high speed routers. In this ...
- ArticleAugust 2003
Quantum cryptography in practice
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 227–238https://doi.org/10.1145/863955.863982BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping ...
- ArticleAugust 2003
Packet classification using multidimensional cutting
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 213–224https://doi.org/10.1145/863955.863980This paper introduces a classification algorithm called phHyperCuts. Like the previously best known algorithm, HiCuts, HyperCuts is based on a decision tree structure. Unlike HiCuts, however, in which each node in the decision tree represents a ...
- ArticleAugust 2003
Longest prefix matching using bloom filters
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 201–212https://doi.org/10.1145/863955.863979We introduce the first algorithm that we are aware of to employ Bloom filters for Longest Prefix Matching (LPM). The algorithm performs parallel queries on Bloom filters, an efficient data structure for membership queries, in order to determine address ...
- ArticleAugust 2003
Scaling internet routers using optics
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 189–200https://doi.org/10.1145/863955.863978Routers built around a single-stage crossbar and a centralized scheduler do not scale, and (in practice) do not provide the throughput guarantees that network operators need to make efficient use of their expensive long-haul links. In this paper we ...
- ArticleAugust 2003
Forwarding in a content-based network
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 163–174https://doi.org/10.1145/863955.863975This paper presents an algorithm for content-based forwarding, an essential function in content-based networking. Unlike in traditional address-based unicast or multicast networks, where messages are given explicit destination addresses, the movement of ...
- ArticleAugust 2003
On selfish routing in internet-like environments
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 151–162https://doi.org/10.1145/863955.863974A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks (e.g., Detour or RON). Such approaches result in selfish ...
- ArticleAugust 2003
Automatically inferring patterns of resource consumption in network traffic
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communicationsAugust 2003, pp 137–148https://doi.org/10.1145/863955.863972The Internet service model emphasizes flexibility -- any node can send any type of traffic at any time. While this design has allowed new applications and usage models to flourish, it also makes the job of network management significantly more ...