Search
Now showing items 1-10 of 24
Building a Better Mousetrap
(Georgia Institute of Technology, 2007)
Routers in the network core are unable to maintain detailed
statistics for every packet; thus, traffic statistics are often
based on packet sampling, which reduces accuracy. Because
tracking large ("heavy-hitter") traffic ...
Towards an Internet Connectivity Market
(Georgia Institute of Technology, 2009)
Today’s Internet achieves end-to-end connectivity through
bilateral contracts between neighboring networks; unfortunately,
this “one size fits all” connectivity results in less efficient
paths, unsold capacity and unmet ...
Packets with Provenance
(Georgia Institute of Technology, 2008)
Traffic classification and distinction allows network operators
to provision resources, enforce trust, control unwanted
traffic, and traceback unwanted traffic to its source. Today’s
classification mechanisms rely ...
SDX: A Software Defined Internet Exchange
(Georgia Institute of Technology, 2013)
Deploying software-defined networking (SDN) at Internet
Exchange Points (IXPs) offers new hope for solving long-standing problems in interdomain routing. SDN allows direct expression of more flexible policies, and IXPs ...
WTF? Locating Performance Problems in Home Networks
(Georgia Institute of Technology, 2013)
Most users of home networks have experienced the intense
frustration that comes with diagnosing poor performance.
Even determining something as simple as whether a performance
problem lies with the ISP or somewhere in ...
Simpler Network Configuration with State-Based Network Policies
(Georgia Institute of Technology, 2013)
Operators make hundreds of changes to a network’s router
and switch configurations every day—a painstaking, error-prone process. If the network configuration could instead
encode different forwarding behavior for different ...
Lithium: Event-Driven Network Control
(Georgia Institute of Technology, 2012)
This paper introduces event-driven network control, a network
control framework that makes networks easier to manage
by automating many tasks that must currently be performed
by manually modifying low-level, distributed, ...
Pushing Enterprise Security Down the Network Stack
(Georgia Institute of Technology, 2009)
Network security is typically reactive: Networks provide
connectivity and subsequently alter this connectivity according
to various security policies, as implemented in middleboxes,
or at higher layers. This approach ...
Which Factors Affect Access Network Performance?
(Georgia Institute of Technology, 2010)
This paper presents an analysis of the performance of residential
access networks using over four months of round-trip, download,
and upload measurements from more than 7,000 users across four
ADSL and cable providers ...
FlowQoS: Per-Flow Quality of Service for Broadband Access Networks
(Georgia Institute of Technology, 2015)
In broadband access networks, one application may compete
for the bandwidth of other applications, thus degrading overall
performance. One solution to this problem is to allocate
bandwidth to competing flows based on ...