[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 27, Issue 4Oct. 1997
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0146-4833
Reflects downloads up to 20 Dec 2024Bibliometrics
Skip Table Of Content Section
article
Free
Small forwarding tables for fast routing lookups

For some time, the networking community has assumed that it is impossible to do IP routing lookups in software fast enough to support gigabit speeds. IP routing lookups must find the routing entry with the longest matching prefix, a task that has been ...

article
Free
A simulation study of IP switching

Recently there has been much interest in combining the speed of layer-2 switching with the features of layer-3 routing. This has been prompted by numerous proposals, including: IP Switching [1], Tag Switching [2], ARIS [3], CSR [4], and IP over ATM [5]. ...

article
Free
Scalable high speed IP routing lookups

Internet address lookup is a challenging problem because of increasing routing table sizes, increased traffic, higher speed links, and the migration to 128 bit IPv6 addresses. IP routing lookup requires computing the best matching prefix, for which ...

article
Free
Solutions to hidden terminal problems in wireless networks

The floor acquisition multiple access (FAMA) discipline is analyzed in networks with hidden terminals. According to FAMA, control of the channel (the floor) is assigned to at most one station in the network at any given time, and this station is ...

article
Free
Trace-based mobile network emulation

Subjecting a mobile computing system to wireless network conditions that are realistic yet reproducible is a challenging problem. In this paper, we describe a technique called trace modulation that re-creates the observed end-to-end characteristics of a ...

article
Free
Fair scheduling in wireless packet networks

Fair scheduling of delay and rate-sensitive packet flows over a wireless channel is not addressed effectively by most contemporary wireline fair scheduling algorithms because of two unique characteristics of wireless media: (a) bursty channel errors, ...

article
Free
Fast restoration of real-time communication service from component failures in multi-hop networks

For many applications it is important to provide communication services with guaranteed timeliness and fault-tolerance at an acceptable level of overhead. In this paper, we present a scheme for restoring real-time channels, each with guaranteed ...

article
Free
Skyscraper broadcasting: a new broadcasting scheme for metropolitan video-on-demand systems

We investigate a novel multicast technique, called Skyscraper Broadcasting (SB), for video-on-demand applications. We discuss the data fragmentation technique, the broadcasting strategy, and the client design. We also show the correctness of our ...

article
Free
Active bridging

Active networks accelerate network evolution by permitting the network infrastructure to be programmable, on a per-user, per-packet, or other basis. This programmability must be balanced against the safety and security needs inherent in shared ...

article
Free
Internet routing instability

This paper examines the network inter-domain routing information exchanged between backbone service providers at the major U.S. public Internet exchange points. Internet routing instability, or the rapid fluctuation of network reachability information, ...

article
Free
Dynamics of random early detection

In this paper we evaluate the effectiveness of Random Early Detection (RED) over traffic types categorized as non-adaptive, fragile and robust, according to their responses to congestion. We point out that RED allows unfair bandwidth sharing when a ...

article
Free
End-to-end Internet packet dynamics

We discuss findings from a large-scale study of Internet packet dynamics conducted by tracing 20,000 TCP bulk transfers between 35 Internet sites. Because we traced each 100 Kbyte transfer at both the sender and the receiver, the measurements allow us ...

article
Free
Network performance effects of HTTP/1.1, CSS1, and PNG

We describe our investigation of the effect of persistent connections, pipelining and link level document compression on our client and server HTTP implementations. A simple test setup is used to verify HTTP/1.1's design and understand HTTP/1.1 ...

article
Free
Automated packet trace analysis of TCP implementations

We describe tcpanaly, a tool for automatically analyzing a TCP implementation's behavior by inspecting packet traces of the TCP's activity. Doing so requires surmounting a number of hurdles, including detecting packet filter measurement errors, coping ...

article
Free
Potential benefits of delta encoding and data compression for HTTP

Caching in the World Wide Web currently follows a naive model, which assumes that resources are referenced many times between changes. The model also provides no way to update a cache entry if a resource does change, except by transferring the resource'...

article
Free
Network text editor (NTE): A scalable shared text editor for the MBone

IP Multicast, Lightweight Sessions and Application Level Framing provide guidelines by which multimedia conferencing tools can be designed, but they do not provide specific solutions. In this paper, we use these design principles to guide the design of ...

article
Free
Consistent overhead byte stuffing

Byte stuffing is a process that transforms a sequence of data bytes that may contain 'illegal' or 'reserved' values into a potentially longer sequence that contains no occurrences of those values. The extra length is referred to in this paper as the ...

article
Free
A flow-based approach to datagram security

Datagram services provide a simple, flexible, robust, and scalable communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwhelming majority of network security protocols that have been ...

article
Free
A framework for robust measurement-based admission control

Measurement-based Admission Control (MBAC) is an attractive mechanism to concurrently offer Quality of Service (QoS) to users, without requiring a-priori traffic specification and on-line policing. However, several aspects of such a system need to be ...

article
Free
A hierarchical fair service curve algorithm for link-sharing, real-time and priority services

In this paper, we study hierarchical resource management models and algorithms that support both link-sharing and guaranteed real-time services with decoupled delay (priority) and bandwidth allocation. We extend the service curve based QoS model, which ...

article
Free
Effective bandwidths for a class of non Markovian fluid sources

This paper proves the existence of and explicitly determines effective bandwidths for a class of non Markovian fluid source models, featuring multiple data-transmission rates and arbitrary distributions for the times these rates are sustained. The ...

article
Free
Iolus: a framework for scalable secure multicasting

As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast ...

article
Free
Parity-based loss recovery for reliable multicast transmission

We investigate how FEC (Forward Error Correction) can be combined with ARQ (Automatic Repeat Request) to achieve scalable reliable multicast transmission. We consider the two scenarios where FEC is introduced as a transparent layer underneath a reliable ...

article
Free
Scheduling of multicast traffic in tunable-receiver WDM networks with non-negligible tuning latencies

We consider the problem of supporting multipoint communication at the media access control (MAC) layer of broadcast-and-select WDM networks. We first show that bandwidth consumption and channel utilization arise as two conflicting objectives in the ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.