Results 1 - 10
of
194
Scalable Flow-Based Networking with DIFANE
"... Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for flowbased networking rely too heavily on centralized controller software that installs rules reactively, based on the first ..."
Abstract
-
Cited by 96 (11 self)
- Add to MetaCart
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for flowbased networking rely too heavily on centralized controller software that installs rules reactively, based
Packet Classification using Tuple Space Search
- In Proc. of SIGCOMM
, 1999
"... Routers must perform packet classification at high speeds to efficiently implement functions such as rewalls and QoS routing. Packet classification requires matching each packet against a database of filters (or rules), and forwarding the packet according to the highest priority filter. Existing fil ..."
Abstract
-
Cited by 195 (7 self)
- Add to MetaCart
Routers must perform packet classification at high speeds to efficiently implement functions such as rewalls and QoS routing. Packet classification requires matching each packet against a database of filters (or rules), and forwarding the packet according to the highest priority filter. Existing
Scalable NDN forwarding: Concepts, issues and principles
- in Computer Communications and Networks (ICCCN), 2012 21st International Conference on
, 2012
"... Abstract—Named Data Networking (NDN) is a recently pro-posed general-purpose network architecture that leverages the strengths of Internet architecture while aiming to address its weaknesses. NDN names packets rather than end-hosts, and most of NDN’s characteristics are a consequence of this fact. I ..."
Abstract
-
Cited by 14 (2 self)
- Add to MetaCart
and evaluating a scalable NDN forwarding node architecture is a major effort within the overall NDN research agenda. In this paper, we present the concepts, issues and principles of scalable NDN forwarding plane design. The essential function of NDN forwarding plane is fast name lookup. By studying
Scalable Network Technologies Scalable Network Technologies
"... In this paper, we describe the architecture of a hardware-in-the-loop (HWIL) network simulation based testbed developed by L-3 CSW and illustrate its benefits towards effective and cost efficient design, implementation, and qualification of military wireless networks. The HWIL Network Simulator solv ..."
Abstract
- Add to MetaCart
In this paper, we describe the architecture of a hardware-in-the-loop (HWIL) network simulation based testbed developed by L-3 CSW and illustrate its benefits towards effective and cost efficient design, implementation, and qualification of military wireless networks. The HWIL Network Simulator
Smartbridge: A scalable bridge architecture
- in ACM SIGCOMM
, 2000
"... As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs becomes an issue. Two common solutions to the forwarding problem are IP routing and spanning tree bridging. IP routing scales w ..."
Abstract
-
Cited by 46 (0 self)
- Add to MetaCart
. This paper introduces a new architecture, called SmartBridge, that combines the good features of IP routing and spanning tree bridging. We have implemented the SmartBridge design for 10 Mb/s and 100 Mb/s Ethernet LANs, using standard PC hardware with off-the-shelf network interface cards and running our
Towards Adaptive Networking for Embedded Devices based on Reconfigurable Hardware
- in International Conference on Engineering of Reconfigurable Systems and Algorithms (ERSA’10). Las Vegas
, 2010
"... Abstract—Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing centers or sensor and mobile networks. Stringent requirements with respect to performance, cost, and power con ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
network of dedicated compute nodes. In this paper, we introduce the concept of a reconfigurable system-on-chip infrastructure for implementing adaptive protocol stacks. Our proposed architecture leverages research in the areas of adaptive networks and reconfigurable computing to provide a hardware/software
Cognitive Radio Universal Software Hardware
"... Abstract—The FPGA is an integral component of a software defined radio (SDR), which provides the needed reconfigurability for dynamically adapting its transceiver and data processing functions. The current state of the art in SDR design relies on complete processing of the raw samples at the host co ..."
Abstract
- Add to MetaCart
Abstract—The FPGA is an integral component of a software defined radio (SDR), which provides the needed reconfigurability for dynamically adapting its transceiver and data processing functions. The current state of the art in SDR design relies on complete processing of the raw samples at the host
hardware and mobile web technology Master of Science Thesis in Programme Computer Systems and Networks
, 2013
"... Digitising statistics handling through ..."
Duet: Cloud scale load balancing with hardware and software.
- In SIGCOMM,
, 2014
"... ABSTRACT Load balancing is a foundational function of datacenter infrastructures and is critical to the performance of online services hosted in datacenters. As the demand for cloud services grows, expensive and hard-to-scale dedicated hardware load balancers are being replaced with software load b ..."
Abstract
-
Cited by 9 (2 self)
- Add to MetaCart
ABSTRACT Load balancing is a foundational function of datacenter infrastructures and is critical to the performance of online services hosted in datacenters. As the demand for cloud services grows, expensive and hard-to-scale dedicated hardware load balancers are being replaced with software load
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient?
"... Abstract. Hash functions are widely used in Cryptography, and hardware implementations of hash functions are of interest in a variety of contexts such as speeding up the computations of a network server or providing authentication in small electronic devices such as RFID tags. Provably secure hash f ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract. Hash functions are widely used in Cryptography, and hardware implementations of hash functions are of interest in a variety of contexts such as speeding up the computations of a network server or providing authentication in small electronic devices such as RFID tags. Provably secure hash
Results 1 - 10
of
194