Results 1 - 10
of
1,174
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
, and instant messaging. Clients choose a path through the network and build a circuit, in which each node (or "onion router" or "OR") in the path knows its predecessor and successor, but no other nodes in the circuit. Traffic flows down the circuit in fixed-size cells, which are unwrapped
Benchmarking Basic OSPF Single Router Control Plane Convergence
, 2005
"... This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2005). This document provides suggestions for measuring OSPF single router control plane conve ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2005). This document provides suggestions for measuring OSPF single router control plane
Sizing Router Buffers
, 2004
"... All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100 % of the time; which is equivalen ..."
Abstract
-
Cited by 352 (17 self)
- Add to MetaCart
control algorithms. In this paper we argue that the rule-of-thumb (B = RT T ×C) is now outdated and incorrect for backbone routers. This is because of the large number of flows (TCP connections) multiplexed together on a single backbone link. Using theory, simulation and experiments on a network of real
Congestion control of a single router with an active queue management
- International Journal on Advances in Internet Technology
"... Several works have shown the link between congestion control in communication networks and feedback control system. This paper is an extended version of [1] and pro-poses the design of an Active Queue Management (AQM) that ensures the congestion control stability. To this end, tools from control the ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
theory, and especially in a time delay systems framework, are considered. We aim at stabilizing the Transmission Control Protocol (TCP) as well as the queue length of the congested router. Furthermore, the control mechanism is then completed to deal with the stability issue under some non
Multicast Routing in Datagram Internetworks and Extended LANs
- ACM Transactions on Computer Systems
, 1990
"... Multicasting, the transmission of a packet to a group of hosts, is an important service for improving the efficiency and robustness of distributed systems and applications. Although multicast capability is available and widely used in local area networks, when those LANs are interconnected by store- ..."
Abstract
-
Cited by 1074 (5 self)
- Add to MetaCart
-and-forward routers, the multicast service is usually not offered across the resulting internetwork. To address this limitation, we specify extensions to two common internetwork routing algorithms-distance-vector routing and link-state routing-to support low-delay datagram multicasting beyond a single LAN. We also
SplitStream: High-Bandwidth Multicast in Cooperative Environments
- SOSP '03
, 2003
"... In tree-based multicast systems, a relatively small number of interior nodes carry the load of forwarding multicast messages. This works well when the interior nodes are highly available, d d cated infrastructure routers but it poses a problem for application-level multicast in peer-to-peer systems. ..."
Abstract
-
Cited by 578 (17 self)
- Add to MetaCart
In tree-based multicast systems, a relatively small number of interior nodes carry the load of forwarding multicast messages. This works well when the interior nodes are highly available, d d cated infrastructure routers but it poses a problem for application-level multicast in peer-to-peer systems
Analysis of a tandem network model of a single-router Network-on-Chip
, 2006
"... We study a single-router Network-on-Chip modelled as a tandem queueing network. The rst node is a geoK=D=1 queue (K xed) representing a network interface, and the second node is a:=G=1 queue representing the packet switch. If K> 1 we have train arrivals at the second node. If K = 1 the arrival pr ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
We study a single-router Network-on-Chip modelled as a tandem queueing network. The rst node is a geoK=D=1 queue (K xed) representing a network interface, and the second node is a:=G=1 queue representing the packet switch. If K> 1 we have train arrivals at the second node. If K = 1 the arrival
The iSLIP Scheduling Algorithm for Input-Queued Switches
, 1999
"... An increasing number of high performance internetworking protocol routers, LAN and asynchronous transfer mode (ATM) switches use a switched backplane based on a crossbar switch. Most often, these systems use input queues to hold packets waiting to traverse the switching fabric. It is well known th ..."
Abstract
-
Cited by 425 (8 self)
- Add to MetaCart
An increasing number of high performance internetworking protocol routers, LAN and asynchronous transfer mode (ATM) switches use a switched backplane based on a crossbar switch. Most often, these systems use input queues to hold packets waiting to traverse the switching fabric. It is well known
Analyzing Peer-to-Peer Traffic Across Large Networks
- IEEE/ACM Transactions on Networking
, 2002
"... Abstract—The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software. In this paper, we analyze P2P traffic by measuring flowlevel information collected at multiple border routers across a large ISP network, and report our investi ..."
Abstract
-
Cited by 383 (3 self)
- Add to MetaCart
Abstract—The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software. In this paper, we analyze P2P traffic by measuring flowlevel information collected at multiple border routers across a large ISP network, and report our
Controlling high bandwidth aggregates in the network
- ACM Computer Communication Review
, 2002
"... The current Internet infrastructure has very few built-in protection mechanisms, and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated the Internet’s vulnerability to both denial of service (DoS) attacks and flash crowds in which one or more links in the ..."
Abstract
-
Cited by 317 (10 self)
- Add to MetaCart
and controlling such high bandwidth aggregates. Our design involves both a local mechanism for detecting and controlling an aggregate at a single router, and a cooperative pushback mechanism in which a router can ask upstream routers to control an aggregate. The presentation in this paper is a first step towards
Results 1 - 10
of
1,174