Search For:

Displaying 1-25 out of 25 total
A Study of BGP Path Vector Route Looping Behavior
Found in: Distributed Computing Systems, International Conference on
By Dan Pei, Xiaoliang Zhao, Dan Massey, Lixia Zhang
Issue Date:March 2004
pp. 720-729
Measurements have shown evidences of inter-domain packet forwarding loops in the Internet, but the exact cause of these loops remains unclear. As one of the efforts in identifying the causes, this paper examines how transient loops can be created at the in...
 
Understanding BGP Behavior through a Study of DoD Prefixes
Found in: DARPA Information Survivability Conference and Exposition,
By Xiaoliang Zhao, Dan Massey, S. Felix Wu, Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang
Issue Date:April 2003
pp. 214
BGP is the de-facto inter-domain routing protocol and it is essential to understand how well BGP performs in the Internet. As a step toward this understanding, this paper studies the routing performance of a sample set of prefixes owned by the U.S. Departm...
 
Detection of Invalid Routing Announcement in the Internet
Found in: Dependable Systems and Networks, International Conference on
By Xiaoliang Zhao, Dan Pei, Lan Wang, Dan Massey, Allison Mankin, S. Felix Wu, Lixia Zhang
Issue Date:June 2002
pp. 59
<p>Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS, or MOAS. MOAS can be due to either operational need to support multi...
 
Protecting BGP Routes to Top Level DNS Servers
Found in: Distributed Computing Systems, International Conference on
By Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, S. Felix Wu, Lixia Zhang
Issue Date:May 2003
pp. 322
The Domain Name System (DNS) is an essential part of the Internet infrastructure and provides fundamental services, such as translating host names into IP addresses for Internet communication. The DNS is vulnerable to a number of potential faults and attac...
 
Where the Sidewalk Ends: Extending theInternet AS Graph Using Traceroutesfrom P2P Users
Found in: IEEE Transactions on Computers
By Kai Chen,David R. Choffnes,Rahul Potharaju,Yan Chen,Fabian E. Bustamante, Dan Pei, Yao Zhao
Issue Date:April 2014
pp. 1021-1036
An accurate Internet topology graph is important in many areas of networking, from understanding ISP business relationships to diagnosing network anomalies. Most Internet mapping efforts have derived the network structure, at the level of interconnected au...
 
To Cache or Not to Cache: The 3G Case
Found in: IEEE Internet Computing
By J Erman,A Gerber,M Hajiaghayi, Dan Pei,S Sen,O Spatscheck
Issue Date:March 2011
pp. 27-34
Recent studies have shown that in the wired broadband world, caching of HTTP objects results in substantial savings in network resources. What about cellular networks? This article examines the characteristics of HTTP traffic generated by millions of wirel...
 
TowerDefense: Deployment strategies for battling against IP prefix hijacking
Found in: Network Protocols, IEEE International Conference on
By Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun Xu
Issue Date:October 2010
pp. 134-143
IP prefix hijacking is one of the top security threats targeting today's Internet routing protocol. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none of these approaches is adopted and deployed on a larg...
 
Timer Interaction in Route Flap Damping
Found in: Distributed Computing Systems, International Conference on
By Beichuan Zhang, Dan Pei, Daniel Massey, Lixia Zhang
Issue Date:June 2005
pp. 393-403
Route Flap Damping is a mechanism generally used in network routing protocols. Its goal is to limit the global impact of unstable routes by temporarily suppressing routes with rapid changes over short time periods. Although route damping is a clearly defin...
 
A Study of Packet Delivery Performance during Routing Convergence
Found in: Dependable Systems and Networks, International Conference on
By Dan Pei, Lan Wang, Daniel Massey, S. Felix Wu, Lixia Zhang
Issue Date:June 2003
pp. 183
<p>Internet measurements have shown that network failures happen frequently, and that existing routing protocols can take multiple seconds, or even minutes, to converge after a failure. During these routing convergence periods, some packets may alrea...
 
Design and Implementation of a Low-Overhead File Checkpointing Approach
Found in: High-Performance Computing in the Asia-Pacific Region, International Conference on
By Dan Pei, Dongsheng Wang, Meiming Shen, Weimin Zheng
Issue Date:May 2000
pp. 439
One of checkpointing and recovery technique's important capabilities is file checkpointing, i.e., to save and restore the state of user files of the process. This paper describes the design and implementation of a file check-pointing approach called Modifi...
 
G-RCA: a generic root cause analysis platform for service quality management in large IP networks
Found in: Proceedings of the 6th International COnference (Co-NEXT '10)
By Dan Massey, Dan Pei, He Yan, Jennifer Yates, Lee Breslau, Zihui Ge
Issue Date:November 2010
pp. 1-12
As IP networks have become the mainstay of an increasingly diverse set of applications ranging from Internet games and streaming videos, to e-commerce and online-banking, and even to mission-critical 911, best effort service is no longer acceptable. This r...
     
An analysis of BGP multiple origin AS (MOAS) conflicts
Found in: Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement Workshop (IMW '01)
By Allison Mankin, Dan Massey, Dan Pei, Lan Wang, Lixia Zhang, S. Felix Wu, Xiaoliang Zhao
Issue Date:November 2001
pp. 31-35
This paper presents a detailed study of BGP Multiple Origin AS (MOAS) conflicts observed in the Internet. A MOAS conflict occurs when a particular prefix appears to originate from more than one AS. We analyzed data from archived BGP routing tables over 127...
     
Scalable monitoring via threshold compression in a large operational 3G network
Found in: Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (SIGMETRICS '11)
By Dan Pei, He Yan, Ioannis Pefkianakis, Jennifer Yates, Mario Kosseifi, MohammadTaghi Hajiaghayi, Songwu Lu, Suk-Bok Lee, Zihui Ge
Issue Date:June 2011
pp. 135-136
Threshold-based performance monitoring in large 3G networks is very challenging for two main factors: large network scale and dynamics in both time and spatial domains. There exists a fundamental tradeoff between the size of threshold settings and the alar...
     
What happened in my network: mining network events from router syslogs
Found in: Proceedings of the 10th annual conference on Internet measurement (IMC '10)
By Dan Pei, Jia Wang, Jun Xu, Tongqing Qiu, Zihui Ge
Issue Date:November 2010
pp. 472-484
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network health and for trou- bleshooting network faults and performance anomalies. Ho...
     
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
Found in: Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09)
By Dan Pei, David R. Choffnes, Fabian E. Bustamante, Kai Chen, Rahul Potharaju, Yan Chen, Yao Zhao
Issue Date:December 2009
pp. 217-228
An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping efforts have derived the network structure, at the level of interconnected autonom...
     
Network-aware forward caching
Found in: Proceedings of the 18th international conference on World wide web (WWW '09)
By Alexandre Gerber, Dan Pei, Jeffrey Erman, Mohammad T. Hajiaghayi, Oliver Spatscheck
Issue Date:April 2009
pp. 66-66
This paper proposes and evaluates a Network Aware Forward Caching approach for determining the optimal deployment strategy of forward caches to a network. A key advantage of this approach is that we can reduce the network costs associated with forward cach...
     
Shedding light on the glue logic of the internet routing architecture
Found in: Proceedings of the ACM SIGCOMM 2008 conference on Data communication (SIGCOMM '08)
By Dan Pei, Franck Le, Geoffrey G. Xie, Hui Zhang, Jia Wang
Issue Date:August 2008
pp. 325
Recent studies reveal that the routing structures of operational networks are much more complex than a simple BGP/IGP hierarchy, highlighted by the presence of many distinct instances of routing protocols. However, the glue (how routing protocol instances ...
     
In search of the elusive ground truth: the internet's as-level connectivity structure
Found in: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '08)
By Beichuan Zhang, Dan Pei, Lixia Zhang, Ricardo V. Oliveira, Walter Willinger
Issue Date:June 2008
pp. 305-305
Despite significant efforts to obtain an accurate picture of the Internet's actual connectivity structure at the level of individual autonomous systems (ASes), much has remained unknown in terms of the quality of the inferred AS maps that have been widely ...
     
Scalable VPN routing via relaying
Found in: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '08)
By Alexandre Gerber, Carsten Lund, Changhoon Kim, Dan Pei, Subhabrata Sen
Issue Date:June 2008
pp. 305-305
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the customer sites via a provider network. Unfortunately this direct reachability mod...
     
A light-weight distributed scheme for detecting ip prefix hijacks in real-time
Found in: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '07)
By Changxi Zheng, Dan Pei, Jia Wang, Lusheng Ji, Paul Francis
Issue Date:August 2007
pp. 652-652
As more and more Internet IP prefix hijacking incidents are being reported, the value of hijacking detection services has become evident. Most of the current hijacking detection approaches monitor IP prefixes on the control plane and detect inconsistencies...
     
BGP convergence in virtual private networks
Found in: Proceedings of the 6th ACM SIGCOMM on Internet measurement (IMC '06)
By Dan Pei, Jacobus Van der Merwe
Issue Date:October 2006
pp. 283-288
Multi-protocol label switching (MPLS) virtual private networks (VPNs) have had significant and growing commercial deployments. In this paper we present the first systematic study of BGP convergence in MPLS VPNs using data collected from a large tier-1 ISP....
     
Quantifying path exploration in the internet
Found in: Proceedings of the 6th ACM SIGCOMM on Internet measurement (IMC '06)
By Beichuan Zhang, Dan Pei, Lixia Zhang, Rafit Izhak-Ratzin, Ricardo Oliveira
Issue Date:October 2006
pp. 269-282
A number of previous measurement studies [10, 12, 17] have shown the existence of path exploration and slow convergence in the global Internet routing system, and a number of protocol enhancements have been proposed to remedy the problem [21, 15, 4, 20, 5]...
     
A study on the routing convergence of Latin American networks
Found in: Proceedings of the 2003 IFIP/ACM Latin America conference on Towards a Latin American agenda for network research (LANC '03)
By Dan Pei, Daniel Massey, Lixia Zhang, Xiaoliang Zhao
Issue Date:October 2003
pp. 35-43
BGP is known to suffer from slow routing convergence after network connectivity changes. In this paper we identify the impact of network connectivity on the routing convergence delay and discuss its implication for networks in the Latin American region. BG...
     
Observation and analysis of BGP behavior under stress
Found in: Proceedings of the second ACM SIGCOMM Workshop on Internet measurment workshop (IMW '02)
By Allison Mankin, Dan Pei, Daniel Massey, Lan Wang, Lixia Zhang, Randy Bush, S. Felix Wu, Xiaoliang Zhao
Issue Date:November 2002
pp. 183-195
Despite BGP's critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGP's behavior...
     
Automatic Extraction and Matching of Control Points for Distortion Correction in Star-Background Image
Found in: Image and Graphics, International Conference on
By Zun-yan Liu, Dan-pei Zhao, Zhi-guo Jiang, Jun-li Yang
Issue Date:August 2007
pp. 764-768
Usually a typical geometry distortion will occur when images are captured because of inaccuracy of axis distance of lens in the optical camera lens. The problem is also obvious in star-background images, which necessitate distortion correction for subseque...
 
 1