Search For:

Displaying 1-50 out of 71 total
Future Internet architecture: clean-slate versus evolutionary research
Found in: Communications of the ACM
By Constantine Dovrolis, Jennifer Rexford, Jennifer Rexford
Issue Date:September 2010
pp. 36-40
Should researchers focus on designing new network architectures or improving the current Internet?
     
Joint Server Selection and Routing for Geo-replicated Services
Found in: 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)
By Srinivas Narayana,Wenjie Jiang,Jennifer Rexford,Mung Chiang
Issue Date:December 2013
pp. 423-428
The performance and costs of geo-replicated online services depend on which data centers handle user requests, and which wide-area paths carry traffic. To provide good performance at reasonable cost, service providers adapt the mapping of user requests to ...
 
Scalable Network Virtualization in Software-Defined Networks
Found in: IEEE Internet Computing
By Dmitry Drutskoy,Eric Keller,Jennifer Rexford
Issue Date:March 2013
pp. 20-27
Network virtualization gives each "tenant" in a data center its own network topology and control over its traffic flow. Software-defined networking offers a standard interface between controller applications and switch-forwarding tables, and is t...
 
A formally-verified migration protocol for mobile, multi-homed hosts
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Matvey Arye,Erik Nordstrom,Robert Kiefer,Jennifer Rexford,Michael J. Freedman
Issue Date:October 2012
pp. 1-12
Modern consumer devices, like smartphones and tablets, have multiple interfaces (e.g., WiFi and 4G) that attach to new access points as users move. These mobile, multi-homed computers are a poor match with an Internet architecture that binds connections to...
 
Toward Software-Defined Cellular Networks
Found in: 2012 European Workshop on Software Defined Networking (EWSDN)
By Li Erran Li,Z. Morley Mao,Jennifer Rexford
Issue Date:October 2012
pp. 7-12
Existing cellular networks suffer from inflexible and expensive equipment, complex control-plane protocols, and vendor-specific configuration interfaces. In this position paper, we argue that software defined networking (SDN) can simplify the design and ma...
 
Incrementally-Deployable Security for Interdomain Routing
Found in: Conference For Homeland Security, Cybersecurity Applications & Technology
By Jennifer Rexford, Joan Feigenbaum
Issue Date:March 2009
pp. 130-134
The Internet’s interdomain-routing system is extremely vulnerable to accidental failure, configuration errors, and malicious attack. Any successful approach to improving interdomain-routing security must satisfy two requirements for incremental deployabili...
 
Risking Communications Security: Potential Hazards of the Protect America Act
Found in: IEEE Security and Privacy
By Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, Jennifer Rexford
Issue Date:January 2008
pp. 24-33
A new US law allows warrantless wiretapping whenever one end of the communication is believed to be outside national borders. This creates serious security risks: danger of exploitation of the system by unauthorized users, danger of criminal misuse by trus...
 
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
Found in: Network Protocols, IEEE International Conference on
By Josh Karlin, Stephanie Forrest, Jennifer Rexford
Issue Date:November 2006
pp. 290-299
The Internet's interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, a...
 
Scalable Hardware Priority Queue Architectures for High-Speed Packet Switches
Found in: IEEE Transactions on Computers
By Sung-Whan Moon, Jennifer Rexford, Kang G. Shin
Issue Date:November 2000
pp. 1215-1227
<p><b>Abstract</b>—With effective packet-scheduling mechanisms, modern integrated networks can support the diverse quality-of-service requirements of emerging applications. However, arbitrating between a large number of small packets on a...
 
A Router Architecture for Real-Time Communication in Multicomputer Networks
Found in: IEEE Transactions on Computers
By Jennifer Rexford, John Hall, Kang G. Shin
Issue Date:October 1998
pp. 1088-1101
<p><b>Abstract</b>—Parallel machines have the potential to satisfy the large computational demands of real-time applications. These applications require a predictable communication network, where <it>time-constrained</it> traf...
 
Design and Evaluation of a Window-Consistent Replication Service
Found in: IEEE Transactions on Computers
By Ashish Mehra, Jennifer Rexford, Farnam Jahanian
Issue Date:September 1997
pp. 986-996
<p><b>Abstract</b>—Real-time applications typically operate under strict timing and dependability constraints. Although traditional data replication protocols provide fault tolerance, real-time guarantees require bounded overhead for mana...
 
Scalable Hardware Priority Queue Architectures for High-Speed Packet Switches
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Sung-Whan Moon, Kang G. Shin, Jennifer Rexford
Issue Date:June 1997
pp. 203
In packet-switched networks, queueing of packets at the switches can result when multiple connections share the same physical link. To accommodate a large number of connections, a switch can employ link-scheduling algorithms to prioritize the transmission ...
 
A Scalable Architecture for Fair Leaky-Bucket Shaping
Found in: IEEE Computer and Communications Societies, Annual Joint Conference of the
By Jennifer Rexford, Flavio Bonomi, Albert Greenberg, Albert Wong
Issue Date:April 1997
pp. 1054
This paper presents a shaper architecture that scales to a large number of connections with diverse burstiness and bandwidth parameters. The architecture arbitrates fairly between connections with conforming cells by carefully integrating leaky-bucket traf...
 
A Comparison of Bandwidth Smoothing Techniques for the Transmission of Prerecorded Compressed Video
Found in: IEEE Computer and Communications Societies, Annual Joint Conference of the
By Wu-chi Feng, Jennifer Rexford
Issue Date:April 1997
pp. 58
The transfer of prerecorded, compressed video requires multimedia services to support large fluctuations in band width requirements on multiple time scales. Bandwidth smoothing techniques can reduce the burstiness of a variable-bit-rate stream by prefetchi...
 
PP-MESS-SIM: A Flexible and Extensible Simulator for Evaluating Multicomputer Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jennifer Rexford, Wu-chang Feng, James Dolter, Kang G. Shin
Issue Date:January 1997
pp. 25-40
<p><b>Abstract</b>—This paper presents <b>pp-mess-sim</b>, an object-oriented discrete-event simulation environment for evaluating interconnection networks in message-passing systems. The simulator provides a toolbox of variou...
 
A Router Architecture for Real-Time Point-to-Point Networks
Found in: Computer Architecture, International Symposium on
By John Hall, Kang G. Shin, Jennifer Rexford
Issue Date:May 1996
pp. 237
Parallel machines have the potential to satisfy the large computational demands of emerging real-time applications. These applications require a predictable communication network, where time-constrained traffic requires bounds on latency or throughput whil...
 
The Road to SDN
Found in: Queue
By Ellen Zegura, Jennifer Rexford, Nick Feamster
Issue Date:December 2013
pp. 20-40
An intellectual history of programmable networks
     
A slick control plane for network middleboxes
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By Bilal Anwer, Dave Levin, Jennifer Rexford, Nick Feamster, Theophilus Benson
Issue Date:August 2013
pp. 147-148
We provide a brief overview of the vulnerabilities present in the OpenFlow protocol as it is currently deployed by hardware and software vendors. We identify a widespread failure to adopt TLS for the OpenFlow control channel by both controller and switch v...
     
HotSwap: correct and efficient controller upgrades for software-defined networks
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By Jennifer Rexford, Joshua Reich, Laurent Vanbever, Nate Foster, Theophilus Benson
Issue Date:August 2013
pp. 133-138
Like any complex software, SDN programs must be updated periodically, whether to migrate to a new controller platform, repair bugs, or address performance issues. Nowadays, SDN operators typically perform such upgrades by stopping the old controller and st...
     
Incremental consistent updates
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By David Walker, Jennifer Rexford, Naga Praveen Katta
Issue Date:August 2013
pp. 49-54
A consistent update installs a new packet-forwarding policy across the switches of a software-defined network in place of an old policy. While doing so, such an update guarantees that every packet entering the network either obeys the old policy or the new...
     
The geomorphic view of networking: a network model and its uses
Found in: Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing (MW4NG '12)
By Jennifer Rexford, Pamela Zave
Issue Date:December 2012
pp. 1-6
The Internet is evolving away from its original architecture and toward the use of multiple, customized protocol stacks. A pluralistic architecture is best explained by the "geomorphic view" of networks, in which each layer is a microcosm of networking, an...
     
Abstractions for network update
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Cole Schlesinger, David Walker, Jennifer Rexford, Mark Reitblatt, Nate Foster
Issue Date:August 2012
pp. 323-334
Configuration changes are a common source of instability in networks, leading to outages, performance disruptions, and security vulnerabilities. Even when the initial and final configurations are correct, the update process itself often steps through inter...
     
Policy transformation in software defined networks
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By David Walker, Jennifer Rexford, Joshua Reich, Nanxi Kang
Issue Date:August 2012
pp. 309-310
A Software Defined Network (SDN) enforces network-wide policies by installing packet-handling rules across a distributed collection of switches. Today's SDN platforms force programmers to decide how to decompose a high-level policy into the low-level rules...
     
Programming languages for programmable networks
Found in: Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL '12)
By Jennifer Rexford
Issue Date:January 2012
pp. 226-235
Today's computer networks perform a bewildering array of tasks, from routing and access control, to traffic monitoring and load balancing. To support wireless users accessing services hosted in the cloud, enterprise and data-center networks are under incre...
     
FSR: formal analysis and implementation toolkit for safe inter-domain routing
Found in: Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM (SIGCOMM '11)
By Alexander J.T. Gurney, Anduo Wang, Boon Thau Loo, Jennifer Rexford, Limin Jia, Wenchao Zhou, Yiqing Ren
Issue Date:August 2011
pp. 440-441
We present the demonstration of a comprehensive toolkit for analyzing and implementing routing policies, ranging from high-level guidelines to specific router configurations. Our Formally Safe Routing (FSR) toolkit performs all of these functions from the ...
     
Network architecture for joint failure recovery and traffic engineering
Found in: Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (SIGMETRICS '11)
By Dahai Xu, David Johnson, Jennifer Rexford, Martin Suchara, Robert Doverspike
Issue Date:June 2011
pp. 97-108
Today's networks typically handle traffic engineering (e.g., tuning the routing-protocol parameters to optimize the flow of traffic) and failure recovery (e.g., pre-installed backup paths) independently. In this paper, we propose a unified way to balance l...
     
VL2: technical perspective
Found in: Communications of the ACM
By Jennifer Rexford
Issue Date:March 2011
pp. 94-94
A system for musical accompaniment is presented in which a computer-driven orchestra follows and learns from a soloist in a concerto-like setting. The system is decomposed into three modules: The first computes a real-time score match using a hidden Markov...
     
Frenetic: a high-level language for OpenFlow networks
Found in: Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO '10)
By David Walker, Jennifer Rexford, Matthew L. Meola, Michael J. Freedman, Nate Foster, Rob Harrison
Issue Date:November 2010
pp. 1-6
Most interfaces for programming network devices are defined at the low level of abstraction supported by the underlying hardware, which leads to complicated programs that are prone to errors. This paper proposes a high-level programming language for OpenFl...
     
Greening backbone networks: reducing energy consumption by shutting off cables in bundled links
Found in: Proceedings of the first ACM SIGCOMM workshop on Green networking (Green Networking '10)
By Jennifer Rexford, Martin Suchara, Will Fisher
Issue Date:August 2010
pp. 29-34
In backbone networks, the line cards that drive the links between neighboring routers consume a large amount of energy. Since these networks are typically overprovisioned, selectively shutting down links during periods of low demand seems like a good way t...
     
Scalable flow-based networking with DIFANE
Found in: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10)
By Jennifer Rexford, Jia Wang, Michael J. Freedman, Minlan Yu
Issue Date:August 2010
pp. 112-ff
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for flow-based networking rely too heavily on centralized controller software that ...
     
DONAR: decentralized server selection for cloud services
Found in: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10)
By Jennifer Rexford, Joe Wenjie Jiang, Michael J. Freedman, Patrick Wendell
Issue Date:August 2010
pp. 112-ff
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed system that can offload the burden of replica selection, while providing these ...
     
How secure are secure interdomain routing protocols
Found in: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10)
By Jennifer Rexford, Michael Schapira, Peter Hummon, Sharon Goldberg
Issue Date:August 2010
pp. 112-ff
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which variant should be deployed in the Internet, we quantify the ability of the main p...
     
NoHype: virtualized cloud infrastructure without the virtualization
Found in: Proceedings of the 37th annual international symposium on Computer architecture (ISCA '10)
By Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby B. Lee
Issue Date:June 2010
pp. 72-ff
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization -- so much so that many consider virtualization to be one of the key features rather than simply an im...
     
BUFFALO: bloom filter forwarding architecture for large organizations
Found in: Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09)
By Alex Fabrikant, Jennifer Rexford, Minlan Yu
Issue Date:December 2009
pp. 313-324
In enterprise and data center networks, the scalability of the data plane becomes increasingly challenging as forwarding tables and link speeds grow. Simply building switches with larger amounts of faster memory is not appealing, since high-speed memory is...
     
Virtually eliminating router bugs
Found in: Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09)
By Eric Keller, Jennifer Rexford, Matthew Caesar, Minlan Yu
Issue Date:December 2009
pp. 13-24
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semantics, rendering traditional failure detection and recovery techniques ineffect...
     
Impact of prefix-match changes on IP reachability
Found in: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC '09)
By Aman Shaikh, Jennifer Rexford, Subhabrata Sen, Yaping Zhu
Issue Date:November 2009
pp. 235-241
Although most studies of Internet routing treat each IP address block (or prefix) independently, the relationship between prefixes is important because routers ultimately forward packets based on the "longest-matching prefix." In fact, the most-specific pr...
     
Hash, don't cache: fast packet forwarding for enterprise edge routers
Found in: Proceedings of the 1st ACM workshop on Research on enterprise networking (WREN '09)
By Jennifer Rexford, Minlan Yu
Issue Date:August 2009
pp. 101-104
As forwarding tables and link speeds continue to grow, fast packet forwarding becomes increasingly challenging for enterprise edge routers. Simply building routers with ever larger amounts of ever faster memory is not appealing, since high-speed memory is ...
     
Accountability in hosted virtual networks
Found in: Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures (VISA '09)
By Eric Keller, Jennifer Rexford, Ruby B. Lee
Issue Date:August 2009
pp. 101-104
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks is to create a hosting platform where companies can deploy services by leasi...
     
Cooperative content distribution and traffic engineering in an ISP network
Found in: Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems (SIGMETRICS '09)
By Jennifer Rexford, Mung Chiang, Rui Zhang-Shen, Wenjie Jiang
Issue Date:June 2009
pp. 159-162
Traditionally, Internet Service Providers (ISPs) make profit by providing Internet connectivity, while content providers (CPs) play the more lucrative role of delivering content to users. As network connectivity is increasingly a commodity, ISPs have a str...
     
Neighbor-specific BGP: more flexible routing policies while improving global stability
Found in: Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems (SIGMETRICS '09)
By Jennifer Rexford, Michael Schapira, Yi Wang
Issue Date:June 2009
pp. 159-162
The Border Gateway Protocol (BGP) offers network administrators considerable flexibility in controlling how traffic flows through their networks. However, the interaction between routing policies in different Autonomous Systems (ASes) can lead to protocol ...
     
Trellis: a platform for building flexible, fast virtual networks on commodity hardware
Found in: Proceedings of the 2008 ACM CoNEXT Conference (CONEXT '08)
By Andy Bavier, Jennifer Rexford, Larry Peterson, Murtaza Motiwala, Nick Feamster, Sapan Bhatia, Vytautas Valancius, Wolfgang Muhlbauer, Yogesh Mundada
Issue Date:December 2008
pp. 1-6
We describe Trellis, a platform for hosting virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topology, control protocols, and forwarding tables, while amortizing costs by sharing the physical infrastructu...
     
Cabernet: connectivity architecture for better network services
Found in: Proceedings of the 2008 ACM CoNEXT Conference (CONEXT '08)
By Jennifer Rexford, Rui Zhang-Shen, Sampath Rangarajan, Yaping Zhu
Issue Date:December 2008
pp. 1-6
Deploying and managing wide-area network services is exceptionally challenging. Despite having servers at many locations, a service provider must rely on an underlying best-effort network; a network provider can offer services over its own customized netwo...
     
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
Found in: Proceedings of the 2008 ACM CoNEXT Conference (CONEXT '08)
By Jennifer Rexford, Jing Fu
Issue Date:December 2008
pp. 1-12
Virtual routers are a promising way to provide network services such as customer-specific routing, policy-based routing, multi-topology routing, and network virtulization. However, the need to support a separate forwarding information base (FIB) for each v...
     
DaVinci: dynamically adaptive virtual networks for a customized internet
Found in: Proceedings of the 2008 ACM CoNEXT Conference (CONEXT '08)
By Cheng-Yen Lee, Jennifer Rexford, Jiayue He, Mung Chiang, Rui Zhang-Shen, Ying Li
Issue Date:December 2008
pp. 1-12
Running multiple virtual networks, customized for different performance objectives, is a promising way to support diverse applications over a shared substrate. Despite being simple, a static division of resources between virtual networks can be highly inef...
     
Cooperative content distribution and traffic engineering
Found in: Proceedings of the 3rd international workshop on Economics of networked systems (NetEcon '08)
By Jennifer Rexford, Mung Chiang, Rui Zhang-Shen, Wenjie Jiang
Issue Date:August 2008
pp. 107-112
Traditionally, Internet Service Providers (ISPs) make profit by providing Internet connectivity, while content providers (CPs) play the more lucrative role of delivering content to users. As network connectivity is increasingly a commodity, ISPs have a str...
     
Virtual routers on the move: live router migration as a network-management primitive
Found in: Proceedings of the ACM SIGCOMM 2008 conference on Data communication (SIGCOMM '08)
By Brian Biskeborn, Eric Keller, Jacobus van der Merwe, Jennifer Rexford, Yi Wang
Issue Date:August 2008
pp. 325
The complexity of network management is widely recognized as one of the biggest challenges facing the Internet today. Point solutions for individual problems further increase system complexity while not addressing the underlying causes. In this paper, we a...
     
Floodless in seattle: a scalable ethernet architecture for large enterprises
Found in: Proceedings of the ACM SIGCOMM 2008 conference on Data communication (SIGCOMM '08)
By Changhoon Kim, Jennifer Rexford, Matthew Caesar
Issue Date:August 2008
pp. 325
IP networks today require massive effort to configure and manage. Ethernet is vastly simpler to manage, but does not scale beyond small local area networks. This paper describes an alternative network architecture called SEATTLE that achieves the best of b...
     
Building bug-tolerant routers with virtualization
Found in: Proceedings of the ACM workshop on Programmable routers for extensible services of tomorrow (PRESTO '08)
By Jennifer Rexford, Matthew Caesar
Issue Date:August 2008
pp. 107-112
Implementation bugs are a highly critical problem in wide-area networks. The software running on core routers is subject to vulnerabilities, coding mistakes, and misconfiguration. Unfortunately, these problems are often found after deployment in live netwo...
     
Performance bounds for peer-assisted live streaming
Found in: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '08)
By Jennifer Rexford, Mung Chiang, Rui Zhang-Shen, Shao Liu, Wenjie Jiang
Issue Date:June 2008
pp. 305-305
Peer-assisted streaming is a promising way for service providers to offer high-quality IPTV to consumers at reasonable cost. In peer-assisted streaming, the peers exchange video chunks with one another, and receive additional data from the central server a...
     
Path-quality monitoring in the presence of adversaries
Found in: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '08)
By Boaz Barak, David Xiao, Eran Tromer, Jennifer Rexford, Sharon Goldberg
Issue Date:June 2008
pp. 305-305
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing measurement tools, like ping, traceroute, and trajectory sampling, are vulne...
     
 1  2 Next >>