Category Archives: Reviews

Active Network Vision and Reality: Lessons from a Capsule-Based System

D. Wetherall, "Active Network Vision and Reality: Lessons from a Capsule-Based System," 17th Symposium on Operating Systems Principles, (December 1999). [PDF]

Summary

Active networks were a radical concept of allowing untrusted sources to execute codes on network operators' hardware to allow faster and easier deployment of diverse distributed applications. Consequently, it also ran the risk … Continue Reading ››

Resilient Overlay Networks

D. Andersen. H. Balakrishnan, F. Kaashoek, R. Morris, "Resilient Overly Networks," 18th Symposium on Operating Systems Principles, (December 2001). [PDF]

Summary

Routing scalability in BGP comes at the cost of reduced fault-tolerance and slower fault-recovery procedures. BGP hides paths due to policy concerns, damps routing updates to avoid route flapping, and has or uses little … Continue Reading ››

On Inferring Autonomous System Relationships in the Internet

L. Gao, "On Inferring Autonomous System Relationships in the Internet," IEEE/ACM Transactions on Networks, V. 9, N. 6, (Dec. 2001), pp. 733-745. [PDF]

Summary

Business relationships among the ASes in the Internet are kept secret, similar to any other business deals. The only thing available to outsiders are the BGP route announcements that can be … Continue Reading ››

On Power-Law Relationships of the Internet Topology

M. Faloutsos, P. Faloutsos, C. Faloutsos, "On Power-Law Relationships of the Internet Topology," ACM SIGCOMM Conference, (September 1999). [PDF]

Summary

This paper explores the underlying regularities of the Internet structure and uses power laws to capture the properties of the AS-graph. The results presented in this paper are based on three AS-level as-complete-as-possible traces … Continue Reading ››

Interactive WiFi Connectivity For Moving Vehicles

A. Balasubramanian, R. Mahajan, A. Venkataramani, B. N. Levine, J. Zahorjan, "Interactive WiFi Connectivity For Moving Vehicles", ACM SIGCOMM Conference, (August 2008). [PDF]

Summary

Current WiFi handoff methods, where a client remains connected to a single basestation (BS), lead to frequent disruptions in connectivity in highly mobile vehicular networks. This paper proposes ViFi, a protocol … Continue Reading ››

ExOR: Opportunistic Multi-Hop Routing for Wireless Networks

S. Biswas, R. Morris, "ExOR: Opportunistic Multi-Hop Routing for Wireless Networks," ACM SIGCOMM Conference, (August 2005). [PDF]

Summary

ExOR is an integrated routing and MAC technique that opportunistically exploits the broadcast characteristics of the wireless environment. Unlike the traditional routing protocols, where the best sequence of nodes from a source to a destination is decided … Continue Reading ››