Princeton University

Displaying 1-40 of 141 results

  • White Papers // Dec 2014

    CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication

    "Recent revelations about government surveillance have significantly increased the demand for end-to-end secure communications. However, key management remains a major barrier to adoption. Current systems are often either vulnerable to a malicious or coerced key directory or they make unrealistic assumptions about user behavior, for example, that users will verify...

    Provided By Princeton University

  • White Papers // Mar 2013

    Shining the Floodlights on Mobile Web Tracking - A Privacy Survey

    The authors present the first published large-scale study of mobile web tracking. They compare tracking across five physical and emulated mobile devices with one desktop device as a benchmark. Their crawler is based on FourthParty; however, their architecture avoids clearing state which has the benefit of continual observation of (and...

    Provided By Princeton University

  • White Papers // Mar 2012

    Serval: An End-Host Stack for Service-Centric Networking

    Internet services run on multiple servers in different locations, serving clients that are often mobile and multi-homed. This does not match well with today's network stack, designed for communication between fixed hosts with topology-dependent addresses. As a result, online service providers resort to clumsy and management intensive work-arounds - forfeiting...

    Provided By Princeton University

  • White Papers // Mar 2012

    An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?

    Recent incidents of cyber-security violations have revealed the importance of having firewalls and other intrusion detection systems to monitor traffic entering and leaving access networks. But the adoption of such security measures is often stymied by 'Free-riding' effects and 'Shortsightedness' among Internet Service Providers (ISPs). In this paper, the authors...

    Provided By Princeton University

  • White Papers // Feb 2012

    Network Formation Games Among Relay Stations in Next Generation Wireless Networks

    The introduction of Relay Station (RS) nodes is a key feature in next generation wireless networks such as 3GPP's Long Term Evolution Advanced (LTE-Advanced), or the forthcoming IEEE 802.16j WiMAX standard. This paper presents, using game theory, a novel approach for the formation of the tree architecture that connects the...

    Provided By Princeton University

  • White Papers // Jan 2012

    ILC: A Foundation for Automated Reasoning About Pointer Programs

    This paper shows how to use Girard's intuitionistic linear logic extended with a classical sublogic to reason about pointer programs. More specifically, first, the paper defines the proof theory for ILC (Intuitionistic Linear logic with Constraints) and shows it is well-defined via a proof of cut elimination. Second, inspired by...

    Provided By Princeton University

  • White Papers // Jan 2012

    A Distributed Sorting Framework for Ad Hoc Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are distributed, self-organizing, pervasive systems, which perform collaborative computations to provide useful information about the underlying stochastic phenomenon. In this paper, the authors explore the ranking and sorting problems in distributed sensor networks which provide perspectives in understanding certain fundamental issues in WSN, as well as...

    Provided By Princeton University

  • White Papers // Jan 2012

    Commensal Cuckoo: Secure Group Partitioning for Large-Scale Services

    The authors present commensal cuckoo, a secure group partitioning scheme for large-scale systems that maintains the correctness of many small groups, despite a Byzantine adversary that controls a constant (global) fraction of all nodes. In particular, the adversary is allowed to repeatedly rejoin faulty nodes to the system in an...

    Provided By Princeton University

  • White Papers // Dec 2011

    Multi-Resource Allocation: Fairness-Efficiency Tradeoffs in a Unifying Framework

    Quantifying the notion of fairness is under-explored when users request different ratios of multiple distinct resource types. A typical example is datacenters processing jobs with heterogeneous resource requirements on CPU, memory, etc. A generalization of max-min fairness to multiple resources was recently proposed in, but may suffer from significant loss...

    Provided By Princeton University

  • White Papers // Dec 2011

    Language Abstractions for Software-Defined Networks

    For the past 30 years, networks have been built the same way: out of special-purpose devices running distributed algorithms that provide functionality such as topology discovery, routing, traffic monitoring, and access control. Recent years, however, have seen growing interest in a new kind of network architecture in which a logically-centralized...

    Provided By Princeton University

  • White Papers // Nov 2011

    LearnPADS++ Incremental Inference of Ad Hoc Data Formats

    An ad hoc data source is any semi-structured, non-standard data source. The format of such data sources is often evolving and frequently lacking documentation. Consequently, off-the-shelf tools for processing such data often do not exist, forcing analysts to develop their own tools, a costly and time-consuming process. In this paper,...

    Provided By Princeton University

  • White Papers // Oct 2011

    Pricing by Timing: Innovating Broadband Data Plans

    Wireless Internet data usage is doubling every year. Users are consuming more of high-bandwidth data applications, with usage concentrated on several peak hours in a day. The authors review many of the pricing schemes in practice today and analyze why they do not solve this problem of growing data traffic....

    Provided By Princeton University

  • White Papers // Aug 2011

    The Diversity-Multiplexing-Delay Tradeoff in MIMO Multihop Networks With ARQ

    The authors study the tradeoff between reliability, data rate, and delay for half-duplex MIMO multi-hop networks that utilize the Automatic-Retransmission-reQuest (ARQ) protocol both in the asymptotic high Signal-to-Noise Ratio (SNR) regime and in the finite SNR regime. They propose novel ARQ protocol designs that optimize these tradeoffs. In particular, they...

    Provided By Princeton University

  • White Papers // Aug 2011

    Toward a Lightweight Model of BGP Safety

    For the past ten years, researchers have used the Stable Paths Problem (SPP) to analyze the stability properties of the Border Gateway Protocol (BGP). Analysis of SPP has revealed several combinations of topologies and routing configurations (or gadgets) where BGP cannot converge to a unique stable solution. Researchers typically analyze...

    Provided By Princeton University

  • White Papers // Aug 2011

    Fair Greening of Broadband Access: Spectrum Management for Energy-Efficient DSL Networks

    Dynamic Spectrum Management (DSM) is recognized as a promising technology to reduce power consumption in DSL access networks. However, the correct formulation of power-aware DSM problem statements requires a proper understanding of greening, i.e., reducing power consumption. In this paper, the authors therefore investigate greening and show that it can...

    Provided By Princeton University

  • White Papers // Aug 2011

    Commensal Cuckoo: Secure Group Partitioning for LargeScale Services

    The authors present commensal cuckoo, a secure group partitioning scheme for large-scale systems that maintains the correctness of many small groups, despite a Byzantine adversary that controls a constant (global) fraction of all nodes. In particular, the adversary is allowed to repeatedly rejoin faulty nodes to the system in an...

    Provided By Princeton University

  • White Papers // Aug 2011

    ARIADNE: Agnostic Reconfiguration in a Disconnected Network Environment

    Extreme transistor technology scaling is causing increasing concerns in device reliability: the expected lifetime of individual transistors in complex chips is quickly decreasing, and the problem is expected to worsen at future technology nodes. With complex designs increasingly relying on Networks-on-Chip (NoCs) for on-chip data transfers, a NoC must continue...

    Provided By Princeton University

  • White Papers // Jul 2011

    Hiding Amongst the Clouds: A Proposal for Cloud-Based Onion Routing

    Internet censorship and surveillance have made anonymity tools increasingly critical for free and open Internet access. Tor, and its associated ecosystem of volunteer traffic relays, provides one of the most secure and widely-available means for achieving Internet anonymity today. Unfortunately, Tor has limitations, including poor performance, inadequate capacity, and a...

    Provided By Princeton University

  • White Papers // Jun 2011

    Coercing Clients Into Facilitating Failover for Object Delivery

    Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its host-to-host abstraction. Given that these services are replicated for scalability, this unnecessarily exposes failures of individual servers to their clients. While changes to both client and server applications can be used to mask such...

    Provided By Princeton University

  • White Papers // May 2011

    Levels of Awareness: Design Considerations for Web Crawlers and Censorware Detection

    Search engines are tremendous force-multipliers for end-hosts trying to discover content on the Web. As the amount of content online grows, so does dependence on web crawlers to discover content. The desire for adversaries to censor search engines from detecting content on the Internet has scaled accordingly. Web crawlers, programs...

    Provided By Princeton University

  • White Papers // Apr 2011

    Identifying Performance Bottlenecks in CDNs Through TCP-Level Monitoring

    Content Distribution Networks (CDNs) need to make decisions, such as server selection and routing, to improve performance for their clients. The performance may be limited by various factors such as packet loss in the network, a small receive buffer at the client, or constrained server CPU and disk resources. Conventional...

    Provided By Princeton University

  • White Papers // Apr 2011

    A List-Machine Benchmark for Mechanized Metatheory

    The authors propose a benchmark to compare theorem-proving systems on their ability to express proofs of compiler correctness. In contrast to the first POPL-mark, they emphasize the connection of proofs to compiler implementations, and they point out that much can be done without binders or alpha-conversion. They propose specific criteria...

    Provided By Princeton University

  • White Papers // Apr 2011

    Modular Protections Against Non-Control Data Attacks

    This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by declaring critical data types and ascribing these critical types to important data structures. YARRA guarantees that such critical data is only written through pointers with the...

    Provided By Princeton University

  • White Papers // Mar 2011

    Frenetic: A Network Programming Language

    Modern networks provide a variety of interrelated services including routing, traffic monitoring, load balancing, and access control. Unfortunately, the languages used to program today's networks lack modern features they are usually defined at the low level of abstraction supplied by the underlying hardware and they fail to provide even rudimentary...

    Provided By Princeton University

  • White Papers // Mar 2011

    Time-Dependent Broadband Pricing: Feasibility and Benefits

    Charging different prices for Internet access at different times induces users to spread out their bandwidth consumption across times of the day. Potential impact on ISP revenue, congestion management, and consumer behavior can be significant, yet some fundamental questions remain: is it feasible to operate time dependent pricing and how...

    Provided By Princeton University

  • White Papers // Mar 2011

    Profiling Network Performance for Multi-Tier Data Center Applications

    Network performance problems are notoriously tricky to diagnose, and this is magnified when applications are often split into multiple tiers of application components spread across thousands of servers in a data center. Problems often arise in the communication between the tiers, where either the application or the network (or both!)...

    Provided By Princeton University

  • White Papers // Mar 2011

    SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy

    The authors introduce SSDAlloc, a hybrid main memory management system that allows developers to treat Solid-State Disk (SSD) as an extension of the RAM in a system. SSDAlloc moves the SSD upward in the memory hierarchy, usable as a larger, slower form of RAM instead of just a cache for...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Macroeconomic Model With A Financial Sector

    This paper studies the full equilibrium dynamics of an economy with financial frictions. Due to highly non-linear amplification effects, the economy is prone to instability and occasionally enters volatile episodes. Risk is endogenous and asset price correlations are high in down turns. In an environment of low exogenous risk experts...

    Provided By Princeton University

  • White Papers // Feb 2011

    Investing In Schooling In Chile: The Role Of Information About Financial Aid For Higher Education

    Recent economic research shows that imperfect information about Mincer returns to education (in developing countries) or about financial aid (in the US) may undermine investments in schooling and exacerbate inequalities in access to education. The authors extend this literature by presenting the results of an experiment that provided children and...

    Provided By Princeton University

  • White Papers // Feb 2011

    Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security

    With a cryptographic root-of-trust for Internet routing (RPKI) on the horizon, the authors can finally start planning the deployment of one of the secure interdomain routing protocols proposed over a decade ago (Secure BGP, secure origin BGP). However, if experience with IPv6 is any indicator, this will be no easy...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Survey of Virtual LAN Usage in Campus Networks

    VLANs are widely used in today's enterprise networks to improve Ethernet scalability and support network policies. However, manuals and textbooks offer very little information about how VLANs are actually used in practice. Through discussions with network administrators and analysis of configuration data, the authors describe how three university campuses and...

    Provided By Princeton University

  • White Papers // Jan 2011

    A Service Access Layer, at Your Service

    Historically, Internet services provided clients with access to the resources of a particular host. However, today's services are no longer defined by a single host or confined to a fixed location. Yet, the network architecture continues to impose an unfortunate coupling between hosts and services by binding connections to topology-dependent...

    Provided By Princeton University

  • White Papers // Jan 2011

    Is There Learning By Exporting: Evidence From The Automobile Industry In China

    Do exporters learn from their exporting experience? While this question seems to have been proven in theory, it nevertheless needs to be tested empirically. In this paper, the author uses an approach, suggested by De Loecker, which corrects for econometric and consistency problems, to estimate productivity. Using data from the...

    Provided By Princeton University

  • White Papers // Jan 2011

    BGP Safety With Spurious Updates

    The authors explore BGP safety, the question of whether a BGP system converges to a stable routing, in light of several BGP implementation features that have not been fully included in the previous theoretical analyses. They show that Route Flap Damping, MRAI timers, and other intra-router features can cause a...

    Provided By Princeton University

  • White Papers // Jan 2011

    There's Something About MRAI: Timing Diversity May Exponentially Worsen BGP Convergence

    To better support interactive applications, individual network operators are decreasing the timers that affect BGP convergence, leading to greater diversity in the timer settings across the Internet. While decreasing timers is intended to improve routing convergence, the authors show that, ironically, the resulting timer heterogeneity can make routing convergence substantially...

    Provided By Princeton University

  • White Papers // Jan 2011

    Job Search And Job Finding In A Period Of Mass Unemployment: Evidence From High-Frequency Longitudinal Data

    Several findings in this paper shed light on job search behavior in a depressed job market. Some findings are consistent with the Mortensen (1977) sequential job search model and others are inconsistent with it. In contrast to the prediction of sequential, stationary job search model, the authors find that the...

    Provided By Princeton University

  • White Papers // Jan 2011

    Routing as a Service

    In Internet routing, there is a fundamental tussle between the end users who want control over the end-to-end paths and the Autonomous Systems (ASes) who want control over the flow of traffic through their infrastructure. To resolve this tussle and offer flexible routing control across multiple routing domains, the authors...

    Provided By Princeton University

  • White Papers // Jan 2011

    PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

    Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. The authors observe that wide-area services, such as peer-to-peer systems and content distribution networks, exhibit large traffic volumes, spread over large numbers of geographically-dispersed endpoints. This makes them ideal candidates for observing wide-area network behavior....

    Provided By Princeton University

  • White Papers // Jan 2011

    Connection Conditioning: Architecture-Independent Support for Simple, Robust Servers

    For many network server applications, extracting the maximum performance or scalability from the hardware may no longer be much of a concern, given today's pricing a $300 system can easily handle 100 Mbps of Web server traffic, which would cost nearly $30,000 per month in most areas. Freed from worrying...

    Provided By Princeton University

  • White Papers // Jan 2011

    CoMon: A Mostly-Scalable Monitoring System for PlanetLab

    CoMon is an evolving, mostly-scalable monitoring system for PlanetLab that has the goal of presenting environment tailored information for both the administrators and users of the PlanetLab global testbed. In addition to passively reporting metrics provided by the operating system, CoMon also actively gathers a number of metrics useful for...

    Provided By Princeton University

  • White Papers // Jan 2011

    PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

    Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. The authors observe that wide-area services, such as peer-to-peer systems and content distribution networks, exhibit large traffic volumes, spread over large numbers of geographically-dispersed endpoints. This makes them ideal candidates for observing wide-area network behavior....

    Provided By Princeton University

  • White Papers // Dec 2009

    Minimum Energy Per Bit for Wideband Wireless Multicasting: Performance of Decode-and-Forward

    The authors study the minimum energy per bit required for communicating a message to all the destination nodes in a wireless network. The physical layer is modeled as an additive white Gaussian noise channel affected by circularly symmetric fading. The fading coefficients are known at neither transmitters nor receivers. This...

    Provided By Princeton University

  • White Papers // Mar 2010

    Making Cloud Intermediate Data Fault-Tolerant

    Parallel dataflow programs generate enormous amounts of distributed data that are short-lived, yet are critical for completion of the job and for good run-time performance. The authors call this class of data as intermediate data. This paper is the first to address intermediate data as a first-class citizen, specifically targeting...

    Provided By Princeton University

  • White Papers // Sep 2010

    Estimating Risk Preferences: Evidence From Online Sports Gambling

    The authors examine individual decision-making under risk using a unique panel dataset of consumer betting activity in an online sportsbook. This econometric model accounts for individual heterogeneity in risk preferences both between and within rational and behavioral theories of choice under risk. Besides being able to estimate individual-level utility parameters...

    Provided By Princeton University

  • White Papers // Nov 2010

    Career Services: At Princeton University

    Job satisfaction is closely linked to having an interest in the tasks you perform. This includes the things you enjoy doing and the mental and physical activities that you find stimulating. Doing something that you are passionate about can make it easier to become successful at what you do. To...

    Provided By Princeton University

  • White Papers // Sep 2010

    Financial Regulation In A System Context

    The global financial crisis raises questions about the proper objectives of financial regulation and how best to meet them. Traditionally, capital requirements have been the cornerstone of bank regulation. However, the run on the investment bank Bear Stearns in March 2008 led to its demise even though Bear Stearns met...

    Provided By Princeton University

  • White Papers // Apr 2010

    The "Platform as a Service" Model for Networking

    Decoupling infrastructure management from service management can lead to innovation, new business models, and a reduction in the complexity of running services. It is happening in the world of computing, and is poised to happen in networking. While many have considered this in the context of network virtualization, they all...

    Provided By Princeton University

  • White Papers // Oct 2010

    SPORC: Group Collaboration Using Untrusted Cloud Resources

    Cloud-based services are an attractive deployment model for user-facing applications like word processing and calendaring. Unlike desktop applications, cloud services allow multiple users to edit shared state concurrently and in real-time, while being scalable, highly available, and globally accessible. Unfortunately, these benefits come at the cost of fully trusting cloud...

    Provided By Princeton University

  • White Papers // Oct 2009

    Goal-Setting, Social Comparison, And Self-Control

    This paper addresses the role of self-set, non-binding goals as a source of internal motivation to attenuate the self-control problem of a hyperbolic discounter. Agents have linear reference-dependent preferences and endogenously set a goal that serves as the reference point. They face an infinite horizon, optimal stopping problem in continuous...

    Provided By Princeton University

  • White Papers // Jan 2010

    The Exporters Behaviors: Evidence From The Automobile Industry In China

    In this paper, the author presents some evidence about the Chinese exporters in the automobile industry. In particular, the author finds that productivity is linked positively with exports, although this relationship is not significant in some sectors, as well as when we control for the state and foreign capital. More...

    Provided By Princeton University

  • White Papers // Jan 2010

    DFS: A File System for Virtualized Flash Storage

    This paper presents the design, implementation and evaluation of Direct File System (DFS) for virtualized flash storage. Instead of using traditional layers of abstraction, the layers of abstraction are designed for directly accessing flash memory devices. DFS has two main novel features. First, it lays out its files directly in...

    Provided By Princeton University

  • White Papers // Feb 2009

    NetReview: Detecting When Interdomain Routing Goes Wrong

    Despite many attempts to fix it, the Internet's interdomain routing system remains vulnerable to configuration errors, buggy software, flaky equipment, protocol oscillation, and intentional attacks. Unlike most existing solutions that prevent specific routing problems, the approach is to detect problems automatically and to identify the offending party. Fault detection is...

    Provided By Princeton University

  • White Papers // Jan 2011

    Connection Conditioning: Architecture-Independent Support for Simple, Robust Servers

    For many network server applications, extracting the maximum performance or scalability from the hardware may no longer be much of a concern, given today's pricing a $300 system can easily handle 100 Mbps of Web server traffic, which would cost nearly $30,000 per month in most areas. Freed from worrying...

    Provided By Princeton University

  • White Papers // Jan 2011

    CoMon: A Mostly-Scalable Monitoring System for PlanetLab

    CoMon is an evolving, mostly-scalable monitoring system for PlanetLab that has the goal of presenting environment tailored information for both the administrators and users of the PlanetLab global testbed. In addition to passively reporting metrics provided by the operating system, CoMon also actively gathers a number of metrics useful for...

    Provided By Princeton University

  • White Papers // Jun 2010

    Markups And Exporting Behavior

    Estimating markups has a long tradition in industrial organization and international trade. Economists and policy makers are interested in measuring the effect of various competition and trade policies on market power, typically measured by markups. The empirical methods that were developed in empirical industrial organization often rely on the availability...

    Provided By Princeton University

  • White Papers // Jan 2011

    Is There Learning By Exporting: Evidence From The Automobile Industry In China

    Do exporters learn from their exporting experience? While this question seems to have been proven in theory, it nevertheless needs to be tested empirically. In this paper, the author uses an approach, suggested by De Loecker, which corrects for econometric and consistency problems, to estimate productivity. Using data from the...

    Provided By Princeton University

  • White Papers // Jan 2010

    A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths

    Recent work on Internet measurement and overlay networks has shown that redundant paths are common between pairs of hosts and that one can often achieve better end-to-end performance by adaptively choosing an alternate path. In this paper, the authors propose an end-to-end transport layer protocol, mTCP, which can aggregate the...

    Provided By Princeton University

  • White Papers // Aug 2010

    Multi-product Firms And Exchange Rate Fluctuations

    The paper studies the effect of exchange rate shocks on the pricing decisions of multi-product firms. The authors construct a model to illustrate how firms adjust their prices, as well as quantities and product scope, in the event of an exchange rate depreciation. Firms' markups depend on their productivity levels...

    Provided By Princeton University

  • White Papers // Jan 2011

    Routing as a Service

    In Internet routing, there is a fundamental tussle between the end users who want control over the end-to-end paths and the Autonomous Systems (ASes) who want control over the flow of traffic through their infrastructure. To resolve this tussle and offer flexible routing control across multiple routing domains, the authors...

    Provided By Princeton University

  • White Papers // May 2010

    Dynamic Spectrum Management for Fast and Fair Green DSL

    Dynamic Spectrum Management (DSM) has been recognized as a key technology for tackling multi-user crosstalk interference in DSL broadband access networks. The major objective of DSM so far has mainly been to maximize the user data rates. Recently, however, the reduction of power consumption has become an important, additional design...

    Provided By Princeton University

  • White Papers // Apr 2010

    Seamless BGP Migration With Router Grafting

    Network operators are under tremendous pressure to make their networks highly reliable to avoid service disruptions. Yet, operators often need to change the network to upgrade faulty equipment, deploy new services, and install new routers. Unfortunately, changes cause disruptions, forcing a trade-off between the benefit of the change and the...

    Provided By Princeton University

  • White Papers // Dec 2010

    OpenFlow-Based Server Load Balancing Gone Wild

    Today's data centers host online services on multiple servers, with a front-end load balancer directing each client request to a particular replica. Dedicated load balancers are expensive and quickly become a single point of failure and congestion. The OpenFlow standard enables an alternative approach where the commodity network switches divide...

    Provided By Princeton University

  • White Papers // Dec 2010

    Online Measurement of Large Traffic Aggregates on Commodity Switches

    Traffic measurement plays an important role in many network-management tasks, such as anomaly detection and traffic engineering. However, existing solutions either rely on custom hardware designed for a specific measurement task, or introduce substantial overhead for data collection and analysis. Instead, the authors argue that a practical traffic-measurement solution should...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Survey of Virtual LAN Usage in Campus Networks

    VLANs are widely used in today's enterprise networks to improve Ethernet scalability and support network policies. However, manuals and textbooks offer very little information about how VLANs are actually used in practice. Through discussions with network administrators and analysis of configuration data, the authors describe how three university campuses and...

    Provided By Princeton University

  • White Papers // Jan 2011

    Solving Nonconvex Power Control Problems in Wireless Networks: Low SIR Regime and Distributed Algorithms

    In wireless cellular networks that are interference-limited, a variety of power control problems can be formulated as nonlinear optimization with a system-wide objective, e.g., maximizing total system throughput under many QoS constraints from individual users. Previous work have been done in the high SIR regime by turning these problems with...

    Provided By Princeton University

  • White Papers // Feb 2011

    Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security

    With a cryptographic root-of-trust for Internet routing (RPKI) on the horizon, the authors can finally start planning the deployment of one of the secure interdomain routing protocols proposed over a decade ago (Secure BGP, secure origin BGP). However, if experience with IPv6 is any indicator, this will be no easy...

    Provided By Princeton University

  • White Papers // Jan 2011

    A Blueprint for Introducing Disruptive Technology Into the Internet

    This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay - based testbed. Unlike conventional network testbeds, however, the authors advocate an approach that supports both researchers that...

    Provided By Princeton University

  • White Papers // Apr 2010

    Minimizing Streaming Delay in Homogeneous Peer-to-Peer Networks

    Two questions on the theory of content distribution capacity are addressed in this paper: What is the worst user delay performance bound in a chunk-based P2P streaming systems under peer fan-out degree constraint? Can we achieve both the minimum delay and the maximum streaming rate simultaneously? In the homogeneous user...

    Provided By Princeton University

  • White Papers // May 2010

    1Mbps P2P Streaming: A Global Measurement Study

    High definition video is defining a new age of Peer-To-Peer (P2P) video streaming over the public Internet. Simultaneously achieving a resolution-scale upgrade, e.g., providing 1Mbps streaming to a commercial scale of customers, presents new challenges. In contrast to previous measurement studies that crawl commercial applications like a black box, the...

    Provided By Princeton University

  • White Papers // Apr 2010

    Proxy-P2P Streaming Under the Microscope: Fine-Grain Measurement of a Configurable Platform

    Although Peer-To-Peer (P2P) streaming can efficiently deliver live video content to large user populations, existing applications often suffer from limited video quality, periodic hiccups, and high delays. To overcome some of the limitations of today's unstructured (mesh-based) designs, the authors have developed and deployed Fast-Mesh-SIM, a novel P2P streaming system...

    Provided By Princeton University

  • White Papers // Jan 2011

    Route Optimization in IP Networks

    The performance and reliability of the Internet depend, in large part, on the operation of the underlying routing protocols. Today's IP routing protocols compute paths based on the network topology and configuration parameters, without regard to the current traffic load on the routers and links. The responsibility for adapting the...

    Provided By Princeton University

  • White Papers // Aug 2009

    Simple Failure Resilient Load Balancing

    To enable reliable data delivery and balance load in the presence of failures, the authors propose a new mechanism that combines path protection and traffic engineering. The key benefit of the solution is its simplicity, allowing for fast recovery while imposing minimal requirements on the routers. To provide resilience against...

    Provided By Princeton University

  • White Papers // Aug 2010

    Practical Network-Wide Compression of IP Routing Tables

    The memory Internet routers use to store paths to destinations is expensive, and must be continually upgraded in the face of steadily increasing routing table size. Unfortunately, routing protocols are not designed to gracefully handle cases where memory becomes full, which arises increasingly often due to misconfigurations and routing table...

    Provided By Princeton University

  • White Papers // May 2010

    Wide-Area Route Control for Distributed Services

    Many distributed services would benefit from control over the flow of traffic to and from their users, to offer better performance and higher reliability at a reasonable cost. Unfortunately, although today's cloud-computing platforms offer elastic computing and bandwidth resources, they do not give services control over wide-area routing. This paper...

    Provided By Princeton University

  • White Papers // Apr 2010

    Dynamic Route Computation Considered Harmful

    This paper advocates a different approach to reduce routing convergence - side-stepping the problem by avoiding it in the first place! Rather than recomputing paths after temporary topology changes, the authors argue for a separation of timescale between offline computation of multiple diverse paths and online spreading of load over...

    Provided By Princeton University

  • White Papers // Jun 2010

    Greening Backbone Networks: Reducing Energy Consumption by Shutting Off Cables in Bundled Links

    In backbone networks, the line cards that drive the links between neighboring routers consume a large amount of energy. Since these networks are typically overprovisioned, selectively shutting down links during periods of low demand seems like a good way to reduce energy consumption. However, removing entire links from the topology...

    Provided By Princeton University

  • White Papers // Jun 2010

    Collaborative, Privacy-Preserving Data Aggregation at Scale

    Combining and analyzing data collected at multiple administrative locations is critical for a wide variety of applications, such as detecting malicious attacks or computing an accurate estimate of the popularity of Web sites. However, legitimate concerns about privacy often inhibit participation in collaborative data aggregation. In this paper, the authors...

    Provided By Princeton University

  • White Papers // Mar 2011

    Profiling Network Performance for Multi-Tier Data Center Applications

    Network performance problems are notoriously tricky to diagnose, and this is magnified when applications are often split into multiple tiers of application components spread across thousands of servers in a data center. Problems often arise in the communication between the tiers, where either the application or the network (or both!)...

    Provided By Princeton University

  • White Papers // Jan 2011

    BGP Safety With Spurious Updates

    The authors explore BGP safety, the question of whether a BGP system converges to a stable routing, in light of several BGP implementation features that have not been fully included in the previous theoretical analyses. They show that Route Flap Damping, MRAI timers, and other intra-router features can cause a...

    Provided By Princeton University

  • White Papers // Nov 2010

    To Change Traffic Engineering, Change the Traffic Matrix

    Traditional traffic engineering adapts the routing of traffic within the network to maximize performance. The authors propose a new approach to traffic engineering that also adaptively changes where traffic enters and leaves the network. To change the traffic matrix, they leverage recent innovations in virtual-machine migration (in data-center networks) and...

    Provided By Princeton University