Continuous in-network round-trip time monitoring
Round-trip time (RTT) is a central metric that influences end-user QoE and can expose traffic-
interception attacks. Many popular RTT monitoring techniques either send active probes …
interception attacks. Many popular RTT monitoring techniques either send active probes …
Multi-path tcp: a joint congestion control and routing scheme to exploit path diversity in the internet
We consider the problem of congestion-aware multi-path routing in the Internet. Currently,
Internet routing protocols select only a single path between a source and a destination …
Internet routing protocols select only a single path between a source and a destination …
California fault lines: understanding the causes and impact of network failures
Of the major factors affecting end-to-end service availability, network component failure is
perhaps the least well understood. How often do failures occur, how long do they last, what …
perhaps the least well understood. How often do failures occur, how long do they last, what …
[PDF][PDF] Fog computing: Will it be the future of cloud computing?
Cloud computing is the newest computing paradigm that makes computing resources
available over the Internet on a utility costing basis. Cloud computing offers many …
available over the Internet on a utility costing basis. Cloud computing offers many …
Optimizing cost and performance for multihoming
Multihoming is often used by large enterprises and stub ISPs to connect to the Internet. In
this paper, we design a series of novel smart routing algorithms to optimize cost and …
this paper, we design a series of novel smart routing algorithms to optimize cost and …
On the predictability of large transfer TCP throughput
Predicting the throughput of large TCP transfers is important for a broad class of
applications. This paper focuses on the design, empirical evaluation, and analysis of TCP …
applications. This paper focuses on the design, empirical evaluation, and analysis of TCP …
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed
MAC-level behavior of operational wireless networks. Wit uses three processing steps to …
MAC-level behavior of operational wireless networks. Wit uses three processing steps to …
[PDF][PDF] Optimizing Cost and Performance in Online Service Provider Networks.
We present a method to jointly optimize the cost and the performance of delivering traffic
from an online service provider (OSP) network to its users. Our method, called Entact, is …
from an online service provider (OSP) network to its users. Our method, called Entact, is …
Topology aware overlay networks
J Han, D Watson, F Jahanian - Proceedings IEEE 24th Annual …, 2005 - ieeexplore.ieee.org
Recently, overlay networks have emerged as a means to enhance end-to-end application
performance and availability. Overlay networks attempt to leverage the inherent redundancy …
performance and availability. Overlay networks attempt to leverage the inherent redundancy …
Community contribution award--Measuring and mitigating web performance bottlenecks in broadband access networks
We measure Web performance bottlenecks in home broadband access networks and
evaluate ways to mitigate these bottlenecks with caching within home networks. We first …
evaluate ways to mitigate these bottlenecks with caching within home networks. We first …