Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleApril 2009
Symbiotic relationships in internet routing overlays
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 467–480We propose to construct routing overlay networks using the following principle: that overlay edges should be based on mutual advantage between pairs of hosts. Upon this principle, we design, implement, and evaluate Peer-Wise, a latency-reducing overlay ...
- ArticleApril 2009
Making routers last longer with ViAggre
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 453–466This paper presents ViAggre (Virtual Aggregation), a "configuration-only" approach to shrinking the routing table on routers. ViAggre does not require any changes to router software and routing protocols and can be deployed independently and ...
- ArticleApril 2009
NetReview: detecting when interdomain routing goes wrong
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 437–452Despite many attempts to fix it, the Internet's interdomain routing system remains vulnerable to configuration errors, buggy software, flaky equipment, protocol oscillation, and intentional attacks. Unlike most existing solutions that prevent specific ...
- ArticleApril 2009
Block-switched networks: a new paradigm for wireless transport
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 423–436TCP has well-known problems over multi-hop wireless networks as it conflates congestion and loss, performs poorly over time-varying and lossy links, and is fragile in the presence of route changes and disconnections.
Our contribution is a clean-slate ...
- ArticleApril 2009
Softspeak: making VoIP play well in existing 802.11 deployments
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 409–422Voice over IP (VoIP) in 802.11 wireless networks (WiFi) is an attractive alternative to cellular wireless telephony. Unfortunately, VoIP traffic is well known to make inefficient use of such networks. Indeed, we demonstrate that increasing handset ...
-
- ArticleApril 2009
Skilled in the art of being idle: reducing energy waste in networked systems
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 381–394Networked end-systems such as desktops and set-top boxes are often left powered-on, but idle, leading to wasted energy consumption. An alternative would be for these idle systems to enter low-power sleep modes. Unfortunately, today, a sleeping system ...
- ArticleApril 2009
Somniloquy: augmenting network interfaces to reduce PC energy usage
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 365–380Reducing the energy consumption of PCs is becoming increasingly important with rising energy costs and environmental concerns. Sleep states such as S3 (suspend to RAM) save energy, but are often not appropriate because ongoing networking tasks, such as ...
- ArticleApril 2009
Unraveling the complexity of network management
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 335–348Operator interviews and anecdotal evidence suggest that an operator's ability to manage a network decreases as the network becomes more complex. However, there is currently no way to systematically quantify how complex a network's design is nor how ...
- ArticleApril 2009
BotGraph: large scale spamming botnet detection
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 321–334Network security applications often require analyzing huge volumes of data to identify abnormal patterns or activities. The emergence of cloud-computing models opens up new opportunities to address this challenge by leveraging the power of parallel ...
- ArticleApril 2009
Not-a-Bot: improving service availability in the face of botnet attacks
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 307–320A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying human-generated traffic as ...
- ArticleApril 2009
RPC chains: efficient client-server communication in geodistributed systems
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 277–290We propose the RPC chain, a simple but powerful communication primitive that allows an application to reduce the performance effects of wide-area links on enterprise and data center applications that span multiple sites. This primitive chains together ...
- ArticleApril 2009
Cimbiosys: a platform for content-based partial replication
- Venugopalan Ramasubramanian,
- Thomas L. Rodeheffer,
- Douglas B. Terry,
- Meg Walraed-Sullivan,
- Ted Wobber,
- Catherine C. Marshall,
- Amin Vahdat
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 261–276Increasingly people manage and share information across a wide variety of computing devices from cell phones to Internet services. Selective replication of content is essential because devices, especially portable ones, have limited resources for ...
- ArticleApril 2009
Tolerating latency in replicated state machines through client speculation
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 245–260Replicated state machines are an important and widely-studied methodology for tolerating a wide range of faults. Unfortunately, while replicas should be distributed geographically for maximum fault tolerance, current replicated state machine protocols ...
- ArticleApril 2009
CrystalBall: predicting and preventing inconsistencies in deployed distributed systems
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 229–244We propose a new approach for developing and deploying distributed systems, in which nodes predict distributed consequences of their actions, and use this information to detect and avoid errors. Each node continuously runs a state exploration algorithm ...
- ArticleApril 2009
MODIST: transparent model checking of unmodified distributed systems
- Junfeng Yang,
- Tisheng Chen,
- Ming Wu,
- Zhilei Xu,
- Xuezheng Liu,
- Haoxiang Lin,
- Mao Yang,
- Fan Long,
- Lintao Zhang,
- Lidong Zhou
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 213–228MODIST is the first model checker designed for transparently checking unmodified distributed systems running on unmodified operating systems. It achieves this transparency via a novel architecture: a thin interposition layer exposes all actions in a ...
- ArticleApril 2009
SPLAY: distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze)
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 185–198This paper presents SPLAY, an integrated system that facilitates the design, deployment and testing of large-scale distributed applications. Unlike existing systems, SPLAY covers all aspects of the development and evaluation chain. It allows developers ...
- ArticleApril 2009
Zeno: eventually consistent Byzantine-fault tolerance
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 169–184Many distributed services are hosted at large, shared, geographically diverse data centers, and they use replication to achieve high availability despite the unreachability of an entire data center. Recent events show that non-crash faults occur in ...
- ArticleApril 2009
Making Byzantine fault tolerant systems tolerate Byzantine faults
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 153–168This paper argues for a new approach to building Byzantine fault tolerant replication systems. We observe that although recently developed BFT state machine replication protocols are quite fast, they don't tolerate Byzantine faults very well: a single ...
- ArticleApril 2009
iPlane Nano: path prediction for peer-to-peer applications
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 137–152Many peer-to-peer distributed applications can benefit from accurate predictions of Internet path performance. Existing approaches either 1) achieve high accuracy for sophisticated path properties, but adopt an unscalable centralized approach, or 2) are ...
- ArticleApril 2009
Enabling MAC protocol implementations on software-defined radios
NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementationApril 2009, Pages 91–105Over the past few years a range of new Media Access Control (MAC) protocols have been proposed for wireless networks. This research has been driven by the observation that a single one-size-fits-all MAC protocol cannot meet the needs of diverse wireless ...