Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/347059acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
SIGCOMM '00: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
ACM2000 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGCOMM00: ACM SIGCOMM 2000 Stockholm Sweden 28 August 2000- 1 September 2000
ISBN:
978-1-58113-223-6
Published:
28 August 2000
Sponsors:

Reflects downloads up to 16 Oct 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Free
A framework for scalable global IP-anycast (GIA)

This paper proposes GIA, a scalable architecture for global IP-anycast. Existing designs for providing IP-anycast must either globally distribute routes to individual anycast groups, or confine each anycast group to a pre-configured topological region. ...

Article
Free
pgmcc: a TCP-friendly single-rate multicast congestion control scheme

We present a single rate multicast congestion control scheme (pgmcc) which is TCP-friendly and achieves scalability, stability and fast response to variations in network conditions. pgmcc is suitable for both non-reliable and reliable data transfers; it ...

Article
Free
Fault isolation in multicast trees

Fault isolation has received little attention in the Internet research literature. We take a step towards addressing this deficiency, exploring robust and scalable techniques by which multicast receivers can (in some cases, approximately) locate the on-...

Article
Free
Equation-based congestion control for unicast applications

This paper proposes a mechanism for equation-based congestion control for unicast traffic. Most best-effort traffic in the current Internet is well-served by the dominant transport protocol, TCP. However, traffic such as best-effort unicast streaming ...

Article
Free
Endpoint admission control: architectural issues and performance

The traditional approach to implementing admission control, as exemplified by the Integrated Services proposal in the IETF, uses a signalling protocol to establish reservations at all routers along the path. While providing excellent quality-of-service, ...

Article
Free
Decoupling QoS control from core routers: a novel bandwidth broker architecture for scalable support of guaranteed services

For scalable support of guaranteed services that decouples the QoS control plane from the packet forwarding plane. More specifically, under this architecture, core routers do not maintain any QoS reservation states, whether per-flow or aggregate. ...

Article
Free
A protocol-independent technique for eliminating redundant network traffic

We present a technique for identifying repetitive information transfers and use it to analyze the redundancy of network traffic. Our insight is that dynamic content, streaming media and other traffic that is not caught by today's Web caches is ...

Article
Free
On network-aware clustering of Web clients

Being able to identify the groups of clients that are responsible for a significant portion of a Web site's requests can be helpful to both the Web site and the clients. In a Web application, it is beneficial to move content closer to groups of clients ...

Article
Free
The content and access dynamics of a busy Web site: findings and implications

In this paper, we study the dynamics of the MSNBC news site, one of the busiest Web sites in the Internet today. Unlike many other efforts that have analyzed client accesses as seen by proxies, we focus on the server end. We analyze the dynamics of both ...

Article
Free
Critical path analysis of TCP transactions

Improving the performance of data transfers in the Internet (such as Web transfers) requires a detailed understanding of when and how delays are introduced. Unfortunately, the complexity of data transfers like those using HTTP is great enough that ...

Article
Free
Tuning RED for Web traffic

We study the effects of RED on the performance of Web browsing with a novel aspect of our work being the use of a user-centric measure of performance - response time for HTTP request-response pairs. We empirically evaluate RED across a range of ...

Article
Free
Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED

In this paper we use jump process driven Stochastic Differential Equations to model the interactions of a set of TCP flows and Active Queue Management routers in a network setting. We show how the SDEs can be transformed into a set of Ordinary ...

Article
Free
Routing stability in congested networks: experimentation and analysis

Loss of the routing protocol messages due to network congestion can cause peering session failures in routers, leading to route flaps and routing instabilities. We study the effects of traffic overload on routing protocols by quantifying the stability ...

Article
Free
Delayed Internet routing convergence

This paper examines the latency in Internet path failure, failover and repair due to the convergence properties of inter-domain routing. Unlike switches in the public telephony network which exhibit failover on the order of milliseconds, our ...

Article
Free
FIRE: flexible Intra-AS routing environment

Current routing protocols are monolithic, specifying the algorithm used to construct forwarding tables, the metric used by the algorithm (generally some form of hop-count), and the protocol used to distribute these metrics as an integrated package. The ...

Article
Free
SmartBridge: a scalable bridge architecture

As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs becomes an issue. Two common solutions to the forwarding problem are IP routing ...

Article
Free
TCP is max-plus linear and what it tells us on its throughput

We give a representation of the packet-level dynamical behavior of the Reno and Tahoe variants of TCP over a single end-to-end connection. This representation allows one to consider the case when the connection involves a network made of several, ...

Article
Free
A stochastic model of TCP/IP with stationary random losses

We present a technique for identifying repetitive information transfers and use it to analyze the redundancy of network traffic. Our insight is that dynamic content, streaming media and other traffic that is not caught by today's Web caches is ...

Article
Free
On the propagation of long-range dependence in the Internet

This paper analyzes how TCP congestion control can propagate self-similarity between distant areas of the Internet. This property of TCP is due to its congestion control algorithm, which adapts to self-similar fluctuations on several timescales. The ...

Article
Free
Deriving traffic demands for operational IP networks: methodology and experience

Engineering a large IP backbone network without an accurate, network-wide view of the traffic demands is challenging. Shifts in user behavior, changes in routing policies, and failures of network elements can result in significant (and sudden) ...

Article
Free
Trajectory sampling for direct traffic observation

Traffic measurement is a critical component for the control and engineering of communication networks. We argue that traffic measurement should make it possible to obtain the spatial flow of traffic through the domain, i.e., the paths followed by ...

Article
Free
Measuring link bandwidths using a deterministic model of packet delay

We describe a deterministic model of packet delay and use it to derive both the packet pair [2] property of FIFO-queueing networks and a new technique packet tailgating) for actively measuring link bandwidths. Compared to previously known techniques, ...

Article
Free
Practical network support for IP traceback

This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing ...

Article
Free
When the CRC and TCP checksum disagree

Traces of Internet packets from the past two years show that between 1 packet in 1,100 and 1 packet in 32,000 fails the TCP checksum, even on links where link-level CRCs should catch all but 1 in 4 billion errors. For certain situations, the rate of ...

Article
Free
Packet types: abstract specification of network protocol messages

In writing networking code, one is often faced with the task of interpreting a raw buffer according to a standardized packet format. This is needed, for example, when monitoring network traffic for specific kinds of packets, or when unmarshaling an ...

Article
Free
Memory-efficient state lookups with fast updates

Routers must do a best matching prefix lookup for every packet; solutions for Gigabit speeds are well known. As Internet link speeds higher, we seek a scalable solution whose speed scales with memory speeds while allowing large prefix databases. In this ...

Contributors
  • Colorado State University

Recommendations

Acceptance Rates

SIGCOMM '00 Paper Acceptance Rate 26 of 238 submissions, 11%;
Overall Acceptance Rate 462 of 3,389 submissions, 14%
YearSubmittedAcceptedRate
SIGCOMM '162313917%
SIGCOMM '152424017%
SIGCOMM '142424519%
SIGCOMM '132463815%
SIGCOMM '112233214%
SIGCOMM '033193411%
SIGCOMM '02300258%
SIGCOMM '01252239%
SIGCOMM '002382611%
SIGCOMM '991902413%
SIGCOMM '982472611%
SIGCOMM '972132411%
SIGCOMM '961622717%
SIGCOMM '951433021%
SIGCOMM '941412921%
Overall3,38946214%