A flexible model for resource management in virtual private networks
NG Duffield, P Goyal, A Greenberg, P Mishra… - Proceedings of the …, 1999 - dl.acm.org
As IP technologies providing both tremendous capacity and the ability to establish dynamic
secure associations between endpoints emerge, Virtual Private Networks (VPNs) are going …
secure associations between endpoints emerge, Virtual Private Networks (VPNs) are going …
Towards a next generation data center architecture: scalability and commoditization
A Greenberg, P Lahiri, DA Maltz, P Patel… - Proceedings of the ACM …, 2008 - dl.acm.org
Applications hosted in today's data centers suffer from internal fragmentation of resources,
rigidity, and bandwidth constraints imposed by the architecture of the network connecting the …
rigidity, and bandwidth constraints imposed by the architecture of the network connecting the …
Advanced wireless networks: 4G technologies
S Glisic, JP Makela - 2006 IEEE Ninth International Symposium …, 2006 - ieeexplore.ieee.org
Within the wide range of issues related to 4G wireless networks, due to the scope of the
ISSTA conference, in this presentation we highlight some segments of wireless networks …
ISSTA conference, in this presentation we highlight some segments of wireless networks …
Building programmable wireless networks: an architectural survey
In recent times, there is increasing consensus that the traditional Internet architecture needs
to be evolved for it to sustain unstinted growth and innovation. A major reason for the …
to be evolved for it to sustain unstinted growth and innovation. A major reason for the …
Tesseract: A 4D Network Control Plane.
We present Tesseract, an experimental system that enables the direct control of a computer
network that is under a single administrative domain. Tesseract's design is based on the 4D …
network that is under a single administrative domain. Tesseract's design is based on the 4D …
Resource management with hoses: point-to-cloud services for virtual private networks
NG Duffield, P Goyal, A Greenberg… - IEEE/ACM …, 2002 - ieeexplore.ieee.org
As IP technologies providing both tremendous capacity and the ability to establish dynamic
security associations between endpoints emerge, virtual private networks (VPNs) are going …
security associations between endpoints emerge, virtual private networks (VPNs) are going …
Multi-channel support for virtual private networks in a packet to ATM cell cable system
ME Laubach, SL Helton, A Raissinia… - US Patent …, 2005 - Google Patents
(57) ABSTRACT A two-way cable network offering high-speed broadband communications
delivered via virtual private networks over a multi-channel shared media system. Bi …
delivered via virtual private networks over a multi-channel shared media system. Bi …
Cognitive packet networks
E Gelenbe, Z Xu, E Seref - Proceedings 11th International …, 1999 - ieeexplore.ieee.org
We propose cognitive packet networks (CPN) in which intelligent capabilities for routing and
flow control are concentrated in the packets, rather than in the nodes and protocols …
flow control are concentrated in the packets, rather than in the nodes and protocols …
Blender: Upgrading tenant-based data center networking
KC Webb, A Roy, K Yocum, AC Snoeren - Proceedings of the tenth ACM …, 2014 - dl.acm.org
This paper presents Blender, a framework that enables network operators to improve tenant
performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their …
performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their …