Skip to main content

Showing 1–40 of 40 results for author: Rexford, J

.
  1. arXiv:2402.11155  [pdf, other

    cs.NI

    Automated Optimization of Parameterized Data-Plane Programs with Parasol

    Authors: Mary Hogan, Devon Loehr, John Sonchack, Shir Landau Feibish, Jennifer Rexford, David Walker

    Abstract: Programmable data planes allow for sophisticated applications that give operators the power to customize the functionality of their networks. Deploying these applications, however, often requires tedious and burdensome optimization of their layout and design, in which programmers must manually write, compile, and test an implementation, adjust the design, and repeat. In this paper we present Paras… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  2. arXiv:2311.02636  [pdf, other

    cs.NI

    Compact Data Structures for Network Telemetry

    Authors: Shir Landau Feibish, Zaoxing Liu, Jennifer Rexford

    Abstract: Collecting and analyzing of network traffic data (network telemetry) plays a critical role in managing modern networks. Network administrators analyze their traffic to troubleshoot performance and reliability problems, and to detect and block cyberattacks. However, conventional traffic-measurement techniques offer limited visibility into network conditions and rely on offline analysis. Fortunately… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  3. arXiv:2302.08000  [pdf, other

    cs.CR

    How Effective is Multiple-Vantage-Point Domain Control Validation?

    Authors: Grace Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal

    Abstract: Multiple-vantage-point domain control validation (multiVA) is an emerging defense for mitigating BGP hijacking attacks against certificate authorities. While the adoption of multiVA is on the rise, little work has quantified its effectiveness against BGP hijacks in the wild. We bridge the gap by presenting the first analysis framework that measures the security of a multiVA deployment under real-w… ▽ More

    Submitted 17 February, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: 17 pages, 7 figures

  4. arXiv:2301.00058  [pdf, other

    cs.NI

    Detecting TCP Packet Reordering in the Data Plane

    Authors: Yufei Zheng, Huacheng Yu, Jennifer Rexford

    Abstract: Network administrators want to detect TCP-level packet reordering to diagnose performance problems and attacks. However, reordering is expensive to measure, because each packet must be processed relative to the TCP sequence number of its predecessor in the same flow. Due to the volume of traffic, detection should take place in the data plane as the packets fly by. However, restrictions on the memo… ▽ More

    Submitted 19 February, 2023; v1 submitted 30 December, 2022; originally announced January 2023.

    Comments: 17 pages body, 20 pages total

  5. arXiv:2209.10001  [pdf, other

    cs.NI

    Building Flexible, Low-Cost Wireless Access Networks With Magma

    Authors: Shaddi Hasan, Amar Padmanabhan, Bruce Davie, Jennifer Rexford, Ulas Kozat, Hunter Gatewood, Shruti Sanadhya, Nick Yurchenko, Tariq Al-Khasib, Oriol Batalla, Marie Bremner, Andrei Lee, Evgeniy Makeev, Scott Moeller, Alex Rodriguez, Pravin Shelar, Karthik Subraveti, Sudarshan Kandi, Alejandro Xoconostle, Praveen Kumar Ramakrishnan, Xiaochen Tian, Anoop Tomar

    Abstract: Billions of people remain without Internet access due to availability or affordability of service. In this paper, we present Magma, an open and flexible system for building low-cost wireless access networks. Magma aims to connect users where operator economics are difficult due to issues such as low population density or income levels, while preserving features expected in cellular networks such a… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: 15 pages, 10 figures, to be published in the 20th USENIX Symposium on Networked Systems Design and Implementation (2023), source code available at https://github.com/magma/magma

  6. arXiv:2201.07328  [pdf, other

    cs.NI cs.SI physics.data-an physics.soc-ph

    Cutting Through the Noise to Infer Autonomous System Topology

    Authors: Kirtus G. Leyba, Joshua J. Daymude, Jean-Gabriel Young, M. E. J. Newman, Jennifer Rexford, Stephanie Forrest

    Abstract: The Border Gateway Protocol (BGP) is a distributed protocol that manages interdomain routing without requiring a centralized record of which autonomous systems (ASes) connect to which others. Many methods have been devised to infer the AS topology from publicly available BGP data, but none provide a general way to handle the fact that the data are notoriously incomplete and subject to error. This… ▽ More

    Submitted 18 January, 2022; originally announced January 2022.

    Comments: 10 pages, 8 figures, 1 table. To appear at IEEE INFOCOM 2022. © IEEE 2022

    Journal ref: Proceedings of the IEEE Conference on Computer Communications (INFOCOM 2022), pp. 1609-1618

  7. arXiv:2111.02268  [pdf

    cs.CR cs.NI

    Data-Plane Security Applications in Adversarial Settings

    Authors: Liang Wang, Prateek Mittal, Jennifer Rexford

    Abstract: High-speed programmable switches have emerged as a promising building block for develo** performant data-plane applications. In this paper, we argue that the resource constraints and programming model in hardware switches has led to developers adopting problematic design patterns, whose security implications are not widely understood. We bridge the gap by identifying the major challenges and com… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: Under submission

  8. arXiv:2107.10344  [pdf

    cs.CY q-bio.PE

    Challenges in cybersecurity: Lessons from biological defense systems

    Authors: Edward Schrom, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. de Boer, Adam Doupé, Roya Ensafi, Stuart Feldman, Bryan T. Grenfell. Alex Halderman, Silvie Huijben, Carlo Maley, Melanie Mosesr, Alan S. Perelson, Charles Perrings, Joshua Plotkin, Jennifer Rexford, Mohit Tiwari

    Abstract: We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying the evolution of natural defenses can inform the design of more effective cybersecurity systems. More generally, security challenges are crucial for… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 20 pages

    MSC Class: A.0

  9. Lucid: A Language for Control in the Data Plane

    Authors: John Sonchack, Devon Loehr, Jennifer Rexford, David Walker

    Abstract: Programmable switch hardware makes it possible to move fine-grained control logic inside the network data plane, improving performance for a wide range of applications. However, applications with integrated control are inherently hard to write in existing data-plane programming languages such as P4. This paper presents Lucid, a language that raises the level of abstraction for putting control func… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: 12 pages plus 5 pages references/appendix. 17 figures. To appear in SIGCOMM 2021

    ACM Class: C.2.1

  10. arXiv:2009.12861  [pdf, other

    cs.NI

    The Remaining Improbable: Toward Verifiable Network Services

    Authors: Pamela Zave, Jennifer Rexford, John Sonchack

    Abstract: The trustworthiness of modern networked services is too important to leave to chance. We need to design these services with specific properties in mind, and verify that the properties hold. In this paper, we argue that a compositional network architecture, based on a notion of layering where each layer is its own complete network customized for a specific purpose, is the only plausible approach to… ▽ More

    Submitted 27 September, 2020; originally announced September 2020.

    Comments: 6 pages with 4 figures, plus references. This paper has been reviewed extensively as a conference submission. Although some reviewers have found it cryptic due to its length (small) and scope (large), we are satisfied that it contains no factual errors. We welcome your questions!

  11. arXiv:2006.13086  [pdf, other

    cs.NI cs.CR

    Classifying Network Vendors at Internet Scale

    Authors: Jordan Holland, Ross Teixeira, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan Mayer

    Abstract: In this paper, we develop a method to create a large, labeled dataset of visible network device vendors across the Internet by map** network-visible IP addresses to device vendors. We use Internet-wide scanning, banner grabs of network-visible devices across the IPv4 address space, and clustering techniques to assign labels to more than 160,000 devices. We subsequently probe these devices and us… ▽ More

    Submitted 24 June, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: 11 Pages, 2 figures, 7 tables

  12. arXiv:2006.10188  [pdf

    cs.CY cs.DB cs.NI

    Wide-Area Data Analytics

    Authors: Rachit Agarwal, Jen Rexford, with contributions from numerous workshop attendees

    Abstract: We increasingly live in a data-driven world, with diverse kinds of data distributed across many locations. In some cases, the datasets are collected from multiple locations, such as sensors (e.g., mobile phones and street cameras) spread throughout a geographic region. The data may need to be analyzed close to where they are produced, particularly when the applications require low latency, high, l… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: A Computing Community Consortium (CCC) workshop report, 16 pages

    Report number: ccc2020report_2

  13. arXiv:2006.00097  [pdf

    cs.NI cs.CR

    Programmable In-Network Obfuscation of Traffic

    Authors: Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford

    Abstract: Recent advances in programmable switch hardware offer a fresh opportunity to protect user privacy. This paper presents PINOT, a lightweight in-network anonymity solution that runs at line rate within the memory and processing constraints of hardware switches. PINOT encrypts a client's IPv4 address with an efficient encryption scheme to hide the address from downstream ASes and the destination serv… ▽ More

    Submitted 29 May, 2020; originally announced June 2020.

  14. arXiv:2004.09063  [pdf, other

    cs.NI cs.CR

    Securing Internet Applications from Routing Attacks

    Authors: Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal

    Abstract: Attacks on Internet routing are typically viewed through the lens of availability and confidentiality, assuming an adversary that either discards traffic or performs eavesdrop**. Yet, a strategic adversary can use routing attacks to compromise the security of critical Internet applications like Tor, certificate authorities, and the bitcoin network. In this paper, we survey such application-speci… ▽ More

    Submitted 11 August, 2020; v1 submitted 20 April, 2020; originally announced April 2020.

  15. arXiv:1912.13371  [pdf, other

    cs.NI

    Patterns and Interactions in Network Security

    Authors: Pamela Zave, Jennifer Rexford

    Abstract: Networks play a central role in cyber-security: networks deliver security attacks, suffer from them, defend against them, and sometimes even cause them. This article is a concise tutorial on the large subject of networks and security, written for all those interested in networking, whether their specialty is security or not. To achieve this goal, we derive our focus and organization from two persp… ▽ More

    Submitted 6 June, 2020; v1 submitted 31 December, 2019; originally announced December 2019.

    Comments: 63 pages, 28 figures, 56 references

  16. arXiv:1911.06951  [pdf, other

    cs.DS cs.NI

    Memory-Efficient Performance Monitoring on Programmable Switches with Lean Algorithms

    Authors: Zaoxing Liu, Samson Zhou, Ori Rottenstreich, Vladimir Braverman, Jennifer Rexford

    Abstract: Network performance problems are notoriously difficult to diagnose. Prior profiling systems collect performance statistics by kee** information about each network flow, but maintaining per-flow state is not scalable on resource-constrained NIC and switch hardware. Instead, we propose sketch-based performance monitoring using memory that is sublinear in the number of flows. Existing sketches esti… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

    Comments: To appear at APoCS 2020

  17. arXiv:1904.06574  [pdf, other

    cs.NI

    Robust Network Design for Software-Defined IP/Optical Backbones

    Authors: Jennifer Gossels, Gagan Choudhury, Jennifer Rexford

    Abstract: Recently, Internet service providers (ISPs) have gained increased flexibility in how they configure their in-ground optical fiber into an IP network. This greater control has been made possible by (i) the maturation of software defined networking (SDN), and (ii) improvements in optical switching technology. Whereas traditionally, at network design time, each IP link was assigned a fixed optical pa… ▽ More

    Submitted 13 April, 2019; originally announced April 2019.

  18. arXiv:1903.10375  [pdf

    cs.CY

    Evolving Academia/Industry Relations in Computing Research

    Authors: Greg Morrisett, Shwetak Patel, Jennifer Rexford, Benjamin Zorn

    Abstract: In 2015, the CCC co-sponsored an industry round table that produced the document "The Future of Computing Research: Industry-Academic Collaborations". Since then, several important trends in computing research have emerged, and this document considers how those trends impact the interaction between academia and industry in computing fields. We reach the following conclusions: - In certain computin… ▽ More

    Submitted 8 October, 2019; v1 submitted 25 March, 2019; originally announced March 2019.

    Comments: A Computing Community Consortium (CCC) white paper, 12 pages

    Report number: ccc2019whitepaper_1

  19. arXiv:1902.00849  [pdf, other

    cs.NI

    Contra: A Programmable System for Performance-aware Routing

    Authors: Kuo-Feng Hsu, Ryan Beckett, Ang Chen, Jennifer Rexford, Praveen Tammana, David Walker

    Abstract: We present Contra, a system for performance-aware routing that can adapt to traffic changes at hardware speeds. While existing work has developed point solutions for performance-aware routing on a fixed topology (e.g., a Fattree) with a fixed routing policy (e.g., use least utilized paths), Contra can be configured to operate seamlessly over any network topology and a wide variety of sophisticated… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

  20. arXiv:1802.09815  [pdf, other

    cs.NI

    Elmo: Source-Routed Multicast for Cloud Services

    Authors: Muhammad Shahbaz, Lalith Suresh, Jen Rexford, Nick Feamster, Ori Rottenstreich, Mukesh Hira

    Abstract: We present Elmo, a system that addresses the multicast scalability problem in multi-tenant data centers. Modern cloud applications frequently exhibit one-to-many communication patterns and, at the same time, require sub-millisecond latencies and high throughput. IP multicast can achieve these requirements but has control- and data-plane scalability limitations that make it challenging to offer it… ▽ More

    Submitted 31 May, 2018; v1 submitted 27 February, 2018; originally announced February 2018.

    Comments: 16 pages

  21. arXiv:1802.09118  [pdf, other

    cs.DS cs.NI

    Multi-Commodity Flow with In-Network Processing

    Authors: Moses Charikar, Yonatan Naamad, Jennifer Rexford, X. Kelvin Zou

    Abstract: Modern networks run "middleboxes" that offer services ranging from network address translation and server load balancing to firewalls, encryption, and compression. In an industry trend known as Network Functions Virtualization (NFV), these middleboxes run as virtual machines on any commodity server, and the switches steer traffic through the relevant chain of services. Network administrators must… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.

  22. arXiv:1711.01478  [pdf, other

    cs.NI

    OCDN: Oblivious Content Distribution Networks

    Authors: Anne Edmundson, Paul Schmitt, Nick Feamster, Jennifer Rexford

    Abstract: As publishers increasingly use Content Distribution Networks (CDNs) to distribute content across geographically diverse networks, CDNs themselves are becoming unwitting targets of requests for both access to user data and content takedown. From copyright infringement to moderation of online speech, CDNs have found themselves at the forefront of many recent legal quandaries. At the heart of the ten… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

  23. arXiv:1710.11583  [pdf, other

    cs.NI

    Why (and How) Networks Should Run Themselves

    Authors: Nick Feamster, Jennifer Rexford

    Abstract: The proliferation of networked devices, systems, and applications that we depend on every day makes managing networks more important than ever. The increasing security, availability, and performance demands of these applications suggest that these increasingly difficult network management problems be solved in real time, across a complex web of interacting protocols and systems. Alas, just as the… ▽ More

    Submitted 31 October, 2017; originally announced October 2017.

  24. arXiv:1707.00599  [pdf

    cs.CY

    Advanced Cyberinfrastructure for Science, Engineering, and Public Policy

    Authors: Vasant G. Honavar, Katherine Yelick, Klara Nahrstedt, Holly Rushmeier, Jennifer Rexford, Mark D. Hill, Elizabeth Bradley, Elizabeth Mynatt

    Abstract: Progress in many domains increasingly benefits from our ability to view the systems through a computational lens, i.e., using computational abstractions of the domains; and our ability to acquire, share, integrate, and analyze disparate types of data. These advances would not be possible without the advanced data and computational cyberinfrastructure and tools for data capture, integration, analys… ▽ More

    Submitted 30 June, 2017; originally announced July 2017.

    Comments: A Computing Community Consortium (CCC) white paper, 9 pages. arXiv admin note: text overlap with arXiv:1604.02006

  25. arXiv:1706.07363  [pdf

    cs.CY

    Smart Wireless Communication is the Cornerstone of Smart Infrastructures

    Authors: Mary Ann Weitnauer, Jennifer Rexford, Nicholas Laneman, Matthieu Bloch, Santiago Griljava, Catherine Ross, Gee-Kung Chang

    Abstract: Emerging smart infrastructures, such as Smart City, Smart Grid, Smart Health, and Smart Transportation, need smart wireless connectivity. However, the requirements of these smart infrastructures cannot be met with today's wireless networks. A new wireless infrastructure is needed to meet unprecedented needs in terms of agility, reliability, security, scalability, and partnerships. We are at the… ▽ More

    Submitted 22 June, 2017; originally announced June 2017.

    Comments: A Computing Community Consortium (CCC) white paper, 5 pages

  26. arXiv:1705.01920  [pdf

    cs.CY

    A National Research Agenda for Intelligent Infrastructure

    Authors: Elizabeth Mynatt, Jennifer Clark, Greg Hager, Dan Lopresti, Greg Morrisett, Klara Nahrstedt, George Pappas, Shwetak Patel, Jennifer Rexford, Helen Wright, Ben Zorn

    Abstract: Our infrastructure touches the day-to-day life of each of our fellow citizens, and its capabilities, integrity and sustainability are crucial to the overall competitiveness and prosperity of our country. Unfortunately, the current state of U.S. infrastructure is not good: the American Society of Civil Engineers' latest report on America's infrastructure ranked it at a D+ -- in need of $3.9 trillio… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.

    Comments: A Computing Community Consortium (CCC) white paper, 7 pages

  27. arXiv:1705.01049  [pdf, other

    cs.NI

    Sonata: Query-Driven Network Telemetry

    Authors: Arpit Gupta, Rob Harrison, Ankita Pawar, Rüdiger Birkner, Marco Canini, Nick Feamster, Jennifer Rexford, Walter Willinger

    Abstract: Operating networks depends on collecting and analyzing measurement data. Current technologies do not make it easy to do so, typically because they separate data collection (e.g., packet capture or flow monitoring) from analysis, producing either too much data to answer a general question or too little data to answer a detailed question. In this paper, we present Sonata, a network telemetry system… ▽ More

    Submitted 2 May, 2017; originally announced May 2017.

  28. Heavy-Hitter Detection Entirely in the Data Plane

    Authors: Vibhaalakshmi Sivaraman, Srinivas Narayana, Ori Rottenstreich, S. Muthukrishnan, Jennifer Rexford

    Abstract: Identifying the "heavy hitter" flows or flows with large traffic volumes in the data plane is important for several applications e.g., flow-size aware routing, DoS detection, and traffic engineering. However, measurement in the data plane is constrained by the need for line-rate processing (at 10-100Gb/s) and limited memory in switching hardware. We propose HashPipe, a heavy hitter detection algor… ▽ More

    Submitted 19 July, 2017; v1 submitted 15 November, 2016; originally announced November 2016.

    Comments: SOSR 2017, Santa Clara, CA

  29. arXiv:1611.01529  [pdf, other

    cs.NI

    Dapper: Data Plane Performance Diagnosis of TCP

    Authors: Mojgan Ghasemi, Theophilus Benson, Jennifer Rexford

    Abstract: With more applications moving to the cloud, cloud providers need to diagnose performance problems in a timely manner. Offline processing of logs is slow and inefficient, and instrumenting the end-host network stack would violate the tenants' rights to manage their own virtual machines (VMs). Instead, our Dapper system analyzes TCP performance in real time near the end-hosts (e.g., at the hyperviso… ▽ More

    Submitted 4 November, 2016; originally announced November 2016.

  30. arXiv:1605.07734  [pdf, other

    cs.NI

    Recursive SDN for Carrier Networks

    Authors: James McCauley, Zhi Liu, Aurojit Panda, Teemu Koponen, Barath Raghavan, Jennifer Rexford, Scott Shenker

    Abstract: Control planes for global carrier networks should be programmable (so that new functionality can be easily introduced) and scalable (so they can handle the numerical scale and geographic scope of these networks). Neither traditional control planes nor new SDN-based control planes meet both of these goals. In this paper, we propose a framework for recursive routing computations that combines the be… ▽ More

    Submitted 25 May, 2016; originally announced May 2016.

  31. arXiv:1605.07685  [pdf, other

    cs.NI

    Characterizing and Avoiding Routing Detours Through Surveillance States

    Authors: Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford

    Abstract: An increasing number of countries are passing laws that facilitate the mass surveillance of Internet traffic. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some cases, countries are taking extreme steps, such as building new Internet Exchange Points (IXPs), which allow networks to interconnect directly, and encour… ▽ More

    Submitted 24 May, 2016; originally announced May 2016.

  32. arXiv:1605.04966  [pdf, other

    cs.NI

    Performance Characterization of a Commercial Video Streaming Service

    Authors: Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford

    Abstract: Despite the growing popularity of video streaming over the Internet, problems such as re-buffering and high startup latency continue to plague users. In this paper, we present an end-to-end characterization of Yahoo's video streaming service, analyzing over 500 million video chunks downloaded over a two-week period. We gain unique visibility into the causes of performance degradation by instrument… ▽ More

    Submitted 16 May, 2016; originally announced May 2016.

  33. arXiv:1604.02980  [pdf

    cs.CY

    Systems Computing Challenges in the Internet of Things

    Authors: Rajeev Alur, Emery Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel Lopresti, Klara Nahrstedt, Elizabeth Mynatt, Shwetak Patel, Jennifer Rexford, John A. Stankovic, Benjamin Zorn

    Abstract: A recent McKinsey report estimates the economic impact of the Internet of Things (IoT) to be between $3.9 to $11 trillion dollars by 20251 . IoT has the potential to have a profound impact on our daily lives, including technologies for the home, for health, for transportation, and for managing our natural resources. The Internet was largely driven by information and ideas generated by people, but… ▽ More

    Submitted 11 April, 2016; originally announced April 2016.

    Comments: A Computing Community Consortium (CCC) white paper, 15 pages

  34. arXiv:1512.00822  [pdf, other

    cs.NI

    SNAP: Stateful Network-Wide Abstractions for Packet Processing

    Authors: Mina Tahmasbi Arashloo, Yaron Koral, Michael Greenberg, Jennifer Rexford, David Walker

    Abstract: Early programming languages for software-defined networking (SDN) were built on top of the simple match-action paradigm offered by OpenFlow 1.0. However, emerging hardware and software switches offer much more sophisticated support for persistent state in the data plane, without involving a central controller. Nevertheless, managing stateful, distributed systems efficiently and correctly is known… ▽ More

    Submitted 4 July, 2016; v1 submitted 2 December, 2015; originally announced December 2015.

  35. arXiv:1503.03940  [pdf, other

    cs.NI cs.CR

    RAPTOR: Routing Attacks on Privacy in Tor

    Authors: Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal

    Abstract: The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-… ▽ More

    Submitted 12 March, 2015; originally announced March 2015.

  36. arXiv:1312.1719  [pdf, other

    cs.NI

    Programming Protocol-Independent Packet Processors

    Authors: Pat Bosshart, Dan Daly, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, David Walker

    Abstract: P4 is a high-level language for programming protocol-independent packet processors. P4 works in conjunction with SDN control protocols like OpenFlow. In its current form, OpenFlow explicitly specifies protocol headers on which it operates. This set has grown from 12 to 41 fields in a few years, increasing the complexity of the specification while still not providing the flexibility to add new head… ▽ More

    Submitted 15 May, 2014; v1 submitted 5 December, 2013; originally announced December 2013.

  37. arXiv:1305.3568  [pdf, other

    cs.NI

    SoftCell: Taking Control of Cellular Core Networks

    Authors: Xin **, Li Erran Li, Laurent Vanbever, Jennifer Rexford

    Abstract: Existing cellular networks suffer from inflexible and expensive equipment, and complex control-plane protocols. To address these challenges, we present SoftCell, a scalable architecture for supporting fine-grained policies for mobile devices in cellular core networks. The SoftCell controller realizes high-level service polices by directing traffic over paths that traverse a sequence of middleboxes… ▽ More

    Submitted 15 May, 2013; originally announced May 2013.

  38. arXiv:1203.4042  [pdf, other

    cs.NI

    A Provably-Correct Protocol for Seamless Communication with Mobile, Multi-Homed Hosts

    Authors: Matvey Arye, Erik Nordstrom, Robert Kiefer, Jennifer Rexford, Michael J. Freedman

    Abstract: Modern consumer devices, like smartphones and tablets, have multiple interfaces (e.g., WiFi and 3G) that attach to new access points as users move. These mobile, multi-homed computers are a poor match with an Internet architecture that binds connections to fixed end-points with topology- dependent addresses. As a result, hosts typically cannot spread a connection over multiple interfaces or paths,… ▽ More

    Submitted 19 March, 2012; originally announced March 2012.

  39. arXiv:0906.3846  [pdf, ps, other

    cs.NI cs.DC

    Neighbor-Specific BGP: More Flexible Routing Policies While Improving Global Stability

    Authors: Yi Wang, Michael Schapira, Jennifer Rexford

    Abstract: Please Note: This document was written to summarize and facilitate discussion regarding (1) the benefits of changing the way BGP selects routes to selecting the most preferred route allowed by export policies, or more generally, to selecting BGP routes on a per-neighbor basis, (2) the safety condition that guarantees global routing stability under the Neighbor-Specific BGP model, and (3) ways of… ▽ More

    Submitted 21 June, 2009; originally announced June 2009.

  40. arXiv:0903.3218  [pdf, other

    cs.NI cs.CR cs.CY

    Nation-State Routing: Censorship, Wiretap**, and BGP

    Authors: Josh Karlin, Stephanie Forrest, Jennifer Rexford

    Abstract: The treatment of Internet traffic is increasingly affected by national policies that require the ISPs in a country to adopt common protocols or practices. Examples include government enforced censorship, wiretap**, and protocol deployment mandates for IPv6 and DNSSEC. If an entire nation's worth of ISPs apply common policies to Internet traffic, the global implications could be significant. Fo… ▽ More

    Submitted 18 March, 2009; originally announced March 2009.