skip to main content
10.1145/316188acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
SIGCOMM '99: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
ACM1999 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGCOMM99: ACM SIGCOMM 99 - Applications, Technologies, Architectures,and Protocols forComputer Communication Cambridge Massachusetts USA 30 August 1999- 3 September 1999
ISBN:
978-1-58113-135-2
Published:
30 August 1999
Sponsors:

Reflects downloads up to 07 Mar 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Free
A readable TCP in the Prolac protocol language

Prolac is a new statically-typed, object-oriented language for network protocol implementation. It is designed for readability, extensibility, and real-world implementation; most previous protocol languages, in contrast, have been based on hard-to-...

Article
Free
A model, analysis, and protocol framework for soft state-based communication

"Soft state" is an often cited yet vague concept in network protocol design in which two or more network entities intercommunicate in a loosely coupled, often anonymous fashion. Researchers often define this concept operationally (if at all) rather than ...

Article
Free
The impact of multicast layering on network fairness

Many definitions of fairness for multicast networks assume that sessions are single-rate, requiring that each multicast session transmits data to all of its receivers at the same rate. These definitions do not account for multi-rate approaches, such as ...

Article
Free
Scaling of multicast trees: comments on the Chuang-Sirbu scaling law

One of the many benefits of multicast, when compared to traditional unicast, is that multicast reduces the overall network load. While the importance of multicast is beyond dispute, there have been surprisingly few attempts to quantify multicast's ...

Article
Free
KHIP—a scalable protocol for secure multicast routing

We present Keyed HIP (KHIP), a secure, hierarchical multicast routing protocol. We show that other shared-tree multicast routing protocols are subject to attacks against the multicast routing infrastructure that can isolate receivers or domains or ...

Article
Free
IP multicast channels: EXPRESS support for large-scale single-source applications

In the IP multicast model, a set of hosts can be aggregated into a group of hosts with one address, to which any host can send. However, Internet TV, distance learning, file distribution and other emerging large-scale multicast applications strain the ...

Article
Free
Providing guaranteed services without per flow management

Existing approaches for providing guaranteed services require routers to manage per flow states and perform per flow operations [9, 21]. Such a stateful network architecture is less scalable and robust than stateless network architectures like the ...

Article
Free
A flexible model for resource management in virtual private networks

As IP technologies providing both tremendous capacity and the ability to establish dynamic secure associations between endpoints emerge, Virtual Private Networks (VPNs) are going through dramatic growth. The number of endpoints per VPN is growing and ...

Article
Free
Proportional differentiated services: delay differentiation and packet scheduling

Internet applications and users have very diverse service expectations, making the current same-service-to-all model inadequate and limiting. In the relative differentiated services approach, the network traffic is grouped in a small number of service ...

Article
Free
BPF+: exploiting global data-flow optimization in a generalized packet filter architecture

A packet filter is a programmable selection criterion for classifying or selecting packets from a packet stream in a generic, reusable fashion. Previous work on packet filters falls roughly into two categories, namely those efforts that investigate ...

Article
Free
Packet classification using tuple space search

Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls and QoS routing. Packet classification requires matching each packet against a database of filters (or rules), and forwarding the packet ...

Article
Free
Packet classification on multiple fields

Routers classify packets to determine which flow they belong to, and to decide what service they should receive. Classification may, in general, be based on an arbitrary number of fields in the packet header. Performing classification quickly on an ...

Article
Free
A scalable Web cache consistency architecture

The rapid increase in web usage has led to dramatically increased loads on the network infrastructure and on individual web servers. To ameliorate these mounting burdens, there has been much recent interest in web caching architectures and algorithms. ...

Article
Free
An integrated congestion management architecture for Internet hosts

This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple ...

Article
Free
Quality adaptation for congestion controlled video playback over the Internet

Streaming audio and video applications are becoming increasingly popular on the Internet, and the lack of effective congestion control in such applications is now a cause for significant concern. The problem is one of adapting the compression without ...

Article
Free
Routing with a clue

We suggest a new simple forwarding technique to speed-up IP destination address lookup. The technique is a natural extension of IP, requires 5 bits in the IP header (IPv4, 7 in IPv6) and performs IP lookup nearly as fast as IP/Tag-switching but with a ...

Article
Free
Load-sensitive routing of long-lived IP flows

Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic patterns. The ability of dynamic routing to circumvent congested links and ...

Article
Free
A simple approximation to minimum-delay routing

The conventional approach to routing in computer networks consists of using a heuristic to compute a single shortest path from a source to a destination. Single-path routing is very responsive to topological and link-cost changes; however, except under ...

Article
Free
Using pathchar to estimate Internet link characteristics

We evaluate pathchar, a tool that infers the characteristics of links along an Internet path (latency, bandwidth, queue delays). Looking at two example paths, we identify circumstances where pathchar is likely to succeed, and develop techniques to ...

Article
Free
On power-law relationships of the Internet topology

Despite the apparent randomness of the Internet, we discover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December 1998, despite a 45% growth of its ...

Article
Free
On estimating end-to-end network path properties

The more information about current network conditions available to a transport protocol, the more efficiently it can use the network to transfer its data. In networks such as the Internet, the transport protocol must often form its own estimates of ...

Article
Free
An analysis of BGP convergence properties

The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol used to exchange reachability information between Autonomous Systems in the global Internet. BGP is a path-vector protocol that allows each Autonomous System to override ...

Article
Free
The end-to-end effects of Internet path selection

The path taken by a packet traveling across the Internet depends on a large number of factors, including routing protocols and per-network routing policies. The impact of these factors on the end-to-end performance experienced by users is poorly ...

Article
Free
Dynamics of IP traffic: a study of the role of variability and the impact of control

Using the ns-2-simulator to experiment with different aspects of user- or session-behaviors and network configurations and focusing on the qualitative aspects of a wavelet-based scaling analysis, we present a systematic investigation into how and why ...

Contributors
  • BBN Technologies
  • Lancaster University
  • Washington University in St. Louis
  • Washington University in St. Louis

Recommendations

Acceptance Rates

SIGCOMM '99 Paper Acceptance Rate 24 of 190 submissions, 13%;
Overall Acceptance Rate 462 of 3,389 submissions, 14%
YearSubmittedAcceptedRate
SIGCOMM '162313917%
SIGCOMM '152424017%
SIGCOMM '142424519%
SIGCOMM '132463815%
SIGCOMM '112233214%
SIGCOMM '033193411%
SIGCOMM '02300258%
SIGCOMM '01252239%
SIGCOMM '002382611%
SIGCOMM '991902413%
SIGCOMM '982472611%
SIGCOMM '972132411%
SIGCOMM '961622717%
SIGCOMM '951433021%
SIGCOMM '941412921%
Overall3,38946214%