Middlebox

Results: 59



#Item
1Computing / Information and communications technology / Computer network security / Data transmission / Network architecture / Computer networking / Internet architecture / Networking hardware / OpenFlow / Open vSwitch / Middlebox / Forwarding information base

SoftFlow: A Middlebox Architecture for Open vSwitch Ethan J. Jackson, University of California, Berkeley; Melvin Walls, Penn State Harrisburg and University of California, Berkeley; Aurojit Panda, University of Californi

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-06-22 03:22:28
2Computing / Information and communications technology / Computer network security / Networking hardware / Computer networking / Data transmission / Computer security / Firewall software / Middlebox / Computer appliance / Packet processing / Computer network

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2013-04-22 15:35:26
3

1 Workshop on HIP and Related Architectures, Washington, DC, USA, November 6, 2004. Middlebox Traversal of HIP Communication Martin Stiemerling, Jürgen Quittek and Lars Eggert

Add to Reading List

Source URL: eggert.org

Language: English - Date: 2011-09-22 06:55:38
    4

    Lost in Network Address Translation: Lessons from Scaling the World’s Simplest Middlebox Vladimir Olteanu U. Politehnica of Bucharest Felipe Huici

    Add to Reading List

    Source URL: nets.cs.pub.ro

    - Date: 2015-06-24 17:19:38
      5Computing / Software / System software / Computer networking / Middlebox / Hyper-V / Hardware virtualization / Virtual machine / I/O virtualization / Open vSwitch / Packet processing / Virtualization

      PerfSight: Performance Diagnosis for Software Dataplanes Wenfei Wu, Keqiang He, Aditya Akella University of Wisconsin-Madison ABSTRACT The advent of network functions virtualization (NFV) means that

      Add to Reading List

      Source URL: pages.cs.wisc.edu

      Language: English - Date: 2015-10-29 15:03:47
      6Computing / Computer network security / Middlebox / Network architecture / Sylvia Ratnasamy / SIGCOMM / Network function virtualization / Virtualization / Technology / Science and technology

      Hot Topics in Middleboxes and Network Function Virtualization (HotMiddlebox 2016)  in conjunction with Sigcomm 2016,  Salvador, Brazil      Scope and topics of interest   

      Add to Reading List

      Source URL: conferences.sigcomm.org

      Language: English - Date: 2015-12-22 08:38:06
      7Computing / Network architecture / Network protocols / Computer network security / Application server / Software architecture / Load balancing / Hypertext Transfer Protocol / Middlebox / Transmission Control Protocol / Web server

      xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      Language: English - Date: 2013-02-20 11:32:27
      8Network architecture / Linux Foundation / University of Cambridge Computer Laboratory / Xen / Hyper-V / Open vSwitch / Hardware virtualization / Middlebox / Hypervisor / Live migration / Paravirtualization / Kernel-based Virtual Machine

      ClickOS and the Art of Network Function Virtualization Joao Martins† , Mohamed Ahmed† , Costin Raiciu‡ , Vladimir Olteanu‡ , Michio Honda† , Roberto Bifulco† , Felipe Huici† † NEC Europe Ltd. ‡ Universi

      Add to Reading List

      Source URL: nets.cs.pub.ro

      Language: English - Date: 2014-10-19 08:55:39
      9Computer network security / Deep packet inspection / Net neutrality / Networking hardware / Internet in China / Middlebox / Dots per inch / Network intelligence / Packet processing / DPI / Software-defined networking

      Deep Packet Inspection as a Service Anat Bremler-Barr Yotam Harchol School of Computer Science

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2014-12-01 16:57:13
      10Computer network security / Middlebox / Data-flow analysis / Scope / Transmission Control Protocol / Robust random early detection / ALGOL 68 / Subroutine / Parameter / Algorithm

      Paving the Way for NFV: Simplifying Middlebox Modifications using StateAlyzr Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella University of Wisconsin-Madison Abstract

      Add to Reading List

      Source URL: opennf.cs.wisc.edu

      Language: English - Date: 2016-02-29 22:59:54
      UPDATE