In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides flexible and policy-compliant forwarding. Our proposal centers around a new architectural concept: that of packet rules. A rule is a simple if-then-else construct that describes the manner in which the network should -- or should not -- forward packets. A packet identies the rule by which it is to be forwarded and routers forward each packet in accordance with its associated rule. On one hand, rules are flexible, as they can explicitlyspecify paths and invoke packet processing inside the network. This enables RBF to support many previously proposed Internet extensions, such as explicit middleboxes, multiple paths, source routing and support fo...
This is the peer reviewed version of the following article: Leon Gaixas S, Perelló J, Careglio D, Gr...
In the current Internet, senders are not accountable for the packets they send. As a result, malici...
This paper compares and analyses the Denial-of-Service attacks in the two different Network architec...
This thesis addresses packet forwarding in packet-switching networks such as the Internet. The inter...
Congestion control algorithms seek to optimally utilize network resources by allocating a certain ra...
Networked systems now have significant impact on human lives: the Internet, connecting the world glo...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
Inter & intra domain adaptive routing protocols are required to propagate reachability information t...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
This thesis investigates distributed router architectures and IP networks with centralized control. ...
Abstract—Designing infrastructures that give untrusted thirdparties (such as end-hosts) control over...
The implementation of label swapping packet forwarding technology increases the vulnerability to ins...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
This paper focuses on packet forwarding in ad hoc networks and proposes a new approach to improve pe...
Today's Internet is built on decades-old networking protocols that lack scalability, reliability and...
This is the peer reviewed version of the following article: Leon Gaixas S, Perelló J, Careglio D, Gr...
In the current Internet, senders are not accountable for the packets they send. As a result, malici...
This paper compares and analyses the Denial-of-Service attacks in the two different Network architec...
This thesis addresses packet forwarding in packet-switching networks such as the Internet. The inter...
Congestion control algorithms seek to optimally utilize network resources by allocating a certain ra...
Networked systems now have significant impact on human lives: the Internet, connecting the world glo...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
Inter & intra domain adaptive routing protocols are required to propagate reachability information t...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
This thesis investigates distributed router architectures and IP networks with centralized control. ...
Abstract—Designing infrastructures that give untrusted thirdparties (such as end-hosts) control over...
The implementation of label swapping packet forwarding technology increases the vulnerability to ins...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
This paper focuses on packet forwarding in ad hoc networks and proposes a new approach to improve pe...
Today's Internet is built on decades-old networking protocols that lack scalability, reliability and...
This is the peer reviewed version of the following article: Leon Gaixas S, Perelló J, Careglio D, Gr...
In the current Internet, senders are not accountable for the packets they send. As a result, malici...
This paper compares and analyses the Denial-of-Service attacks in the two different Network architec...