SAABCOT: Secure application-agnostic bandwidth conservation techniques

Chad D. Mano, David C. Salyers, Qi Liao, Andrew Blaich, Aaron Striegel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the data exhibits large amounts of redundancy on short and/or long-term time scales. As a result, a large body of work has emerged offering bandwidth conservation exemplified by the work in caching and multicast. The majority of the techniques that have experienced widespread adoption rely on parsing / reacting to application-specific data. With the advent of simplified end-to-end security, as introduced by IPv6, these techniques will no longer have access to the plaintext data. We present a novel technique for preserving security while allowing in-network devices to identify redundant data flows in order to apply bandwidth conservation techniques. Our communication protocol does not require modifications to existing applications nor does it inflict a significant amount of overhead to the existing network infrastructure.

Original languageEnglish
Title of host publicationProceedings of the 4th International Conference on Broadband Communications, Networks, Systems, BroadNets
Pages544-550
Number of pages7
DOIs
StatePublished - 2007
Event4th International Conference on Broadband Communications, Networks, Systems, BroadNets - Raleigh, NC, United States
Duration: Sep 10 2007Sep 14 2007

Publication series

NameProceedings of the 4th International Conference on Broadband Communications, Networks, Systems, BroadNets

Conference

Conference4th International Conference on Broadband Communications, Networks, Systems, BroadNets
Country/TerritoryUnited States
CityRaleigh, NC
Period09/10/0709/14/07

Fingerprint

Dive into the research topics of 'SAABCOT: Secure application-agnostic bandwidth conservation techniques'. Together they form a unique fingerprint.

Cite this