Learn More
We present decoy routing, a mechanism capable of circumventing common network filtering strategies. Unlike other circumvention techniques, decoy routing does not require a client to connect to a specific IP address (which is easily blocked) in order to provide circumvention. We show that if it is possible for a client to connect to any unblocked(More)
We present a content network architecture for a cluster of satellites flying in low Earth orbit. The cluster uses a dynamic wireless network to interconnect the satellites and has an intermittent link to the ground. Even though a cluster of satellites fly in formation, their relative positions can vary widely, and occasionally the cluster can disperse and(More)
As software defined networks (SDN) grow in size and in number, the problem of coordinating the actions of multiple SDN controllers will grow in importance. In this paper, we propose a way of organizing SDN control based on coordinated <i>subgraph shadowing</i>. Graphs are a natural way to think about and describe SDN activity. Subgraphs provide a means to(More)
  • 1