We propose a new objective for network research: to build a fundamentally different sort of network that can assemble itself given high level instructions, reassemble itself as requirements change, automatically discover when something goes wrong, and automatically fix a detected problem or explain why it cannot do so.We further argue that to achieve this… (More)
The architecture of the Internet is based on a number of principles, including the self-describing datagram packet, the end to end arguments, diversity in technology and global addressing. As the Internet has moved from a research curiosity to a recognized component of mainstream society, new requirements have emerged that suggest new design principles, and… (More)
This paper proposes GIA, a scalable architecture for global IP-anycast. Existing designs for providing IP-anycast must either globally distribute routes to individual anycast groups, or confine each anycast group to a pre-configured topological region. The first approach does not scale because of excessive growth in the routing tables, whereas the second… (More)
Connectivity is central to pervasive computing environments. We seek to catalyze a world of rich and diverse con-nectivity through technologies that drastically simplify the task of providing, choosing, and using wireless network services ; creating a new and more competitive environment for these capabilities. A critical requirement is that users actually… (More)
How might the computing and communications world be materially different in 10 to 15 years, and how might we define a research agenda that would get us to that world?
This document discusses goals and directions for a research effort aimed at developing a next-generation Internet architecture.
A system as complex as the Internet can only be designed effectively if it is based on a core set of design principles, or tenets, that identify points in the architecture where there must be common understanding and agreement. The tenets of the original Internet architecture  arose as a response to the technical, governmental, and societal environment… (More)
This paper describes a new message passing protocol that provides guaranteed detection of duplicate messages even when the receiver has no state stored for the sender. It also discusses how to use these messages to implement higher-level primitives such as at-most-once remote procedure calls and sequenced bytestream protocols, and describes an… (More)
Effective analysis of raw data from networked systems requires bridging the semantic gap between the data and the user's high-level understanding of the system. The raw data represents facts about the system state and analysis involves identifying a set of semantically relevant behaviors, which represent " interesting " relationships between these facts.… (More)
Over the past several years, we have seen the emergence of numerous types of so-called "overlay" networks in the Internet. There are many diverse examples of such overlay networks including the content-delivery-caching networks, implemented by companies like Akamai, the peer-to-peer file sharing networks associated with applications such as BitTorrent, the… (More)