Satish Raghunath

Learn More
The “VM Turntable” demonstrator at iGRID 2005 pioneered the integration of Virtual Machines (VMs) with deterministic “lightpath” network services across MAN/WAN. The results provide for a new stage of virtualization—one for which computation is no longer localized within a data center but rather can be migrated across geographical distances, with negligible(More)
A key factor deciding the performance of a routing protocol in mobile ad hoc networks is the manner in which it adapts to route changes caused by mobility. Exploiting the intuition that a less dynamic route lasts longer, we propose a new metric, the Route Fragility Coefficient (RFC), to compare routes. RFC estimates the rate at which a given route expands(More)
Virtual private networks (VPNs) feature notable characteristics in structure and traffic patterns that can be exploited by the service provider to achieve significant capacity savings. Efficient provisioning of point-to-point connections using statistical admission control is well understood. However, provisioning a VPN involves provisioning a set of(More)
We propose BANANAS a connectionless framework for both intra domain and inter domain tra c engineering TE in the Internet The key contributions of this framework are a it allows the source to discover multiple paths and decide on how to split tra c among paths assuming simple for warding extensions in a subset of routers b it does not require signaling or(More)
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniques that adapt to customer demand by leveraging a good understanding of VPN properties. In this paper we analyze two important properties of VPNs that impact provisioning - (a)(More)
Virtual Private Networks have rapidly emerged as a leading solution for multi-site enterprise communication needs. Provider-managed solutions modeled on RFC 2547 serve as a popular choice for layer-3 VPNs and the Hose Model has emerged as a common and simple service specification. It offers a “hose” of a certain contracted bandwidth to customers. With the(More)
In this paper we propose an edge-based quality of service architecture aimed at site-to-site private networks over the Internet. We extend the traditional point-to-point service model to a point-to-set service model, assuming a finite, bounded set of destination sites. Instead of provisioning point-to-point links between a source and its set of(More)
In this paper we propose an edge-based quality of service architecture aimed at site-to-site private networks over the Internet. We extend the traditional point-to-point service model to a point-to-set service model, assuming a finite, bounded set of destination sites. A point-to-set service allows a user to have a pool of premium tokens, which could be(More)
Virtual Private Networks (VPNs) provide secure and reliable communication between customer sites. With the increase in number and size of VPNs, providers need efficient provisioning techniques that adapt to customer demand by leveraging a good understanding of VPN properties. In this paper, we analyze two important properties of VPNs that impact(More)