Learn More
Modern enterprises almost ubiquitously deploy middlebox processing services to improve security and performance in their networks. Despite this, we find that today's middlebox infrastructure is expensive, complex to manage, and creates new failure modes for the networks that use them. Given the promise of cloud computing to decrease costs, ease management,(More)
Technology users in the developing world face a varied and complex set of computer security concerns. These challenges are deeply tied to a range of contextual factors including poor infrastructure, non-traditional usage patterns, and different attitudes towards security, which make simply importing security solutions from industrialized nations inadequate.(More)
Over five billion people are active cellular subscribers, spending over a trillion dollars a year on communications. Despite this, hundreds of millions of people are still not connected. Implicit in these networks is a top-down design, with large nation-scale telecommunication firms deciding when and where coverage will be available. This is enforced by(More)
Software-defined networks (SDNs) have simplified management of complex data center and enterprise networks. We argue that SDNs can play a similar role in rural wireless networks, especially those in developing regions. Operating a rural network in the developing world means coping with unpredictability, low profit margins, and resource constraints; the(More)
—The GSM network is the largest network on Earth, providing vital communications service to billions of people. Yet hundreds of millions of people live outside the coverage of existing cellular providers. Recently, researchers have demonstrated a new model of cellular connectivity, community cellular, that has the potential to bring coverage to extremely(More)
Large-scale communications blackouts, such as those carried out by Egypt and Libya in 2011 and Syria in 2012 and 2013, have motivated a series of projects that aim to enable citizens to communicate even in the face of such heavy-handed censorship efforts. A common theme across these proposals has been the use of wireless mesh networks. We argue that such(More)
Lack of access to cellular service often goes hand-in-hand with lack of access to power. For example, the GSM Association estimates that 95% of people living without cellular access in East Africa also lack access to grid power. This situation forces cellular network operators to build out power infrastructure along with their network infrastructure,(More)
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to(More)
– Networking research would be well served by the adoption of a set of traffic benchmarks to model network applications for empirical evaluations; such benchmarks are common in many other areas of computing. While it has long been known that certain aspects of modeling traffic, such as round trip time, can dramatically affect application and network(More)