Paul Congdon

Paul Congdon
  • University of California, Davis

About

18
Publications
4,492
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
911
Citations
Current institution
University of California, Davis

Publications

Publications (18)
Patent
Full-text available
A method for selecting a command file is described. One or more command files coupled with a first device are accessed. Each command file of the one or more command files comprises one or more command file attributes. One or more device attributes associated with a second device are accessed. The one or more command file attributes and the one or m...
Article
Measurement of network performance in complex WiFi networks, such as in corporations and universities, is an important but challenging task, as wireless performance in networks with many access points is hard to measure and model. We demonstrate that crowdsourcing the task of measuring WiFi performance is an effective solution to this problem. By m...
Patent
Full-text available
One embodiment disclosed relates to a method for a switch to respond to a new client. A new client is detected at a port of the switch. The switch temporarily assigns the port to be an untagged member of a virtual local area network (VLAN) which is configured for unauthorized clients. Initialization services are provided to the new client via the u...
Article
The Ethernet switch is a primary building block for today's enterprise networks and data centers. As network technologies converge upon a single Ethernet fabric, there is ongoing pressure to improve the performance and efficiency of the switch while maintaining flexibility and a rich set of packet processing features. The OpenFlow architecture aims...
Conference Paper
Despite of several years of innovative research, indoor localization is still not mainstream. Existing techniques either employ cumbersome fingerprinting, or rely upon the deployment of additional infrastructure. Towards a solution that is easier to adopt, we propose CUPID, which is free from these restrictions, yet is comparable in accuracy. While...
Conference Paper
Many popular mobile applications require the continuous monitoring and sharing of a mobile user's location. However, exploiting a user's location leads to disclosing sensitive information about the users daily activity. Several location privacy-preserving schemes have been proposed, but it remains challenging for a user to achieve visibility of the...
Article
Despite pervasive deployment of wireless networks, maintaining seamless mobile connectivity within a set of local devices and to the remote cloud is still challenging. The crux of this challenge stems from the simultaneous interplay of multiple dimensions of a user's mobility - users frequently move between multiple access networks, mobile devices...
Article
Full-text available
Network deduplication (dedup) is an attractive approach to improve network performance for mobile devices. With traditional deduplication, the dedup~source uses only the portion of the cache at the dedup~destination that it is aware of. We argue in this work that in a mobile environment, the dedup~destination (say the mobile) could have accumulated...
Article
Software-Defined Networking (SDN) gains much of its value through the use of central controllers with global views of dynamic network state. To support a global view, SDN protocols, such as OpenFlow, expose several counters for each flow-table rule. These counters must be maintained by the data plane, which is typically implemented in hardware as a...
Conference Paper
CacheCard is a NIC-based cache for static and dynamic web content in a way that allows for implementation on simple devices like NICs. It requires neither understanding of the way dynamic data is generated, nor execution of scripts on the cache. ...
Conference Paper
Full-text available
The amount of intelligent packet processing in an Ethernet switch continues to grow, in order to support of embedded applications such as network security, load balancing and quality of service assurance. This increased packet processing is contributing to greater per-packet latency through the switch. In addition, there is a growing interest in us...
Article
This document defines a protocol, and a set of management objects for use with IEEE 802 devices. In particular, it describes a physical topology discovery protocol and managed objects used for managing the protocol. The protocol is not restricted from running on non-802 media, however, a specification of this operation is beyond the scope of this d...
Article
This document proposes additional Remote Authentication Dial-In User Service (RADIUS) attributes for dynamic Virtual LAN assignment and prioritization, for use in provisioning of access to IEEE 802 local area networks. These attributes are usable within either RADIUS or Diameter.
Article
To meet the growing demand for strong non-malleable secure identities in network devices such as routers, switches and wireless access points the IEEE 802.1 working group is defining specification IEEE 802.1AR Secure Device Identity. The standard defines a per-device unique identity that is installed at manufacturing time and can be used in subsequ...
Article
NOTE: As suggested through email exchanges, the original approved proposal, "Performance Analysis of Hypervisor Network Offload", is continuing to evolve in order to increase the focus and content on computer architecture issues. This document provides the current status of the project including work done to date and anticipated next steps to meet...
Article
This project report presents the results of measurements and a research survey investigating the architecture of a hardware network offload device for machine virtualization environments. Requirements for the adapter are developed from a study of virtual I/O and networking performance issues as well as a study of associated research on proposed enh...

Network

Cited By