Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hari Balakrishnan is active.

Publication


Featured researches published by Hari Balakrishnan.


IEEE ACM Transactions on Networking | 2003

Chord: a scalable peer-to-peer lookup protocol for Internet applications

Ion Stoica; Robert Tappan Morris; David Liben-Nowell; David R. Karger; M. Frans Kaashoek; Frank Dabek; Hari Balakrishnan

A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing. Results from theoretical analysis and simulations show that Chord is scalable: Communication cost and the state maintained by each node scale logarithmically with the number of Chord nodes.


acm special interest group on data communication | 2001

Chord: A scalable peer-to-peer lookup service for internet applications

Ion Stoica; Robert Tappan Morris; David R. Karger; M. Frans Kaashoek; Hari Balakrishnan

A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data item pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing. Results from theoretical analysis, simulations, and experiments show that Chord is scalable, with communication cost and the state maintained by each node scaling logarithmically with the number of Chord nodes.


acm special interest group on data communication | 2008

OpenFlow: enabling innovation in campus networks

Nick McKeown; Thomas E. Anderson; Hari Balakrishnan; Guru M. Parulkar; Larry L. Peterson; Jennifer Rexford; Scott Shenker; Jonathan S. Turner

This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries. Our goal is to encourage networking vendors to add OpenFlow to their switch products for deployment in college campus backbones and wiring closets. We believe that OpenFlow is a pragmatic compromise: on one hand, it allows researchers to run experiments on heterogeneous switches in a uniform way at line-rate and with high port-density; while on the other hand, vendors do not need to expose the internal workings of their switches. In addition to allowing researchers to evaluate their ideas in real-world traffic settings, OpenFlow could serve as a useful campus component in proposed large-scale testbeds like GENI. Two buildings at Stanford University will soon run OpenFlow networks, using commercial Ethernet switches and routers. We will work to encourage deployment at other schools; and We encourage you to consider deploying OpenFlow in your university network too


acm/ieee international conference on mobile computing and networking | 2000

The Cricket location-support system

Nissanka Bodhi Priyantha; Anit Chakraborty; Hari Balakrishnan

This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, location-dependent applications. It allows applications running on mobile and static nodes to learn their physical location by using listeners that hear and analyze information from beacons spread throughout the building. Cricket is the result of several design goals, including user privacy, decentralized administration, network heterogeneity, and low cost. Rather than explicitly tracking user location, Cricket helps devices learn where they are and lets them decide whom to advertise this information to; it does not rely on any centralized management or control and there is no explicit coordination between beacons; it provides information to devices regardless of their type of network connectivity; and each Cricket device is made from off-the-shelf components and costs less than U.S.


acm/ieee international conference on mobile computing and networking | 2001

Span: An energy-efficient coordination algorithm for topology maintenance in Ad Hoc wireless networks

Benjie Chen; Kyle Jamieson; Hari Balakrishnan; Robert Tappan Morris

10. We describe the randomized algorithm used by beacons to transmit information, the use of concurrent radio and ultrasonic signals to infer distance, the listener inference algorithms to overcome multipath and interference, and practical beacon configuration and positioning techniques that improve accuracy. Our experience with Cricket shows that several location-dependent applications such as in-building active maps and device control can be developed with little effort or manual configuration.


acm/ieee international conference on mobile computing and networking | 1999

Adaptive protocols for information dissemination in wireless sensor networks

Wendi B. Heinzelman; Joanna Kulik; Hari Balakrishnan

This paper presents Span, a power saving technique for multi-hop ad hoc wireless networks that reduces energy consumption without significantly diminishing the capacity or connectivity of the network. Span builds on the observation that when a region of a shared-channel wireless network bag a sufficient density of nodes, only a small number of them need be on at any time to forward traffic for active connections. Span is a distributed, randomized algorithm where nodes make local decisions on whether to sleep, or to join a forwarding backbone as a coordinator. Each node bases its decision on an estimate of how many of its neighbors will benefit from it being awake, and the amount of energy available to it. We give a randomized algorithm where coordinators rotate with time, demonstrating how localized node decisions lead to a connected, capacity-preserving global topology. Improvement in system lifetime due to Span increases as the ratio of idle-to-sleep energy consumption increases, and increases as the density of the network increases. For example, our simulations show that with a practical energy model, system lifetime of an 802.11 network in power saving mode with Span is a factor of two better than without. Span integrates nicely with 802.11—when run in conjunction with the 802.11 power saving mode, Span improves communication latency, capacity, and system lifetime.


symposium on operating systems principles | 2001

Resilient overlay networks

David G. Andersen; Hari Balakrishnan; M. Frans Kaashoek; Robert Tappan Morris

In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminates information among sensors in an energy-constrained wireless sensor network. Nodes running a SPIN communication protocol name their data using high-level data descriptors, called meta-data. They use meta-data negotiations to eliminate the transmission of redundant data throughout the network. In addition, SPIN nodes can base their communication decisions both upon application-specific knowledge of the data and upon knowledge of the resources that are available to them. This allows the sensors to efficiently distribute data given a limited energy supply. We simulate and analyze the performance of two specific SPIN protocols, comparing them to other possible approaches and a theoretically optimal protocol. We find that the SPIN protocols can deliver 60% more data for a given amount of energy than conventional approaches. We also find that, in terms of dissemination rate and energy usage, the SPlN protocols perform close to the theoretical optimum.


IEEE ACM Transactions on Networking | 1997

A comparison of mechanisms for improving TCP performance over wireless links

Hari Balakrishnan; Venkata N. Padmanabhan; Srinivasan Seshan; Randy H. Katz

A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over todays wide-area routing protocols that take at least several minutes to recover. A RON is an application-layer overlay on top of the existing Internet routing substrate. The RON nodes monitor the functioning and quality of the Internet paths among themselves, and use this information to decide whether to route packets directly over the Internet or by way of other RON nodes, optimizing application-specific routing metrics.Results from two sets of measurements of a working RON deployed at sites scattered across the Internet demonstrate the benefits of our architecture. For instance, over a 64-hour sampling period in March 2001 across a twelve-node RON, there were 32 significant outages, each lasting over thirty minutes, over the 132 measured paths. RONs routing mechanism was able to detect, recover, and route around all of them, in less than twenty seconds on average, showing that its methods for fault detection and recovery work well at discovering alternate paths in the Internet. Furthermore, RON was able to improve the loss rate, latency, or throughput perceived by data transfers; for example, about 5% of the transfers doubled their TCP throughput and 5% of our transfers saw their loss probability reduced by 0.05. We found that forwarding packets via at most one intermediate RON node is sufficient to overcome faults and improve performance in most cases. These improvements, particularly in the area of fault detection and recovery, demonstrate the benefits of moving some of the control over routing into the hands of end-systems.


acm/ieee international conference on mobile computing and networking | 1995

Improving TCP/IP performance over wireless networks

Hari Balakrishnan; Srinivasan Seshan; Elan Amir; Randy H. Katz

Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. However, networks with wireless and other lossy links also suffer from significant losses due to bit errors and handoffs. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to end performance in wireless and lossy systems. We compare several schemes designed to improve the performance of TCP in such networks. We classify these schemes into three broad categories: end-to-end protocols, where loss recovery is performed by the sender; link-layer protocols that provide local reliability; and split-connection protocols that break the end-to-end connection into two parts at the base station. We present the results of several experiments performed in both LAN and WAN environments, using throughput and goodput as the metrics for comparison. Our results show that a reliable link-layer protocol that is TCP-aware provides very good performance. Furthermore, it is possible to achieve good performance without splitting the end-to-end connection at the base station. We also demonstrate that selective acknowledgments and explicit loss notifications result in significant performance improvements.


Wireless Networks | 2002

Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks

Benjie Chen; Kyle Jamieson; Hari Balakrishnan; Robert Tappan Morris

TCP is a reliable transport protocol tuned to perform well intraditional networks made up of links with low bit-error rates.Networks with higher bit-error rates, such as those with wirelesslinks and mobile hosts, violate many of the assumptions made byTCP, causing degraded end-to-end performance. In tbis paper, wedescribe the design and implementation of a simple protocol, calledthe snoop protocol, that improves TCP performance in wirelessnetworks. The protocol modifies network-layer software mainly at abase station and preserves end-to-end TCP semantics. The main ideaof the protocol is to cache packets at the base station and performlocal retransmissions across the wireless link. We have implementedthe snoop protocol on a wireless testbed consisting of IBM ThinkPadlaptops and i486 base stations communicating over an AT&TWavelan. Our experiments show that it is significantly more robustat dealing with unreliable wireless links as compared to normalTCP; we have achieved throughput speedups of up to 20 times overregular TCP in our experiments with the protocol.

Collaboration


Dive into the Hari Balakrishnan's collaboration.

Top Co-Authors

Avatar

Samuel Madden

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Randy H. Katz

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David R. Karger

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Srinivasan Seshan

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Kyle Jamieson

University College London

View shared research outputs
Top Co-Authors

Avatar

Robert Tappan Morris

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Scott Shenker

University of California

View shared research outputs
Top Co-Authors

Avatar

Anirudh Sivaraman

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Allen Miu

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge