您的位置:首页 > Web前端

Table of Contents----Proceedings of the 2014 ACM conference on SIGCOMM

2014-10-08 22:24 423 查看
SESSION: Data plane

Brighten Godfrey

Millions of little minions: using packets for low latency network programming and visibility

Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières

This paper presents a practical approach to rapidly introducing new dataplane functionality into networks: End-hosts embed tiny programs into packets to actively query and manipulate a network's internal state. We show how this "tiny packet program" ...

SAX-PAC (Scalable And eXpressive PAcket Classification)

Kirill Kogan, Sergey Nikolenko, Ori Rottenstreich, William Culhane, Patrick Eugster

Efficient packet classification is a core concern for network services. Traditional multi-field classification approaches, in both software and ternary content-addressable memory (TCAMs), entail tradeoffs between (memory) space and (lookup) time. TCAMs ...

Duet: cloud scale load balancing with hardware and software

Rohan Gandhi, Hongqiang Harry Liu, Y. Charlie Hu, Guohan Lu, Jitendra Padhye, Lihua Yuan, Ming Zhang

Load balancing is a foundational function of datacenter infrastructures and is critical to the performance of online services hosted in datacenters. As the demand for cloud services grows, expensive and hard-to-scale dedicated hardware load balancers ...

Guarantee IP lookup performance with FIB explosion

Tong Yang, Gaogang Xie, YanBiao Li, Qiaobin Fu, Alex X. Liu, Qi Li, Laurent Mathy

The Forwarding Information Base (FIB) of backbone routers has been rapidly growing in size. An ideal IP lookup algorithm should achieve constant, yet small, IP lookup time and on-chip memory usage. However, no prior IP lookup algorithm achieves both ...

SESSION: Network architecture 1

Adrian Perrig

From the consent of the routed: improving the transparency of the RPKI

Ethan Heilman, Danny Cooper, Leonid Reyzin, Sharon Goldberg

The Resource Public Key Infrastructure (RPKI) is a new infrastructure that prevents some of the most devastating attacks on interdomain routing. However, the security benefits provided by the RPKI are accomplished via an architecture that empowers centralized ...

Network neutrality inference

Zhiyong Zhang, Ovidiu Mara, Katerina Argyraki

When can we reason about the neutrality of a network based on external observations? We prove conditions under which it is possible to (a) detect neutrality violations and (b) localize them to specific links, based on external observations. Our insight ...

Balancing accountability and privacy in the network

David Naylor, Matthew K. Mukerjee, Peter Steenkiste

Though most would agree that accountability and privacy are both valuable, today's Internet provides little support for either. Previous efforts have explored ways to offer stronger guarantees for one of the two, typically at the expense of the other; ...

Measuring IPv6 adoption

Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric Osterweil, Michael Bailey After several IPv4 address exhaustion milestones in the last three years, it is becoming apparent that the world is running out of IPv4 addresses, and the adoption of the next generation Internet protocol, IPv6, though nascent, is accelerating. In order ...

One tunnel is (often) enough

Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas Anderson, Arvind Krishnamurthy

A longstanding problem with the Internet is that it is vulnerable to outages, black holes, hijacking and denial of service. Although architectural solutions have been proposed to address many of these issues, they have had difficulty being adopted due ...

SESSION: Middleboxes and network services

Vyas Sekar

A middlebox-cooperative TCP for a non end-to-end internet

Ryan Craven, Robert Beverly, Mark Allman

Understanding, measuring, and debugging IP networks, particularly across administrative domains, is challenging. One particularly daunting aspect of the challenge is the presence of transparent middleboxes---which are now common in today's Internet. ...

OpenNF: enabling innovation in network function control

Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, Aditya Akella

Network functions virtualization (NFV) together with software-defined networking (SDN) has the potential to help operators satisfy tight service level agreements, accurately monitor and manipulate network traffic, and minimize operating expenses. However, ...

Network stack specialization for performance

Ilias Marinos, Robert N.M. Watson, Mark Handley

Contemporary network stacks are masterpieces of generality, supporting many edge-node and middle-node functions. Generality comes at a high performance cost: current APIs, memory models, and implementations drastically limit the effectiveness of increasingly ...

A buffer-based approach to rate adaptation: evidence from a large video streaming service

Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson

Existing ABR algorithms face a significant challenge in estimating future capacity: capacity can vary widely over time, a phenomenon commonly observed in commercial services. In this work, we suggest an alternative approach: rather than presuming that ...

SESSION: Wireless (1)

Shyamnath Gollakota

FastForward: fast and constructive full duplex relays

Dinesh Bharadia, Sachin Katti

This paper presents, FastForward (FF), a novel full duplex relay that constructively forwards signals such that wireless network throughput and coverage is significantly enhanced. FF is a Layer 1 in-band full duplex device, it receives and transmits ...

LTE radio analytics made easy and accessible

Swarun Kumar, Ezzeldin Hamed, Dina Katabi, Li Erran Li

Despite the rapid growth of next-generation cellular networks, researchers and end-users today have limited visibility into the performance and problems of these networks. As LTE deployments move towards femto and pico cells, even operators struggle ...

Control-plane protocol interactions in cellular networks

Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu

Control-plane protocols are complex in cellular networks. They communicate with one another along three dimensions of cross layers, cross (circuit-switched and packet-switched) domains, and cross (3G and 4G) systems. In this work, we propose signaling ...

RF-IDraw: virtual touch screen in the air using RF signals

Jue Wang, Deepak Vasisht, Dina Katabi

Prior work in RF-based positioning has mainly focused on discovering the absolute location of an RF source, where state-of-the-art systems can achieve an accuracy on the order of tens of centimeters using a large number of antennas. However, many applications ...

SESSION: Monitoring and diagnostics

Aditya Akella

Diagnosing missing events in distributed systems with negative provenance

Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo

When debugging a distributed system, it is sometimes necessary to explain the absence of an event - for instance, why a certain route is not available, or why a certain packet did not arrive. Existing debuggers offer some support for explaining the presence ...

Troubleshooting blackbox SDN control software with minimal causal sequences

Colin Scott, Andreas Wundsam, Barath Raghavan, Aurojit Panda, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, H.B. Acharya, Kyriakos Zarifis, Scott Shenker

Software bugs are inevitable in software-defined networking control software, and troubleshooting is a tedious, time-consuming task. In this paper we discuss how to improve control software troubleshooting by presenting a technique for automatically ...

Planck: millisecond-scale monitoring and control for commodity networks

Jeff Rasley, Brent Stephens, Colin Dixon, Eric Rozner, Wes Felter, Kanak Agarwal, John Carter, Rodrigo Fonseca

Software-defined networking introduces the possibility of building self-tuning networks that constantly monitor network conditions and react rapidly to important events such as congestion. Unfortunately, state-of-the-art monitoring mechanisms for conventional ...

DREAM: dynamic resource allocation for software-defined measurement

Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat

Software-defined networks can enable a variety of concurrent, dynamically instantiated, measurement tasks, that provide fine-grain visibility into network traffic. Recently, there have been many proposals to configure TCAM counters in hardware switches ...

SESSION: Novel datacenter network designs

Ratul Mahajan

Quartz: a new design element for low-latency DCNs

Yunpeng James Liu, Peter Xiang Gao, Bernard Wong, Srinivasan Keshav

Most datacenter network (DCN) designs focus on maximizing bisection bandwidth rather than minimizing server-to-server latency. We explore architectural approaches to building low-latency DCNs and introduce Quartz, a design element consisting of a full ...

Using RDMA efficiently for key-value services

Anuj Kalia, Michael Kaminsky, David G. Andersen

This paper describes the design and implementation of HERD, a key-value system designed to make the best use of an RDMA network. Unlike prior RDMA-based key-value systems, HERD focuses its design on reducing network round trips while using efficient ...

Fastpass: a centralized "zero-queue" datacenter network

Jonathan Perry, Amy Ousterhout, Hari Balakrishnan, Devavrat Shah, Hans Fugal

An ideal datacenter network should provide several properties, including low median and tail latency, high utilization (throughput), fair allocation of network resources between users or applications, deadline-aware scheduling, and congestion (loss) ...

FireFly: a reconfigurable wireless data center fabric using free-space optics

Navid Hamedazimi, Zafar Qazi, Himanshu Gupta, Vyas Sekar, Samir R. Das, Jon P. Longtin, Himanshu Shah, Ashish Tanwer

Conventional static datacenter (DC) network designs offer extreme cost vs. performance tradeoffs---simple leaf-spine networks are cost-effective but oversubscribed, while "fat tree"-like solutions offer good worst-case performance but are expensive. ...

A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers

K.V. Rashmi, Nihar B. Shah, Dikang Gu, Hairong Kuang, Dhruba Borthakur, Kannan Ramchandran

Erasure codes such as Reed-Solomon (RS) codes are being extensively deployed in data centers since they offer significantly higher reliability than data replication methods at much lower storage overheads. These codes however mandate much higher resources ...

SESSION: Network architecture (2)

John Wroclawski

A global name service for a highly mobile internetwork

Abhigyan Sharma, Xiaozheng Tie, Hardeep Uppal, Arun Venkataramani, David Westbrook, Aditya Yadav

Mobile devices dominate the Internet today, however the Internet rooted in its tethered origins continues to provide poor infrastructure support for mobility. Our position is that in order to address this problem, a key challenge that must be addressed ...

Towards a quantitative comparison of location-independent network architectures

Zhaoyu Gao, Arun Venkataramani, James F. Kurose, Simon Heimlicher

This paper presents a quantitative methodology and results comparing different approaches for {\it location-independent} communication. Our approach is empirical and is based on real Internet topologies, routing tables from real routers, and a measured ...

Lightweight source authentication and path validation

Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig

In-network source authentication and path validation are fundamental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently ...

SESSION: Scheduling in datacenter networks

Rodrigo Fonseca

Decentralized task-aware scheduling for data center networks

Fahad R. Dogar, Thomas Karagiannis, Hitesh Ballani, Antony Rowstron

Many data center applications perform rich and complex tasks (e.g., executing a search query or generating a user's news-feed). From a network perspective, these tasks typically comprise multiple flows, which traverse different parts of the network at ...

Efficient coflow scheduling with Varys

Mosharaf Chowdhury, Yuan Zhong, Ion Stoica

Communication in data-parallel applications often involves a collection of parallel flows. Traditional techniques to optimize flow-level metrics do not perform well in optimizing such collections, because the network is largely agnostic to application-level ...

Multi-resource packing for cluster schedulers

Robert Grandl, Ganesh Ananthanarayanan, Srikanth Kandula, Sriram Rao, Aditya Akella

Tasks in modern data parallel clusters have highly diverse resource requirements, along CPU, memory, disk and network. Any of these resources may become bottlenecks and hence, the likelihood of wasting resources due to fragmentation is now larger. Today's ...

Application-driven bandwidth guarantees in datacenters

Jeongkeun Lee, Yoshio Turner, Myungjin Lee, Lucian Popa, Sujata Banerjee, Joon-Myung Kang, Puneet Sharma

Providing bandwidth guarantees to specific applications is becoming increasingly important as applications compete for shared cloud network resources. We present CloudMirror, a solution that provides bandwidth guarantees to cloud applications based on ...

SESSION: Wireless 2

Kyle Jamieson

Vidyut: exploiting power line infrastructure for enterprise wireless networks

Vivek Yenamandra, Kannan Srinivasan

Global synchronization across time and frequency domains significantly benefits wireless communications. Multi-Cell (Network) MIMO, interference alignment solutions, opportunistic routing techniques in ad-hoc networks, OFDMA etc. all necessitate synchronization ...

Wi-fi backscatter: internet connectivity for RF-powered devices

Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall

RF-powered computers are small devices that compute and communicate using only the power that they harvest from RF signals. While existing technologies have harvested power from ambient RF sources (e.g., TV broadcasts), they require a dedicated gateway ...

Turbocharging ambient backscatter communication

Aaron N. Parks, Angli Liu, Shyamnath Gollakota, Joshua R. Smith

Communication primitives such as coding and multiple antenna processing have provided significant benefits for traditional wireless systems. Existing designs, however, consume significant power and computational resources, and hence cannot be run on ...

Geosphere: consistently turning MIMO capacity into throughput

Konstantinos Nikitopoulos, Juan Zhou, Ben Congdon, Kyle Jamieson

This paper presents the design and implementation of Geosphere, a physical- and link-layer design for access point-based MIMO wireless networks that consistently improves network throughput. To send multiple streams of data in a MIMO system, prior designs ...

expand

SESSION: Network operations

Andrew Moore

Calendaring for wide area networks

Srikanth Kandula, Ishai Menache, Roy Schwartz, Spandana Raj Babbula

Datacenter WAN traffic consists of high priority transfers that have to be carried as soon as they arrive alongside large transfers with pre-assigned deadlines on their completion (ranging from minutes to hours). The ability to offer guarantees to large ...

Traffic engineering with forward fault correction

Hongqiang Harry Liu, Srikanth Kandula, Ratul Mahajan, Ming Zhang, David Gelernter

Faults such as link failures and high switch configuration delays can cause heavy congestion and packet loss. Because it takes time to detect and react to faults, these conditions can last long---even tens of seconds. We propose forward fault correction ...

Dynamic scheduling of network updates

Xin Jin, Hongqiang Harry Liu, Rohan Gandhi, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Jennifer Rexford, Roger Wattenhofer

We present Dionysus, a system for fast, consistent network updates in software-defined networks. Dionysus encodes as a graph the consistency-related dependencies among updates at individual switches, and it then dynamically schedules these updates based ...

SDX: a software defined internet exchange

Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean P. Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett

BGP severely constrains how networks can deliver traffic over the Internet. Today's networks can only forward traffic based on the destination IP prefix, by selecting among routes offered by their immediate neighbors. We believe Software Defined Networking ...

A network-state management service

Peng Sun, Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin

We present Statesman, a network-state management service that allows multiple network management applications to operate independently, while maintaining network-wide safety and performance invariants. Network state captures various aspects of the network ...

expand

SESSION: Transport and congestion control

Jitendra Padhye

An experimental study of the learnability of congestion control

Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, Hari Balakrishnan

When designing a distributed network protocol, typically it is infeasible to fully define the target network where the protocol is intended to be used. It is therefore natural to ask: How faithfully do protocol designers really need to understand the ...

Friends, not foes: synthesizing existing transport strategies for data center networks

Ali Munir, Ghufran Baig, Syed M. Irteza, Ihsan A. Qazi, Alex X. Liu, Fahad R. Dogar

Many data center transports have been proposed in recent times (e.g., DCTCP, PDQ, pFabric, etc). Contrary to the common perception that they are competitors (i.e., protocol A vs. protocol B), we claim that the underlying strategies used in these protocols ...

CONGA: distributed congestion-aware load balancing for datacenters

Mohammad Alizadeh, Tom Edsall, Sarang Dharmapurikar, Ramanan Vaidyanathan, Kevin Chu, Andy Fingerhut, Vinh The Lam, Francis Matus, Rong Pan, Navindra Yadav, George Varghese

We present the design, implementation, and evaluation of CONGA, a network-based distributed congestion-aware load balancing mechanism for datacenters. CONGA exploits recent trends including the use of regular Clos topologies and overlays for network ...

POSTER SESSION: Poster session I

YouSlow: a performance analysis tool for adaptive bitrate video streaming

Hyunwoo Nam, Kyung-Hwa Kim, Doru Calin, Henning Schulzrinne

Adaptive bitrate (ABR) technologies are being widely used in today's popular HTTP-based video streaming such as YouTube and Netflix. Such a rate-switching algorithm embedded in a video player is designed to improve video quality-of-experience (QoE) by ...

RPKI vs ROVER: comparing the risks of BGP security solutions

Aanchal Malhotra, Sharon Goldberg

BGP, the Internet's interdomain routing protocol, is highly vulnerable to routing failures that result from unintentional misconfigurations or deliberate attacks. To defend against these failures, recent years have seen the adoption of the Resource Public ...

CTE: cost-effective intra-domain traffic engineering

Baobao Zhang, Jun Bi, Jianping Wu, Fred Baker

Traffic statistics collection with FleXam

Sajad Shirali-Shahreza, Yashar Ganjali

One of the limitations of wildcard rules in Software Defined Networks, such as OpenFlow, is losing visibility. FleXam is a flexible sampling extension for OpenFlow that allows the controller to define which packets should be sampled, what parts of each ...

Identifying traffic differentiation on cellular data networks

Arash Molavi Kakhki, Abbas Razaghpanah, Rajesh Golani, David Choffnes, Phillipa Gill, Alan Mislove

The goal of this research is to detect traffic differentiation in cellular data networks. We define service differentiation as any attempt to change the performance of network traffic traversing an ISP's boundaries. ISPs may implement differentiation ...

NIMBUS: cloud-scale attack detection and mitigation

Rui Miao, Minlan Yu, Navendu Jain

A user behavior based cheat detection mechanism for crowdtesting

Ricky K.P. Mok, Weichao Li, Rocky K.C. Chang

Crowdtesting is increasingly popular among researchers to carry out subjective assessments of different services. Experimenters can easily assess to a huge pool of human subjects through crowdsourcing platforms. The workers are usually anonymous, and ...

ESCAPE: extensible service chain prototyping environment using mininet, click, NETCONF and POX

Attila Csoma, Balázs Sonkoly, Levente Csikor, Felicián Németh, Andràs Gulyas, Wouter Tavernier, Sahel Sahhaf

Mininet is a great prototyping tool which combines existing SDN-related software components (e.g., Open vSwitch, OpenFlow controllers, network namespaces, cgroups) into a framework, which can automatically set up and configure customized OpenFlow testbeds ...

Sampling online social networks: an experimental study of twitter

Maksym Gabielkov, Ashwin Rao, Arnaud Legout

Online social networks (OSNs) are an important source of information for scientists in different fields such as computer science, sociology, economics, etc. However, it is hard to study OSNs as they are very large. For instance, Facebook has 1.28 billion ...

Mahimahi: a lightweight toolkit for reproducible web measurement

Ravi Netravali, Anirudh Sivaraman, Keith Winstein, Somak Das, Ameesh Goyal, Hari Balakrishnan

This demo presents a measurement toolkit, Mahimahi, that records websites and replays them under emulated network conditions. Mahimahi is structured as a set of arbitrarily composable UNIX shells. It includes two shells to record and replay Web pages, ...

A time for reliability: the growing importance of being always on

Zachary S. Bischof, Fabián E. Bustamante

When a new technology reaches the market, we typically focus on the want or need that it can fulfill. As the technology becomes a commodity and its market matures, reliability often become a key differentiating factor between competing products. We posit ...

Vivisecting whatsapp through large-scale measurements in mobile networks

Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas

WhatsApp, the new giant in instant multimedia messaging in mobile networks is rapidly increasing its popularity, taking over the traditional SMS/MMS messaging. In this paper we present the first large-scale characterization of WhatsApp, useful among ...

Behind the curtain: the importance of replica selection in next generation cellular networks

John P. Rula, Fabian E. Bustamante

Flowinsight: decoupling visibility from operability in SDN data plane

Yuliang Li, Guang Yao, Jun Bi

A cliq of content curators

Angela H. Jiang, Zachary S. Bischof, Fabian E. Bustamante

A social news site presents user-curated content, ranked by popularity. Popular curators like Reddit, or Facebook have become effective way of crowdsourcing news or sharing for personal opinions. Traditionally, these services require a centralized authority ...

Native actors: how to scale network forensics

Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch

When an organization detects a security breach, it undertakes a forensic analysis to figure out what happened. This investigation involves inspecting a wide range of heterogeneous data sources spanning over a long period of time. The iterative nature ...

SOUP: an online social network by the people, for the people

David Koll, Jun Li, Xiaoming Fu

With increasing frequency, users raise concerns about data privacy and protection in centralized Online Social Networks (OSNs), in which providers have the unprecedented privilege to access and exploit every user's private data at will. To mitigate these ...

AI3: application-independent information infrastructure

Bo Zhang, Jinfan Wang, Xinyu Wang, Yingying Cheng, Xiaohua Jia, Jianfei He

In the current Internet architecture, application service providers (ASPs) own users' data and social groups information, which made a handful of ASP companies growing bigger and bigger and denied small and medium companies from entering this business. ...

Robust full duplex radio link

Dinesh Bharadia, Kiran Joshi, Sachin Katti

This paper presents demonstration of a real-time full duplex point-to-point link, where transmission and reception occurs in the same spectrum band simultaneously between a pair of full-duplex radios. This demo first builds a full duplex radio by implementing ...

Demonstrating the prospects of dynamic application-aware networking in a home environment

Florian Wamser, Thomas Zinner, Lukas Iffländer, Phuoc Tran-Gia

POSTER SESSION: Poster session II

Enabling near real-time central control for live video delivery in CDNs

Matthew K. Mukerjee, JungAh Hong, Junchen Jiang, David Naylor, Dongsu Han, Srinivasan Seshan, Hui Zhang

User-created live video streaming is marking a fundamental shift in the workload of live video delivery. However, live-video-specific challenges and the viral nature of user-created content makes it difficult for current CDNs to deliver 1) high-quality, ...

NetAssay: providing new monitoring primitives for network operators

Sean Donovan, Nick Feamster

Home and business network operators have limited network statistics available over which management decisions can be made. Similarly, there are few triggered behaviors, such as usage or bandwidths cap for individual users, that are available. By looking ...

OpenSAN: a software-defined satellite network architecture

Jinzhen Bao, Baokang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu, Zhenghu Gong

In recent years, with the rapid development of satellite technology including On Board Processing (OBP) and Inter Satellite Link (ISL), satellite network devices such as space IP routers have been experimentally carried in space. However, there are many ...

SENSS: observe and control your own traffic in the internet

Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic

We propose a new software-defined security service -- SENSS -- that enables a victim network to request services from remote ISPs for traffic that carries source IPs or destination IPs from this network's address space. These services range from statistics ...

Locating throughput bottlenecks in home networks

Srikanth Sundaresan, Nick Feamster, Renata Teixeira

We present a demonstration of WTF (Where's The Fault?), a system that localizes performance problems in home and access networks. We implement WTF as custom firmware that runs in an off-the-shelf home router. WTF uses timing and buffering information ...

OpenANFV: accelerating network function virtualization with a consolidated framework in openstack

Xiongzi Ge, Yi Liu, David H.C. Du, Liang Zhang, Hongguang Guan, Jian Chen, Yuping Zhao, Xinyu Hu

The resources of dedicated accelerators (e.g. FPGA) are still required to bridge the gap between software-based Middleboxs(MBs) and the commodity hardware. To consolidate various hardware resources in an elastic, programmable and reconfigurable manner, ...

Towards the super fluid cloud

Filipe Manco, Joao Martins, Felipe Huici

Traditionally, the number of VMs running on a server and how quickly these can be migrated has been less than optimal mostly because of the memory and CPU requirements imposed on the system by the full-fledged OSes that the VMs run. More recently, work ...

Ziria: language for rapid prototyping of wireless PHY

Gordon Stewart, Mahanth Gowda, Geoffrey Mainland, Bozidar Radunovic, Dimitrios Vytiniotis, Doug Patterson

Software-defined radios (SDR) have the potential to bring major innovation in wireless networking design. However, their impact so far has been limited due to complex programming tools. Most of the existing tools are either too slow to achieve the full ...

Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events

Steffen Gebert, David Hock, Thomas Zinner, Phuoc Tran-Gia, Marco Hoffmann, Michael Jarschel, Ernst-Dieter Schmidt, Ralf-Peter Braun, Christian Banse, Andreas Köpsel

Tracing multipath TCP connections

Benjamin Hesmans, Olivier Bonaventure

Multipath TCP is a new extension to TCP that enables a host to transmit the packets from a given connection by using several interfaces. We propose mptcptrace, a software that enables a detailed analysis of Multipath TCP packet traces.

Demo: a virtualized lab testbed with physical network outlets for hands-on computer networking education

Mark Schmidt, Florian Heimgaertner, Michael Menth

This demo presents a testbed for computer networking education. It leverages hardware virtualization to accommodate 6 PCs and 2 routers on a single testbed host to reduce costs, energy consumption, space requirements, and heat emission. The testbed excels ...

Rethinking congestion control architecture: performance-oriented congestion control

Mo Dong, Qingxi Li, Doron Zarchy, Brighten Godfrey, Michael Schapira

After more than two decades of evolution, TCP and its end host based modifications can still suffer from severely degraded performance under real-world challenging network conditions. The reason, as we observe, is due to TCP family's fundamental architectural ...

DOT: distributed OpenFlow testbed

Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba

With the growing adoption of Software Defined Networking (SDN) technology, there is a compelling need for an SDN emulator that can facilitate experimenting with new SDN solutions. Unfortunately, Mininet, the de facto standard emulator for software defined ...

Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework

Adrian Gämperli, Vasileios Kotronis, Xenofontas Dimitropoulos

Droid-Sec: deep learning in android malware detection

Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, Yibo Xue

As smartphones and mobile devices are rapidly becoming indispensable for many network users, mobile malware has become a serious threat in the network security and privacy. Especially on the popular Android platform, many malicious apps are hiding in ...

Accelerating incast and multicast traffic delivery for data-intensive applications using physical layer optics

Payman Samadi, Varun Gupta, Berk Birand, Howard Wang, Gil Zussman, Keren Bergman

We present a control plane architecture to accelerate multicast and incast traffic delivery for data-intensive applications in cluster-computing interconnection networks. The architecture is experimentally examined by enabling physical layer optical ...

Social SDN: online social networks integration in wireless network provisioning

Arjuna Sathiaseelan, M. Said Seddiki, Stoyan Stoyanov, Dirk Trossen

Flow-level state transition as a new switch primitive for SDN

Masoud Moshref, Apoorv Bhargava, Adhip Gupta, Minlan Yu, Ramesh Govindan

T-DNS: connection-oriented DNS to improve privacy and security (poster abstract)

Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya

DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that ...

Extending the software-defined network boundary

Oliver Michel, Michael Coughlin, Eric Keller

Given that Software-Defined Networking is highly successful in solving many of today's manageability, flexibility, and scalability issues in large-scale networks, in this paper we argue that the concept of SDN can be extended even further. Many applications ...

POSTER SESSION: Poster session 3

Rethinking buffer management in data center networks

Aisha Mushtaq, Asad Khalid Ismail, Abdul Wasay, Bilal Mahmood, Ihsan Ayyub Qazi, Zartash Afzal Uzmi

Data center operators face extreme challenges in simultaneously providing low latency for short flows, high throughput for long flows, and high burst tolerance. We propose a buffer management strategy that addresses these challenges by isolating short ...

VIRL: the virtual internet routing lab

Joel Obstfeld, Simon Knight, Ed Kern, Qiang Sheng Wang, Tom Bryan, Dan Bourque

The increasing demand to provide new network services in a timely and efficient manner is driving the need to design, test and deploy networks quickly and consistently. Testing and verifying at scale is a challenge: network equipment is expensive, requires ...

SDX: a software defined internet exchange

Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean Patrick Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett

BGP severely constrains how networks can deliver traffic over the Internet. Today's networks can only forward traffic based on the destination IP prefix, by selecting among routes offered by their immediate neighbors. We believe Software Defined Networking ...

Toward a biometric-aware cloud service engine for multi-screen video applications

Han Hu, Yichao Jin, Yonggang Wen, Tat-Seng Chua, Xuelong Li

The emergence of portable devices and online social networks (OSNs) has changed the traditional video consumption paradigm by simultaneously providing multi-screen video watching, social networking engagement, etc. One challenge is to design a unified ...

SDN-based live VM migration across datacenters

Jiaqiang Liu, Yong Li, Depeng Jin

Characterizing botnets-as-a-service

Wentao Chang, An Wang, Aziz Mohaisen, Songqing Chen

Aerial wireless localization using target-guided flight route

Shaofeng Chen, Dingyi Fang, Xiaojiang Chen, Tingting Xia, Meng Jin

This poster presents GuideLoc, a highly efficient aerial wireless localization system that uses directional antennas mounted on a mini Multi-rotor Unmanned Aerial Vehicle (UAV), to enable detecting and positioning of targets. Taking advantage of angle ...

An educational networking framework for full layer implementation and testing

Keunhong Lee, Joongi Kim, Sue Moon

Drawbridge: software-defined DDoS-resistant traffic engineering

Jun Li, Skyler Berg, Mingwei Zhang, Peter Reiher, Tao Wei

End hosts in today's Internet have the best knowledge of the type of traffic they should receive, but they play no active role in traffic engineering. Traffic engineering is conducted by ISPs, which unfortunately are blind to specific user needs. End ...

DesktopDC: setting all programmable data center networking testbed on desk

Chengchen Hu, Ji Yang, Zhimin Gong, Shuoling Deng, Hongbo Zhao
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: 
相关文章推荐