ACM SIGCOMM Conference 2011:Toronto, ON, Canada

Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011. ACM 【DBLP Link

Paper Num: 80 || Session Num: 15

Security 3

1. They can hear your heartbeats: non-invasive security for implantable medical devices.

Paper Link】 【Pages】:2-13

【Authors】: Shyamnath Gollakota ; Haitham Hassanieh ; Benjamin Ransford ; Dina Katabi ; Kevin Fu

【Abstract】: Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.

【Keywords】: full-duplex; implanted medical devices; wireless

2. Let the market drive deployment: a strategy for transitioning to BGP security.

Paper Link】 【Pages】:14-25

【Authors】: Phillipa Gill ; Michael Schapira ; Sharon Goldberg

【Abstract】: With a cryptographic root-of-trust for Internet routing(RPKI [17]) on the horizon, we can finally start planning the deployment of one of the secure interdomain routing protocols proposed over a decade ago (Secure BGP [22], secure origin BGP [37]). However, if experience with IPv6 is any indicator, this will be no easy task. Security concerns alone seem unlikely to provide sufficient local incentive to drive the deployment process forward. Worse yet, the security benefits provided by the SBGP protocols do not even kick in until a large number of ASes have deployed them. Instead, we appeal to ISPs' interest in increasing revenue-generating traffic. We propose a strategy that governments and industry groups can use to harness ISPs' local business objectives and drive global SBGP deployment. We evaluate our deployment strategy using theoretical analysis and large-scale simulations on empirical data. Our results give evidence that the market dynamics created by our proposal can transition the majority of the Internet to S*BGP.

【Keywords】: bgp; routing; security

3. Finding protocol manipulation attacks.

Paper Link】 【Pages】:26-37

【Authors】: Nupur Kothari ; Ratul Mahajan ; Todd D. Millstein ; Ramesh Govindan ; Madanlal Musuvathi

【Abstract】: We develop a method to help discover manipulation attacks in protocol implementations. In these attacks, adversaries induce honest nodes to exhibit undesirable behaviors by misrepresenting their intent or network conditions. Our method is based on a novel combination of static analysis with symbolic execution and dynamic analysis with concrete execution. The former finds code paths that are likely vulnerable, and the latter emulates adversarial actions that lead to effective attacks. Our method is precise (i.e., no false positives) and we show that it scales to complex protocol implementations. We apply it to four diverse protocols, including TCP, the 802.11 MAC, ECN, and SCTP, and show that it is able to find all manipulation attacks that have been previously reported for these protocols. We also find a previously unreported attack for SCTP. This attack is a variant of a TCP attack but must be mounted differently in SCTP because of subtle semantic differences between the two protocols.

【Keywords】: manipulation attacks; symbolic execution

Novel data center architectures 3

4. Augmenting data center networks with multi-gigabit wireless links.

Paper Link】 【Pages】:38-49

【Authors】: Daniel Halperin ; Srikanth Kandula ; Jitendra Padhye ; Paramvir Bahl ; David Wetherall

【Abstract】: The 60 GHz wireless technology that is now emerging has the potential to provide dense and extremely fast connectivity at low cost. In this paper, we explore its use to relieve hotspots in oversubscribed data center (DC) networks. By experimenting with prototype equipment, we show that the DC environment is well suited to a deployment of 60GHz links contrary to concerns about interference and link reliability. Using directional antennas, many wireless links can run concurrently at multi-Gbps rates on top-of-rack (ToR) switches. The wired DC network can be used to sidestep several common wireless problems. By analyzing production traces of DC traffic for four real applications, we show that adding a small amount of network capacity in the form of wireless flyways to the wired DC network can improve performance. However, to be of significant value, we find that one hop indirect routing is needed. Informed by our 60GHz experiments and DC traffic analysis, we present a design that uses DC traffic levels to select and adds flyways to the wired DC network. Trace-driven evaluations show that network-limited DC applications with predictable traffic workloads running on a 1:2 oversubscribed network can be sped up by 45% in 95% of the cases, with just one wireless device per ToR switch. With two devices, in 40% of the cases, the performance is identical to that of a non-oversubscribed network.

【Keywords】: 60 ghz; 802.11ad; data center; datacenter; flyways; network

5. Better never than late: meeting deadlines in datacenter networks.

Paper Link】 【Pages】:50-61

【Authors】: Christo Wilson ; Hitesh Ballani ; Thomas Karagiannis ; Antony I. T. Rowstron

【Abstract】: The soft real-time nature of large scale web applications in today's datacenters, combined with their distributed workflow, leads to deadlines being associated with the datacenter application traffic. A network flow is useful, and contributes to application throughput and operator revenue if, and only if, it completes within its deadline. Today's transport pro- tocols (TCP included), given their Internet origins, are agnostic to such flow deadlines. Instead, they strive to share network resources fairly. We show that this can hurt application performance. Motivated by these observations, and other (previously known) deficiencies of TCP in the datacenter environment, this paper presents the design and implementation of D3, a deadline-aware control protocol that is customized for the datacenter environment. D3 uses explicit rate control to apportion bandwidth according to flow deadlines. Evaluation from a 19-node, two-tier datacenter testbed shows that D3, even without any deadline information, easily outper- forms TCP in terms of short flow latency and burst tolerance. Further, by utilizing deadline information, D3 effectively doubles the peak load that the datacenter network cansupport.

【Keywords】: datacenter; deadline; online services; rate control; sla

6. NetLord: a scalable multi-tenant network architecture for virtualized datacenters.

Paper Link】 【Pages】:62-73

【Authors】: Jayaram Mudigonda ; Praveen Yalagandula ; Jeffrey C. Mogul ; Bryan Stiekes ; Yanick Pouffary

【Abstract】: Providers of "Infrastructure-as-a-Service" need datacenter networks that support multi-tenancy, scale, and ease of operation, at low cost. Most existing network architectures cannot meet all of these needs simultaneously. In this paper we present NetLord, a novel multi-tenant network architecture. NetLord provides tenants with simple and flexible network abstractions, by fully and efficiently virtualizing the address space at both L2 and L3. NetLord can exploit inexpensive commodity equipment to scale the network to several thousands of tenants and millions of virtual machines. NetLord requires only a small amount of offline, one-time configuration. We implemented NetLord on a testbed, and demonstrated its scalability, while achieving order-of-magnitude goodput improvements over previous approaches.

【Keywords】: datacenter network; multi-pathing; multi-tenant; network virtualization; scalable ethernet

Bulk data transfers 3

7. Inter-datacenter bulk transfers with netstitcher.

Paper Link】 【Pages】:74-85

【Authors】: Nikolaos Laoutaris ; Michael Sirivianos ; Xiaoyuan Yang ; Pablo Rodriguez

【Abstract】: Large datacenter operators with sites at multiple locations dimension their key resources according to the peak demand of the geographic area that each site covers. The demand of specific areas follows strong diurnal patterns with high peak to valley ratios that result in poor average utilization across a day. In this paper, we show how to rescue unutilized bandwidth across multiple datacenters and backbone networks and use it for non-real-time applications, such as backups, propagation of bulky updates, and migration of data. Achieving the above is non-trivial since leftover bandwidth appears at different times, for different durations, and at different places in the world. For this purpose, we have designed, implemented, and validated NetStitcher, a system that employs a network of storage nodes to stitch together unutilized bandwidth, whenever and wherever it exists. It gathers information about leftover resources, uses a store-and-forward algorithm to schedule data transfers, and adapts to resource fluctuations. We have compared NetStitcher with other bulk transfer mechanisms using both a testbed and a live deployment on a real CDN. Our testbed evaluation shows that NetStitcher outperforms all other mechanisms and can rescue up to five times additional datacenter bandwidth thus making it a valuable tool for datacenter providers. Our live CDN deployment demonstrates that our solution can perform large data transfers at a much lower cost than naive end-to-end or store-and-forward schemes.

【Keywords】: bulk transfers; inter-datacenter traffic; store-and-forward

8. The power of prediction: cloud bandwidth and cost reduction.

Paper Link】 【Pages】:86-97

【Authors】: Eyal Zohar ; Israel Cidon ; Osnat Mokryn

【Abstract】: In this paper we present PACK (Predictive ACKs), a novel end-to-end Traffic Redundancy Elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage would be optimized. PACK's main advantage is its capability of offloading the cloud-server TRE effort to end-clients, thus minimizing the processing costs induced by the TRE algorithm. Unlike previous solutions, PACK does not require the server to continuously maintain clients' status. This makes PACK very suitable for pervasive computation environments that combine client mobility and server migration to maintain cloud elasticity. PACK is based on a novel TRE technique, which allows the client to use newly received chunks to identify previously received chunk chains, which in turn can be used as reliable predictors to future transmitted chunks. We present a fully functional PACK implementation, transparent to all TCP-based applications and network devices. Finally, we analyze PACK benefits for cloud users, using traffic traces from various sources.

【Keywords】: caching; cloud computing; network optimization; traffic redundancy elimination

9. Managing data transfers in computer clusters with orchestra.

Paper Link】 【Pages】:98-109

【Authors】: Mosharaf Chowdhury ; Matei Zaharia ; Justin Ma ; Michael I. Jordan ; Ion Stoica

【Abstract】: Cluster computing applications like MapReduce and Dryad transfer massive amounts of data between their computation stages. These transfers can have a significant impact on job performance, accounting for more than 50% of job completion times. Despite this impact, there has been relatively little work on optimizing the performance of these data transfers, with networking researchers traditionally focusing on per-flow traffic management. We address this limitation by proposing a global management architecture and a set of algorithms that (1) improve the transfer times of common communication patterns, such as broadcast and shuffle, and (2) allow scheduling policies at the transfer level, such as prioritizing a transfer over other transfers. Using a prototype implementation, we show that our solution improves broadcast completion times by up to 4.5X compared to the status quo in Hadoop. We also show that transfer-level scheduling can reduce the completion time of high-priority transfers by 1.7X.

【Keywords】: data transfer; data-intensive applications; datacenter networks

Network measurement I -- wide-area measurement 3

10. On blind mice and the elephant: understanding the network impact of a large distributed system.

Paper Link】 【Pages】:110-121

【Authors】: John S. Otto ; Mario A. Sánchez ; David R. Choffnes ; Fabián E. Bustamante ; Georgos Siganos

【Abstract】: A thorough understanding of the network impact of emerging large-scale distributed systems -- where traffic flows and what it costs -- must encompass users' behavior, the traffic they generate and the topology over which that traffic flows. In the case of BitTorrent, however, previous studies have been limited by narrow perspectives that restrict such analysis. This paper presents a comprehensive view of BitTorrent, using data from a representative set of 500,000 users sampled over a two year period, located in 169 countries and 3,150 networks. This unique perspective captures unseen trends and reveals several unexpected features of the largest peer-to-peer system. For instance, over the past year total BitTorrent traffic has increased by 12%, driven by 25% increases in per-peer hourly download volume despite a 10% decrease in the average number of online peers. We also observe stronger diurnal usage patterns and, surprisingly given the bandwidth-intensive nature of the application, a close alignment between these patterns and overall traffic. Considering the aggregated traffic across access links, this has potential implications on BitTorrent-associated costs for Internet Service Providers (ISPs). Using data from a transit ISP, we find a disproportionately large impact on a commonly used burstable (95th-percentile) billing model. Last, when examining BitTorrent traffic's paths, we find that for over half its users, most network traffic never reaches large transit networks, but is instead carried by small transit ISPs. This raises questions on the effectiveness of most in-network monitoring systems to capture trends on peer-to-peer traffic and further motivates our approach.

【Keywords】: evaluation; internet-scale systems; peer-to-peer

11. Predicting and tracking internet path changes.

Paper Link】 【Pages】:122-133

【Authors】: Ítalo Cunha ; Renata Teixeira ; Darryl Veitch ; Christophe Diot

【Abstract】: This paper investigates to what extent it is possible to use traceroute-style probing for accurately tracking Internet path changes. When the number of paths is large, the usual traceroute based approach misses many path changes because it probes all paths equally. Based on empirical observations, we argue that monitors can optimize probing according to the likelihood of path changes. We design a simple predictor of path changes using a nearest neighbor model. Although predicting path changes is not very accurate, we show that it can be used to improve probe targeting. Our path tracking method, called DTrack, detects up to two times more path changes than traditional probing, with lower detection delay, as well as providing complete load-balancer information.

【Keywords】: path changes; prediction; topology mapping; tracking

12. Broadband internet performance: a view from the gateway.

Paper Link】 【Pages】:134-145

【Authors】: Srikanth Sundaresan ; Walter de Donato ; Nick Feamster ; Renata Teixeira ; Sam Crawford ; Antonio Pescapè

【Abstract】: We present the first study of network access link performance measured directly from home gateway devices. Policymakers, ISPs, and users are increasingly interested in studying the performance of Internet access links. Because of many confounding factors in a home network or on end hosts, however, thoroughly understanding access network performance requires deploying measurement infrastructure in users' homes as gateway devices. In conjunction with the Federal Communication Commission's study of broadband Internet access in the United States, we study the throughput and latency of network access links using longitudinal measurements from nearly 4,000 gateway devices across 8 ISPs from a deployment of over 4,200 devices. We study the performance users achieve and how various factors ranging from the user's choice of modem to the ISP's traffic shaping policies can affect performance. Our study yields many important findings about the characteristics of existing access networks. Our findings also provide insights into the ways that access network performance should be measured and presented to users, which can help inform ongoing broader efforts to benchmark the performance of access networks.

【Keywords】: access networks; benchmarking; bismark; broadband networks

Wireless 3

13. Random access heterogeneous MIMO networks.

Paper Link】 【Pages】:146-157

【Authors】: Kate Ching-Ju Lin ; Shyamnath Gollakota ; Dina Katabi

【Abstract】: This paper presents the design and implementation of 802.11n+, a fully distributed random access protocol for MIMO networks. 802.11n+ allows nodes that differ in the number of antennas to contend not just for time, but also for the degrees of freedom provided by multiple antennas. We show that even when the medium is already occupied by some nodes, nodes with more antennas can transmit concurrently without harming the ongoing transmissions. Furthermore, such nodes can contend for the medium in a fully distributed way. Our testbed evaluation shows that even for a small network with three competing node pairs, the resulting system about doubles the average network throughput. It also maintains the random access nature of today's 802.11n networks.

【Keywords】: interference alignment; interference nulling; mimo

14. Strider: automatic rate adaptation and collision handling.

Paper Link】 【Pages】:158-169

【Authors】: Aditya Gudipati ; Sachin Katti

【Abstract】: This paper presents the design, implementation and evaluation of Strider, a system that automatically achieves almost the optimal rate adaptation without incurring any overhead. The key component in Strider is a novel code that has two important properties: it is rateless and collision-resilient. First, in time-varying wireless channels, Strider's rateless code allows a sender to effectively achieve almost the optimal bitrate, without knowing how the channel state varies. Second, Strider's collision-resilient code allows a receiver to decode both packets from collisions, and achieves the same throughput as the collision-free scheduler. We show via theoretical analysis that Strider achieves Shannon capacity for Gaussian channels, and our empirical evaluation shows that Strider outperforms SoftRate, a state of the art rate adaptation technique by 70% in mobile scenarios and by upto 2.8× in contention scenarios.

【Keywords】: collision decoding; hidden terminals; rate adaptation; rateless coding

15. Clearing the RF smog: making 802.11n robust to cross-technology interference.

Paper Link】 【Pages】:170-181

【Authors】: Shyamnath Gollakota ; Fadel Adib ; Dina Katabi ; Srinivasan Seshan

【Abstract】: Recent studies show that high-power cross-technology interference is becoming a major problem in today's 802.11 networks. Devices like baby monitors and cordless phones can cause a wireless LAN to lose connectivity. The existing approach for dealing with such high-power interferers makes the 802.11 network switch to a different channel; yet the ISM band is becoming increasingly crowded with diverse technologies, and hence many 802.11 access points may not find an interference-free channel. This paper presents TIMO, a MIMO design that enables 802.11n to communicate in the presence of high-power cross-technology interference. Unlike existing MIMO designs, however, which require all concurrent transmissions to belong to the same technology, TIMO can exploit MIMO capabilities to decode in the presence of a signal from a different technology, hence enabling diverse technologies to share the same frequency band. We implement a prototype of TIMO in GNURadio-USRP2 and show that it enables 802.11n to communicate in the presence of interference from baby monitors, cordless phones, and microwave ovens, transforming scenarios with a complete loss of connectivity to operational networks.

【Keywords】: cognitive mimo; cross-technology interference

Network modeling 3

16. Design space analysis for modeling incentives in distributed systems.

Paper Link】 【Pages】:182-193

【Authors】: Rameez Rahman ; Tamás Vinkó ; David Hales ; Johan A. Pouwelse ; Henk J. Sips

【Abstract】: Distributed systems without a central authority, such as peer-to-peer (P2P) systems, employ incentives to encourage nodes to follow the prescribed protocol. Game theoretic analysis is often used to evaluate incentives in such systems. However, most game-theoretic analyses of distributed systems do not adequately model the repeated interactions of nodes inherent in such systems. We present a game-theoretic analysis of a popular P2P protocol, Bit-Torrent, that models the repeated interactions in such protocols. We also note that an analytical approach for modeling incentives is often infeasible given the complicated nature of most deployed protocols. In order to comprehensively model incentives in complex protocols, we propose a simulation-based method, which we call Design Space Analysis (DSA). DSA provides a tractable analysis of competing protocol variants within a detailed design space. We apply DSA to P2P file swarming systems. With extensive simulations we analyze a wide-range of protocol variants and gain insights into their robustness and performance. To validate these results and to demonstrate the efficacy of DSA, we modify an instrumented BitTorrent client and evaluate protocols discovered using DSA. We show that they yield higher system performance and robustness relative to the reference implementation.

【Keywords】: design space analysis; game theory; incentive systems; robustness

17. How many tiers?: pricing in the internet transit market.

Paper Link】 【Pages】:194-205

【Authors】: Vytautas Valancius ; Cristian Lumezanu ; Nick Feamster ; Ramesh Johari ; Vijay V. Vazirani

【Abstract】: ISPs are increasingly selling "tiered" contracts, which offer Internet connectivity to wholesale customers in bundles, at rates based on the cost of the links that the traffic in the bundle is traversing. Although providers have already begun to implement and deploy tiered pricing contracts, little is known about how to structure them. While contracts that sell connectivity on finer granularities improve market efficiency, they are also more costly for ISPs to implement and more difficult for customers to understand. Our goal is to analyze whether current tiered pricing practices in the wholesale transit market yield optimal profits for ISPs and whether better bundling strategies might exist. In the process, we deliver two contributions: 1) we develop a novel way of mapping traffic and topology data to a demand and cost model, and 2) we fit this model on three large real-world networks: an European transit ISP, a content distribution network, and an academic research network, and run counterfactuals to evaluate the effects of different bundling strategies. Our results show that the common ISP practice of structuring tiered contracts according to the cost of carrying the traffic flows (e.g., offering a discount for traffic that is local) can be suboptimal and that dividing contracts based on both traffic demand and the cost of carrying it into only three or four tiers yields near-optimal profit for the ISP.

【Keywords】: bandwidth pricing; network economics

18. The evolution of layered protocol stacks leads to an hourglass-shaped architecture.

Paper Link】 【Pages】:206-217

【Authors】: Saamer Akhshabi ; Constantine Dovrolis

【Abstract】: The Internet protocol stack has a layered architecture that resembles an hourglass. The lower and higher layers tend to see frequent innovations, while the protocols at the waist of the hourglass appear to be "ossified". We propose EvoArch, an abstract model for studying protocol stacks and their evolution. EvoArch is based on a few principles about layered network architectures and their evolution in a competitive environment where protocols acquire value based on their higher layer applications and compete with other protocols at the same layer. EvoArch produces an hourglass structure that is similar to the Internet architecture from general initial conditions and in a robust manner. It also suggests a plausible explanation why some protocols, such as TCP or IP, managed to survive much longer than most other protocols at the same layers. Furthermore, it suggests ways to design more competitive new protocols and more evolvable future Internet architectures.

【Keywords】: evolution; evolutionary kernels; future internet; internet architecture; layering; network science

Neat tricks 2

19. What's the difference?: efficient set reconciliation without prior context.

Paper Link】 【Pages】:218-229

【Authors】: David Eppstein ; Michael T. Goodrich ; Frank Uyeda ; George Varghese

【Abstract】: We describe a synopsis structure, the Difference Digest, that allows two nodes to compute the elements belonging to the set difference in a single round with communication overhead proportional to the size of the difference times the logarithm of the keyspace. While set reconciliation can be done efficiently using logs, logs require overhead for every update and scale poorly when multiple users are to be reconciled. By contrast, our abstraction assumes no prior context and is useful in networking and distributed systems applications such as trading blocks in a peer-to-peer network, and synchronizing link-state databases after a partition. Our basic set-reconciliation method has a similarity with the peeling algorithm used in Tornado codes [6], which is not surprising, as there is an intimate connection between set difference and coding. Beyond set reconciliation, an essential component in our Difference Digest is a new estimator for the size of the set difference that outperforms min-wise sketches [3] for small set differences. Our experiments show that the Difference Digest is more efficient than prior approaches such as Approximate Reconciliation Trees [5] and Characteristic Polynomial Interpolation [17]. We use Difference Digests to implement a generic KeyDiff service in Linux that runs over TCP and returns the sets of keys that differ between machines.

【Keywords】: difference digest; invertible bloom filter; set difference

20. DOF: a local wireless information plane.

Paper Link】 【Pages】:230-241

【Authors】: Steven Siying Hong ; Sachin Rajsekhar Katti

【Abstract】: The ability to detect what unlicensed radios are operating in a neigh borhood, their spectrum occupancies and the spatial directions their signals are traversing is a fundamental primitive needed by many applications, ranging from smart radios to coexistence to network management to security. In this paper we present DOF, a detector that in a single framework accurately estimates all three parameters. DOF builds on the insight that in most wireless protocols, there are hidden repeating patterns in the signals that can be used to construct unique signatures, and accurately estimate signal types and their spectral and spatial parameters. We show via experimental evaluation in an indoor testbed that DOF is robust and accurate, it achieves greater than 85% accuracy even when the SNRs of the detected signals are as low as 0 dB, and even when there are multiple interfering signals present. To demonstrate the benefits of DOF, we design and implement a preliminary prototype of a smart radio that operates on top of DOF, and show experimentally that it provides a 80% increase in throughput over Jello, the best known prior implementation, while causing less than 10% performance drop for co-existing WiFi and Zigbee radios.

【Keywords】: smart radios; wireless degrees of freedom

Data center network performance 3

21. Towards predictable datacenter networks.

Paper Link】 【Pages】:242-253

【Authors】: Hitesh Ballani ; Paolo Costa ; Thomas Karagiannis ; Antony I. T. Rowstron

【Abstract】: The shared nature of the network in today's multi-tenant datacenters implies that network performance for tenants can vary significantly. This applies to both production datacenters and cloud environments. Network performance variability hurts application performance which makes tenant costs unpredictable and causes provider revenue loss. Motivated by these factors, this paper makes the case for extending the tenant-provider interface to explicitly account for the network. We argue this can be achieved by providing tenants with a virtual network connecting their compute instances. To this effect, the key contribution of this paper is the design of virtual network abstractions that capture the trade-off between the performance guarantees offered to tenants, their costs and the provider revenue. To illustrate the feasibility of virtual networks, we develop Oktopus, a system that implements the proposed abstractions. Using realistic, large-scale simulations and an Oktopus deployment on a 25-node two-tier testbed, we demonstrate that the use of virtual networks yields significantly better and more predictable tenant performance. Further, using a simple pricing model, we find that the our abstractions can reduce tenant costs by up to 74% while maintaining provider revenue neutrality.

【Keywords】: allocation; bandwidth; datacenter; virtual network

22. DevoFlow: scaling flow management for high-performance networks.

Paper Link】 【Pages】:254-265

【Authors】: Andrew R. Curtis ; Jeffrey C. Mogul ; Jean Tourrilhes ; Praveen Yalagandula ; Puneet Sharma ; Sujata Banerjee

【Abstract】: OpenFlow is a great concept, but its original design imposes excessive overheads. It can simplify network and traffic management in enterprise and data center environments, because it enables flow-level control over Ethernet switching and provides global visibility of the flows in the network. However, such fine-grained control and visibility comes with costs: the switch-implementation costs of involving the switch's control-plane too often and the distributed-system costs of involving the OpenFlow controller too frequently, both on flow setups and especially for statistics-gathering. In this paper, we analyze these overheads, and show that OpenFlow's current design cannot meet the needs of high-performance networks. We design and evaluate DevoFlow, a modification of the OpenFlow model which gently breaks the coupling between control and global visibility, in a way that maintains a useful amount of visibility without imposing unnecessary costs. We evaluate DevoFlow through simulations, and find that it can load-balance data center traffic as well as fine-grained solutions, without as much overhead: DevoFlow uses 10--53 times fewer flow table entries at an average switch, and uses 10--42 times fewer control messages.

【Keywords】: data center; flow-based networking; switch design

23. Improving datacenter performance and robustness with multipath TCP.

Paper Link】 【Pages】:266-277

【Authors】: Costin Raiciu ; Sébastien Barré ; Christopher Pluntke ; Adam Greenhalgh ; Damon Wischik ; Mark Handley

【Abstract】: The latest large-scale data centers offer higher aggregate bandwidth and robustness by creating multiple paths in the core of the net- work. To utilize this bandwidth requires different flows take different paths, which poses a challenge. In short, a single-path transport seems ill-suited to such networks. We propose using Multipath TCP as a replacement for TCP in such data centers, as it can effectively and seamlessly use available bandwidth, giving improved throughput and better fairness on many topologies. We investigate what causes these benefits, teasing apart the contribution of each of the mechanisms used by MPTCP. Using MPTCP lets us rethink data center networks, with a different mindset as to the relationship between transport protocols, rout- ing and topology. MPTCP enables topologies that single path TCP cannot utilize. As a proof-of-concept, we present a dual-homed variant of the FatTree topology. With MPTCP, this outperforms FatTree for a wide range of workloads, but costs the same. In existing data centers, MPTCP is readily deployable leveraging widely deployed technologies such as ECMP. We have run MPTCP on Amazon EC2 and found that it outperforms TCP by a factor of three when there is path diversity. But the biggest benefits will come when data centers are designed for multipath transports.

【Keywords】: data center; mptcp

Network management -- reasoning and debugging 3

24. NetQuery: a knowledge plane for reasoning about network properties.

Paper Link】 【Pages】:278-289

【Authors】: Alan Shieh ; Emin Gün Sirer ; Fred B. Schneider

【Abstract】: This paper presents the design and implementation of NetQuery, a knowledge plane for federated networks such as the Internet. In such networks, not all administrative domains will generate information that an application can trust and many administrative domains may have restrictive policies on disclosing network information. Thus, both the trustworthiness and accessibility of network information pose obstacles to effective reasoning. NetQuery employs trustworthy computing techniques to facilitate reasoning about the trustworthiness of information contained in the knowledge plane while preserving confidentiality guarantees for operator data. By characterizing information disclosure between operators, NetQuery enables remote verification of advertised claims and contractual stipulations; this enables new applications because network guarantees can span administrative boundaries. We have implemented NetQuery, built several NetQuery-enabled devices, and deployed applications for cloud datacenters, enterprise networks, and the Internet. Simulations, testbed experiments, and a deployment on a departmental network indicate NetQuery can support hundreds of thousands of operations per second and can thus scale to large ISPs.

【Keywords】: knowledge plane; tpm; trustworthy computing

25. Debugging the data plane with anteater.

Paper Link】 【Pages】:290-301

【Authors】: Haohui Mai ; Ahmed Khurshid ; Rachit Agarwal ; Matthew Caesar ; Brighten Godfrey ; Samuel Talmadge King

【Abstract】: Diagnosing problems in networks is a time-consuming and error-prone process. Existing tools to assist operators primarily focus on analyzing control plane configuration. Configuration analysis is limited in that it cannot find bugs in router software, and is harder to generalize across protocols since it must model complex configuration languages and dynamic protocol behavior. This paper studies an alternate approach: diagnosing problems through static analysis of the data plane. This approach can catch bugs that are invisible at the level of configuration files, and simplifies unified analysis of a network across many protocols and implementations. We present Anteater, a tool for checking invariants in the data plane. Anteater translates high-level network invariants into boolean satisfiability problems (SAT), checks them against network state using a SAT solver, and reports counterexamples if violations have been found. Applied to a large university network, Anteater revealed 23 bugs, including forwarding loops and stale ACL rules, with only five false positives. Nine of these faults are being fixed by campus network operators.

【Keywords】: boolean satisfiability; data plane analysis; network troubleshooting

26. Demystifying configuration challenges and trade-offs in network-based ISP services.

Paper Link】 【Pages】:302-313

【Authors】: Theophilus Benson ; Aditya Akella ; Aman Shaikh

【Abstract】: ISPs are increasingly offering a variety of network-based services such as VPN, VPLS, VoIP, Virtual-Wire and DDoS protection. Although both enterprise and residential networks are rapidly adopting these services, there is little systematic work on the design challenges and trade-offs ISPs face in providing them. The goal of our paper is to understand the complexity underlying the layer-3 design of services and to highlight potential factors that hinder their introduction, evolution and management. Using daily snapshots of configuration and device metadata collected from a tier-1 ISP, we examine the logical dependencies and special cases in device configurations for five different network-based services. We find: (1) the design of the core data-plane is usually service-agnostic and simple, but the control-planes for different services become more complex as services evolve; (2) more crucially, the configuration at the service edge inevitably becomes more complex over time, potentially hindering key management issues such as service upgrades and troubleshooting; and (3) there are key service-specific issues that also contribute significantly to the overall design complexity. Thus, the high prevalent complexity could impede the adoption and growth of network-based services. We show initial evidence that some of the complexity can be mitigated systematically.

【Keywords】: configuration analysis; network modeling; network services

ISPs and wide-area networking 3

27. Seamless network-wide IGP migrations.

Paper Link】 【Pages】:314-325

【Authors】: Laurent Vanbever ; Stefano Vissicchio ; Cristel Pelsser ; Pierre François ; Olivier Bonaventure

【Abstract】: Network-wide migrations of a running network, such as the replacement of a routing protocol or the modification of its configuration, can improve the performance, scalability, manageability, and security of the entire network. However, such migrations are an important source of concerns for network operators as the reconfiguration campaign can lead to long and service-affecting outages. In this paper, we propose a methodology which addresses the problem of seamlessly modifying the configuration of commonly used link-state Interior Gateway Protocols (IGP). We illustrate the benefits of our methodology by considering several migration scenarios, including the addition or the removal of routing hierarchy in an existing IGP and the replacement of one IGP with another. We prove that a strict operational ordering can guarantee that the migration will not create IP transit service outages. Although finding a safe ordering is NP complete, we describe techniques which efficiently find such an ordering and evaluate them using both real-world and inferred ISP topologies. Finally, we describe the implementation of a provisioning system which automatically performs the migration by pushing the configurations on the routers in the appropriate order, while monitoring the entire migration process.

【Keywords】: configuration; design guidelines; interior gateway protocol (igp); migration; summarization

28. A content propagation metric for efficient content distribution.

Paper Link】 【Pages】:326-337

【Authors】: Ryan S. Peterson ; Bernard Wong ; Emin Gün Sirer

【Abstract】: Efficient content distribution in large networks comprising datacenters, end hosts, and distributed in-network caches is a difficult problem. Existing systems rely on mechanisms and metrics that fail to effectively utilize all available sources of bandwidth in the network. This paper presents a novel metric, called the Content Propagation Metric (CPM), for quantitatively evaluating the marginal benefit of available bandwidth to competing consumers, enabling efficient utilization of the bandwidth resource. The metric is simple to implement, imposes only a modest overhead, and can be retrofitted easily into existing content distribution systems. We have designed and implemented a high-performance content distribution system, called V-Formation, based on the CPM. The CPM guides V-Formation toward a global allocation of bandwidth that maximizes the aggregate download bandwidth of consumers. Results from a PlanetLab deployment and extensive simulations show that V-Formation achieves high aggregate bandwidth and that the CPM enables hosts to converge quickly on a stable allocation of resources in a wide range of deployment scenarios.

【Keywords】: content distribution; hybrid; peer-to-peer

Paper Link】 【Pages】:338-349

【Authors】: Eduard Goma Llairo ; Marco Canini ; Alberto López Toledo ; Nikolaos Laoutaris ; Dejan Kostic ; Pablo Rodriguez ; Rade Stanojevic ; Pablo Yagüe Valentin

【Abstract】: Access networks include modems, home gateways, and DSL Access Multiplexers (DSLAMs), and are responsible for 70-80% of total network-based energy consumption. In this paper, we take an in-depth look at the problem of greening access networks, identify root problems, and propose practical solutions for their user- and ISP-parts. On the user side, the combination of continuous light traffic and lack of alternative paths condemns gateways to being powered most of the time despite having Sleep-on-Idle (SoI) capabilities. To address this, we introduce Broadband Hitch-Hiking (BH2), that takes advantage of the overlap of wireless networks to aggregate user traffic in as few gateways as possible. In current urban settings BH2 can power off 65-90% of gateways. Powering off gateways permits the remaining ones to synchronize at higher speeds due to reduced crosstalk from having fewer active lines. Our tests reveal speedup up to 25%. On the ISP side, we propose introducing simple inexpensive switches at the distribution frame for batching active lines to a subset of cards letting the remaining ones sleep. Overall, our results show an 80% energy savings margin in access networks. The combination of B2 and switching gets close to this margin, saving 66% on average.

【Keywords】: broadband access networks; energy

Network measurement II -- what's going on? 3

30. Understanding network failures in data centers: measurement, analysis, and implications.

Paper Link】 【Pages】:350-361

【Authors】: Phillipa Gill ; Navendu Jain ; Nachiappan Nagappan

【Abstract】: We present the first large-scale analysis of failures in a data center network. Through our analysis, we seek to answer several fundamental questions: which devices/links are most unreliable, what causes failures, how do failures impact network traffic and how effective is network redundancy? We answer these questions using multiple data sources commonly collected by network operators. The key findings of our study are that (1) data center networks show high reliability, (2) commodity switches such as ToRs and AggS are highly reliable, (3) load balancers dominate in terms of failure occurrences with many short-lived software related faults,(4) failures have potential to cause loss of many small packets such as keep alive messages and ACKs, and (5) network redundancy is only 40% effective in reducing the median impact of failure.

【Keywords】: data centers; network reliability

31. Understanding the impact of video quality on user engagement.

Paper Link】 【Pages】:362-373

【Authors】: Florin Dobrian ; Vyas Sekar ; Asad Awan ; Ion Stoica ; Dilip Antony Joseph ; Aditya Ganjam ; Jibin Zhan ; Hui Zhang

【Abstract】: As the distribution of the video over the Internet becomes main- stream and its consumption moves from the computer to the TV screen, user expectation for high quality is constantly increasing. In this context, it is crucial for content providers to understand if and how video quality affects user engagement and how to best invest their resources to optimize video quality. This paper is a first step towards addressing these questions. We use a unique dataset that spans different content types, including short video on demand (VoD), long VoD, and live content from popular video con- tent providers. Using client-side instrumentation, we measure quality metrics such as the join time, buffering ratio, average bitrate, rendering quality, and rate of buffering events. We quantify user engagement both at a per-video (or view) level and a per-user (or viewer) level. In particular, we find that the percentage of time spent in buffering (buffering ratio) has the largest impact on the user engagement across all types of content. However, the magnitude of this impact depends on the content type, with live content being the most impacted. For example, a 1% increase in buffering ratio can reduce user engagement by more than three minutes for a 90-minute live video event. We also see that the average bitrate plays a significantly more important role in the case of live content than VoD content.

【Keywords】: engagement; measurement; video quality

32. An untold story of middleboxes in cellular networks.

Paper Link】 【Pages】:374-385

【Authors】: Zhaoguang Wang ; Zhiyun Qian ; Qiang Xu ; Zhuoqing Morley Mao ; Ming Zhang

【Abstract】: The use of cellular data networks is increasingly popular as network coverage becomes more ubiquitous and many diverse user-contributed mobile applications become available. The growing cellular traffic demand means that cellular network carriers are facing greater challenges to provide users with good network performance and energy efficiency, while protecting networks from potential attacks. To better utilize their limited network resources while securing the network and protecting client devices the carriers have already deployed various network policies that influence traffic behavior. Today, these policies are mostly opaque, though they directly impact application designs and may even introduce network vulnerabilities. We present NetPiculet, the first tool that unveils carriers' NAT and firewall policies by conducting intelligent measurement. By running NetPiculet on the major U.S. cellular providers as well as deploying it as a smartphone application in the wild covering more than 100 cellular ISPs, we identified the key NAT and firewall policies which have direct implications on performance, energy, and security. For example, NAT boxes and firewalls set timeouts for idle TCP connections, which sometimes cause significant energy waste on mobile devices. Although most carriers today deploy sophisticated firewalls, they are still vulnerable to various attacks such as battery draining and denial of service. These findings can inform developers in optimizing the interaction between mobile applications and cellular networks and also guide carriers in improving their network configurations.

【Keywords】: cellular data network; firewall; middlebox; nat; tcp performance

SIGCOMM 2011 posters session 1 12

33. Automatic inference of movements from contact histories.

Paper Link】 【Pages】:386-387

【Authors】: Pengcheng Wang ; Zhaoyu Gao ; Xinhui Xu ; Yujiao Zhou ; Haojin Zhu ; Kenny Qili Zhu

【Abstract】: This paper introduces a new security problem in which individuals movement traces (in terms of accurate routes) can be inferred from just a series of mutual contact records and the map of the area in which they roam around. Such contact records may be obtained through the bluetooth communication on mobile phones. We present an approach that solve the trace inference problem in reasonable time, and analyze some properties of the inference algorithm.

【Keywords】: contacts; inference; location privacy; traces

34. Towards a fully distributed n-tuple store.

Paper Link】 【Pages】:388-389

【Authors】: Yan Shvartzshnaider ; Maximilian Ott

【Abstract】: We present our work towards building a novel distributed n-tuple store by extending the Kademlia DHT [1] algorithm to support n dimensional keys as well as an multi get operator, where some of the dimensions of the "query" key can be left unspecified.

【Keywords】: distributed pattern matching; kademlia

35. ASAP: a low-latency transport layer.

Paper Link】 【Pages】:390-391

【Authors】: Qingxi Li ; Wenxuan Zhou ; Matthew Caesar ; Brighten Godfrey

【Abstract】: For interactive networked applications like web browsing, every round-trip time (RTT) matters. We introduce ASAP, a new naming and transport protocol that reduces latency by shortcutting DNS requests and eliminating TCP's three-way handshake, while ensuring the key security property of verifiable provenance of client requests. ASAP eliminates between one and two RTTs, cutting the delay of small requests by up to two-thirds.

【Keywords】: dns; latency; security; tcp

36. What can free money tell us on the virtual black market?

Paper Link】 【Pages】:392-393

【Authors】: Kyungmoon Woo ; Hyukmin Kwon ; Hyunchul Kim ; Chong-kwon Kim ; Huy Kang Kim

【Abstract】: "Real money trading" or "Gold farming" refers to a set of illicit practices for gathering and distributing virtual goods in online games for real money. Unlike previous work, we use network-wide economic interactions among in-game characters as a lens to monitor, detect and identify gold farming networks. Our work is based on a set of real in-game trade activity logs collected for one month in year 2010 from the world's second largest MMORPG called AION (with 3.4 million subscribers). This is the first work that empirically (i) shows that "free money network" is a promising measure/approximation for detecting and characterizing gold farming networks, and (ii) measures the size of the free money net and in-game virtual economy in a large-scale MMORPG in terms of the cash flow.

【Keywords】: gold farming; onlinr game security; real money trading

37. LoKI: location-based PKI for social networks.

Paper Link】 【Pages】:394-395

【Authors】: Randy Baden

【Abstract】: Decentralized online social networks (OSNs) typically rely on the existence of a public key infrastructure (PKI), but certificate authorities (CAs) cannot scalably identify all of the members of an OSN. Our system, LoKI, uses the ubiquity of mobile devices to exchange secrets during real-world meetings that can be used for the purposes of identification in-band, allowing each user to easily discover the keys of many one-hop relationships in the OSN. We measure the frequency of such real-world meetings among OSN users with data sets crawled from Facebook, Twitter, and Foursquare. We quantify the resources consumed on the mobile devices in terms of storage and battery based on traces that reveal the number of mobile devices expected to be seen under normal activity. Lastly, we describe a rendezvous service that enables background peer-to-peer (P2P) communication on non-rooted Android phones, which we believe to be a practical and necessary service for many mobile peer-to-peer systems.

【Keywords】: location; mobility; online social networks; public key infrastructure

38. "Roto-Rooting" your router: solution against new potential DoS attacks on modern routers.

Paper Link】 【Pages】:396-397

【Authors】: Danai Chasaki

【Abstract】: Our work presents the first practical example of an entirely new class of network attacks - attacks that target the network infrastructure. Modern routers use general purpose programmable processors, and the software used for packet processing on these systems is potentially vulnerable to remote exploits. We describe a specific attack that can launch a devastating denial-of-service attack by sending just a single packet. We also show that there are effective defense techniques, based on processor monitoring, that can help in detecting and avoiding such attacks.

【Keywords】: embedded processors; next-generation internet

39. Limiting large-scale crawls of social networking sites.

Paper Link】 【Pages】:398-399

【Authors】: Mainack Mondal ; Bimal Viswanath ; Allen Clement ; Peter Druschel ; P. Krishna Gummadi ; Alan Mislove ; Ansley Post

【Abstract】: Online social networking sites (OSNs) like Facebook and Orkut contain personal data of millions of users. Many OSNs view this data as a valuable asset that is at the core of their business model. Both OSN users and OSNs have strong incentives to restrict large scale crawls of this data. OSN users want to protect their privacy and OSNs their business interest. Traditional defenses against crawlers involve rate- limiting browsing activity per user account. These defense schemes, however, are vulnerable to Sybil attacks, where a crawler creates a large number of fake user accounts. In this paper, we propose Genie, a system that can be deployed by OSN operators to defend against Sybil crawlers. Genie is based on a simple yet powerful insight: the social network itself can be leveraged to defend against Sybil crawlers. We first present Genie's design and then discuss how Genie can limit crawlers while allowing browsing of user profiles by normal users.

【Keywords】: social network-based sybil defense; social networks; sybil attacks

40. Designing a testbed for large-scale distributed systems.

Paper Link】 【Pages】:400-401

【Authors】: Christof Leng ; Max Lehn ; Robert Rehner ; Alejandro P. Buchmann

【Abstract】: Different evaluation methods for distributed systems like prototyping, simulation and emulation have different tradeoffs. We present a testbed for Internet applications that supports real-network prototypes and multiple simulators with unchanged application code. To ensure maximum portability between runtimes, a compact but flexible system interface is defined.

【Keywords】: event-based simulator; network simulator; peer-to-peer

41. Spider: improving mobile networking with concurrent wi-fi connections.

Paper Link】 【Pages】:402-403

【Authors】: Hamed Soroush ; Peter Gilbert ; Nilanjan Banerjee ; Mark D. Corner ; Brian Neil Levine ; Landon P. Cox

【Abstract】: We investigate attempting concurrent connections to multiple Wi-Fi access points (APs) from highly mobile clients. Previous multi-AP solutions are limited to stationary wireless clients and do not take into account a myriad of mobile factors. We show that connection duration, AP response times, channel scheduling, available and offered bandwidth, node speed, and dhcp joins all affect performance. Building on these results, we present a system, Spider, that establishes and maintains concurrent connections to 802.11 APs in a mobile environment. While Spider can manage multiple channels, we demonstrate that it achieves maximum throughput when using multiple APs on a single channel.

【Keywords】: concurrent wi-fi; mobile networks

42. Covert channels in multiple access protocols.

Paper Link】 【Pages】:404-405

【Authors】: Seyed Ali Ahmadzadeh ; Gordon B. Agnew

【Abstract】: In this paper, the use of structural behavior of communication protocols in designing new covert channels is investigated. In this way, a new covert transmitter is designed based on a modified CSMA protocol that enables the transmitter to embed a covert message in its overt traffic. The proposed scheme provides high covert rate without compromising the stealthiness of the channel.

【Keywords】: covert channel; information hiding; wireless networks

43. Pomelo: accurate and decentralized shortest-path distance estimation in social graphs.

Paper Link】 【Pages】:406-407

【Authors】: Zhuo Chen ; Yang Chen ; Cong Ding ; Beixing Deng ; Xing Li

【Abstract】: Computing the shortest-path distances between nodes is a key problem in analyzing social graphs. Traditional methods like breadth-first search (BFS) do not scale well with graph size. Recently, a Graph Coordinate System, called Orion, has been proposed to estimate shortest-path distances in a scalable way. Orion uses a landmark-based approach, which does not take account of the shortest-path distances between non-landmark nodes in coordinate calculation. Such biased input for the coordinate system cannot characterize the graph structure well. In this paper, we propose Pomelo, which calculates the graph coordinates in a decentralized manner. Every node in Pomelo computes its shortest-path distances to both nearby neighbors and some random distant neighbors. By introducing the novel partial BFS, the computational overhead of Pomelo is tunable. Our experimental results from different representative social graphs show that Pomelo greatly outperforms Orion in estimation accuracy while maintaining the same computational overhead.

【Keywords】: graph coordinate system; online social network

44. Dummy rate analysis of buffer constrained chaum mix.

Paper Link】 【Pages】:408-409

【Authors】: Abhishek Mishra ; Parv Venkitasubramaniam

【Abstract】:

【Keywords】: buffer constraint; chaum mix; dummy rate

SIGCOMM 2011 posters session 2 12

45. Minimising cell transmit power: towards self-organized resource allocation in OFDMA femtocells.

Paper Link】 【Pages】:410-411

【Authors】: David López-Pérez ; Xiaoli Chu ; Athanasios V. Vasilakos ; Holger Claussen

【Abstract】: With the introduction of femtocells, cellular networks are moving from the conventional centralised architecture to a distributed one, where each network cell should make its own radio resource management decisions, while providing inter-cell interference mitigation. However, realising this distributed cellular network architecture is not a trivial task. In this paper, we first introduce a simple self-organisation rule under which a distributed cellular network is able to converge into an efficient resource allocation pattern, then propose a novel resource allocation model taking realistic resource allocation constraints into account, and finally evaluate the performance of the proposed self-organisation rule and resource allocation model using system-level simulations.

【Keywords】: femtocell; interference; resource allocation

46. Building virtual networks across multiple domains.

Paper Link】 【Pages】:412-413

【Authors】: Christoph Werle ; Panagiotis Papadimitriou ; Ines Houidi ; Wajdi Louati ; Djamal Zeghlache ; Roland Bless ; Laurent Mathy

【Abstract】: This paper presents a platform for virtual network (VN) provisioning across multiple domains. The platform decomposes VN provisioning into multiple steps to address the implications of limited information disclosure on resource discovery and allocation. A new VN embedding algorithm with simultaneous node and link mapping allows to assign resources within each domain. For inter-domain virtual link setup, we design and realize a signaling protocol that also integrates resource reservations for providing virtual links with Quality-of-Service guarantees. Experimental results show that small VNs can be provisioned within a few seconds.

【Keywords】: network virtualization; platform design; resource provisioning

47. Multi-relational social networks in a large-scale MMORPG.

Paper Link】 【Pages】:414-415

【Authors】: Seokshin Son ; Ah Reum Kang ; Hyunchul Kim ; Ted Taekyoung Kwon ; Juyong Park ; Huy Kang Kim

【Abstract】: We analyze multi-relational social interaction networks in a large-scale commercial Massively Multiplayer Online Role-Playing Game(MMORPG). Our work is based on data from AION, currently the world's second most-played MMORPG with 3.4 million subscribers as of mid 2010, created and serviced by NCSoft, Inc. We construct and characterize six distinct interactivity networks (Friend, Private Messaging, Party invitation, Trade, Mail, and Shop), each representing diverse player interaction types.

【Keywords】: massively multiplayer online game; quantitative social science; social network analysis

48. Taming power peaks in mapreduce clusters.

Paper Link】 【Pages】:416-417

【Authors】: Nan Zhu ; Lei Rao ; Xue Liu ; Jie Liu ; Haibin Guan

【Abstract】: Along with the surging service demands on the cloud, the energy cost of Internet Data Centers (IDCs) is dramatically increasing. Energy management for IDCs is becoming ever more important. A large portion of applications running on data centers are data-intensive applications. MapReduce (and Hadoop) has been one of the mostly deployed frameworks for data-intensive applications. Both academia and industry have been greatly concerned with the problem of how to reduce the energy consumption of IDCs. However the critical power peak problem for MapReduce clusters has been overlooked, which is a new challenge brought by the usage of MapReduce. We elaborate the power peak problem and investigate the cause of the problem in details. Then we design an adaptive approach to regulate power peaks.

【Keywords】: mapreduce; power peak; regulation

49. Towards scalable and realistic node models for network simulators.

Paper Link】 【Pages】:418-419

【Authors】: Stein Kristiansen ; Thomas Plagemann ; Vera Goebel

【Abstract】: Network simulators typically do not include node models. Our studies show that in networks such as mobile networks, the impact of nodes on performance can be significant. Existing techniques to simulate nodes' are not scalable for network simulations, and require a too large modelling effort to be feasible for network research. In this paper, we propose to capture flexible per-protocol performance profiles from real, running systems using instrumentation and traffic benchmarking techniques. By using the obtained profiles as input into an extended scheduler simulator, the behaviour of the node can be accurately reproduced. Since the processing overhead is represented statistically, we preserve scalability and a low modelling overhead.

【Keywords】: linux; manet; multi-threading; network simulation; node model; ns-3; operating system; resource constraints

50. Revisiting next-hop selection in multipath networks.

Paper Link】 【Pages】:420-421

【Authors】: Simon van der Linden ; Gregory Detal ; Olivier Bonaventure

【Abstract】: Multipath routing strategies such as Equal-Cost MultiPath (ECMP) are widely used in IP and data-center networks. Most current methods to balance packets over the multiple next hops toward the destination base their decision on a hash computed over selected fields of the packet headers. Because of the non-invertible nature of hash functions, it is hard to determine the values of those fields so as to make the packet follow a specific path in the network. However, several applications might benefit from being able to choose such a path. Therefore, we propose a novel next-hop selection method based on an invertible function. By encoding the selection of successive routers into common fields of packet headers, the proposed method enables end hosts to force their packets to follow a specific path.

【Keywords】: load balancing; multipath; path selection

51. netmap: memory mapped access to network devices.

Paper Link】 【Pages】:422-423

【Authors】: Luigi Rizzo ; Matteo Landi

【Abstract】: Recent papers have shown that wire-speed packet processing is feasible in software even at 10~Gbit/s, but the result has been achieved taking direct control of the network controllers to cut down OS and device driver overheads. In this paper we show how to achieve similar performance in safer conditions on standard operating systems. As in some other proposals, our framework, called netmap, maps packet buffers into the process' memory space; but unlike other proposals, any operation that may affect the state of the hardware is filtered by the OS. This protects the system from crashes induced by misbehaving programs, and simplifies the use of the API. Our tests show that netmap takes as little as 90 clock cycles to move one packet between the wire and the application, almost one order of magnitude less than using the standard OS path. A single core at 1.33~GHz can send or receive packets at wire speed on 10~Gbit/s links (14.8~Mpps), with very good scalability in the number of cores and clock speed. At least three factors contribute to this performance: i) no overhead for encapsulation and metadata management; ii) no per-packet system calls and data copying (ioctl()s are still required, but involve no copying and their cost is amortized over a batch of packets); iii) much simpler device driver operation, because buffers have a plain and simple format that requires

【Keywords】: device drivers; monitoring; packet forwarding

52. Detecting and assessing the hybrid IPv4/IPv6 as relationships.

Paper Link】 【Pages】:424-425

【Authors】: Vasileios Giotsas ; Shi Zhou

【Abstract】: The business relationships between the Autonomous Systems (ASes) play a central role in the BGP routing. The existing relationship inference algorithms are profoundly based on the valley-free rule and generalize their inference heuristics for both the IPv4 and IPv6 planes, introducing unavoidable inference artifacts. To discover and analyze the Type-of-Relationship (ToR) properties of the IPv6 topology we mine the BGP Communities attribute which provides an unexploited wealth of reliable relationship information. We obtain the actual relationships for 72% of the IPv6 AS links that are visible in the RouteViews and RIPE RIS repositories. Our results show that as many as 13% of AS links that serve both IPv4 and IPv6 traffic have different relationships depending on the IP version. Such relationships are characterized as hybrid. We observe that links with hybrid relationships are present in a large number of IPv6 AS paths. Furthermore, an unusually large portion of IPv6 AS paths violate the valley-free rule, indicating that the global reachability in the IPv6 Internet requires the relaxation of the valley-free rule. Our work highlights the importance of correctly inferring the AS relationships and the need to appreciate the distinct characteristics of IPv6 routing policies.

【Keywords】: as relationship; autonomous systems; bgp; inference algorithms; inter-domain routing; internet; ipv6; topology

53. CloudProphet: towards application performance prediction in cloud.

Paper Link】 【Pages】:426-427

【Authors】: Ang Li ; Xuanran Zong ; Srikanth Kandula ; Xiaowei Yang ; Ming Zhang

【Abstract】: Choosing the best-performing cloud for one's application is a critical problem for potential cloud customers. We propose CloudProphet, a trace-and-replay tool to predict a legacy application's performance if migrated to a cloud infrastructure. CloudProphet traces the workload of the application when running locally, and replays the same workload in the cloud for prediction. We discuss two key technical challenges in designing CloudProphet, and some preliminary results using a prototype implementation.

【Keywords】: cloud computing; performance; prediction

54. A novel approach for making energy efficient PON.

Paper Link】 【Pages】:428-429

【Authors】: S. H. Shah Newaz ; Ángel Cuevas ; Gyu Myoung Lee ; Noël Crespi ; Jun Kyun Choi

【Abstract】: Nowadays Passive Optical Network (PON) requires that Optical Network Units (ONUs) wake up periodically to check if the Optical Line Terminal (OLT) has any message directed to them. This implies that ONUs change from sleeping mode in which they just consume 1 W to active mode in which the consumption goes up to 10 W. In many cases, the OLT does not have any packets for the ONU and it goes to sleep again, what supposes a waste of energy. In this paper, we propose a novel Hybrid ONU that relies on a low-cost and low-energy technology, IEEE 802.15.4, to wake up those ONUs that are going to receive a packet. Our first estimations demonstrates that our solution would save around 25000$ per year and OLT.

【Keywords】: converged.; energy saving; pon; sleep mode

55. On the efficacy of fine-grained traffic splitting protocolsin data center networks.

Paper Link】 【Pages】:430-431

【Authors】: Advait Abhay Dixit ; Pawan Prakash ; Ramana Rao Kompella

【Abstract】: Multi-rooted tree topologies are commonly used to construct high-bandwidth data center network fabrics. In these networks, switches typically rely on equal-cost multipath (ECMP) routing techniques to split traffic across multiple paths, such that packets within a flow traverse the same end-to-end path. Unfortunately, since ECMP splits traffic based on flow-granularity, it can cause load imbalance across paths resulting in poor utilization of network resources. More fine-grained traffic splitting techniques are typically not preferred because they can cause packet reordering that can, according to conventional wisdom, lead to severe TCP throughput degradation. In this work, we revisit this fact in the context of regular data center topologies such as fat-tree architectures. We argue that packet-level traffic splitting, where packets of a flow are sprayed through all available paths, would lead to a better load-balanced network, which in turn leads to significantly more balanced queues and much higher throughput compared to ECMP.

【Keywords】: data centers; traffic splitting

56. Wide-area routing dynamics of malicious networks.

Paper Link】 【Pages】:432-433

【Authors】: Maria Konte ; Nick Feamster

【Abstract】: This paper studies the routing dynamics of malicious networks. We characterize the routing behavior of malicious networks on both short and long timescales. We find that malicious networks more consistently advertise prefixes with short durations and long inter- arrival times; over longer timescales, we find that malicious ASes connect with more upstream providers than legitimate ASes, and they also change upstream providers more frequently.

【Keywords】: bgp; security; spam

SIGCOMM 2011 demos session 1 12

57. Online testing of federated and heterogeneous distributed systems.

Paper Link】 【Pages】:434-435

【Authors】: Marco Canini ; Vojin Jovanovic ; Daniele Venzano ; Dejan M. Novakovic ; Dejan Kostic

【Abstract】: DiCE is a system for online testing of federated and heterogeneous distributed systems. We have built a prototype of DiCE and integrated it with an open-source BGP router. DiCE quickly detects three important classes of faults, resulting from configuration mistakes, policy conflicts and programming errors. The goal of this demo is to showcase our DiCE prototype while it executes an experiment that involves exploring BGP system behavior in a topology with 27 BGP routers and Internet-like conditions (Figure 1).

【Keywords】: fault detection; federated and heterogeneous distributed systems; online testing

58. Performance based traffic control with IDIPS.

Paper Link】 【Pages】:436-437

【Authors】: Damien Saucez ; Olivier Bonaventure

【Abstract】: Nowadays Internet is ubiquitous resulting in an increasing path diversity and content duplication. However, while content can be retrieved from many different places, the paths to those places are not equivalent. Indeed, some paths offer better bandwidth while others are less expensive or more stable. In addition, a new range of applications is sensitive to the performance of the paths that carry their traffic. To support this evolution of the Internet, we propose ISP-Driven Informed Path Selection (IDIPS). Any ISP can easily deploy IDIPS to help its customers to select the paths that best meet their requirements in order to reach their content. IDIPS helps in this selection through pro-active measurements and ISP-defined policies. IDIPS is scalable and can support thousands of clients. IDIPS is also flexible and can thus be used by the ISP to optimize its routing decisions to take the performance of its inter-domain links into account.

【Keywords】: route control; traffic engineering; xorp

59. Eco-Sign: a load-based traffic light control system for environmental protection with vehicular communications.

Paper Link】 【Pages】:438-439

【Authors】: Lien-Wu Chen ; Pranay Sharma ; Yu-Chee Tseng

【Abstract】: The Eco-Sign system is a traffic light control system for minimizing greenhouse gases emitted by idling vehicles at intersections. Eco-Sign provides the following features: (i) it can notify vehicles to turn on/off their engines based on expected waiting time for green lights at intersections, (ii) it can dynamically adjust traffic light timing to minimize the number of vehicles stopping at an intersection based on vehicle arrival and departure rates, and (iii) it is a fully distributed system in the sense that each intersection can learn its local traffic condition and optimize its traffic sign setting to prevent congestions and thus traffic jams. Eco-Sign thus demonstrates a new traffic light control system for environmental protection.

【Keywords】: dynamic traffic light control; environmental protection; ignition control; vehicular communications

60. FSR: formal analysis and implementation toolkit for safe inter-domain routing.

Paper Link】 【Pages】:440-441

【Authors】: Yiqing Ren ; Wenchao Zhou ; Anduo Wang ; Limin Jia ; Alexander J. T. Gurney ; Boon Thau Loo ; Jennifer Rexford

【Abstract】: We present the demonstration of a comprehensive toolkit for analyzing and implementing routing policies, ranging from high-level guidelines to specific router configurations. Our Formally Safe Routing (FSR) toolkit performs all of these functions from the same algebraic representation of routing policy. We show that routing algebra has a very natural translation to both integer constraints (to perform safety analysis using SMT solvers) and declarative programs (to generate distributed implementations). Our demonstration with realistic topologies and policies shows how FSR can detect problems in an AS's iBGP configuration, prove sufficient conditions for BGP safety, and empirically evaluate convergence time.

【Keywords】: formal verification; formally safe routing; safety analysis

61. PANDAA: a physical arrangement detection technique for networked devices through ambient-sound awareness.

Paper Link】 【Pages】:442-443

【Authors】: Zheng Sun ; Aveek Purohit ; Philippe De Wagter ; Irina Brinster ; Chorom Hamm ; Pei Zhang

【Abstract】: This demo presents PANDAA, a zero-configuration automatic spatial localization technique for networked devices based on ambient sound sensing. We will demonstrate that after initial placement of the devices, ambient sounds, such as human speech, music, footsteps, finger snaps, hand claps, or coughs and sneezes, can be used to autonomously resolve the spatial relative arrangement of devices, such as mobile phones, using trigonometric bounds and successive approximation.

【Keywords】: arrangement detection; localization; networked devices

62. Implementing ARP-path low latency bridges in NetFPGA.

Paper Link】 【Pages】:444-445

【Authors】: Elisa Rojas ; Jad Naous ; Guillermo Ibáñez ; Diego Rivera ; Juan A. Carral ; José M. Arco

【Abstract】: The demo is focused on the implementation of ARP-Path (a.k.a. FastPath) bridges, a recently proposed concept for low latency bridges. ARP-Path Bridges rely on the race between broadcast ARP Request packets, to discover the minimum latency path to the destination host. Several implementations (in Omnet++, Linux, OpenFlow, NetFPGA) have shown that ARP-Path exhibits loop-freedom, does not block links, is fully transparent to hosts and neither needs a spanning tree protocol to prevent loops nor a link state protocol to obtain low latency paths. This demo compares our hardware implementation on NetFPGA to bridges running STP, showing that ARP-Path finds lower latency paths than STP.

【Keywords】: ethernet; netfpga; routing bridges; shortest path bridges; spanning tree

63. LifeNet: a flexible ad hoc networking solution for transient environments.

Paper Link】 【Pages】:446-447

【Authors】: Hrushikesh Mehendale ; Ashwin Paranjpe ; Santosh Vempala

【Abstract】: We demonstrate a new ad hoc routing method that can handle transience such as node-mobility, obstructions and node failures. It has controlled management overhead, and is platform-independent (our demo includes phones, routers, and laptops running different operating systems). It achieves reliability and flexibility at the expense of throughput. It is ideal for scenarios where the reliability of connectivity is critical and bandwidth requirements are low. For e.g., disaster relief operations and sensor networks. Along with applications, we exhibit measurements to illustrate the advantages of our approach in dealing with transience.

【Keywords】: manets; minimum infrastructure; reliable routing

64. A protocol for disaster data evacuation.

Paper Link】 【Pages】:448-449

【Authors】: Tilmann Rabl ; Florian Stegmaier ; Mario Döller ; The Thong Vang

【Abstract】: Data is the basis of the modern information society. However, recent natural catastrophes have shown that it is not possible to definitively secure a data storage location. Even if the storage location is not destroyed itself the access may quickly become impossible, due to the breakdown of connections or power supply. However, this rarely happens without any warning. While floods have hours or days of warning time, tsunamis usually leave only minutes for reaction and for earthquakes there are only seconds. In such situations, timely evacuation of important data is the key challenge. Consequently, the focus lies on minimizing the time to move away all data from the storage location whereas the actual time to arrival remains less (but still) important. This demonstration presents the dynamic fast send protocol (DFSP), a new bulk data transfer protocol. It employs striping to dynamic intermediate nodes in order to minimize sending time and to utilize the sender's resources to a high extent.

【Keywords】: data evacuation; dfsp; dynamic fast send protocol; fsp

65. Towards energy-efficient streaming system for mobile hotspots.

Paper Link】 【Pages】:450-451

【Authors】: Ming-Hung Chen ; Chun-Yu Yang ; Chun-Yuan Chang ; Ming-Yuan Hsu ; Ke-Han Lee ; Cheng-Fu Chou

【Abstract】: Modern mobile devices have become an important part of our daily life but the performance of multimedia applications still suffers from the constrained energy supply and communication bandwidth of the mobile devices. In this work, we develop an energy-efficient streaming system for mobile hotspots to achieve better Quality-of-Experience. Our main idea is (a) to avoid redundant 3G transmissions as well as reduce the usage of 3G links for those low residual-energy users, and (b) to enable nearby mobile users cooperatively to share the downloaded data via short-range interfaces. The experiment results shows our scheme can improve the system lifetime by 27%, and provide better throughput as well as lower loss rate than conversional 3G systems do.

【Keywords】: composite networks; cooperative networks; energy efficiency; mobile hotspots; streaming; wireless networks

66. MPLS-TE and MPLS VPNS with openflow.

Paper Link】 【Pages】:452-453

【Authors】: Ali Reza Sharafat ; Saurav Das ; Guru M. Parulkar ; Nick McKeown

【Abstract】: We demonstrate MPLS Traffic Engineering (MPLS-TE) and MPLS-based Virtual Private Networks (MPLS VPNs) using OpenFlow [1] and NOX [6]. The demonstration is the outcome of an engineering experiment to answer the following questions: How hard is it to implement a complex control plane on top of a network controller such as NOX? Does the global vantage point in NOX make the implementation easier than the traditional method of implementing it on every switch, embedded in the data plane? We implemented every major feature of MPLS-TE and MPLS-VPN in just 2,000 lines of code, compared to much larger lines of code in the more traditional approach, such as Quagga-MPLS. Because NOX maintains a consistent, up-to-date topology map, the MPLS control plane features are quite simple to implement. And its simplicity makes it easy to extend: We have easily added several new features; something a network operator could do to customize their network to meet their customers' needs. The demo consists of two parts: MPLS-TE services and then MPLS VPN driven by a GUI.

【Keywords】: mpls; mpls-te; openflow; traffic engineering; vpn

67. Dasu - ISP characterization from the edge: a BitTorrent implementation.

Paper Link】 【Pages】:454-455

【Authors】: Mario A. Sánchez ; John S. Otto ; Zachary S. Bischof ; Fabián E. Bustamante

【Abstract】: Evaluating and characterizing access ISPs is critical to consumers shopping for alternative services and governments surveying the availability of broadband services to their citizens. We present Dasu, a service for crowdsourcing ISP characterization to the edge of the network. Dasu is implemented as an extension to a popular BitTorrent client and has been available since July 2010. While the prototype uses BitTorrent as its host application, its design is agnostic to the particular host application. The demo showcases our current implementation using both a prerecorded execution trace and a live run.

【Keywords】: broadband access networks; characterization; isp

68. WiFire: a firewall for wireless networks.

Paper Link】 【Pages】:456-457

【Authors】: Matthias Wilhelm ; Ivan Martinovic ; Jens B. Schmitt ; Vincent Lenders

【Abstract】: Firewalls are extremely effective at enforcing security policies in wired networks. Perhaps surprisingly, firewalls are entirely nonexistent in the wireless domain. Yet, the need to selectively control and block radio communication is particularly high in a broadcast environment since any node may receive and send packets. In this demo, we present WiFire, a system that brings the firewall concept to wireless networks. First, WiFire detects and analyzes packets during their transmission, checking their content against a set of rules. It then relies on reactive jamming techniques to selectively block undesired communication. We show the feasibility and performance of WiFire, which is implemented on the USRP2 software-defined radio platform, in several scenarios with IEEE 802.15.4 radios. WiFire is able to classify and effectively block undesired communication without interfering with desired communication.

【Keywords】: 802.15.4; reactive jamming; software-defined jammer; wsn

SIGCOMM 2011 demos session 2 12

69. Demonstrating generalized virtual topologies in an openflow network.

Paper Link】 【Pages】:458-459

【Authors】: Elio Salvadori ; Roberto Doriguzzi Corin ; Matteo Gerola ; Attilio Broglio ; Francesco De Pellegrini

【Abstract】:

【Keywords】: network virtualization; openflow

70. Visualizing anomalies in sensor networks.

Paper Link】 【Pages】:460-461

【Authors】: Qi Liao ; Lei Shi ; Yuan He ; Rui Li ; Zhong Su ; Aaron Striegel ; Yunhao Liu

【Abstract】: Diagnosing a large-scale sensor network is a crucial but challenging task due to the spatiotemporally dynamic network behaviors of sensor nodes. In this demo, we present Sensor Anomaly Visualization Engine (SAVE), an integrated system that tackles the sensor network diagnosis problem using both visualization and anomaly detection analytics to guide the user quickly and accurately diagnose sensor network failures. Temporal expansion model, correlation graphs and dynamic projection views are proposed to effectively interpret the topological, correlational and dimensional sensor data dynamics and their anomalies. Through a real-world large-scale wireless sensor network deployment (GreenOrbs), we demonstrate that SAVE is able to help better locate the problem and further identify the root cause of major sensor network failures.

【Keywords】: anomaly detection and analysis; diagnosing; visualization; wireless sensor networks

71. WiRE: a new rural connectivity paradigm.

Paper Link】 【Pages】:462-463

【Authors】: Aditya Dhananjay ; Matt Tierney ; Jinyang Li ; Lakshminarayanan Subramanian

【Abstract】: Many rural areas in developing regions remain largely disconnected from the rest of the world due to low purchasing power and the exorbitant cost of existing connectivity solutions. Wireless Rural Extensions (WiRE) is a low-power rural wireless network architecture that provides inexpensive, self-sustainable, and high-bandwidth connectivity. WiRE relies on a high-bandwidth directional wireless backbone with local distribution networks to provide focused IP coverage. WiRE also provides cellular connectivity using OpenBTS-based GSM microcells. It supports a naming and addressing framework that inter-operates with traditional telecom networks and enables a wide range of mobile services on a common IP framework. The entire name network can be built by integrating a range of off-the-shelf components and existing open source tools.

【Keywords】: cellular

72. Supporting novel home network management interfaces with openflow and NOX.

Paper Link】 【Pages】:464-465

【Authors】: Richard Mortier ; Ben Bedwell ; Kevin Glover ; Tom Lodge ; Tom Rodden ; Charalampos Rotsos ; Andrew W. Moore ; Alexandros Koliousis ; Joseph S. Sventek

【Abstract】: The Homework project has examined redesign of existing home network infrastructures to better support the needs and requirements of actual home users. Integrating results from several ethnographic studies, we have designed and built a home networking platform providing detailed per-flow measurement and management capabilities supporting several novel management interfaces. This demo specifically shows these new visualization and control interfaces (1), and describes the broader benefits of taking an integrated view of the networking infrastructure, realised through our router's augmented measurement and control APIs (2). Aspects of this work have been published: the Homework Database in Internet Management (IM) 2011 [3] and implications of the ethnographic results are to appear at the SIGCOMM W-MUST workshop 2011 [2]. Separate, more detailed expositions of the interface elements and system performance and implications are currently under submission at other venues. A partial code release is already available and we anticipate fuller public beta release by Q4 2011.

【Keywords】: dhcp; home networks; network management; nox; openflow

73. Using NetMagic to observe fine-grained per-flow latency measurements.

Paper Link】 【Pages】:466-467

【Authors】: Tao Li ; Zhigang Sun ; Chunbo Jia ; Qi Su ; Myungjin Lee

【Abstract】: We introduce NetMagic to demonstrate the efficacy of RLI architecture RLI for the fine-grained per-flow latency measurements. In this demo, the main function of RLI is implemented in NetMagic, which is the key component of our experimental network comprising several computers and switches. We are going to show how NetMagic can provide rapid implementation and evaluation of RLI architecture that is difficult with commercial switch or router platforms. In the demo, the estimated fine-grained per-flow latency by RLI is monitored and dynamically presented. Further, the true latency with a resolution of 8ns is also provided by NetMagic for the evaluation. The efficacy of RLI architecture can be observed in a real-time fashion by the difference between estimated latencies and true ones.

【Keywords】: measurement; netmagic platform; per-flow latency; rli architecture

Paper Link】 【Pages】:468-469

【Authors】: Bart Puype ; Dimitri Papadimitriou ; Goutam Das ; Didier Colle ; Mario Pickavet ; Piet Demeester

【Abstract】: We demonstrate machine learning augmented Open Shortest Path First (OSPF) routing which infers Shared Risk Groups (SRG) from link failure history. For an initial link failure matching an SRG, it predicts subsequent link state advertisements corresponding with that SRG, improving convergence and recovery times during multiple network failures.

【Keywords】: cognitive routing; machine learning; network recovery; ospf; shared risk group

75. Communicating with caps: managing usage caps in home networks.

Paper Link】 【Pages】:470-471

【Authors】: Hyojoon Kim ; Srikanth Sundaresan ; Marshini Chetty ; Nick Feamster ; W. Keith Edwards

【Abstract】: As Internet service providers increasingly implement and impose "usage caps", consumers need better ways to help them understand and control how devices in the home use up the available network resources or available capacity. Towards this goal, we will demonstrate a system that allows users to monitor and manage their usage caps. The system uses the BISMark firmware running on network gateways to collect usage statistics and report them to a logically centralized controller, which displays usage information. The controller allows users to specify policies about how different people, devices, and applications should consume the usage cap; it implements and enforces these policies via a secure OpenFlow control channel to each gateway device. The demonstration will show various use cases, such as limiting the usage of a particular application, visualizing usage statistics, and allowing users within a single household to "trade" caps with one another.

【Keywords】: home network; openflow; usage cap

76. Cyber-physical handshake.

Paper Link】 【Pages】:472-473

【Authors】: Fang-Jing Wu ; Feng-I. Chu ; Yu-Chee Tseng

【Abstract】: While sensor-enabled devices have greatly enriched human interactions in our daily life, discovering the essential knowledge behind sensing data is a critical issue to connect the cyber world and the physical world. This motivates us to design an innovative sensor-aided social network system, termed cyber-physical handshake. It allows two users to naturally exchange personal information with each other after detecting and authenticating the handshaking patterns between them. This work describes our design of detection and authentication mechanisms to achieve this purpose and our prototype system to facilitate handshake social behavior.

【Keywords】: cyber-physical system; participatory sensing; pervasive computing; social network; wireless sensor network

77. An online gaming testbed for peer-to-peer architectures.

Paper Link】 【Pages】:474-475

【Authors】: Max Lehn ; Christof Leng ; Robert Rehner ; Tonio Triebel ; Alejandro P. Buchmann

【Abstract】: In this demo we present a testbed environment for Peer-to-Peer (P2P) game architectures. It is based on Planet PI4, an online multiplayer game whose gameplay provides a standard workload for a set of gaming-specific network interfaces. Its pluggable architecture allows for the evaluation and comparison of existing and new P2P networking approaches. Planet PI4 can run on a real network for prototypical evaluation as well as in a discrete-event simulator providing a reproducible environment.

【Keywords】: benchmarking; online gaming; peer-to-peer

78. Service hosting gateways: a platform for distributed service deployment in end user homes.

Paper Link】 【Pages】:476-477

【Authors】: Martin May ; Christophe Diot ; Pascal Le Guyadec ; Fabio Picconi ; Joris Roussel ; Augustin Soule

【Abstract】: The success of broadband residential Internet access is changing the way home users consume digital content and services. Currently, each home service requires the installation of a separate physical box (for instance, the NetFlix box or IPTV set-top-boxes). Instead, we argue for deploying a single box in the home that is powerful and flexible enough to host a variety of home services. In addition, this box is managed by the Internet Service provider and is able to provide service guarantees. We call such a box a service-hosting gateway (SHG), as it combines the functionalities of the home gateway managed by the network service provider with the capability of hosting services. Isolation between such services is ensured by virtualization. We demonstrate a prototype of our (SHG). It is based on the hardware platform that will be used for future home gateways. We illustrate the features of the SHG with multiple use cases ranging from simple service deployment scenarios to complex media distribution services and home automation features.

【Keywords】: nano datacenters

79. Optimizing a virtualized data center.

Paper Link】 【Pages】:478-479

【Authors】: David Erickson ; Brandon Heller ; Shuang Yang ; Jonathan Chu ; Jonathan D. Ellithorpe ; Scott Whyte ; Stephen Stuart ; Nick McKeown ; Guru M. Parulkar ; Mendel Rosenblum

【Abstract】: Many data centers extensively use virtual machines (VMs), which provide the flexibility to move workload among physical servers. VMs can be placed to maximize application performance, power efficiency, or even fault tolerance. However, VMs are typically repositioned without considering network topology, congestion, or traffic routes. In this demo, we show a system, Virtue, which enables the comparison of different algorithms for VM placement and network routing at the scale of an entire data center. Our goal is to understand how placement and routing affect overall application performance by varying the types and mix of workloads, network topologies, and compute resources; these parameters will be available for demo attendees to explore.

【Keywords】: data center network; openflow; virtualization; virtue

80. Efficient content dissemination in heterogeneous networks prone to episodic connectivity.

Paper Link】 【Pages】:480-481

【Authors】: Amir Krifa ; Marc Mendonca ; Rao Naveed Bin Rais ; Chadi Barakat ; Thierry Turletti ; Katia Obraczka

【Abstract】: Ubiquity of portable computing devices coupled with wide availability of wireless communication present new impor- tant opportunities for applications involving media-rich content dissemination. However, as access networks become increasingly more heterogeneous, seamless data delivery across internets consisting of a variety of network technology becomes a real challenge. In this demonstration, we showcase a system that enables content dissemination over heterogeneous internets consisting of wired, infrastructure-based and infrastructure-less wireless networks that may be prone to intermittent connectivity. Using an efficient, yet flexible buffer management scheme, we are able to address application-specific performance requirements such as average delay, delivery probability, energy efficiency, etc. Our system uses the Message Delivery in Heterogeneous, Disruption-prone Networks (MeDeHa) [2]) framework to deliver messages across a heterogeneous internet coupled with History-Based Scheduling and Drop (HBSD) buffer management [1] as a way to optimize resources provided by opportunistic networks. MeDeHa, which is described in detail in [2], provides seamless data delivery over interconnecting networks of different types, i.e., infrastructure-based and infrastructure-less networks. MeDeHa's comprehensive approach to bridging infrastructure-based and infrastructureless networks also copes with intermittent connectivity. For this demonstration, we showcase a "complete stack" solution featuring, from to top to bottom, the DTN2 "bundle" layer, HBSD as an "external router" to DTN2, and MeDeHa, which handles message delivery. We have implemented, on a Linux-based testbed, (i) the MeDeHa framework, (ii) the HBSD [3] external router for the DTN2 [4] architecture.

【Keywords】: buffer management; disruption tolerance; episodic connectivity; heterogeneous networks