Paper Digest: SIGCOMM 2014 Highlights
SIGCOMM (ACM Special Interest Group on Data Communications) is one of the top data communications and networking conferences in the world.
To help the community quickly catch up on the work presented in this conference, Paper Digest Team processed all accepted papers, and generated one highlight sentence (typically the main topic) for each paper. Readers are encouraged to read these machine generated highlights / summaries to quickly get the main idea of each paper.
If you do not want to miss any interesting academic paper, you are welcome to sign up our free daily paper digest service to get updates on new papers published in your area every day. You are also welcome to follow us on Twitter and Linkedin to get updated with new conference digests.
Paper Digest Team
team@paperdigest.org
TABLE 1: SIGCOMM 2014 Papers
Title | Authors | Highlight | |
---|---|---|---|
1 | Keynote: life in the fast lane | George Varghese | Algorithmics is the servant of abstraction, allowing system performance to approach that of the underlying hardware, sometimes by using efficient algorithms but often by simply leveraging other aspects of the system. |
2 | Millions of little minions: using packets for low latency network programming and visibility | Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières | This paper presents a practical approach to rapidly introducing new dataplane functionality into networks: End-hosts embed tiny programs into packets to actively query and manipulate a network’s internal state. |
3 | SAX-PAC (Scalable And eXpressive PAcket Classification) | Kirill Kogan, Sergey Nikolenko, Ori Rottenstreich, William Culhane, Patrick Eugster | In this work, we present a novel approach which identifies properties of many classifiers which can be implemented in linear space and with worst-case guaranteed logarithmic time \emph{and} allows the addition of more fields including range constraints without impacting space and time complexities. |
4 | Duet: cloud scale load balancing with hardware and software | Rohan Gandhi, Hongqiang Harry Liu, Y. Charlie Hu, Guohan Lu, Jitendra Padhye, Lihua Yuan, Ming Zhang | In this paper, we present Duet, which offers all the benefits of software load balancer, along with low latency and high availability — at next to no cost. |
5 | Guarantee IP lookup performance with FIB explosion | Tong Yang, Gaogang Xie, YanBiao Li, Qiaobin Fu, Alex X. Liu, Qi Li, Laurent Mathy | An ideal IP lookup algorithm should achieve constant, yet small, IP lookup time and on-chip memory usage. |
6 | From the consent of the routed: improving the transparency of the RPKI | Ethan Heilman, Danny Cooper, Leonid Reyzin, Sharon Goldberg | We propose mechanisms to improve the transparency of the RPKI, in order to mitigate the risk that it will be used for IP address takedowns. |
7 | Network neutrality inference | Zhiyong Zhang, Ovidiu Mara, Katerina Argyraki | We present an algorithm that relies on this idea to identify sets of non-neutral links based on external observations, and we show, through network emulation, that it achieves good accuracy for a variety of network conditions. |
8 | Balancing accountability and privacy in the network | David Naylor, Matthew K. Mukerjee, Peter Steenkiste | In this paper, we argue that a balance is possible. |
9 | Measuring IPv6 adoption | Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric Osterweil, Michael Bailey | In order to better understand this unique and disruptive transition, we explore twelve metrics using ten global-scale datasets to create the longest and broadest measurement of IPv6 adoption to date. |
10 | One tunnel is (often) enough | Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas Anderson, Arvind Krishnamurthy | In this paper, we study whether a simple, easy to implement model is sufficient for addressing the aforementioned Internet vulnerabilities. |
11 | YouSlow: a performance analysis tool for adaptive bitrate video streaming | Hyunwoo Nam, Kyung-Hwa Kim, Doru Calin, Henning Schulzrinne | Such a rate-switching algorithm embedded in a video player is designed to improve video quality-of-experience (QoE) by selecting an appropriate resolution based on the analysis of network conditions while the video is playing. |
12 | RPKI vs ROVER: comparing the risks of BGP security solutions | Aanchal Malhotra, Sharon Goldberg | RPKI vs ROVER: comparing the risks of BGP security solutions |
13 | CTE: cost-effective intra-domain traffic engineering | Baobao Zhang, Jun Bi, Jianping Wu, Fred Baker | CTE: cost-effective intra-domain traffic engineering |
14 | Traffic statistics collection with FleXam | Sajad Shirali-Shahreza, Yashar Ganjali | Here, we present an interactive demo showing how FleXam enables the controller to dynamically adjust sampling rates and change the sampling scheme to optimally keep up with a sampling budget in the context of a traffic statistics collection application. |
15 | Identifying traffic differentiation on cellular data networks | Arash Molavi Kakhki, Abbas Razaghpanah, Rajesh Golani, David Choffnes, Phillipa Gill, Alan Mislove | The goal of this research is to detect traffic differentiation in cellular data networks. |
16 | NIMBUS: cloud-scale attack detection and mitigation | Rui Miao, Minlan Yu, Navendu Jain | NIMBUS: cloud-scale attack detection and mitigation |
17 | A user behavior based cheat detection mechanism for crowdtesting | Ricky K.P. Mok, Weichao Li, Rocky K.C. Chang | In this poster, we propose cheat-detection mechanism based on an analysis of the workers’ mouse cursor trajectories. |
18 | ESCAPE: extensible service chain prototyping environment using mininet, click, NETCONF and POX | Attila Csoma, Balázs Sonkoly, Levente Csikor, Felicián Németh, Andràs Gulyas, Wouter Tavernier, Sahel Sahhaf | Standing on the shoulders of Mininet, we implement a similar prototyping system called ESCAPE, which can be used to develop and test various components of the service chaining architecture. |
19 | Sampling online social networks: an experimental study of twitter | Maksym Gabielkov, Ashwin Rao, Arnaud Legout | In this work, we take an experimental approach to study the characteristics of well-known sampling techniques on a full social graph of Twitter crawled in 2012 [2]. |
20 | Mahimahi: a lightweight toolkit for reproducible web measurement | Ravi Netravali, Anirudh Sivaraman, Keith Winstein, Somak Das, Ameesh Goyal, Hari Balakrishnan | Mahimahi: a lightweight toolkit for reproducible web measurement |
21 | A time for reliability: the growing importance of being always on | Zachary S. Bischof, Fabián E. Bustamante | In this poster, we present the first study of reliability in broadband networks. |
22 | Vivisecting whatsapp through large-scale measurements in mobile networks | Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas | In this paper we present the first large-scale characterization of WhatsApp, useful among others to ISPs willing to understand the impacts of this and similar applications on their networks. |
23 | Behind the curtain: the importance of replica selection in next generation cellular networks | John P. Rula, Fabian E. Bustamante | Behind the curtain: the importance of replica selection in next generation cellular networks |
24 | Flowinsight: decoupling visibility from operability in SDN data plane | Yuliang Li, Guang Yao, Jun Bi | Flowinsight: decoupling visibility from operability in SDN data plane |
25 | A cliq of content curators | Angela H. Jiang, Zachary S. Bischof, Fabian E. Bustamante | In this poster, we present cliq, a decentralized social news curator. |
26 | Native actors: how to scale network forensics | Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch | We present the design and implementation of Visibility Across Space and Time (VAST), a distributed database to support interactive network forensics, and libcppa, its exceptionally scalable messaging core. |
27 | SOUP: an online social network by the people, for the people | David Koll, Jun Li, Xiaoming Fu | To tackle their deficiencies, we introduce the Self-Organized Universe of People (SOUP). |
28 | AI3: application-independent information infrastructure | Bo Zhang, Jinfan Wang, Xinyu Wang, Yingying Cheng, Xiaohua Jia, Jianfei He | We propose a new architecture, called Application Independent Information Infrastructure (AI3). |
29 | Robust full duplex radio link | Dinesh Bharadia, Kiran Joshi, Sachin Katti | This paper presents demonstration of a real-time full duplex point-to-point link, where transmission and reception occurs in the same spectrum band simultaneously between a pair of full-duplex radios. |
30 | Demonstrating the prospects of dynamic application-aware networking in a home environment | Florian Wamser, Thomas Zinner, Lukas Iffländer, Phuoc Tran-Gia | Demonstrating the prospects of dynamic application-aware networking in a home environment |
31 | A middlebox-cooperative TCP for a non end-to-end internet | Ryan Craven, Robert Beverly, Mark Allman | We develop TCP HICCUPS to reveal packet header manipulation to both endpoints of a TCP connection. |
32 | OpenNF: enabling innovation in network function control | Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, Aditya Akella | To this end, we design a control plane called OpenNF. |
33 | Network stack specialization for performance | Ilias Marinos, Robert N.M. Watson, Mark Handley | We present Sandstorm and Namestorm, web and DNS servers that utilize a clean-slate userspace network stack that exploits knowledge of application-specific workloads. |
34 | A buffer-based approach to rate adaptation: evidence from a large video streaming service | Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson | In this work, we suggest an alternative approach: rather than presuming that capacity estimation is required, it is perhaps better to begin by using only the buffer, and then ask when capacity estimation is needed. |
35 | FastForward: fast and constructive full duplex relays | Dinesh Bharadia, Sachin Katti | This paper presents, FastForward (FF), a novel full duplex relay that constructively forwards signals such that wireless network throughput and coverage is significantly enhanced. |
36 | LTE radio analytics made easy and accessible | Swarun Kumar, Ezzeldin Hamed, Dina Katabi, Li Erran Li | This paper introduces LTEye, the first open platform to monitor and analyze LTE radio performance at a fine temporal and spatial granularity. |
37 | Control-plane protocol interactions in cellular networks | Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu | In this work, we propose signaling diagnosis tools and uncover six instances of problematic interactions. |
38 | RF-IDraw: virtual touch screen in the air using RF signals | Jue Wang, Deepak Vasisht, Dina Katabi | Prior work in RF-based positioning has mainly focused on discovering the absolute location of an RF source, where state-of-the-art systems can achieve an accuracy on the order of tens of centimeters using a large number of antennas. |
39 | Diagnosing missing events in distributed systems with negative provenance | Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo | In this paper, we show that the concept of negative provenance can be used to explain the absence of events in distributed systems. |
40 | Troubleshooting blackbox SDN control software with minimal causal sequences | Colin Scott, Andreas Wundsam, Barath Raghavan, Aurojit Panda, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, H.B. Acharya, Kyriakos Zarifis, Scott Shenker | In this paper we discuss how to improve control software troubleshooting by presenting a technique for automatically identifying a minimal sequence of inputs responsible for triggering a given bug, without making assumptions about the language or instrumentation of the software under test. |
41 | Planck: millisecond-scale monitoring and control for commodity networks | Jeff Rasley, Brent Stephens, Colin Dixon, Eric Rozner, Wes Felter, Kanak Agarwal, John Carter, Rodrigo Fonseca | In this paper, we present Planck, a novel network measurement architecture that employs oversubscribed port mirroring to extract network information at 280 µs–7 ms timescales on a 1 Gbps commodity switch and 275 µs–4 ms timescales on a 10 Gbps commodity switch,over 11x and 18x faster than recent approaches, respectively (and up to 291x if switch firmware allowed buffering to be disabled on some ports). |
42 | DREAM: dynamic resource allocation for software-defined measurement | Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat | This paper describes an adaptive measurement framework, called DREAM, that dynamically adjusts the resources devoted to each measurement task, while ensuring a user-specified level of accuracy. |
43 | Quartz: a new design element for low-latency DCNs | Yunpeng James Liu, Peter Xiang Gao, Bernard Wong, Srinivasan Keshav | We explore architectural approaches to building low-latency DCNs and introduce Quartz, a design element consisting of a full mesh of switches. |
44 | Using RDMA efficiently for key-value services | Anuj Kalia, Michael Kaminsky, David G. Andersen | This paper describes the design and implementation of HERD, a key-value system designed to make the best use of an RDMA network. |
45 | Fastpass: a centralized "zero-queue" datacenter network | Jonathan Perry, Amy Ousterhout, Hari Balakrishnan, Devavrat Shah, Hans Fugal | Instead, we propose that each sender should delegate control—to a centralized arbiter—of when each packet should be transmitted and what path it should follow. |
46 | FireFly: a reconfigurable wireless data center fabric using free-space optics | Navid Hamedazimi, Zafar Qazi, Himanshu Gupta, Vyas Sekar, Samir R. Das, Jon P. Longtin, Himanshu Shah, Ashish Tanwer | Inspired by the promise of reconfigurability, this paper presents FireFly, an inter-rack network solution that pushes DC network design to the extreme on three key fronts: (1) all links are reconfigurable; (2) all links are wireless; and (3) non top-of-rack switches are eliminated altogether. |
47 | A "hitchhiker’s" guide to fast and efficient data reconstruction in erasure-coded data centers | K.V. Rashmi, Nihar B. Shah, Dikang Gu, Hairong Kuang, Dhruba Borthakur, Kannan Ramchandran | In this paper, we present "Hitchhiker", a new erasure-coded storage system that reduces both network traffic and disk IO by around 25% to 45% during reconstruction of missing or otherwise unavailable data, with no additional storage, the same fault tolerance, and arbitrary flexibility in the choice of parameters, as compared to RS-based systems. |
48 | Enabling near real-time central control for live video delivery in CDNs | Matthew K. Mukerjee, JungAh Hong, Junchen Jiang, David Naylor, Dongsu Han, Srinivasan Seshan, Hui Zhang | We present the design and implementation of VDN, a new control plane for CDNs designed to optimize the delivery of live streams within the CDN. |
49 | NetAssay: providing new monitoring primitives for network operators | Sean Donovan, Nick Feamster | NetAssay: providing new monitoring primitives for network operators |
50 | OpenSAN: a software-defined satellite network architecture | Jinzhen Bao, Baokang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu, Zhenghu Gong | In this paper, we propose OpenSAN, a novel architecture of software-defined satellite network. |
51 | SENSS: observe and control your own traffic in the internet | Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic | We propose a new software-defined security service — SENSS — that enables a victim network to request services from remote ISPs for traffic that carries source IPs or destination IPs from this network’s address space. |
52 | Locating throughput bottlenecks in home networks | Srikanth Sundaresan, Nick Feamster, Renata Teixeira | We present a demonstration of WTF (Where’s The Fault?) |
53 | OpenANFV: accelerating network function virtualization with a consolidated framework in openstack | Xiongzi Ge, Yi Liu, David H.C. Du, Liang Zhang, Hongguang Guan, Jian Chen, Yuping Zhao, Xinyu Hu | To consolidate various hardware resources in an elastic, programmable and reconfigurable manner, we design and build a flexible and consolidated framework, OpenANFV, to support virtualized accelerators for MBs in the cloud environment. |
54 | Towards the super fluid cloud | Filipe Manco, Joao Martins, Felipe Huici | More recently, work towards VMs based on minimalistic or specialized OSes has started pushing the envelope of how reactive or fluid the cloud can be. |
55 | Ziria: language for rapid prototyping of wireless PHY | Gordon Stewart, Mahanth Gowda, Geoffrey Mainland, Bozidar Radunovic, Dimitrios Vytiniotis, Doug Patterson | In this demo we present our novel SDR programming environment called Ziria. |
56 | Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events | Steffen Gebert, David Hock, Thomas Zinner, Phuoc Tran-Gia, Marco Hoffmann, Michael Jarschel, Ernst-Dieter Schmidt, Ralf-Peter Braun, Christian Banse, Andreas Köpsel | Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events |
57 | Tracing multipath TCP connections | Benjamin Hesmans, Olivier Bonaventure | We propose mptcptrace, a software that enables a detailed analysis of Multipath TCP packet traces. |
58 | Demo: a virtualized lab testbed with physical network outlets for hands-on computer networking education | Mark Schmidt, Florian Heimgaertner, Michael Menth | Demo: a virtualized lab testbed with physical network outlets for hands-on computer networking education |
59 | Rethinking congestion control architecture: performance-oriented congestion control | Mo Dong, Qingxi Li, Doron Zarchy, Brighten Godfrey, Michael Schapira | Jumping out of TCP lineage’s architectural deficiency, we propose Performance-oriented Congestion Control (PCC), a new congestion control architecture in which each sender controls its sending strategy based on empirically observed performance metrics. |
60 | DOT: distributed OpenFlow testbed | Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba | To address these limitations, we developed Distributed OpenFlow Testbed (DOT), a highly scalable emulator for SDN. |
61 | Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework | Adrian Gämperli, Vasileios Kotronis, Xenofontas Dimitropoulos | Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework |
62 | Droid-Sec: deep learning in android malware detection | Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, Yibo Xue | In this paper, we propose a ML-based method that utilizes more than 200 features extracted from both static analysis and dynamic analysis of Android app for malware detection. |
63 | Accelerating incast and multicast traffic delivery for data-intensive applications using physical layer optics | Payman Samadi, Varun Gupta, Berk Birand, Howard Wang, Gil Zussman, Keren Bergman | We present a control plane architecture to accelerate multicast and incast traffic delivery for data-intensive applications in cluster-computing interconnection networks. |
64 | Social SDN: online social networks integration in wireless network provisioning | Arjuna Sathiaseelan, M. Said Seddiki, Stoyan Stoyanov, Dirk Trossen | Social SDN: online social networks integration in wireless network provisioning |
65 | Flow-level state transition as a new switch primitive for SDN | Masoud Moshref, Apoorv Bhargava, Adhip Gupta, Minlan Yu, Ramesh Govindan | Flow-level state transition as a new switch primitive for SDN |
66 | T-DNS: connection-oriented DNS to improve privacy and security (poster abstract) | Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya | We propose T-DNS to address these problems. |
67 | Extending the software-defined network boundary | Oliver Michel, Michael Coughlin, Eric Keller | In this work, we investigate the commonalities between such intra-host networks and classical computer networking. |
68 | A global name service for a highly mobile internetwork | Abhigyan Sharma, Xiaozheng Tie, Hardeep Uppal, Arun Venkataramani, David Westbrook, Aditya Yadav | Our primary contribution is the design, implementation, and evaluation of auspice, a next-generation global name service that addresses this challenge. |
69 | Towards a quantitative comparison of location-independent network architectures | Zhaoyu Gao, Arun Venkataramani, James F. Kurose, Simon Heimlicher | This paper presents a quantitative methodology and results comparing different approaches for {\it location-independent} communication. |
70 | Lightweight source authentication and path validation | Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig | In this paper, we propose lightweight, scalable, and secure protocols for shared key setup, source authentication, and path validation. |
71 | Decentralized task-aware scheduling for data center networks | Fahad R. Dogar, Thomas Karagiannis, Hitesh Ballani, Antony Rowstron | In this paper, we show that task-aware network scheduling, which groups flows of a task and schedules them together, can reduce both the average as well as tail completion time for typical data center applications. |
72 | Efficient coflow scheduling with Varys | Mosharaf Chowdhury, Yuan Zhong, Ion Stoica | In this paper, we address inter-coflow scheduling for two different objectives: decreasing communication time of data-intensive jobs and guaranteeing predictable communication time. |
73 | Multi-resource packing for cluster schedulers | Robert Grandl, Ganesh Ananthanarayanan, Srikanth Kandula, Sriram Rao, Aditya Akella | We present Tetris, a cluster scheduler that packs, i.e., matches multi-resource task requirements with resource availabilities of machines so as to increase cluster efficiency (makespan). |
74 | Application-driven bandwidth guarantees in datacenters | Jeongkeun Lee, Yoshio Turner, Myungjin Lee, Lucian Popa, Sujata Banerjee, Joon-Myung Kang, Puneet Sharma | We present CloudMirror, a solution that provides bandwidth guarantees to cloud applications based on a new network abstraction and workload placement algorithm. |
75 | Vidyut: exploiting power line infrastructure for enterprise wireless networks | Vivek Yenamandra, Kannan Srinivasan | The key contributions of this paper are the following: Identify and demonstrate the feasibility of utilizing power lines as a medium to achieve synchronization (in time and frequency domains) between nodes in the network; Demonstrate the scalability of this technique by achieving synchronization between nodes beyond the transmission range of any of the individual nodes. |
76 | Wi-fi backscatter: internet connectivity for RF-powered devices | Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall | We present Wi-Fi Backscatter, a novel communication system that bridges RF-powered devices with the Internet. |
77 | Turbocharging ambient backscatter communication | Aaron N. Parks, Angli Liu, Shyamnath Gollakota, Joshua R. Smith | This paper makes two main contributions: (1) we introduce the first multi-antenna cancellation design that operates on backscatter devices while retaining a small form factor and power footprint, (2) we introduce a novel coding mechanism that enables long range communication as well as concurrent transmissions and can be decoded on backscatter devices. |
78 | Geosphere: consistently turning MIMO capacity into throughput | Konstantinos Nikitopoulos, Juan Zhou, Ben Congdon, Kyle Jamieson | This paper presents the design and implementation of Geosphere, a physical- and link-layer design for access point-based MIMO wireless networks that consistently improves network throughput. |
79 | Calendaring for wide area networks | Srikanth Kandula, Ishai Menache, Roy Schwartz, Spandana Raj Babbula | We present Tempus, an online traffic engineering scheme that exploits information on transfer size and deadlines to appropriately pack long-running transfers across network paths and time, thereby leaving enough capacity slack for future high-priority requests. |
80 | Traffic engineering with forward fault correction | Hongqiang Harry Liu, Srikanth Kandula, Ratul Mahajan, Ming Zhang, David Gelernter | We propose forward fault correction (FFC), a proactive approach to handling faults. |
81 | Dynamic scheduling of network updates | Xin Jin, Hongqiang Harry Liu, Rohan Gandhi, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Jennifer Rexford, Roger Wattenhofer | We present Dionysus, a system for fast, consistent network updates in software-defined networks. |
82 | SDX: a software defined internet exchange | Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean P. Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett | In this paper, we tackle these challenges and demonstrate the flexibility and scalability of our solutions through controlled and in-the-wild experiments. |
83 | A network-state management service | Peng Sun, Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin | We present Statesman, a network-state management service that allows multiple network management applications to operate independently, while maintaining network-wide safety and performance invariants. |
84 | Rethinking buffer management in data center networks | Aisha Mushtaq, Asad Khalid Ismail, Abdul Wasay, Bilal Mahmood, Ihsan Ayyub Qazi, Zartash Afzal Uzmi | We propose a buffer management strategy that addresses these challenges by isolating short and long flows into separate buffers, sizing these buffers based on flow requirements, and scheduling packets to meet different flow-level objectives. |
85 | VIRL: the virtual internet routing lab | Joel Obstfeld, Simon Knight, Ed Kern, Qiang Sheng Wang, Tom Bryan, Dan Bourque | Testing and verifying at scale is a challenge: network equipment is expensive, requires space, power and cooling, and there is never enough test equipment for everyone who wants to use it! |
86 | SDX: a software defined internet exchange | Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean Patrick Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett | In this demo, we show how we tackle these challenges demonstrating the flexibility and scalability of our SDX platform. |
87 | Toward a biometric-aware cloud service engine for multi-screen video applications | Han Hu, Yichao Jin, Yonggang Wen, Tat-Seng Chua, Xuelong Li | One challenge is to design a unified solution to support ever-growing features while guarantee system performance. |
88 | SDN-based live VM migration across datacenters | Jiaqiang Liu, Yong Li, Depeng Jin | SDN-based live VM migration across datacenters |
89 | Characterizing botnets-as-a-service | Wentao Chang, An Wang, Aziz Mohaisen, Songqing Chen | Characterizing botnets-as-a-service |
90 | Aerial wireless localization using target-guided flight route | Shaofeng Chen, Dingyi Fang, Xiaojiang Chen, Tingting Xia, Meng Jin | We implement a prototype of GuideLoc using ArduCopter and evaluate the performance by simulations and experiments. |
91 | An educational networking framework for full layer implementation and testing | Keunhong Lee, Joongi Kim, Sue Moon | An educational networking framework for full layer implementation and testing |
92 | Drawbridge: software-defined DDoS-resistant traffic engineering | Jun Li, Skyler Berg, Mingwei Zhang, Peter Reiher, Tao Wei | By realizing the potential of software-defined networking (SDN), in this research we investigate a solution that enables end hosts to use their knowledge of desired traffic to improve traffic engineering during DDoS attacks. |
93 | DesktopDC: setting all programmable data center networking testbed on desk | Chengchen Hu, Ji Yang, Zhimin Gong, Shuoling Deng, Hongbo Zhao | DesktopDC: setting all programmable data center networking testbed on desk |
94 | An experimental study of the learnability of congestion control | Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, Hari Balakrishnan | We found only weak evidence of a tradeoff between operating range in link speeds and performance, even when the operating range was extended to cover a thousand-fold range of link speeds. |
95 | Friends, not foes: synthesizing existing transport strategies for data center networks | Ali Munir, Ghufran Baig, Syed M. Irteza, Ihsan A. Qazi, Alex X. Liu, Fahad R. Dogar | Based on this insight, we design PASE, a transport framework that synthesizes existing transport strategies, namely, self-adjusting endpoints (used in TCP style protocols), innetwork prioritization (used in pFabric), and arbitration (used in PDQ). |
96 | CONGA: distributed congestion-aware load balancing for datacenters | Mohammad Alizadeh, Tom Edsall, Sarang Dharmapurikar, Ramanan Vaidyanathan, Kevin Chu, Andy Fingerhut, Vinh The Lam, Francis Matus, Rong Pan, Navindra Yadav, George Varghese | We present the design, implementation, and evaluation of CONGA, a network-based distributed congestion-aware load balancing mechanism for datacenters. |