{"title":"Application-transparent scheduling of socket system calls on many-core systems","authors":"Jooho Kim, Joong-Yeon Cho, Hyun-Wook Jin","doi":"10.1145/3230718.3232113","DOIUrl":"https://doi.org/10.1145/3230718.3232113","url":null,"abstract":"As the number of cores equipped in network servers is rapidly increasing, a greater number of processes or threads run concurrently. However, if these tasks invoke system calls frequently, they are not executed as concurrently as expected due to the synchronization of in-kernel data structures, cache coherence for shared data structures, and cache pollution by system calls. To address these issues, we suggest decoupling the system call context that performs network I/O from the application context and scheduling the system call contexts on a set of cores independently, which can maximize the data and instruction locality of network protocol stacks. Our design does not require any modifications of the kernel and existing applications.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shelby Thomas, Rob McGuinness, G. Voelker, G. Porter
{"title":"Dark packets and the end of network scaling","authors":"Shelby Thomas, Rob McGuinness, G. Voelker, G. Porter","doi":"10.1145/3230718.3230727","DOIUrl":"https://doi.org/10.1145/3230718.3230727","url":null,"abstract":"Today 100GbE network interfaces are commercially available, with 400GbE proposals already in the standardization process. In this environment, a major bottleneck is DRAM latency, which has stagnated at 100ns per access. Beyond 100GbE, all packet sizes will arrive faster than main memory can accommodate, resulting packet drops due to the latency incurred by the memory hierarchy. We call these losses caused by the gap between cache and DRAM, Dark Packets. We observe that for link rates of 100GbE an application making a single memory access causes a high number of packet drops. Today, this problem can be overcome by increasing the physical core count (not scalable), increasing packet sizes (not generalizable), or by building specialized hardware (high cost). In this work, we measure the impact of the dark packet phenomenon and propose CacheBuilder, an API to carve out bespoke hardware caches from existing ones through simple user level APIs. CacheBuilder allows for explicit control over processor cache memory and cache-to-main memory copies by creating application-specific caches that result in higher overall performance and reduce dark packets. Our results show that for NFVs operating with small packet sizes at 40GbE we reduce dark packets from 35% to 0% and only require half the amount of cores to achieve line rates.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ben-Basat, Gil Einziger, Shir Landau Feibish, Jalil Moraney, D. Raz
{"title":"Network-wide routing-oblivious heavy hitters","authors":"R. Ben-Basat, Gil Einziger, Shir Landau Feibish, Jalil Moraney, D. Raz","doi":"10.1145/3230718.3230729","DOIUrl":"https://doi.org/10.1145/3230718.3230729","url":null,"abstract":"The recent introduction of SDN allows deploying new centralized network algorithms that dramatically improve the network operation. Many of these solutions rely on the assumption that the centralized controller merges data from different Network Monitoring Points (NMP) to obtain a network-wide view. This is far from trivial when the same packet may traverse through several NMPs. Therefore, existing solutions either assume that each packet is measured at exactly one NMP or that the routing of each packet is known. Another approach is to mark the sampled packets so that other NMPs are aware that the packet was already considered. We suggest the first network-wide and routing oblivious algorithms for three fundamental network monitoring problems. The suggested algorithms allow flexible NMP placement, require no control over edge routers, and are indifferent to network topology and routing. Moreover, they are based on passive measurements without modifying the traffic in any way. Formally, we provide a general, constant time framework that solves the distributed versions of the volume estimation, frequency estimation and heavy-hitters problems with provable guarantees. The evaluation of our scheme on real packet traces shows that we can achieve very accurate results using a very reasonable amount of memory. For example, using less than 60KB memory in each monitoring point we get a root square error of less than 0.01% of the packets for frequency estimation.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131305523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a highly scalable network tester","authors":"M. Ramanujam, Noa Zilberman","doi":"10.1145/3230718.3232104","DOIUrl":"https://doi.org/10.1145/3230718.3232104","url":null,"abstract":"High end networked-systems have quickly climbed from a throughput of gigabits/sec to terabits/sec, and are approaching petabits/sec. Alas, network testing equipment has not scaled: it remained either low throughput or extremely expensive. With suitable network testing equipment either not at scale or too expensive even for commercial vendors, systems may be released without proper testing and validation. We propose a methodology for large scale testing of networked systems, based on using a low-cost, open source network tester and a commodity switch. Our approach is scalable, open source, and accurate, and can be adapted to a variety of networking equipment, widely available to users.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129797095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinghan Zhou, Danyang Li, Xiaohe Hu, Y. Sun, Shui Cao, Wei Xu, Jun Li
{"title":"APF","authors":"Jinghan Zhou, Danyang Li, Xiaohe Hu, Y. Sun, Shui Cao, Wei Xu, Jun Li","doi":"10.1145/3230718.3232112","DOIUrl":"https://doi.org/10.1145/3230718.3232112","url":null,"abstract":"Network verification, which is mainly about checking network states against network invariants or operator beliefs, has been a popular research thesis recently. Fast calculation of all-pair reachability of the network beforehand for further query or overall analysis can be a huge assistance to network verification. In this paper, we propose a new fast all-pair reachability calculation algorithm Atomic Predicates Flooding(APF). Experiments on real-life datasets show that the new algorithm based on network atomization is about three to four orders of magnitude faster than existing algorithms without network atomization. On most kinds of datasets, APF is even 2 to 5 times faster than the Warshall based all pair reachability algorithm with atomization. We believe that our method is essential for developing more practical and more efficient network and verification tools.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kodirov, Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, H. Hoos, A. Hu
{"title":"VNF chain allocation and management at data center scale","authors":"N. Kodirov, Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, H. Hoos, A. Hu","doi":"10.1145/3230718.3230724","DOIUrl":"https://doi.org/10.1145/3230718.3230724","url":null,"abstract":"Recent advances in network function virtualization have prompted the research community to consider data-center-scale deployments. However, existing tools, such as E2 and SOL, limit VNF chain allocation to rack-scale and provide limited support for management of allocated chains. We define a narrow API to let data center tenants and operators allocate and manage arbitrary VNF chain topologies, and we introduce NetPack, a new stochastic placement algorithm, to implement this API at data-center-scale. We prototyped the resulting system, dubbed Daisy, using the Sonata platform. In data-center-scale simulations on realistic scenarios and topologies that are orders of magnitude larger than prior work, we achieve in all cases an allocation density within 96% of a recently introduced, theoretically complete, constraint-solver-based placement engine, while being 82x faster on average. In detailed emulation with real packet traces, we find that Daisy performs each of our six API calls with at most one second of throughput drop.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132264374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FTvNF","authors":"Yotam Harchol, David Hay, Tal Orenstein","doi":"10.1145/3230718.3230731","DOIUrl":"https://doi.org/10.1145/3230718.3230731","url":null,"abstract":"One of the major concerns about Network Function Virtualization (NFV) is the reduced stability of virtual network functions (VNFs), compared to dedicated hardware appliances. Stateful VNFs make recovery a complex process, where a major concern is how to handle non-determinism such as multi-threaded processing, time dependence, and randomness. In this paper we present FTvNF --- a new approach for network functions recovery with very low overhead in failure-free time. This is in contrast to previous suggestions to take snapshots of the VNF state at certain checkpoints or to store the VNF state externally. Compared with state-of-the-art approaches, our approach significantly reduces the latency overhead incurred by the network elements, both in failure-free operations and when failures occur. In addition, our approach better suits the common case of NFV service chaining, as our mechanisms are applied once per chain, thus significantly improve the performance over approaches that treat each VNF separately.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Kucera, Lukás Kekely, V. Pus, A. Piecek, J. Korenek
{"title":"Hardware acceleration of intrusion detection systems for high-speed networks","authors":"J. Kucera, Lukás Kekely, V. Pus, A. Piecek, J. Korenek","doi":"10.1145/3230718.3232114","DOIUrl":"https://doi.org/10.1145/3230718.3232114","url":null,"abstract":"Intrusion Detection Systems (IDS) are among popular technologies for securing computer networks. However, their high computational complexity makes it hard to meet performance goals of modern high-speed networks. This paper aims at an acceleration of IDS by informed packet discarding. Focusing the limited computational resources available to IDS towards only the most relevant parts of incoming traffic and offloading (bypassing) the rest. We show that this controlled (informed) discarding of well-defined traffic portions helps IDS to achieve better results and compare software and FPGA accelerated discarding implementations.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122626712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable high-speed NDN name lookup","authors":"Kun Huang, Zhaohua Wang, Gaogang Xie","doi":"10.1145/3230718.3230720","DOIUrl":"https://doi.org/10.1145/3230718.3230720","url":null,"abstract":"Name lookup is a core function of the Named Data Networking (NDN) forwarding plane. It performs a name-based longest prefix match lookup against a large amount of variable-length, hierarchical name prefixes. NDN name lookup suffers a scalability challenge and needs to satisfy three key requirements: high-speed lookups, low memory cost, and fast updates. However, no existing work satisfies these requirements. Hash-based linear search schemes achieve fast updates and low memory cost but not high-speed lookups. Binary search (BS) schemes achieve high-speed lookups but slow updates with high memory cost. In this paper, we propose CBS, a hash-based counting binary search scheme for scalable high-speed NDN name lookup. CBS achieves fast updates and low memory cost, while sustaining high-speed lookups. The key to CBS is using a counter for each slot in a hash table to keep track of the number of markers that direct a search to find longer matching prefixes. This design not only allows fast updates by incrementing and decrementing counters, but also reduces the additional memory cost. Our experimental results demonstrate that CBS outperforms BS in update throughput, memory cost, and lookup throughput.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131276093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query language for large-scale P4 network debugging","authors":"Jehandad Khan, P. Athanas","doi":"10.1145/3230718.3232108","DOIUrl":"https://doi.org/10.1145/3230718.3232108","url":null,"abstract":"Diagnosing and solving problems in a contemporary data-center can be a daunting task. By merging network topology information with state collection, this poster abstract explores a new way to look at the network monitoring and troubleshooting problem. Abstracting the entire network as an entity simplifies the debugging process, making possible comprehensive root-cause analysis and exonerating the network administrator from dealing with many devices, delivering gains in productivity and efficiency. Such an amalgamation allows the translation of a performance query expressed in a domain specific language to small pieces of code operating on different devices in the network collecting necessary state. This merging results in lesser overhead per switch and reduces the strain on devices and provides a simple abstraction to the administrator.","PeriodicalId":247881,"journal":{"name":"Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132302325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}