{"title":"The Impact of Cache Partitioning on Software-Based Packet Processing","authors":"N. Schramm, Torsten M. Runge, B. Wolfinger","doi":"10.1109/NetSys.2019.8854519","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854519","url":null,"abstract":"Traditionally, network functions were often implemented on expensive special networking hardware (e.g. middle-boxes). The architectural concept of network functions virtualization (NFV) enables the implementation of network functions (e.g. routing, firewall) as virtual network functions (VNF) in software to execute them on off-the-shelf x86 hardware. To leverage the capabilities of multi-core processors, the VNFs must be distributed on several cores. However, when many VNFs are executed on different CPU cores, the VNFs compete for the last level cache (LLC) which is a shared resource between all CPU cores and might become a performance bottleneck. With the help of cache partitioning, it is possible to divide the LLC into dedicated blocks for each VNF. This paper investigates if a performance gain can be achieved by cache partitioning. With the help of real testbed measurements, a Linux router as well as a DPDK-based router is examined. Our results show that cache partitioning can be beneficial if the cache partition size is sufficiently large.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126054720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-Centric IoT Middleware Overlay: VSL","authors":"Marc-Oliver Pahl, Stefan Liebald","doi":"10.1109/NetSys.2019.8854515","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854515","url":null,"abstract":"The heart of the Internet of Things (IoT) is data. IoT services processes data from sensors that interface their physical surroundings, and from other software such as Internet weather databases. They produce data to control physical environments via actuators, and offer data to other services. More recently, service-centric designs for managing the IoT have been proposed. Data-centric or name-based communication architectures complement these developments very well. Especially for edge-based or site-local installations, data-centric Internet architectures can be implemented already today, as they do not require any changes at the core. We present the Virtual State Layer (VSL), a site-local data-centric architecture for the IoT. Special features of our solution are full separation of logic and data in IoT services, offering the data-centric VSL interface directly to developers, which significantly reduces the overall system complexity, explicit data modeling, a semantically-rich data item lookup, stream connections between services, and security-by-design. We evaluate our solution regarding usability, performance, scalability, resilience, energy efficiency, and security.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"39 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security","authors":"A. Al-Haj, B. Aziz","doi":"10.1109/NetSys.2019.8854491","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854491","url":null,"abstract":"Despite the wide of range of research and technologies that deal with the problem of routing in computer networks, there remains a gap between the level of network hardware administration and the level of business requirements and constraints. Not much has been accomplished in literature in order to have a direct enforcement of such requirements on the network. This paper presents a new solution in specifying and directly enforcing security policies to control the routing configuration in a software-defined network by using Row-Level Security checks which enable fine-grained security policies on individual rows in database tables. We show, as a first step, how a specific class of such policies, namely multilevel security policies, can be enforced on a database-defined network, which presents an abstraction of a network's configuration as a set of database tables. We show that such policies can be used to control the flow of data in the network either in an upward or downward manner.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking","authors":"Kilian Becher, Martin Beck, T. Strufe","doi":"10.1109/NetSys.2019.8854503","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854503","url":null,"abstract":"Benchmarking is an important measure for companies to investigate their performance and to increase efficiency. As companies usually are reluctant to provide their key performance indicators (KPIs) for public benchmarks, privacy-preserving benchmarking systems are required. In this paper, we present an enhanced privacy-preserving benchmarking protocol, which we implemented and evaluated based on the real-world scenario of product cost optimisation. It is based on homomorphic encryption and enables cloud-based KPI comparison, providing a variety of statistical measures. The theoretical and empirical evaluation of our benchmarking system underlines its practicability.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}