2019 International Conference on Networked Systems (NetSys)最新文献

筛选
英文 中文
The Impact of Cache Partitioning on Software-Based Packet Processing 缓存分区对软件包处理的影响
2019 International Conference on Networked Systems (NetSys) Pub Date : 2019-03-01 DOI: 10.1109/NetSys.2019.8854519
N. Schramm, Torsten M. Runge, B. Wolfinger
{"title":"The Impact of Cache Partitioning on Software-Based Packet Processing","authors":"N. Schramm, Torsten M. Runge, B. Wolfinger","doi":"10.1109/NetSys.2019.8854519","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854519","url":null,"abstract":"Traditionally, network functions were often implemented on expensive special networking hardware (e.g. middle-boxes). The architectural concept of network functions virtualization (NFV) enables the implementation of network functions (e.g. routing, firewall) as virtual network functions (VNF) in software to execute them on off-the-shelf x86 hardware. To leverage the capabilities of multi-core processors, the VNFs must be distributed on several cores. However, when many VNFs are executed on different CPU cores, the VNFs compete for the last level cache (LLC) which is a shared resource between all CPU cores and might become a performance bottleneck. With the help of cache partitioning, it is possible to divide the LLC into dedicated blocks for each VNF. This paper investigates if a performance gain can be achieved by cache partitioning. With the help of real testbed measurements, a Linux router as well as a DPDK-based router is examined. Our results show that cache partitioning can be beneficial if the cache partition size is sufficiently large.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126054720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information-Centric IoT Middleware Overlay: VSL 以信息为中心的物联网中间件覆盖:VSL
2019 International Conference on Networked Systems (NetSys) Pub Date : 2019-03-01 DOI: 10.1109/NetSys.2019.8854515
Marc-Oliver Pahl, Stefan Liebald
{"title":"Information-Centric IoT Middleware Overlay: VSL","authors":"Marc-Oliver Pahl, Stefan Liebald","doi":"10.1109/NetSys.2019.8854515","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854515","url":null,"abstract":"The heart of the Internet of Things (IoT) is data. IoT services processes data from sensors that interface their physical surroundings, and from other software such as Internet weather databases. They produce data to control physical environments via actuators, and offer data to other services. More recently, service-centric designs for managing the IoT have been proposed. Data-centric or name-based communication architectures complement these developments very well. Especially for edge-based or site-local installations, data-centric Internet architectures can be implemented already today, as they do not require any changes at the core. We present the Virtual State Layer (VSL), a site-local data-centric architecture for the IoT. Special features of our solution are full separation of logic and data in IoT services, offering the data-centric VSL interface directly to developers, which significantly reduces the overall system complexity, explicit data modeling, a semantically-rich data item lookup, stream connections between services, and security-by-design. We evaluate our solution regarding usability, performance, scalability, resilience, energy efficiency, and security.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"39 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security 使用行级安全在数据库定义的网络中执行多级安全策略
2019 International Conference on Networked Systems (NetSys) Pub Date : 2019-01-09 DOI: 10.1109/NetSys.2019.8854491
A. Al-Haj, B. Aziz
{"title":"Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security","authors":"A. Al-Haj, B. Aziz","doi":"10.1109/NetSys.2019.8854491","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854491","url":null,"abstract":"Despite the wide of range of research and technologies that deal with the problem of routing in computer networks, there remains a gap between the level of network hardware administration and the level of business requirements and constraints. Not much has been accomplished in literature in order to have a direct enforcement of such requirements on the network. This paper presents a new solution in specifying and directly enforcing security policies to control the routing configuration in a software-defined network by using Row-Level Security checks which enable fine-grained security policies on individual rows in database tables. We show, as a first step, how a specific class of such policies, namely multilevel security policies, can be enforced on a database-defined network, which presents an abstraction of a network's configuration as a set of database tables. We show that such policies can be used to control the flow of data in the network either in an upward or downward manner.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking 基于云的隐私保护基准测试的增强方法
2019 International Conference on Networked Systems (NetSys) Pub Date : 2018-10-11 DOI: 10.1109/NetSys.2019.8854503
Kilian Becher, Martin Beck, T. Strufe
{"title":"An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking","authors":"Kilian Becher, Martin Beck, T. Strufe","doi":"10.1109/NetSys.2019.8854503","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854503","url":null,"abstract":"Benchmarking is an important measure for companies to investigate their performance and to increase efficiency. As companies usually are reluctant to provide their key performance indicators (KPIs) for public benchmarks, privacy-preserving benchmarking systems are required. In this paper, we present an enhanced privacy-preserving benchmarking protocol, which we implemented and evaluated based on the real-world scenario of product cost optimisation. It is based on homomorphic encryption and enables cloud-based KPI comparison, providing a variety of statistical measures. The theoretical and empirical evaluation of our benchmarking system underlines its practicability.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信