CoNEXT '10 Student Workshop最新文献

筛选
英文 中文
Understanding the impact of internet exchange points on internet topology and routing performance 了解互联网交换点对互联网拓扑和路由性能的影响
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921226
M. Ahmad, R. Guha
{"title":"Understanding the impact of internet exchange points on internet topology and routing performance","authors":"M. Ahmad, R. Guha","doi":"10.1145/1921206.1921226","DOIUrl":"https://doi.org/10.1145/1921206.1921226","url":null,"abstract":"The growth of Internet eXchange Points (IXPs) as an important component in the Internet Autonomous System (AS) level topology has led to the need for a detailed evaluation of their effect on Internet topology evolution and inter-domain packet routing. In this work, we carry out initial measurements to analyze the effect of the additional peering links and observe path quality in terms of round-trip time and loss rates of routes going through an IXP between pairs of Internet hosts. We observe significant effects of IXP-links on Internet growth and topology evolution while the routing performance points to numerous cases of Triangle Inequality Violations (TIVs) due to the IXP switches.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126729809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Robust traffic anomaly detection with principal component pursuit 基于主成分追踪的鲁棒交通异常检测
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921217
A. Abdelkefi, Yuming Jiang, Wen Wang, Arne Øslebø, O. Kvittem
{"title":"Robust traffic anomaly detection with principal component pursuit","authors":"A. Abdelkefi, Yuming Jiang, Wen Wang, Arne Øslebø, O. Kvittem","doi":"10.1145/1921206.1921217","DOIUrl":"https://doi.org/10.1145/1921206.1921217","url":null,"abstract":"Principal component analysis (PCA) is a statistical technique that has been used for data analysis and dimensionality reduction. It was introduced as a network traffic anomaly detection technique firstly in [1]. Since then, a lot of research attention has been received, which results in an extensive analysis and several extensions. In [2], the sensitivity of PCA to its tuning parameters, such as the dimension of the low-rank subspace and the detection threshold, on traffic anomaly detection was indicated. However, no explanation on the underlying reasons of the problem was given in [2]. In [3], further investigation on the PCA sensitivity was conducted and it was found that the PCA sensitivity comes from the inability of PCA to detect temporal correlations. Based on this finding, an extension of PCA to Kalman-Loeve expansion (KLE) was proposed in [3]. While KLE shows slight improvement, it still exhibits similar sensitivity issue since a new tuning parameter called temporal correlation range was introduced. Recently, in [4], additional effort was paid to illustrate the PCA-poisoning problem. To underline this problem, an evading strategy called Boiled-Frog was proposed which adds a high fraction of outliers to the traffic. To defend against this, the authors employed a more robust version of PCA called PCA-GRID. While PCA-GRID shows performance improvement regarding the robustness to the outliers, it experiences a high sensitivity to the threshold estimate and the k-dimensional subspace that maximizes the dispersion of the data. The purpose of this work is to consider another technique to address the PCA poisoning problems to provide robust traffic anomaly detection: The Principal Component Pursuit.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124130275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Have your cake and eat it too!: enabling frequency diversity through opportunism 鱼与熊掌兼得!:通过机会主义实现频率分集
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921224
Edmund L. Wong, Sangmin Lee
{"title":"Have your cake and eat it too!: enabling frequency diversity through opportunism","authors":"Edmund L. Wong, Sangmin Lee","doi":"10.1145/1921206.1921224","DOIUrl":"https://doi.org/10.1145/1921206.1921224","url":null,"abstract":"The broadcast nature of wireless networks is both a boon and a bane. On the one hand, multiple receivers may overhear a single transmission on the same channel at no additional cost above a point-to-point transmission; this property has been exploited in many opportunistic applications (e.g., [2]). On the other hand, the shared nature of the medium effectively forces wireless nodes to leverage frequency diversity and channelization for efficiency. Unfortunately, coordinating communication between nodes that may switch channels at any time is difficult and may in fact offset any performance gains from leveraging frequency diversity.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124252898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards hardware accelerated software routers 走向硬件加速软件路由器
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921209
Nadi Sarrar, A. Feldmann, S. Uhlig, Rob Sherwood, Xin Huang
{"title":"Towards hardware accelerated software routers","authors":"Nadi Sarrar, A. Feldmann, S. Uhlig, Rob Sherwood, Xin Huang","doi":"10.1145/1921206.1921209","DOIUrl":"https://doi.org/10.1145/1921206.1921209","url":null,"abstract":"We propose an alternative router design to fill the gap between PC-based open source software routers and commercial high-end routers. Our hardware accelerated software router uses commodity PC hardware running an open source software router for the control path, and couples it with programmable switching hardware by delegating most of the packet forwarding to the switch. We describe a prototype implementation and show that it is capable of handling the traffic requirements of an existing carrier aggregation network.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121720155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prefetching Bloom filters to control flooding in content-centric networks 预取Bloom过滤器以控制以内容为中心的网络中的泛滥
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921230
A. W. Kazi
{"title":"Prefetching Bloom filters to control flooding in content-centric networks","authors":"A. W. Kazi","doi":"10.1145/1921206.1921230","DOIUrl":"https://doi.org/10.1145/1921206.1921230","url":null,"abstract":"We address an issue relevant to Content-Centric Networks, in which content is discovered by flooding a request over the entire network. In our design, the collection of objects resolvable by a router is represented using Bloom filters. In response to the flooding, we send Bloom filters -- in essence transmitting all the object names represented within a router -- along with the object. In this manner, any subsequent request to an object represented within that Bloom filter will not need to be flooded. We present preliminary observations to validate our claims.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121569129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
NetQuery: a knowledge plane for reasoning about network properties NetQuery:用于网络属性推理的知识平面
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921231
Alan Shieh, E. G. Sirer, F. Schneider
{"title":"NetQuery: a knowledge plane for reasoning about network properties","authors":"Alan Shieh, E. G. Sirer, F. Schneider","doi":"10.1145/1921206.1921231","DOIUrl":"https://doi.org/10.1145/1921206.1921231","url":null,"abstract":"Depending on their configuration, administration, and provisioning, networks provide drastically different features. For instance, some networks provide little failure resilience while others provision failover capacity and deploy middleboxes to protect against denial of service attacks [1, 2]. Yet the standard IP interface masks these differences; every network appears to provide the same basic \"dial-tone\" service. Consequently, clients that desire certain network properties must resort to ad hoc techniques to detect these differences or must target the lowest common denominator service.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Multipath transport protocol for heterogeneous multi-homing networks 异构多归属网络的多路径传输协议
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921212
YoungHa Hwang, B. O. Obele, Hyuk Lim
{"title":"Multipath transport protocol for heterogeneous multi-homing networks","authors":"YoungHa Hwang, B. O. Obele, Hyuk Lim","doi":"10.1145/1921206.1921212","DOIUrl":"https://doi.org/10.1145/1921206.1921212","url":null,"abstract":"We present a new multipath transport protocol - Heterogeneous Multipath Transport Protocol (HMTP), powered by fountain codes to improve throughput performance and path utilization of heterogeneous multi-homing networks. HMTP solves the receive buffer blocking problem and eliminates the need for retransmission and in-order packet delivery, especially in a heterogeneous multi-homing network.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125229914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Inferring router statistics with IP timestamps 用IP时间戳推断路由器统计信息
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921218
Andrew D. Ferguson, Rodrigo Fonseca
{"title":"Inferring router statistics with IP timestamps","authors":"Andrew D. Ferguson, Rodrigo Fonseca","doi":"10.1145/1921206.1921218","DOIUrl":"https://doi.org/10.1145/1921206.1921218","url":null,"abstract":"This paper describes our initial experiences with using the IP timestamp option to infer router statistics such as traffic shape and CPU load. By deducing this information through the use of an IP option, we can gather these statistics without administrative access to the router under study. This creates the potential for researchers to gather basic statistics from routers in wide-area networks which support this option.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121639294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network 802.11a/g和802.11n共存网络中无线业务特性研究
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921208
H. Asai, K. Fukuda, H. Esaki
{"title":"Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network","authors":"H. Asai, K. Fukuda, H. Esaki","doi":"10.1145/1921206.1921208","DOIUrl":"https://doi.org/10.1145/1921206.1921208","url":null,"abstract":"The number of wireless devices and the traffic volume generated by these devices become significant today, and many devices begin supporting 802.11n protocol for higher-speed wireless access. However, the diversification in link types of end-hosts may degrade system performance. For example, hosts using 802.11 protocols had better not be relay nodes in a P2P live streaming system because 802.11 is a half-duplex protocol and usually less stable compared to modern wired links. Hence, understanding traffic characteristics of various link types is essential for improving or building network architectures. Moreover, estimation of the link type of a remote host possibly achieves better performance (e.g., higher throughput) in some network systems. Baiamonte et al. [1] have proposed an algorithm to detect wireless hosts from passive measurement by using the entropy of packet interarrival time (PIT). Wei et al. [2] have also proposed an algorithm to classify access network types. However, these algorithms pay no attention to new link types such as 802.11n, 3G, and WiMAX even though each of them has different characteristics and possibly degrades the performance of network systems.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characterizing the file hosting service ecosystem 文件托管服务生态系统的特征
CoNEXT '10 Student Workshop Pub Date : 2010-11-30 DOI: 10.1145/1921206.1921210
Aniket Mahanti, Niklas Carlsson, C. Williamson
{"title":"Characterizing the file hosting service ecosystem","authors":"Aniket Mahanti, Niklas Carlsson, C. Williamson","doi":"10.1145/1921206.1921210","DOIUrl":"https://doi.org/10.1145/1921206.1921210","url":null,"abstract":"File Hosting Services (FHS) such as Rapidshare and Mega-upload have recently become popular. The decline of P2P file sharing has prompted various services including FHS to replace it. We propose a comprehensive multi-level characterization of the FHS ecosystem. We devise a measurement framework to collect datasets from multiple vantage points. To the best of our knowledge, this work is the first to characterize the FHS ecosystem. The work will highlight the content, usage, performance, infrastructure, and quality of service characteristics of FHS. FHS can have significant implications on Internet traffic, if these services were to supplant P2P as the dominant content sharing technology.","PeriodicalId":325024,"journal":{"name":"CoNEXT '10 Student Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信