Proceedings of the ACM SIGCOMM 2011 conference最新文献

筛选
英文 中文
Improving datacenter performance and robustness with multipath TCP 通过多路径TCP提高数据中心性能和健壮性
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018467
C. Raiciu, S. Barré, C. Pluntke, A. Greenhalgh, D. Wischik, M. Handley
{"title":"Improving datacenter performance and robustness with multipath TCP","authors":"C. Raiciu, S. Barré, C. Pluntke, A. Greenhalgh, D. Wischik, M. Handley","doi":"10.1145/2018436.2018467","DOIUrl":"https://doi.org/10.1145/2018436.2018467","url":null,"abstract":"The latest large-scale data centers offer higher aggregate bandwidth and robustness by creating multiple paths in the core of the net- work. To utilize this bandwidth requires different flows take different paths, which poses a challenge. In short, a single-path transport seems ill-suited to such networks. We propose using Multipath TCP as a replacement for TCP in such data centers, as it can effectively and seamlessly use available bandwidth, giving improved throughput and better fairness on many topologies. We investigate what causes these benefits, teasing apart the contribution of each of the mechanisms used by MPTCP. Using MPTCP lets us rethink data center networks, with a different mindset as to the relationship between transport protocols, rout- ing and topology. MPTCP enables topologies that single path TCP cannot utilize. As a proof-of-concept, we present a dual-homed variant of the FatTree topology. With MPTCP, this outperforms FatTree for a wide range of workloads, but costs the same. In existing data centers, MPTCP is readily deployable leveraging widely deployed technologies such as ECMP. We have run MPTCP on Amazon EC2 and found that it outperforms TCP by a factor of three when there is path diversity. But the biggest benefits will come when data centers are designed for multipath transports.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114071757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 766
Pomelo: accurate and decentralized shortest-path distance estimation in social graphs 柚:社交图中准确和分散的最短路径距离估计
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018491
Zhuo Chen, Yang Chen, Cong Ding, Beixing Deng, Xing Li
{"title":"Pomelo: accurate and decentralized shortest-path distance estimation in social graphs","authors":"Zhuo Chen, Yang Chen, Cong Ding, Beixing Deng, Xing Li","doi":"10.1145/2018436.2018491","DOIUrl":"https://doi.org/10.1145/2018436.2018491","url":null,"abstract":"Computing the shortest-path distances between nodes is a key problem in analyzing social graphs. Traditional methods like breadth-first search (BFS) do not scale well with graph size. Recently, a Graph Coordinate System, called Orion, has been proposed to estimate shortest-path distances in a scalable way. Orion uses a landmark-based approach, which does not take account of the shortest-path distances between non-landmark nodes in coordinate calculation. Such biased input for the coordinate system cannot characterize the graph structure well. In this paper, we propose Pomelo, which calculates the graph coordinates in a decentralized manner. Every node in Pomelo computes its shortest-path distances to both nearby neighbors and some random distant neighbors. By introducing the novel partial BFS, the computational overhead of Pomelo is tunable. Our experimental results from different representative social graphs show that Pomelo greatly outperforms Orion in estimation accuracy while maintaining the same computational overhead.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115222271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The evolution of layered protocol stacks leads to an hourglass-shaped architecture 分层协议栈的演变导致了沙漏形的架构
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018460
Saamer Akhshabi, C. Dovrolis
{"title":"The evolution of layered protocol stacks leads to an hourglass-shaped architecture","authors":"Saamer Akhshabi, C. Dovrolis","doi":"10.1145/2018436.2018460","DOIUrl":"https://doi.org/10.1145/2018436.2018460","url":null,"abstract":"The Internet protocol stack has a layered architecture that resembles an hourglass. The lower and higher layers tend to see frequent innovations, while the protocols at the waist of the hourglass appear to be \"ossified\". We propose EvoArch, an abstract model for studying protocol stacks and their evolution. EvoArch is based on a few principles about layered network architectures and their evolution in a competitive environment where protocols acquire value based on their higher layer applications and compete with other protocols at the same layer. EvoArch produces an hourglass structure that is similar to the Internet architecture from general initial conditions and in a robust manner. It also suggests a plausible explanation why some protocols, such as TCP or IP, managed to survive much longer than most other protocols at the same layers. Furthermore, it suggests ways to design more competitive new protocols and more evolvable future Internet architectures.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"796 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
Performance based traffic control with IDIPS 使用IDIPS进行基于性能的流量控制
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018508
D. Saucez, O. Bonaventure
{"title":"Performance based traffic control with IDIPS","authors":"D. Saucez, O. Bonaventure","doi":"10.1145/2018436.2018508","DOIUrl":"https://doi.org/10.1145/2018436.2018508","url":null,"abstract":"Nowadays Internet is ubiquitous resulting in an increasing path diversity and content duplication. However, while content can be retrieved from many different places, the paths to those places are not equivalent. Indeed, some paths offer better bandwidth while others are less expensive or more stable. In addition, a new range of applications is sensitive to the performance of the paths that carry their traffic. To support this evolution of the Internet, we propose ISP-Driven Informed Path Selection (IDIPS). Any ISP can easily deploy IDIPS to help its customers to select the paths that best meet their requirements in order to reach their content. IDIPS helps in this selection through pro-active measurements and ISP-defined policies. IDIPS is scalable and can support thousands of clients. IDIPS is also flexible and can thus be used by the ISP to optimize its routing decisions to take the performance of its inter-domain links into account.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Better never than late: meeting deadlines in datacenter networks 不做总比迟到好:在数据中心网络中按时完成任务
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018443
Christo Wilson, Hitesh Ballani, T. Karagiannis, A. Rowstron
{"title":"Better never than late: meeting deadlines in datacenter networks","authors":"Christo Wilson, Hitesh Ballani, T. Karagiannis, A. Rowstron","doi":"10.1145/2018436.2018443","DOIUrl":"https://doi.org/10.1145/2018436.2018443","url":null,"abstract":"The soft real-time nature of large scale web applications in today's datacenters, combined with their distributed workflow, leads to deadlines being associated with the datacenter application traffic. A network flow is useful, and contributes to application throughput and operator revenue if, and only if, it completes within its deadline. Today's transport pro- tocols (TCP included), given their Internet origins, are agnostic to such flow deadlines. Instead, they strive to share network resources fairly. We show that this can hurt application performance. Motivated by these observations, and other (previously known) deficiencies of TCP in the datacenter environment, this paper presents the design and implementation of D3, a deadline-aware control protocol that is customized for the datacenter environment. D3 uses explicit rate control to apportion bandwidth according to flow deadlines. Evaluation from a 19-node, two-tier datacenter testbed shows that D3, even without any deadline information, easily outper- forms TCP in terms of short flow latency and burst tolerance. Further, by utilizing deadline information, D3 effectively doubles the peak load that the datacenter network cansupport.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133973440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 650
What's the difference?: efficient set reconciliation without prior context 有什么区别?:有效的设置和解没有事先的背景
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018462
D. Eppstein, M. Goodrich, Frank C. Uyeda, G. Varghese
{"title":"What's the difference?: efficient set reconciliation without prior context","authors":"D. Eppstein, M. Goodrich, Frank C. Uyeda, G. Varghese","doi":"10.1145/2018436.2018462","DOIUrl":"https://doi.org/10.1145/2018436.2018462","url":null,"abstract":"We describe a synopsis structure, the Difference Digest, that allows two nodes to compute the elements belonging to the set difference in a single round with communication overhead proportional to the size of the difference times the logarithm of the keyspace. While set reconciliation can be done efficiently using logs, logs require overhead for every update and scale poorly when multiple users are to be reconciled. By contrast, our abstraction assumes no prior context and is useful in networking and distributed systems applications such as trading blocks in a peer-to-peer network, and synchronizing link-state databases after a partition. Our basic set-reconciliation method has a similarity with the peeling algorithm used in Tornado codes [6], which is not surprising, as there is an intimate connection between set difference and coding. Beyond set reconciliation, an essential component in our Difference Digest is a new estimator for the size of the set difference that outperforms min-wise sketches [3] for small set differences. Our experiments show that the Difference Digest is more efficient than prior approaches such as Approximate Reconciliation Trees [5] and Characteristic Polynomial Interpolation [17]. We use Difference Digests to implement a generic KeyDiff service in Linux that runs over TCP and returns the sets of keys that differ between machines.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131826383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
A novel approach for making energy efficient PON 一种制造节能PON的新方法
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018503
S. Newaz, Ángel Cuevas, G. Lee, N. Crespi, J. Choi
{"title":"A novel approach for making energy efficient PON","authors":"S. Newaz, Ángel Cuevas, G. Lee, N. Crespi, J. Choi","doi":"10.1145/2018436.2018503","DOIUrl":"https://doi.org/10.1145/2018436.2018503","url":null,"abstract":"Nowadays Passive Optical Network (PON) requires that Optical Network Units (ONUs) wake up periodically to check if the Optical Line Terminal (OLT) has any message directed to them. This implies that ONUs change from sleeping mode in which they just consume 1 W to active mode in which the consumption goes up to 10 W. In many cases, the OLT does not have any packets for the ONU and it goes to sleep again, what supposes a waste of energy. In this paper, we propose a novel Hybrid ONU that relies on a low-cost and low-energy technology, IEEE 802.15.4, to wake up those ONUs that are going to receive a packet. Our first estimations demonstrates that our solution would save around 25000$ per year and OLT.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"381 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134399182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Bulk data transfers 会话详细信息:批量数据传输
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/3256190
D. Clark
{"title":"Session details: Bulk data transfers","authors":"D. Clark","doi":"10.1145/3256190","DOIUrl":"https://doi.org/10.1145/3256190","url":null,"abstract":"","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WiFire: a firewall for wireless networks WiFire:无线网络防火墙
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018518
M. Wilhelm, I. Martinovic, J. Schmitt, Vincent Lenders
{"title":"WiFire: a firewall for wireless networks","authors":"M. Wilhelm, I. Martinovic, J. Schmitt, Vincent Lenders","doi":"10.1145/2018436.2018518","DOIUrl":"https://doi.org/10.1145/2018436.2018518","url":null,"abstract":"Firewalls are extremely effective at enforcing security policies in wired networks. Perhaps surprisingly, firewalls are entirely nonexistent in the wireless domain. Yet, the need to selectively control and block radio communication is particularly high in a broadcast environment since any node may receive and send packets. In this demo, we present WiFire, a system that brings the firewall concept to wireless networks. First, WiFire detects and analyzes packets during their transmission, checking their content against a set of rules. It then relies on reactive jamming techniques to selectively block undesired communication. We show the feasibility and performance of WiFire, which is implemented on the USRP2 software-defined radio platform, in several scenarios with IEEE 802.15.4 radios. WiFire is able to classify and effectively block undesired communication without interfering with desired communication.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125825349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Clearing the RF smog: making 802.11n robust to cross-technology interference 清除射频烟雾:使802.11n对跨技术干扰具有鲁棒性
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018456
Shyamnath Gollakota, Fadel M. Adib, D. Katabi, S. Seshan
{"title":"Clearing the RF smog: making 802.11n robust to cross-technology interference","authors":"Shyamnath Gollakota, Fadel M. Adib, D. Katabi, S. Seshan","doi":"10.1145/2018436.2018456","DOIUrl":"https://doi.org/10.1145/2018436.2018456","url":null,"abstract":"Recent studies show that high-power cross-technology interference is becoming a major problem in today's 802.11 networks. Devices like baby monitors and cordless phones can cause a wireless LAN to lose connectivity. The existing approach for dealing with such high-power interferers makes the 802.11 network switch to a different channel; yet the ISM band is becoming increasingly crowded with diverse technologies, and hence many 802.11 access points may not find an interference-free channel. This paper presents TIMO, a MIMO design that enables 802.11n to communicate in the presence of high-power cross-technology interference. Unlike existing MIMO designs, however, which require all concurrent transmissions to belong to the same technology, TIMO can exploit MIMO capabilities to decode in the presence of a signal from a different technology, hence enabling diverse technologies to share the same frequency band. We implement a prototype of TIMO in GNURadio-USRP2 and show that it enables 802.11n to communicate in the presence of interference from baby monitors, cordless phones, and microwave ovens, transforming scenarios with a complete loss of connectivity to operational networks.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126726799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 197
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信