Proceedings of the ACM SIGCOMM 2011 conference最新文献

筛选
英文 中文
Session details: ISPs and wide-area networking 会话细节:isp和广域网
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/3256197
W. Willinger
{"title":"Session details: ISPs and wide-area networking","authors":"W. Willinger","doi":"10.1145/3256197","DOIUrl":"https://doi.org/10.1145/3256197","url":null,"abstract":"","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129595071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seamless network-wide IGP migrations 无缝全网显卡迁移
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018473
L. Vanbever, Stefano Vissicchio, C. Pelsser, Pierre François, O. Bonaventure
{"title":"Seamless network-wide IGP migrations","authors":"L. Vanbever, Stefano Vissicchio, C. Pelsser, Pierre François, O. Bonaventure","doi":"10.1145/2018436.2018473","DOIUrl":"https://doi.org/10.1145/2018436.2018473","url":null,"abstract":"Network-wide migrations of a running network, such as the replacement of a routing protocol or the modification of its configuration, can improve the performance, scalability, manageability, and security of the entire network. However, such migrations are an important source of concerns for network operators as the reconfiguration campaign can lead to long and service-affecting outages. In this paper, we propose a methodology which addresses the problem of seamlessly modifying the configuration of commonly used link-state Interior Gateway Protocols (IGP). We illustrate the benefits of our methodology by considering several migration scenarios, including the addition or the removal of routing hierarchy in an existing IGP and the replacement of one IGP with another. We prove that a strict operational ordering can guarantee that the migration will not create IP transit service outages. Although finding a safe ordering is NP complete, we describe techniques which efficiently find such an ordering and evaluate them using both real-world and inferred ISP topologies. Finally, we describe the implementation of a provisioning system which automatically performs the migration by pushing the configurations on the routers in the appropriate order, while monitoring the entire migration process.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Multi-relational social networks in a large-scale MMORPG 大型MMORPG中的多关系社交网络
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018496
Seokshin Son, Ah Reum Kang, Hyunchul Kim, T. Kwon, Juyong Park, H. Kim
{"title":"Multi-relational social networks in a large-scale MMORPG","authors":"Seokshin Son, Ah Reum Kang, Hyunchul Kim, T. Kwon, Juyong Park, H. Kim","doi":"10.1145/2018436.2018496","DOIUrl":"https://doi.org/10.1145/2018436.2018496","url":null,"abstract":"We analyze multi-relational social interaction networks in a large-scale commercial Massively Multiplayer Online Role-Playing Game(MMORPG). Our work is based on data from AION, currently the world's second most-played MMORPG with 3.4 million subscribers as of mid 2010, created and serviced by NCSoft, Inc. We construct and characterize six distinct interactivity networks (Friend, Private Messaging, Party invitation, Trade, Mail, and Shop), each representing diverse player interaction types.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Demonstrating generalized virtual topologies in an openflow network 演示开放流网络中的广义虚拟拓扑
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018520
E. Salvadori, R. D. Corin, M. Gerola, Attilio Broglio, F. Pellegrini
{"title":"Demonstrating generalized virtual topologies in an openflow network","authors":"E. Salvadori, R. D. Corin, M. Gerola, Attilio Broglio, F. Pellegrini","doi":"10.1145/2018436.2018520","DOIUrl":"https://doi.org/10.1145/2018436.2018520","url":null,"abstract":"Network Virtualization (NV) is one of the most promising approaches to enable innovation in today’s network. Generally speaking, NV refers to the possibility of pooling together low–level hardware and software resources belonging to a networked system into a single administrative entity. In such a way network resources could be effectively shared in a transparent way among different logical network instances corresponding to different virtual network topologies. A recent approach toward Network Virtualization has been proposed through FlowVisor [1], whose aim is to leverage on the specific features of an OpenFlow–controlled network [2] to share the same hardware forwarding plane among multiple logical networks. As highlighted by the authors in [1], one of the major limitations of FlowVisor is the inability to establish virtual topologies not restricted by the underpinning physical topology. As a consequence, FlowVisor is unable to provide researchers flexibility in designing their experiments with arbitrary network topologies on a defined physical infrastructure. The architecture presented in Chapter 2 of this paper, called ADVisor (ADvanced FlowVisor), provides the functionalities to overcome the above-mentioned FlowVisor’s limitation by allowing the instantiation of generalized virtual topologies in a OpenFlow network through the implementation of virtual links as aggregation of multiple physical links and OpenFlow-enabled switches. In this demo we will show the configuration of a simple virtual topology performed through a Web-based control framework which allows the reservation of network resources (nodes, links and bandwidth) and the management of virtual resources (virtual links and virtual ports). We will also demonstrate the effective instantiation of the virtual topology by running a synthetic traffic generator application.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116849498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Cyber-physical handshake Cyber-physical握手
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018527
Fang-jing Wu, Feng-I Chu, Y. Tseng
{"title":"Cyber-physical handshake","authors":"Fang-jing Wu, Feng-I Chu, Y. Tseng","doi":"10.1145/2018436.2018527","DOIUrl":"https://doi.org/10.1145/2018436.2018527","url":null,"abstract":"While sensor-enabled devices have greatly enriched human interactions in our daily life, discovering the essential knowledge behind sensing data is a critical issue to connect the cyber world and the physical world. This motivates us to design an innovative sensor-aided social network system, termed cyber-physical handshake. It allows two users to naturally exchange personal information with each other after detecting and authenticating the handshaking patterns between them. This work describes our design of detection and authentication mechanisms to achieve this purpose and our prototype system to facilitate handshake social behavior.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Towards predictable datacenter networks 走向可预测的数据中心网络
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018465
Hitesh Ballani, Paolo Costa, T. Karagiannis, Ant Rowstron
{"title":"Towards predictable datacenter networks","authors":"Hitesh Ballani, Paolo Costa, T. Karagiannis, Ant Rowstron","doi":"10.1145/2018436.2018465","DOIUrl":"https://doi.org/10.1145/2018436.2018465","url":null,"abstract":"The shared nature of the network in today's multi-tenant datacenters implies that network performance for tenants can vary significantly. This applies to both production datacenters and cloud environments. Network performance variability hurts application performance which makes tenant costs unpredictable and causes provider revenue loss. Motivated by these factors, this paper makes the case for extending the tenant-provider interface to explicitly account for the network. We argue this can be achieved by providing tenants with a virtual network connecting their compute instances. To this effect, the key contribution of this paper is the design of virtual network abstractions that capture the trade-off between the performance guarantees offered to tenants, their costs and the provider revenue. To illustrate the feasibility of virtual networks, we develop Oktopus, a system that implements the proposed abstractions. Using realistic, large-scale simulations and an Oktopus deployment on a 25-node two-tier testbed, we demonstrate that the use of virtual networks yields significantly better and more predictable tenant performance. Further, using a simple pricing model, we find that the our abstractions can reduce tenant costs by up to 74% while maintaining provider revenue neutrality.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"498 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 853
They can hear your heartbeats: non-invasive security for implantable medical devices 他们可以听到你的心跳:植入式医疗设备的非侵入性安全
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018438
Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, D. Katabi, Kevin Fu
{"title":"They can hear your heartbeats: non-invasive security for implantable medical devices","authors":"Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, D. Katabi, Kevin Fu","doi":"10.1145/2018436.2018438","DOIUrl":"https://doi.org/10.1145/2018436.2018438","url":null,"abstract":"Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 394
Supporting novel home network management interfaces with openflow and NOX 支持新颖的家庭网络管理接口与openflow和NOX
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018523
R. Mortier, B. Bedwell, Kevin Glover, T. Lodge, T. Rodden, Charalampos Rotsos, A. Moore, A. Koliousis, J. Sventek
{"title":"Supporting novel home network management interfaces with openflow and NOX","authors":"R. Mortier, B. Bedwell, Kevin Glover, T. Lodge, T. Rodden, Charalampos Rotsos, A. Moore, A. Koliousis, J. Sventek","doi":"10.1145/2018436.2018523","DOIUrl":"https://doi.org/10.1145/2018436.2018523","url":null,"abstract":"The Homework project has examined redesign of existing home network infrastructures to better support the needs and requirements of actual home users. Integrating results from several ethnographic studies, we have designed and built a home networking platform providing detailed per-flow measurement and management capabilities supporting several novel management interfaces. This demo specifically shows these new visualization and control interfaces (1), and describes the broader benefits of taking an integrated view of the networking infrastructure, realised through our router's augmented measurement and control APIs (2). Aspects of this work have been published: the Homework Database in Internet Management (IM) 2011 [3] and implications of the ethnographic results are to appear at the SIGCOMM W-MUST workshop 2011 [2]. Separate, more detailed expositions of the interface elements and system performance and implications are currently under submission at other venues. A partial code release is already available and we anticipate fuller public beta release by Q4 2011.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115447361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
What can free money tell us on the virtual black market? 在虚拟黑市上,免费货币能告诉我们什么?
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/2018436.2018484
Kyungmoon Woo, Hyukmin Kwon, Hyunchul Kim, Chong-kwon Kim, H. Kim
{"title":"What can free money tell us on the virtual black market?","authors":"Kyungmoon Woo, Hyukmin Kwon, Hyunchul Kim, Chong-kwon Kim, H. Kim","doi":"10.1145/2018436.2018484","DOIUrl":"https://doi.org/10.1145/2018436.2018484","url":null,"abstract":"\"Real money trading\" or \"Gold farming\" refers to a set of illicit practices for gathering and distributing virtual goods in online games for real money. Unlike previous work, we use network-wide economic interactions among in-game characters as a lens to monitor, detect and identify gold farming networks. Our work is based on a set of real in-game trade activity logs collected for one month in year 2010 from the world's second largest MMORPG called AION (with 3.4 million subscribers). This is the first work that empirically (i) shows that \"free money network\" is a promising measure/approximation for detecting and characterizing gold farming networks, and (ii) measures the size of the free money net and in-game virtual economy in a large-scale MMORPG in terms of the cash flow.","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Session details: Novel data center architectures 会话细节:新颖的数据中心架构
Proceedings of the ACM SIGCOMM 2011 conference Pub Date : 2011-08-15 DOI: 10.1145/3256189
J. Padhye
{"title":"Session details: Novel data center architectures","authors":"J. Padhye","doi":"10.1145/3256189","DOIUrl":"https://doi.org/10.1145/3256189","url":null,"abstract":"","PeriodicalId":350796,"journal":{"name":"Proceedings of the ACM SIGCOMM 2011 conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122143866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信