SESSION: Data plane
Brighten Godfrey
Millions of little minions: using packets for low latency network programming and visibility
Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières
This paper presents a practical approach to rapidly introducing new dataplane functionality into networks: End-hosts embed tiny programs into packets to actively query and manipulate a network's internal state. We show how this "tiny packet program" ...
SAX-PAC (Scalable And eXpressive PAcket Classification)
Kirill Kogan, Sergey Nikolenko, Ori Rottenstreich, William Culhane, Patrick Eugster
Efficient packet classification is a core concern for network services. Traditional multi-field classification approaches, in both software and ternary content-addressable memory (TCAMs), entail tradeoffs between (memory) space and (lookup) time. TCAMs ...
Duet: cloud scale load balancing with hardware and software
Rohan Gandhi, Hongqiang Harry Liu, Y. Charlie Hu, Guohan Lu, Jitendra Padhye, Lihua Yuan, Ming Zhang
Load balancing is a foundational function of datacenter infrastructures and is critical to the performance of online services hosted in datacenters. As the demand for cloud services grows, expensive and hard-to-scale dedicated hardware load balancers ...
Guarantee IP lookup performance with FIB explosion
Tong Yang, Gaogang Xie, YanBiao Li, Qiaobin Fu, Alex X. Liu, Qi Li, Laurent Mathy
The Forwarding Information Base (FIB) of backbone routers has been rapidly growing in size. An ideal IP lookup algorithm should achieve constant, yet small, IP lookup time and on-chip memory usage. However, no prior IP lookup algorithm achieves both ...
SESSION: Network architecture 1
Adrian Perrig
From the consent of the routed: improving the transparency of the RPKI
Ethan Heilman, Danny Cooper, Leonid Reyzin, Sharon Goldberg
The Resource Public Key Infrastructure (RPKI) is a new infrastructure that prevents some of the most devastating attacks on interdomain routing. However, the security benefits provided by the RPKI are accomplished via an architecture that empowers centralized ...
Network neutrality inference
Zhiyong Zhang, Ovidiu Mara, Katerina Argyraki
When can we reason about the neutrality of a network based on external observations? We prove conditions under which it is possible to (a) detect neutrality violations and (b) localize them to specific links, based on external observations. Our insight ...
Balancing accountability and privacy in the network
David Naylor, Matthew K. Mukerjee, Peter Steenkiste
Though most would agree that accountability and privacy are both valuable, today's Internet provides little support for either. Previous efforts have explored ways to offer stronger guarantees for one of the two, typically at the expense of the other; ...
Measuring IPv6 adoption
Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric Osterweil, Michael Bailey After several IPv4 address exhaustion milestones in the last three years, it is becoming apparent that the world is running out of IPv4 addresses, and the adoption of the next generation Internet protocol, IPv6, though nascent, is accelerating. In order ...
One tunnel is (often) enough
Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas Anderson, Arvind Krishnamurthy
A longstanding problem with the Internet is that it is vulnerable to outages, black holes, hijacking and denial of service. Although architectural solutions have been proposed to address many of these issues, they have had difficulty being adopted due ...
SESSION: Middleboxes and network services
Vyas Sekar
A middlebox-cooperative TCP for a non end-to-end internet
Ryan Craven, Robert Beverly, Mark Allman
Understanding, measuring, and debugging IP networks, particularly across administrative domains, is challenging. One particularly daunting aspect of the challenge is the presence of transparent middleboxes---which are now common in today's Internet. ...
OpenNF: enabling innovation in network function control
Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, Aditya Akella
Network functions virtualization (NFV) together with software-defined networking (SDN) has the potential to help operators satisfy tight service level agreements, accurately monitor and manipulate network traffic, and minimize operating expenses. However, ...
Network stack specialization for performance
Ilias Marinos, Robert N.M. Watson, Mark Handley
Contemporary network stacks are masterpieces of generality, supporting many edge-node and middle-node functions. Generality comes at a high performance cost: current APIs, memory models, and implementations drastically limit the effectiveness of increasingly ...
A buffer-based approach to rate adaptation: evidence from a large video streaming service
Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson
Existing ABR algorithms face a significant challenge in estimating future capacity: capacity can vary widely over time, a phenomenon commonly observed in commercial services. In this work, we suggest an alternative approach: rather than presuming that ...
SESSION: Wireless (1)
Shyamnath Gollakota
FastForward: fast and constructive full duplex relays
Dinesh Bharadia, Sachin Katti
This paper presents, FastForward (FF), a novel full duplex relay that constructively forwards signals such that wireless network throughput and coverage is significantly enhanced. FF is a Layer 1 in-band full duplex device, it receives and transmits ...
LTE radio analytics made easy and accessible
Swarun Kumar, Ezzeldin Hamed, Dina Katabi, Li Erran Li
Despite the rapid growth of next-generation cellular networks, researchers and end-users today have limited visibility into the performance and problems of these networks. As LTE deployments move towards femto and pico cells, even operators struggle ...
Control-plane protocol interactions in cellular networks
Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu
Control-plane protocols are complex in cellular networks. They communicate with one another along three dimensions of cross layers, cross (circuit-switched and packet-switched) domains, and cross (3G and 4G) systems. In this work, we propose signaling ...
RF-IDraw: virtual touch screen in the air using RF signals
Jue Wang, Deepak Vasisht, Dina Katabi
Prior work in RF-based positioning has mainly focused on discovering the absolute location of an RF source, where state-of-the-art systems can achieve an accuracy on the order of tens of centimeters using a large number of antennas. However, many applications ...
SESSION: Monitoring and diagnostics
Aditya Akella
Diagnosing missing events in distributed systems with negative provenance
Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo
When debugging a distributed system, it is sometimes necessary to explain the absence of an event - for instance, why a certain route is not available, or why a certain packet did not arrive. Existing debuggers offer some support for explaining the presence ...
Troubleshooting blackbox SDN control software with minimal causal sequences
Colin Scott, Andreas Wundsam, Barath Raghavan, Aurojit Panda, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, H.B. Acharya, Kyriakos Zarifis, Scott Shenker
Software bugs are inevitable in software-defined networking control software, and troubleshooting is a tedious, time-consuming task. In this paper we discuss how to improve control software troubleshooting by presenting a technique for automatically ...
Planck: millisecond-scale monitoring and control for commodity networks
Jeff Rasley, Brent Stephens, Colin Dixon, Eric Rozner, Wes Felter, Kanak Agarwal, John Carter, Rodrigo Fonseca
Software-defined networking introduces the possibility of building self-tuning networks that constantly monitor network conditions and react rapidly to important events such as congestion. Unfortunately, state-of-the-art monitoring mechanisms for conventional ...
DREAM: dynamic resource allocation for software-defined measurement
Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat
Software-defined networks can enable a variety of concurrent, dynamically instantiated, measurement tasks, that provide fine-grain visibility into network traffic. Recently, there have been many proposals to configure TCAM counters in hardware switches ...
SESSION: Novel datacenter network designs
Ratul Mahajan
Quartz: a new design element for low-latency DCNs
Yunpeng James Liu, Peter Xiang Gao, Bernard Wong, Srinivasan Keshav
Most datacenter network (DCN) designs focus on maximizing bisection bandwidth rather than minimizing server-to-server latency. We explore architectural approaches to building low-latency DCNs and introduce Quartz, a design element consisting of a full ...
Using RDMA efficiently for key-value services
Anuj Kalia, Michael Kaminsky, David G. Andersen
This paper describes the design and implementation of HERD, a key-value system designed to make the best use of an RDMA network. Unlike prior RDMA-based key-value systems, HERD focuses its design on reducing network round trips while using efficient ...
Fastpass: a centralized "zero-queue" datacenter network
Jonathan Perry, Amy Ousterhout, Hari Balakrishnan, Devavrat Shah, Hans Fugal
An ideal datacenter network should provide several properties, including low median and tail latency, high utilization (throughput), fair allocation of network resources between users or applications, deadline-aware scheduling, and congestion (loss) ...
FireFly: a reconfigurable wireless data center fabric using free-space optics
Navid Hamedazimi, Zafar Qazi, Himanshu Gupta, Vyas Sekar, Samir R. Das, Jon P. Longtin, Himanshu Shah, Ashish Tanwer
Conventional static datacenter (DC) network designs offer extreme cost vs. performance tradeoffs---simple leaf-spine networks are cost-effective but oversubscribed, while "fat tree"-like solutions offer good worst-case performance but are expensive. ...
A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers
K.V. Rashmi, Nihar B. Shah, Dikang Gu, Hairong Kuang, Dhruba Borthakur, Kannan Ramchandran
Erasure codes such as Reed-Solomon (RS) codes are being extensively deployed in data centers since they offer significantly higher reliability than data replication methods at much lower storage overheads. These codes however mandate much higher resources ...
SESSION: Network architecture (2)
John Wroclawski
A global name service for a highly mobile internetwork
Abhigyan Sharma, Xiaozheng Tie, Hardeep Uppal, Arun Venkataramani, David Westbrook, Aditya Yadav
Mobile devices dominate the Internet today, however the Internet rooted in its tethered origins continues to provide poor infrastructure support for mobility. Our position is that in order to address this problem, a key challenge that must be addressed ...
Towards a quantitative comparison of location-independent network architectures
Zhaoyu Gao, Arun Venkataramani, James F. Kurose, Simon Heimlicher
This paper presents a quantitative methodology and results comparing different approaches for {\it location-independent} communication. Our approach is empirical and is based on real Internet topologies, routing tables from real routers, and a measured ...
Lightweight source authentication and path validation
Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig
In-network source authentication and path validation are fundamental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently ...
SESSION: Scheduling in datacenter networks
Rodrigo Fonseca
Decentralized task-aware scheduling for data center networks
Fahad R. Dogar, Thomas Karagiannis, Hitesh Ballani, Antony Rowstron
Many data center applications perform rich and complex tasks (e.g., executing a search query or generating a user's news-feed). From a network perspective, these tasks typically comprise multiple flows, which traverse different parts of the network at ...
Efficient coflow scheduling with Varys
Mosharaf Chowdhury, Yuan Zhong, Ion Stoica
Communication in data-parallel applications often involves a collection of parallel flows. Traditional techniques to optimize flow-level metrics do not perform well in optimizing such collections, because the network is largely agnostic to application-level ...
Multi-resource packing for cluster schedulers
Robert Grandl, Ganesh Ananthanarayanan, Srikanth Kandula, Sriram Rao, Aditya Akella
Tasks in modern data parallel clusters have highly diverse resource requirements, along CPU, memory, disk and network. Any of these resources may become bottlenecks and hence, the likelihood of wasting resources due to fragmentation is now larger. Today's ...
Application-driven bandwidth guarantees in datacenters
Jeongkeun Lee, Yoshio Turner, Myungjin Lee, Lucian Popa, Sujata Banerjee, Joon-Myung Kang, Puneet Sharma
Providing bandwidth guarantees to specific applications is becoming increasingly important as applications compete for shared cloud network resources. We present CloudMirror, a solution that provides bandwidth guarantees to cloud applications based on ...
SESSION: Wireless 2
Kyle Jamieson
Vidyut: exploiting power line infrastructure for enterprise wireless networks
Vivek Yenamandra, Kannan Srinivasan
Global synchronization across time and frequency domains significantly benefits wireless communications. Multi-Cell (Network) MIMO, interference alignment solutions, opportunistic routing techniques in ad-hoc networks, OFDMA etc. all necessitate synchronization ...
Wi-fi backscatter: internet connectivity for RF-powered devices
Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall
RF-powered computers are small devices that compute and communicate using only the power that they harvest from RF signals. While existing technologies have harvested power from ambient RF sources (e.g., TV broadcasts), they require a dedicated gateway ...
Turbocharging ambient backscatter communication
Aaron N. Parks, Angli Liu, Shyamnath Gollakota, Joshua R. Smith
Communication primitives such as coding and multiple antenna processing have provided significant benefits for traditional wireless systems. Existing designs, however, consume significant power and computational resources, and hence cannot be run on ...
Geosphere: consistently turning MIMO capacity into throughput
Konstantinos Nikitopoulos, Juan Zhou, Ben Congdon, Kyle Jamieson
This paper presents the design and implementation of Geosphere, a physical- and link-layer design for access point-based MIMO wireless networks that consistently improves network throughput. To send multiple streams of data in a MIMO system, prior designs ...
expand
SESSION: Network operations
Andrew Moore
Calendaring for wide area networks
Srikanth Kandula, Ishai Menache, Roy Schwartz, Spandana Raj Babbula
Datacenter WAN traffic consists of high priority transfers that have to be carried as soon as they arrive alongside large transfers with pre-assigned deadlines on their completion (ranging from minutes to hours). The ability to offer guarantees to large ...
Traffic engineering with forward fault correction
Hongqiang Harry Liu, Srikanth Kandula, Ratul Mahajan, Ming Zhang, David Gelernter
Faults such as link failures and high switch configuration delays can cause heavy congestion and packet loss. Because it takes time to detect and react to faults, these conditions can last long---even tens of seconds. We propose forward fault correction ...
Dynamic scheduling of network updates
Xin Jin, Hongqiang Harry Liu, Rohan Gandhi, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Jennifer Rexford, Roger Wattenhofer
We present Dionysus, a system for fast, consistent network updates in software-defined networks. Dionysus encodes as a graph the consistency-related dependencies among updates at individual switches, and it then dynamically schedules these updates based ...
SDX: a software defined internet exchange
Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean P. Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett
BGP severely constrains how networks can deliver traffic over the Internet. Today's networks can only forward traffic based on the destination IP prefix, by selecting among routes offered by their immediate neighbors. We believe Software Defined Networking ...
A network-state management service
Peng Sun, Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin
We present Statesman, a network-state management service that allows multiple network management applications to operate independently, while maintaining network-wide safety and performance invariants. Network state captures various aspects of the network ...
expand
SESSION: Transport and congestion control
Jitendra Padhye
An experimental study of the learnability of congestion control
Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, Hari Balakrishnan
When designing a distributed network protocol, typically it is infeasible to fully define the target network where the protocol is intended to be used. It is therefore natural to ask: How faithfully do protocol designers really need to understand the ...
Friends, not foes: synthesizing existing transport strategies for data center networks
Ali Munir, Ghufran Baig, Syed M. Irteza, Ihsan A. Qazi, Alex X. Liu, Fahad R. Dogar
Many data center transports have been proposed in recent times (e.g., DCTCP, PDQ, pFabric, etc). Contrary to the common perception that they are competitors (i.e., protocol A vs. protocol B), we claim that the underlying strategies used in these protocols ...
CONGA: distributed congestion-aware load balancing for datacenters
Mohammad Alizadeh, Tom Edsall, Sarang Dharmapurikar, Ramanan Vaidyanathan, Kevin Chu, Andy Fingerhut, Vinh The Lam, Francis Matus, Rong Pan, Navindra Yadav, George Varghese
We present the design, implementation, and evaluation of CONGA, a network-based distributed congestion-aware load balancing mechanism for datacenters. CONGA exploits recent trends including the use of regular Clos topologies and overlays for network ...
POSTER SESSION: Poster session I
YouSlow: a performance analysis tool for adaptive bitrate video streaming
Hyunwoo Nam, Kyung-Hwa Kim, Doru Calin, Henning Schulzrinne
Adaptive bitrate (ABR) technologies are being widely used in today's popular HTTP-based video streaming such as YouTube and Netflix. Such a rate-switching algorithm embedded in a video player is designed to improve video quality-of-experience (QoE) by ...
RPKI vs ROVER: comparing the risks of BGP security solutions
Aanchal Malhotra, Sharon Goldberg
BGP, the Internet's interdomain routing protocol, is highly vulnerable to routing failures that result from unintentional misconfigurations or deliberate attacks. To defend against these failures, recent years have seen the adoption of the Resource Public ...
CTE: cost-effective intra-domain traffic engineering
Baobao Zhang, Jun Bi, Jianping Wu, Fred Baker
Traffic statistics collection with FleXam
Sajad Shirali-Shahreza, Yashar Ganjali
One of the limitations of wildcard rules in Software Defined Networks, such as OpenFlow, is losing visibility. FleXam is a flexible sampling extension for OpenFlow that allows the controller to define which packets should be sampled, what parts of each ...
Identifying traffic differentiation on cellular data networks
Arash Molavi Kakhki, Abbas Razaghpanah, Rajesh Golani, David Choffnes, Phillipa Gill, Alan Mislove
The goal of this research is to detect traffic differentiation in cellular data networks. We define service differentiation as any attempt to change the performance of network traffic traversing an ISP's boundaries. ISPs may implement differentiation ...
NIMBUS: cloud-scale attack detection and mitigation
Rui Miao, Minlan Yu, Navendu Jain
A user behavior based cheat detection mechanism for crowdtesting
Ricky K.P. Mok, Weichao Li, Rocky K.C. Chang
Crowdtesting is increasingly popular among researchers to carry out subjective assessments of different services. Experimenters can easily assess to a huge pool of human subjects through crowdsourcing platforms. The workers are usually anonymous, and ...
ESCAPE: extensible service chain prototyping environment using mininet, click, NETCONF and POX
Attila Csoma, Balázs Sonkoly, Levente Csikor, Felicián Németh, Andràs Gulyas, Wouter Tavernier, Sahel Sahhaf
Mininet is a great prototyping tool which combines existing SDN-related software components (e.g., Open vSwitch, OpenFlow controllers, network namespaces, cgroups) into a framework, which can automatically set up and configure customized OpenFlow testbeds ...
Sampling online social networks: an experimental study of twitter
Maksym Gabielkov, Ashwin Rao, Arnaud Legout
Online social networks (OSNs) are an important source of information for scientists in different fields such as computer science, sociology, economics, etc. However, it is hard to study OSNs as they are very large. For instance, Facebook has 1.28 billion ...
Mahimahi: a lightweight toolkit for reproducible web measurement
Ravi Netravali, Anirudh Sivaraman, Keith Winstein, Somak Das, Ameesh Goyal, Hari Balakrishnan
This demo presents a measurement toolkit, Mahimahi, that records websites and replays them under emulated network conditions. Mahimahi is structured as a set of arbitrarily composable UNIX shells. It includes two shells to record and replay Web pages, ...
A time for reliability: the growing importance of being always on
Zachary S. Bischof, Fabián E. Bustamante
When a new technology reaches the market, we typically focus on the want or need that it can fulfill. As the technology becomes a commodity and its market matures, reliability often become a key differentiating factor between competing products. We posit ...
Vivisecting whatsapp through large-scale measurements in mobile networks
Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas
WhatsApp, the new giant in instant multimedia messaging in mobile networks is rapidly increasing its popularity, taking over the traditional SMS/MMS messaging. In this paper we present the first large-scale characterization of WhatsApp, useful among ...
Behind the curtain: the importance of replica selection in next generation cellular networks
John P. Rula, Fabian E. Bustamante
Flowinsight: decoupling visibility from operability in SDN data plane
Yuliang Li, Guang Yao, Jun Bi
A cliq of content curators
Angela H. Jiang, Zachary S. Bischof, Fabian E. Bustamante
A social news site presents user-curated content, ranked by popularity. Popular curators like Reddit, or Facebook have become effective way of crowdsourcing news or sharing for personal opinions. Traditionally, these services require a centralized authority ...
Native actors: how to scale network forensics
Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch
When an organization detects a security breach, it undertakes a forensic analysis to figure out what happened. This investigation involves inspecting a wide range of heterogeneous data sources spanning over a long period of time. The iterative nature ...
SOUP: an online social network by the people, for the people
David Koll, Jun Li, Xiaoming Fu
With increasing frequency, users raise concerns about data privacy and protection in centralized Online Social Networks (OSNs), in which providers have the unprecedented privilege to access and exploit every user's private data at will. To mitigate these ...
AI3: application-independent information infrastructure
Bo Zhang, Jinfan Wang, Xinyu Wang, Yingying Cheng, Xiaohua Jia, Jianfei He
In the current Internet architecture, application service providers (ASPs) own users' data and social groups information, which made a handful of ASP companies growing bigger and bigger and denied small and medium companies from entering this business. ...
Robust full duplex radio link
Dinesh Bharadia, Kiran Joshi, Sachin Katti
This paper presents demonstration of a real-time full duplex point-to-point link, where transmission and reception occurs in the same spectrum band simultaneously between a pair of full-duplex radios. This demo first builds a full duplex radio by implementing ...
Demonstrating the prospects of dynamic application-aware networking in a home environment
Florian Wamser, Thomas Zinner, Lukas Iffländer, Phuoc Tran-Gia
POSTER SESSION: Poster session II
Enabling near real-time central control for live video delivery in CDNs
Matthew K. Mukerjee, JungAh Hong, Junchen Jiang, David Naylor, Dongsu Han, Srinivasan Seshan, Hui Zhang
User-created live video streaming is marking a fundamental shift in the workload of live video delivery. However, live-video-specific challenges and the viral nature of user-created content makes it difficult for current CDNs to deliver 1) high-quality, ...
NetAssay: providing new monitoring primitives for network operators
Sean Donovan, Nick Feamster
Home and business network operators have limited network statistics available over which management decisions can be made. Similarly, there are few triggered behaviors, such as usage or bandwidths cap for individual users, that are available. By looking ...
OpenSAN: a software-defined satellite network architecture
Jinzhen Bao, Baokang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu, Zhenghu Gong
In recent years, with the rapid development of satellite technology including On Board Processing (OBP) and Inter Satellite Link (ISL), satellite network devices such as space IP routers have been experimentally carried in space. However, there are many ...
SENSS: observe and control your own traffic in the internet
Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic
We propose a new software-defined security service -- SENSS -- that enables a victim network to request services from remote ISPs for traffic that carries source IPs or destination IPs from this network's address space. These services range from statistics ...
Locating throughput bottlenecks in home networks
Srikanth Sundaresan, Nick Feamster, Renata Teixeira
We present a demonstration of WTF (Where's The Fault?), a system that localizes performance problems in home and access networks. We implement WTF as custom firmware that runs in an off-the-shelf home router. WTF uses timing and buffering information ...
OpenANFV: accelerating network function virtualization with a consolidated framework in openstack
Xiongzi Ge, Yi Liu, David H.C. Du, Liang Zhang, Hongguang Guan, Jian Chen, Yuping Zhao, Xinyu Hu
The resources of dedicated accelerators (e.g. FPGA) are still required to bridge the gap between software-based Middleboxs(MBs) and the commodity hardware. To consolidate various hardware resources in an elastic, programmable and reconfigurable manner, ...
Towards the super fluid cloud
Filipe Manco, Joao Martins, Felipe Huici
Traditionally, the number of VMs running on a server and how quickly these can be migrated has been less than optimal mostly because of the memory and CPU requirements imposed on the system by the full-fledged OSes that the VMs run. More recently, work ...
Ziria: language for rapid prototyping of wireless PHY
Gordon Stewart, Mahanth Gowda, Geoffrey Mainland, Bozidar Radunovic, Dimitrios Vytiniotis, Doug Patterson
Software-defined radios (SDR) have the potential to bring major innovation in wireless networking design. However, their impact so far has been limited due to complex programming tools. Most of the existing tools are either too slow to achieve the full ...
Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events
Steffen Gebert, David Hock, Thomas Zinner, Phuoc Tran-Gia, Marco Hoffmann, Michael Jarschel, Ernst-Dieter Schmidt, Ralf-Peter Braun, Christian Banse, Andreas Köpsel
Tracing multipath TCP connections
Benjamin Hesmans, Olivier Bonaventure
Multipath TCP is a new extension to TCP that enables a host to transmit the packets from a given connection by using several interfaces. We propose mptcptrace, a software that enables a detailed analysis of Multipath TCP packet traces.
Demo: a virtualized lab testbed with physical network outlets for hands-on computer networking education
Mark Schmidt, Florian Heimgaertner, Michael Menth
This demo presents a testbed for computer networking education. It leverages hardware virtualization to accommodate 6 PCs and 2 routers on a single testbed host to reduce costs, energy consumption, space requirements, and heat emission. The testbed excels ...
Rethinking congestion control architecture: performance-oriented congestion control
Mo Dong, Qingxi Li, Doron Zarchy, Brighten Godfrey, Michael Schapira
After more than two decades of evolution, TCP and its end host based modifications can still suffer from severely degraded performance under real-world challenging network conditions. The reason, as we observe, is due to TCP family's fundamental architectural ...
DOT: distributed OpenFlow testbed
Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba
With the growing adoption of Software Defined Networking (SDN) technology, there is a compelling need for an SDN emulator that can facilitate experimenting with new SDN solutions. Unfortunately, Mininet, the de facto standard emulator for software defined ...
Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework
Adrian Gämperli, Vasileios Kotronis, Xenofontas Dimitropoulos
Droid-Sec: deep learning in android malware detection
Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, Yibo Xue
As smartphones and mobile devices are rapidly becoming indispensable for many network users, mobile malware has become a serious threat in the network security and privacy. Especially on the popular Android platform, many malicious apps are hiding in ...
Accelerating incast and multicast traffic delivery for data-intensive applications using physical layer optics
Payman Samadi, Varun Gupta, Berk Birand, Howard Wang, Gil Zussman, Keren Bergman
We present a control plane architecture to accelerate multicast and incast traffic delivery for data-intensive applications in cluster-computing interconnection networks. The architecture is experimentally examined by enabling physical layer optical ...
Social SDN: online social networks integration in wireless network provisioning
Arjuna Sathiaseelan, M. Said Seddiki, Stoyan Stoyanov, Dirk Trossen
Flow-level state transition as a new switch primitive for SDN
Masoud Moshref, Apoorv Bhargava, Adhip Gupta, Minlan Yu, Ramesh Govindan
T-DNS: connection-oriented DNS to improve privacy and security (poster abstract)
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address spoofing that results in denial-of-service (DoS) attacks on the server and third parties, injection attacks that ...
Extending the software-defined network boundary
Oliver Michel, Michael Coughlin, Eric Keller
Given that Software-Defined Networking is highly successful in solving many of today's manageability, flexibility, and scalability issues in large-scale networks, in this paper we argue that the concept of SDN can be extended even further. Many applications ...
POSTER SESSION: Poster session 3
Rethinking buffer management in data center networks
Aisha Mushtaq, Asad Khalid Ismail, Abdul Wasay, Bilal Mahmood, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
Data center operators face extreme challenges in simultaneously providing low latency for short flows, high throughput for long flows, and high burst tolerance. We propose a buffer management strategy that addresses these challenges by isolating short ...
VIRL: the virtual internet routing lab
Joel Obstfeld, Simon Knight, Ed Kern, Qiang Sheng Wang, Tom Bryan, Dan Bourque
The increasing demand to provide new network services in a timely and efficient manner is driving the need to design, test and deploy networks quickly and consistently. Testing and verifying at scale is a challenge: network equipment is expensive, requires ...
SDX: a software defined internet exchange
Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean Patrick Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett
BGP severely constrains how networks can deliver traffic over the Internet. Today's networks can only forward traffic based on the destination IP prefix, by selecting among routes offered by their immediate neighbors. We believe Software Defined Networking ...
Toward a biometric-aware cloud service engine for multi-screen video applications
Han Hu, Yichao Jin, Yonggang Wen, Tat-Seng Chua, Xuelong Li
The emergence of portable devices and online social networks (OSNs) has changed the traditional video consumption paradigm by simultaneously providing multi-screen video watching, social networking engagement, etc. One challenge is to design a unified ...
SDN-based live VM migration across datacenters
Jiaqiang Liu, Yong Li, Depeng Jin
Characterizing botnets-as-a-service
Wentao Chang, An Wang, Aziz Mohaisen, Songqing Chen
Aerial wireless localization using target-guided flight route
Shaofeng Chen, Dingyi Fang, Xiaojiang Chen, Tingting Xia, Meng Jin
This poster presents GuideLoc, a highly efficient aerial wireless localization system that uses directional antennas mounted on a mini Multi-rotor Unmanned Aerial Vehicle (UAV), to enable detecting and positioning of targets. Taking advantage of angle ...
An educational networking framework for full layer implementation and testing
Keunhong Lee, Joongi Kim, Sue Moon
Drawbridge: software-defined DDoS-resistant traffic engineering
Jun Li, Skyler Berg, Mingwei Zhang, Peter Reiher, Tao Wei
End hosts in today's Internet have the best knowledge of the type of traffic they should receive, but they play no active role in traffic engineering. Traffic engineering is conducted by ISPs, which unfortunately are blind to specific user needs. End ...
DesktopDC: setting all programmable data center networking testbed on desk
Chengchen Hu, Ji Yang, Zhimin Gong, Shuoling Deng, Hongbo Zhao