首页 > 最新文献

Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM最新文献

英文 中文
Smart in-network deduplication for storage-aware SDN 面向存储感知SDN的智能网内重复数据删除
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491714
Yu Hua, Xue Liu, D. Feng
In order to efficiently handle the rapid growth of data and reduce the overhead of network transmission, we propose an in-network deduplication for storage-aware Software Defined Network (SDN), called SMIND. Unlike conventional source or destination deduplication schemes, SMIND implements in-network deduplication via SDN. Moreover, to address the performance bottleneck of accessing and indexing SDN controller, we implement an SDN-enabled Flash Translation Layer (FTL) in a real prototype of Solid State Disk (SSD). Experimental results demonstrate the efficiency and efficacy of SMIND.
为了有效地处理快速增长的数据并降低网络传输的开销,我们提出了一种基于存储感知的软件定义网络(SDN)的网络内重复数据删除技术,称为SMIND。与传统的源或目的重复数据删除方案不同,SMIND通过SDN实现网络内重复数据删除。此外,为了解决访问和索引SDN控制器的性能瓶颈,我们在固态磁盘(SSD)的真实原型中实现了支持SDN的闪存转换层(FTL)。实验结果证明了该方法的有效性。
{"title":"Smart in-network deduplication for storage-aware SDN","authors":"Yu Hua, Xue Liu, D. Feng","doi":"10.1145/2486001.2491714","DOIUrl":"https://doi.org/10.1145/2486001.2491714","url":null,"abstract":"In order to efficiently handle the rapid growth of data and reduce the overhead of network transmission, we propose an in-network deduplication for storage-aware Software Defined Network (SDN), called SMIND. Unlike conventional source or destination deduplication schemes, SMIND implements in-network deduplication via SDN. Moreover, to address the performance bottleneck of accessing and indexing SDN controller, we implement an SDN-enabled Flash Translation Layer (FTL) in a real prototype of Solid State Disk (SSD). Experimental results demonstrate the efficiency and efficacy of SMIND.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An empirical reexamination of global DNS behavior 全球DNS行为的经验重新检查
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486018
Hongyu Gao, V. Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Haixin Duan
The performance and operational characteristics of the DNS protocol are of deep interest to the research and network operations community. In this paper, we present measurement results from a unique dataset containing more than 26 billion DNS query-response pairs collected from more than 600 globally distributed recursive DNS resolvers. We use this dataset to reaffirm findings in published work and notice some significant differences that could be attributed both to the evolving nature of DNS traffic and to our differing perspective. For example, we find that although characteristics of DNS traffic vary greatly across networks, the resolvers within an organization tend to exhibit similar behavior. We further find that more than 50% of DNS queries issued to root servers do not return successful answers, and that the primary cause of lookup failures at root servers is malformed queries with invalid TLDs. Furthermore, we propose a novel approach that detects malicious domain groups using temporal correlation in DNS queries. Our approach requires no comprehensive labeled training set, which can be difficult to build in practice. Instead, it uses a known malicious domain as anchor, and identifies the set of previously unknown malicious domains that are related to the anchor domain. Experimental results illustrate the viability of this approach, i.e. , we attain a true positive rate of more than 96%, and each malicious anchor domain results in a malware domain group with more than 53 previously unknown malicious domains on average.
DNS协议的性能和操作特性是研究和网络运营界非常感兴趣的问题。在本文中,我们展示了一个独特数据集的测量结果,该数据集包含来自600多个全球分布的递归DNS解析器的260多亿个DNS查询-响应对。我们使用该数据集来重申已发表工作中的发现,并注意到一些重大差异,这些差异可能归因于DNS流量的演变性质和我们不同的观点。例如,我们发现,尽管DNS流量的特征在不同网络之间差异很大,但组织内的解析器往往表现出相似的行为。我们进一步发现,超过50%向根服务器发出的DNS查询没有返回成功的答案,并且根服务器查找失败的主要原因是带有无效tld的格式错误查询。此外,我们提出了一种利用DNS查询中的时间相关性检测恶意域组的新方法。我们的方法不需要全面的标记训练集,这在实践中很难建立。相反,它使用已知的恶意域作为锚,并识别与锚域相关的一组以前未知的恶意域。实验结果证明了该方法的可行性,即我们获得了超过96%的真阳性率,并且每个恶意锚域平均导致一个恶意域组具有超过53个以前未知的恶意域。
{"title":"An empirical reexamination of global DNS behavior","authors":"Hongyu Gao, V. Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Haixin Duan","doi":"10.1145/2486001.2486018","DOIUrl":"https://doi.org/10.1145/2486001.2486018","url":null,"abstract":"The performance and operational characteristics of the DNS protocol are of deep interest to the research and network operations community. In this paper, we present measurement results from a unique dataset containing more than 26 billion DNS query-response pairs collected from more than 600 globally distributed recursive DNS resolvers. We use this dataset to reaffirm findings in published work and notice some significant differences that could be attributed both to the evolving nature of DNS traffic and to our differing perspective. For example, we find that although characteristics of DNS traffic vary greatly across networks, the resolvers within an organization tend to exhibit similar behavior. We further find that more than 50% of DNS queries issued to root servers do not return successful answers, and that the primary cause of lookup failures at root servers is malformed queries with invalid TLDs. Furthermore, we propose a novel approach that detects malicious domain groups using temporal correlation in DNS queries. Our approach requires no comprehensive labeled training set, which can be difficult to build in practice. Instead, it uses a known malicious domain as anchor, and identifies the set of previously unknown malicious domains that are related to the anchor domain. Experimental results illustrate the viability of this approach, i.e. , we attain a true positive rate of more than 96%, and each malicious anchor domain results in a malware domain group with more than 53 previously unknown malicious domains on average.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Towards fast regular expression matching in practice 实现正则表达式的快速匹配
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491705
Kai Wang, Jun Li
Regular expression matching is popular in today's network devices with deep inspection function, but due to lack of algorithmic scalability, it is still the performance bottleneck in practical network processing. To address this problem, our method first partition regular expression patterns into simple segments to avoid state explosion, and then compile these segments into a compact data structure to achieve fast matching. Preliminary experiments illustrate that our matching engine scales linearly with the size of the real-world pattern set, and outperforms state-of-the-art solutions.
正则表达式匹配在当今具有深度检测功能的网络设备中很受欢迎,但由于缺乏算法可扩展性,在实际网络处理中仍然是性能瓶颈。为了解决这个问题,我们的方法首先将正则表达式模式划分为简单的段,以避免状态爆炸,然后将这些段编译成紧凑的数据结构,以实现快速匹配。初步实验表明,我们的匹配引擎与现实世界模式集的大小呈线性关系,并且优于最先进的解决方案。
{"title":"Towards fast regular expression matching in practice","authors":"Kai Wang, Jun Li","doi":"10.1145/2486001.2491705","DOIUrl":"https://doi.org/10.1145/2486001.2491705","url":null,"abstract":"Regular expression matching is popular in today's network devices with deep inspection function, but due to lack of algorithmic scalability, it is still the performance bottleneck in practical network processing. To address this problem, our method first partition regular expression patterns into simple segments to avoid state explosion, and then compile these segments into a compact data structure to achieve fast matching. Preliminary experiments illustrate that our matching engine scales linearly with the size of the real-world pattern set, and outperforms state-of-the-art solutions.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Maple: simplifying SDN programming using algorithmic policies Maple:使用算法策略简化SDN编程
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486030
A. Voellmy, Junchang Wang, Y. Yang, B. Ford, P. Hudak
Software-Defined Networking offers the appeal of a simple, centralized programming model for managing complex networks. However, challenges in managing low-level details, such as setting up and maintaining correct and efficient forwarding tables on distributed switches, often compromise this conceptual simplicity. In this pa- per, we present Maple, a system that simplifies SDN programming by (1) allowing a programmer to use a standard programming language to design an arbitrary, centralized algorithm, which we call an algorithmic policy, to decide the behaviors of an entire network, and (2) providing an abstraction that the programmer-defined, centralized policy runs, conceptually, "afresh" on every packet entering a network, and hence is oblivious to the challenge of translating a high-level policy into sets of rules on distributed individual switches. To implement algorithmic policies efficiently, Maple includes not only a highly-efficient multicore scheduler that can scale efficiently to controllers with 40+ cores, but more importantly a novel tracing runtime optimizer that can automatically record reusable policy decisions, offload work to switches when possible, and keep switch flow tables up-to-date by dynamically tracing the dependency of policy decisions on packet contents as well as the environment (system state). Evaluations using real HP switches show that Maple optimizer reduces HTTP connection time by a factor of 100 at high load. During simulated benchmarking, Maple scheduler, when not running the optimizer, achieves a throughput of over 20 million new flow requests per second on a single machine, with 95-percentile latency under 10 ms.
软件定义网络为管理复杂网络提供了一个简单、集中的编程模型。然而,管理底层细节方面的挑战,比如在分布式交换机上建立和维护正确有效的转发表,往往会损害这种概念上的简单性。在本文中,我们介绍了Maple,一个通过以下方式简化SDN编程的系统:(1)允许程序员使用标准编程语言来设计任意的集中式算法,我们称之为算法策略,以决定整个网络的行为;(2)提供一个抽象,程序员定义的集中式策略在概念上“重新”运行进入网络的每个数据包。因此,忽略了将高级策略转换为分布式单个交换机上的规则集的挑战。为了有效地实现算法策略,Maple不仅包括一个高效的多核调度程序,可以有效地扩展到具有40多个核的控制器,而且更重要的是一个新颖的跟踪运行时优化器,可以自动记录可重用的策略决策,在可能的情况下将工作卸载到交换机,并通过动态跟踪策略决策对数据包内容以及环境(系统状态)的依赖关系来保持交换机流表的最新状态。使用真实HP交换机的评估表明,Maple优化器在高负载下将HTTP连接时间减少了100倍。在模拟基准测试期间,Maple调度器在不运行优化器的情况下,在一台机器上实现了每秒超过2000万个新流请求的吞吐量,95%的延迟低于10毫秒。
{"title":"Maple: simplifying SDN programming using algorithmic policies","authors":"A. Voellmy, Junchang Wang, Y. Yang, B. Ford, P. Hudak","doi":"10.1145/2486001.2486030","DOIUrl":"https://doi.org/10.1145/2486001.2486030","url":null,"abstract":"Software-Defined Networking offers the appeal of a simple, centralized programming model for managing complex networks. However, challenges in managing low-level details, such as setting up and maintaining correct and efficient forwarding tables on distributed switches, often compromise this conceptual simplicity. In this pa- per, we present Maple, a system that simplifies SDN programming by (1) allowing a programmer to use a standard programming language to design an arbitrary, centralized algorithm, which we call an algorithmic policy, to decide the behaviors of an entire network, and (2) providing an abstraction that the programmer-defined, centralized policy runs, conceptually, \"afresh\" on every packet entering a network, and hence is oblivious to the challenge of translating a high-level policy into sets of rules on distributed individual switches. To implement algorithmic policies efficiently, Maple includes not only a highly-efficient multicore scheduler that can scale efficiently to controllers with 40+ cores, but more importantly a novel tracing runtime optimizer that can automatically record reusable policy decisions, offload work to switches when possible, and keep switch flow tables up-to-date by dynamically tracing the dependency of policy decisions on packet contents as well as the environment (system state). Evaluations using real HP switches show that Maple optimizer reduces HTTP connection time by a factor of 100 at high load. During simulated benchmarking, Maple scheduler, when not running the optimizer, achieves a throughput of over 20 million new flow requests per second on a single machine, with 95-percentile latency under 10 ms.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 239
CSPAN: cost-effective geo-replicated storage spanning multiple cloud services CSPAN:跨多个云服务的经济高效的地理复制存储
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491707
Zhe Wu, Michael Butkiewicz, Dorian Perkins, Ethan Katz-Bassett, H. Madhyastha
Existing cloud computing platforms leave it up to applications to deal with the complexities associated with data replication and propagation across data centers. In our work, we propose the CSPAN key-value store to instead export a unified view of storage services in several geographically distributed data centers. To minimize the cost incurred by application providers, we combine two principles. First, CSPAN spans the data centers of multiple cloud providers. Second, CSPAN judiciously trades off the lower latencies and the higher storage and data propagation costs based on an application's anticipated workload, latency goals, and consistency requirements.
现有的云计算平台让应用程序来处理与数据中心之间的数据复制和传播相关的复杂性。在我们的工作中,我们建议使用CSPAN键值存储来导出几个地理上分布的数据中心中存储服务的统一视图。为了最大限度地减少应用程序提供者所产生的成本,我们结合了两个原则。首先,CSPAN跨越了多个云提供商的数据中心。其次,CSPAN根据应用程序的预期工作负载、延迟目标和一致性需求,明智地权衡了较低的延迟和较高的存储和数据传播成本。
{"title":"CSPAN: cost-effective geo-replicated storage spanning multiple cloud services","authors":"Zhe Wu, Michael Butkiewicz, Dorian Perkins, Ethan Katz-Bassett, H. Madhyastha","doi":"10.1145/2486001.2491707","DOIUrl":"https://doi.org/10.1145/2486001.2491707","url":null,"abstract":"Existing cloud computing platforms leave it up to applications to deal with the complexities associated with data replication and propagation across data centers. In our work, we propose the CSPAN key-value store to instead export a unified view of storage services in several geographically distributed data centers. To minimize the cost incurred by application providers, we combine two principles. First, CSPAN spans the data centers of multiple cloud providers. Second, CSPAN judiciously trades off the lower latencies and the higher storage and data propagation costs based on an application's anticipated workload, latency goals, and consistency requirements.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127267458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
D-tunes: self tuning datastores for geo-distributed interactive applications D-tunes:自调优地理分布交互式应用程序的数据存储
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491684
N. ShankaranarayananP., A. Sivakumar, Sanjay G. Rao, Mohit Tawarmalani
Modern internet applications have resulted in users sharing data with each other in an interactive fashion. These applications have very stringent service level agreements (SLAs) which place tight constraints on the performance of the underlying geo-distributed datastores. Deploying these systems in the cloud to meet such constraints is a challenging task, as application architects have to strike an optimal balance among different contrasting objectives such as maintaining consistency between multiple replicas, minimizing access latency and ensuring high availability. Achieving these objectives requires carefully configuring a number of low-level parameters of the datastores, such as the number of replicas, which DCs contain which data, and the underlying consistency protocol parameters. In this work, we adopt a systematic approach where we develop analytical models that capture the performance of a datastore based on application workload and build a system that can automatically configure the datastore for optimal performance.
现代互联网应用程序导致用户以交互方式彼此共享数据。这些应用程序具有非常严格的服务水平协议(sla),对底层地理分布式数据存储的性能施加了严格的约束。在云中部署这些系统以满足这些限制是一项具有挑战性的任务,因为应用程序架构师必须在不同的对比目标之间取得最佳平衡,例如维护多个副本之间的一致性、最小化访问延迟和确保高可用性。要实现这些目标,需要仔细配置数据存储的许多底层参数,例如副本的数量、哪些dc包含哪些数据以及底层一致性协议参数。在这项工作中,我们采用了一种系统的方法,在这种方法中,我们开发了基于应用程序工作负载捕获数据存储性能的分析模型,并构建了一个可以自动配置数据存储以获得最佳性能的系统。
{"title":"D-tunes: self tuning datastores for geo-distributed interactive applications","authors":"N. ShankaranarayananP., A. Sivakumar, Sanjay G. Rao, Mohit Tawarmalani","doi":"10.1145/2486001.2491684","DOIUrl":"https://doi.org/10.1145/2486001.2491684","url":null,"abstract":"Modern internet applications have resulted in users sharing data with each other in an interactive fashion. These applications have very stringent service level agreements (SLAs) which place tight constraints on the performance of the underlying geo-distributed datastores. Deploying these systems in the cloud to meet such constraints is a challenging task, as application architects have to strike an optimal balance among different contrasting objectives such as maintaining consistency between multiple replicas, minimizing access latency and ensuring high availability. Achieving these objectives requires carefully configuring a number of low-level parameters of the datastores, such as the number of replicas, which DCs contain which data, and the underlying consistency protocol parameters. In this work, we adopt a systematic approach where we develop analytical models that capture the performance of a datastore based on application workload and build a system that can automatically configure the datastore for optimal performance.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129846825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
OMware: an open measurement ware for stable residential broadband measurement OMware:用于稳定住宅宽带测量的开放式测量软件
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491702
Lei Xue, Ricky K. P. Mok, R. Chang
A number of home-installed middleboxes, e.g., BISMark and SamKnows, and web-based tools, e.g., Netalyzr and Ookla's speedtest service, have been developed recently to enable residential broadband users to gauge their network service quality. One challenge to designing these systems is to provide stable network measurement. That is, the measurement results will not be fluctuated by sporadic overheads incurred inside the middlebox or web browser. In this poster, we propose a network measurement ware, OMware, to increase the stability of residential broadband measurement. The key feature is to implement the send and receive functions for measurement packets in the kernel. Our preliminary evaluation for an OpenWrt implementation shows that OMware provides very stable throughput and delay measurement, compared with typical socket-based measurement at the user level.
最近已经开发了许多家庭安装的中间设备,例如BISMark和SamKnows,以及基于网络的工具,例如Netalyzr和Ookla的速度测试服务,使住宅宽带用户能够评估他们的网络服务质量。设计这些系统的一个挑战是提供稳定的网络测量。也就是说,测量结果不会因中间框或web浏览器内部产生的零星开销而波动。在这张海报中,我们提出了一种网络测量软件OMware,以增加住宅宽带测量的稳定性。其关键特性是在内核中实现测量包的发送和接收功能。我们对OpenWrt实现的初步评估表明,与典型的基于套接字的用户级测量相比,OMware提供了非常稳定的吞吐量和延迟测量。
{"title":"OMware: an open measurement ware for stable residential broadband measurement","authors":"Lei Xue, Ricky K. P. Mok, R. Chang","doi":"10.1145/2486001.2491702","DOIUrl":"https://doi.org/10.1145/2486001.2491702","url":null,"abstract":"A number of home-installed middleboxes, e.g., BISMark and SamKnows, and web-based tools, e.g., Netalyzr and Ookla's speedtest service, have been developed recently to enable residential broadband users to gauge their network service quality. One challenge to designing these systems is to provide stable network measurement. That is, the measurement results will not be fluctuated by sporadic overheads incurred inside the middlebox or web browser. In this poster, we propose a network measurement ware, OMware, to increase the stability of residential broadband measurement. The key feature is to implement the send and receive functions for measurement packets in the kernel. Our preliminary evaluation for an OpenWrt implementation shows that OMware provides very stable throughput and delay measurement, compared with typical socket-based measurement at the user level.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126270101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
R2D2: bufferless, switchless data center networks using commodity ethernet hardware R2D2:使用商用以太网硬件的无缓冲、无交换机数据中心网络
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491722
Matthew P. Grosvenor, Malte Schwarzkopf, A. Moore
Modern data centers commonly run distributed applications that require low-latency communication, and whose performance is critical to service revenue. If as little as one machine in 10,000 is a latency outlier, around 18% of requests will experience high latency. The sacrifice of latency determinism for bandwidth, however, is not an inevitable one. In our R2D2 architecture, we conceptually split the data centre network into an unbuffered, unswitched low-latency network (LLNet) and a deeply buffered bandwidth centric network (BBNet). Through explicitly scheduling network multiplexing in software, our prototype implementation achieves 99.995% and 99.999% messaging latencies of 35us and 75us respectively for 1514-byte packets on a fully loaded network. Furthermore, we show that it is possible to merge the conceptually separate LLNet and BBNet networks onto the same physical infrastructure using commodity switched Ethernet hardware.
现代数据中心通常运行需要低延迟通信的分布式应用程序,其性能对服务收入至关重要。如果每10000台机器中只有一台是延迟异常值,那么大约18%的请求将经历高延迟。然而,为了带宽而牺牲延迟确定性并不是不可避免的。在我们的R2D2架构中,我们从概念上将数据中心网络分为一个无缓冲、无交换的低延迟网络(LLNet)和一个深度缓冲的带宽中心网络(BBNet)。通过在软件中显式地调度网络多路复用,我们的原型实现在满载网络上对1514字节的数据包分别实现了99.995%和99.999%的消息延迟,分别为35us和75us。此外,我们还表明,可以使用商品交换以太网硬件将概念上分离的LLNet和BBNet网络合并到相同的物理基础设施上。
{"title":"R2D2: bufferless, switchless data center networks using commodity ethernet hardware","authors":"Matthew P. Grosvenor, Malte Schwarzkopf, A. Moore","doi":"10.1145/2486001.2491722","DOIUrl":"https://doi.org/10.1145/2486001.2491722","url":null,"abstract":"Modern data centers commonly run distributed applications that require low-latency communication, and whose performance is critical to service revenue. If as little as one machine in 10,000 is a latency outlier, around 18% of requests will experience high latency. The sacrifice of latency determinism for bandwidth, however, is not an inevitable one. In our R2D2 architecture, we conceptually split the data centre network into an unbuffered, unswitched low-latency network (LLNet) and a deeply buffered bandwidth centric network (BBNet). Through explicitly scheduling network multiplexing in software, our prototype implementation achieves 99.995% and 99.999% messaging latencies of 35us and 75us respectively for 1514-byte packets on a fully loaded network. Furthermore, we show that it is possible to merge the conceptually separate LLNet and BBNet networks onto the same physical infrastructure using commodity switched Ethernet hardware.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122724476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative caching based on hash-routing for information-centric networking 基于以信息为中心的网络的哈希路由的协作缓存
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491727
Sen Wang, J. Bi, Jianping Wu
{"title":"Collaborative caching based on hash-routing for information-centric networking","authors":"Sen Wang, J. Bi, Jianping Wu","doi":"10.1145/2486001.2491727","DOIUrl":"https://doi.org/10.1145/2486001.2491727","url":null,"abstract":"","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124346514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Qphone: a quantum security VoIP phone Qphone:量子安全VoIP电话
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491696
Bo Liu, Bao-kang Zhao, Ziling Wei, Chunqing Wu, Jinshu Su, Wanrong Yu, Fei Wang, S. Sun
This work presents a novel quantum security VoIP phone, called Qphone. Qphone integrates quantum key distribution (QKD) and VoIP steganography, and achieves peer-to-peer communication with information-theoretical security (ITS) guaranteeing. Qphone consists of three parts, a real-time QKD system, RT-QKD, a steganography software, VS-Phone, and an audio encryption and authentication hardware, AE-KEY. RT-QKD explores QKD technologies, and is able establish a shared key between two peers ensuring ITS. VS-Phone utilizes VoIP steganography to protect transmission channels of sensitive information. Qphone can provide efficient and real-time security protections to meet different security demands.
这项工作提出了一种新的量子安全VoIP电话,称为Qphone。Qphone集成了量子密钥分发(QKD)和VoIP隐写技术,在信息论安全(ITS)保证下实现点对点通信。Qphone由实时QKD系统RT-QKD、隐写软件VS-Phone和音频加密与认证硬件AE-KEY三部分组成。RT-QKD探索了QKD技术,并能够在两个对等体之间建立共享密钥以确保ITS。VS-Phone利用VoIP隐写保护敏感信息的传输通道。Qphone可以提供高效、实时的安全防护,满足不同的安全需求。
{"title":"Qphone: a quantum security VoIP phone","authors":"Bo Liu, Bao-kang Zhao, Ziling Wei, Chunqing Wu, Jinshu Su, Wanrong Yu, Fei Wang, S. Sun","doi":"10.1145/2486001.2491696","DOIUrl":"https://doi.org/10.1145/2486001.2491696","url":null,"abstract":"This work presents a novel quantum security VoIP phone, called Qphone. Qphone integrates quantum key distribution (QKD) and VoIP steganography, and achieves peer-to-peer communication with information-theoretical security (ITS) guaranteeing. Qphone consists of three parts, a real-time QKD system, RT-QKD, a steganography software, VS-Phone, and an audio encryption and authentication hardware, AE-KEY. RT-QKD explores QKD technologies, and is able establish a shared key between two peers ensuring ITS. VS-Phone utilizes VoIP steganography to protect transmission channels of sensitive information. Qphone can provide efficient and real-time security protections to meet different security demands.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116600466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1