首页 > 最新文献

Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM最新文献

英文 中文
Full duplex radios 全双工无线电
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486033
Dinesh Bharadia, Emily McMilin, S. Katti
This paper presents the design and implementation of the first in-band full duplex WiFi radios that can simultaneously transmit and receive on the same channel using standard WiFi 802.11ac PHYs and achieves close to the theoretical doubling of throughput in all practical deployment scenarios. Our design uses a single antenna for simultaneous TX/RX (i.e., the same resources as a standard half duplex system). We also propose novel analog and digital cancellation techniques that cancel the self interference to the receiver noise floor, and therefore ensure that there is no degradation to the received signal. We prototype our design by building our own analog circuit boards and integrating them with a fully WiFi-PHY compatible software radio implementation. We show experimentally that our design works robustly in noisy indoor environments, and provides close to the expected theoretical doubling of throughput in practice.
本文介绍了第一个带内全双工WiFi无线电的设计和实现,该无线电可以使用标准WiFi 802.11ac物理设备在同一信道上同时发送和接收,并在所有实际部署场景中实现接近理论吞吐量的翻倍。我们的设计使用单个天线同时进行TX/RX(即,与标准半双工系统相同的资源)。我们还提出了新的模拟和数字消除技术,消除对接收机噪声底的自干扰,从而确保接收信号没有退化。我们通过构建自己的模拟电路板并将其与完全WiFi-PHY兼容的软件无线电实现集成来原型化我们的设计。我们通过实验证明,我们的设计在嘈杂的室内环境中稳定地工作,并在实践中提供接近预期的理论吞吐量加倍。
{"title":"Full duplex radios","authors":"Dinesh Bharadia, Emily McMilin, S. Katti","doi":"10.1145/2486001.2486033","DOIUrl":"https://doi.org/10.1145/2486001.2486033","url":null,"abstract":"This paper presents the design and implementation of the first in-band full duplex WiFi radios that can simultaneously transmit and receive on the same channel using standard WiFi 802.11ac PHYs and achieves close to the theoretical doubling of throughput in all practical deployment scenarios. Our design uses a single antenna for simultaneous TX/RX (i.e., the same resources as a standard half duplex system). We also propose novel analog and digital cancellation techniques that cancel the self interference to the receiver noise floor, and therefore ensure that there is no degradation to the received signal. We prototype our design by building our own analog circuit boards and integrating them with a fully WiFi-PHY compatible software radio implementation. We show experimentally that our design works robustly in noisy indoor environments, and provides close to the expected theoretical doubling of throughput in practice.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1989
Dispatch: secure, resilient mobile reporting 调度:安全,灵活的移动报告
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491697
Kanak Biscuitwala, W. Bult, Mathias Lécuyer, T. J. Purtell, Madeline K. B. Ross, A. Chaintreau, Chris Haseman, M. Lam, Susan E. McGregor
Kanak Biscuitwala kanak@cs.stanford.edu Willem Bult wbult@stanford.edu Mathias Lecuyer† ml3302@columbia.edu T.J. Purtell tpurtell@cs.stanford.edu Madeline K.B. Ross‡ mkr2132@columbia.edu Augustin Chaintreau† augustin@cs.columbia.edu Chris Haseman§ haseman@tumblr.com Monica S. Lam lam@cs.stanford.edu Susan E. McGregor‡ sem2196@columbia.edu Computer Science Department, Stanford University †Computer Science Department, Columbia University ‡Graduate School of Journalism, Columbia University §Tumblr, Inc.
坎纳克·布希特瓦拉·坎纳克@cs.stanford.edu威廉·布尔特·wbult@stanford.edu马蒂亚斯·勒库耶尔†ml3302@columbia.edu T.J. Purtell tpurtell@cs.stanford.edu Madeline K.B. Ross‡mkr2132@columbia.edu Augustin Chaintreau†augustin@cs.columbia.edu克里斯·哈塞曼§haseman@tumblr.com Monica S. Lam lam@cs.stanford.edu苏珊·麦格莱格‡sem2196@columbia.edu斯坦福大学计算机科学系†哥伦比亚大学新闻研究生院哥伦比亚大学/ Tumblr, Inc.
{"title":"Dispatch: secure, resilient mobile reporting","authors":"Kanak Biscuitwala, W. Bult, Mathias Lécuyer, T. J. Purtell, Madeline K. B. Ross, A. Chaintreau, Chris Haseman, M. Lam, Susan E. McGregor","doi":"10.1145/2486001.2491697","DOIUrl":"https://doi.org/10.1145/2486001.2491697","url":null,"abstract":"Kanak Biscuitwala kanak@cs.stanford.edu Willem Bult wbult@stanford.edu Mathias Lecuyer† ml3302@columbia.edu T.J. Purtell tpurtell@cs.stanford.edu Madeline K.B. Ross‡ mkr2132@columbia.edu Augustin Chaintreau† augustin@cs.columbia.edu Chris Haseman§ haseman@tumblr.com Monica S. Lam lam@cs.stanford.edu Susan E. McGregor‡ sem2196@columbia.edu Computer Science Department, Stanford University †Computer Science Department, Columbia University ‡Graduate School of Journalism, Columbia University §Tumblr, Inc.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward content-centric privacy in ICN: attribute-based encryption and routing ICN中以内容为中心的隐私:基于属性的加密和路由
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491717
Mihaela Ion, Jianqing Zhang, E. Schooler
We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater data accessibility, scalable multiparty communication and efficient data distribution. Inspired by application-layer publish-subscribe, we enable fine-grained access control with more expressive policies. Moreover, we propose an attribute-based routing scheme that offers interest confidentiality. A prototype system is implemented based on CCNx, a popular open source version of ICN, to showcase privacy preservation in Smart Neighborhood and Smart City applications.
为信息中心网络(ICN)设计了一个以内容为中心的隐私方案。通过在ICN中引入基于属性的加密并使其特定于数据属性,我们增强了ICN支持数据机密性的能力。我们的方法是不寻常的,因为它保留了ICN的目标,即将发布者和订阅者分离,以获得更大的数据可访问性,可扩展的多方通信和高效的数据分发。受应用层发布-订阅的启发,我们使用更具表现力的策略支持细粒度访问控制。此外,我们提出了一种基于属性的路由方案,提供了兴趣保密性。基于ICN的流行开源版本CCNx实现了一个原型系统,以展示智能社区和智能城市应用中的隐私保护。
{"title":"Toward content-centric privacy in ICN: attribute-based encryption and routing","authors":"Mihaela Ion, Jianqing Zhang, E. Schooler","doi":"10.1145/2486001.2491717","DOIUrl":"https://doi.org/10.1145/2486001.2491717","url":null,"abstract":"We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater data accessibility, scalable multiparty communication and efficient data distribution. Inspired by application-layer publish-subscribe, we enable fine-grained access control with more expressive policies. Moreover, we propose an attribute-based routing scheme that offers interest confidentiality. A prototype system is implemented based on CCNx, a popular open source version of ICN, to showcase privacy preservation in Smart Neighborhood and Smart City applications.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123165976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
Characterizing correlated latency anomalies in broadband access networks 宽带接入网中相关延迟异常的表征
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491734
Swati Roy, N. Feamster
The growing prevalence of broadband Internet access around the world has made understanding the performance and reliability of broadband access networks extremely important. To better understand the performance anomalies that arise in broadband access networks, we have deployed hundreds of routers in home broadband access networks around the world and are studying the performance of these networks. One of the performance pathologies that we have observed is correlated, sudden latency increases simultaneously and to multiple destinations. In this work, we provide an preliminary glimpse into these sudden latency increases and attempt to understand their causes. Although we do not isolate root cause in this study, observing the sets of destinations that experience correlated latency increases can provide important clues as to the locations in the network that may be inducing these pathologies. We present an algorithm to better identify the network locations that are likely responsible for these pathologies. We then analyze latency data from one month across our home router deployment to determine where in the network latency issues are arising, and how those pathologies differ across regions, ISPs, and countries. Our preliminary analysis suggests that most latency pathologies are to a single destination and a relatively small percentage of these pathologies are likely in the last mile, suggesting that peering within the network may be a more likely culprit for these pathologies than access link problems.
宽带互联网接入在世界范围内的日益普及使得了解宽带接入网的性能和可靠性变得极其重要。为了更好地理解宽带接入网中出现的性能异常,我们在世界各地的家庭宽带接入网中部署了数百台路由器,并正在研究这些网络的性能。我们观察到的性能异常之一是相关的,突然的延迟同时增加,并且指向多个目的地。在这项工作中,我们对这些突然的潜伏期增加提供了初步的了解,并试图了解其原因。虽然我们没有在本研究中找出根本原因,但观察经历相关延迟增加的目的地集可以为网络中可能诱发这些病理的位置提供重要线索。我们提出了一种算法来更好地识别可能导致这些病理的网络位置。然后,我们分析一个月来在我们的家庭路由器部署中的延迟数据,以确定网络延迟问题出现的位置,以及这些问题在不同地区、isp和国家之间的差异。我们的初步分析表明,大多数延迟病理都是指向单个目的地的,这些病理中相对较小的比例可能发生在最后一英里,这表明网络内的对等连接可能比访问链路问题更可能是这些病理的罪魁祸首。
{"title":"Characterizing correlated latency anomalies in broadband access networks","authors":"Swati Roy, N. Feamster","doi":"10.1145/2486001.2491734","DOIUrl":"https://doi.org/10.1145/2486001.2491734","url":null,"abstract":"The growing prevalence of broadband Internet access around the world has made understanding the performance and reliability of broadband access networks extremely important. To better understand the performance anomalies that arise in broadband access networks, we have deployed hundreds of routers in home broadband access networks around the world and are studying the performance of these networks. One of the performance pathologies that we have observed is correlated, sudden latency increases simultaneously and to multiple destinations. In this work, we provide an preliminary glimpse into these sudden latency increases and attempt to understand their causes. Although we do not isolate root cause in this study, observing the sets of destinations that experience correlated latency increases can provide important clues as to the locations in the network that may be inducing these pathologies. We present an algorithm to better identify the network locations that are likely responsible for these pathologies. We then analyze latency data from one month across our home router deployment to determine where in the network latency issues are arising, and how those pathologies differ across regions, ISPs, and countries. Our preliminary analysis suggests that most latency pathologies are to a single destination and a relatively small percentage of these pathologies are likely in the last mile, suggesting that peering within the network may be a more likely culprit for these pathologies than access link problems.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128283292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Locating using prior information: wireless indoor localization algorithm 利用先验信息定位:无线室内定位算法
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491688
Yuanfang Chen, N. Crespi, Lin Lv, Mingchu Li, A. M. Ortiz, Lei Shu
Most indoor localization algorithms are based on Received Signal Strength (RSS), in which RSS signatures of an interested area are annotated with their real recorded locations. However, according to our experiments, RSS signatures are not suitable as the unique annotations (like Fingerprints) of recorded locations. In this study, we investigate the characteristics of RSS (e.g., how the RSS values change as time goes on and between consecutive positions?). On this basis, we design LuPI (Locating using Prior Information) that exploits the characteristics of RSS: with user motion, LuPI uses novel sensors integrated in smartphones to construct the RSS variation space (like radio map) of a floor plan as prior information. The deployment of LuPI is easy and rapid since little human intervention is needed. In LuPI, the calibration of ``radio map'' is crowd-sourced, automatic and scheduled. Experimental results show that LuPI achieves comparable location accuracy to previous approaches, even without the statistical information of site survey.
大多数室内定位算法都是基于接收信号强度(RSS),其中对感兴趣区域的RSS签名进行注释,并标注其实际记录的位置。然而,根据我们的实验,RSS签名不适合作为记录位置的唯一注释(如指纹)。在本研究中,我们研究了RSS的特征(例如,RSS值如何随着时间的推移和连续位置之间变化?)。在此基础上,我们设计了利用RSS特性的LuPI (positioning using Prior Information):随着用户的运动,LuPI使用集成在智能手机中的新型传感器来构建平面图的RSS变化空间(如无线电地图)作为先验信息。由于几乎不需要人工干预,因此LuPI的部署既简单又快速。在LuPI中,“无线电地图”的校准是众包的、自动的和预定的。实验结果表明,即使在没有现场调查统计信息的情况下,LuPI的定位精度也与以往的方法相当。
{"title":"Locating using prior information: wireless indoor localization algorithm","authors":"Yuanfang Chen, N. Crespi, Lin Lv, Mingchu Li, A. M. Ortiz, Lei Shu","doi":"10.1145/2486001.2491688","DOIUrl":"https://doi.org/10.1145/2486001.2491688","url":null,"abstract":"Most indoor localization algorithms are based on Received Signal Strength (RSS), in which RSS signatures of an interested area are annotated with their real recorded locations. However, according to our experiments, RSS signatures are not suitable as the unique annotations (like Fingerprints) of recorded locations. In this study, we investigate the characteristics of RSS (e.g., how the RSS values change as time goes on and between consecutive positions?). On this basis, we design LuPI (Locating using Prior Information) that exploits the characteristics of RSS: with user motion, LuPI uses novel sensors integrated in smartphones to construct the RSS variation space (like radio map) of a floor plan as prior information. The deployment of LuPI is easy and rapid since little human intervention is needed. In LuPI, the calibration of ``radio map'' is crowd-sourced, automatic and scheduled. Experimental results show that LuPI achieves comparable location accuracy to previous approaches, even without the statistical information of site survey.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122733392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A provider-side view of web search response time web搜索响应时间的提供者端视图
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486035
Yingying Chen, Ratul Mahajan, B. Sridharan, Zhi-Li Zhang
Using a large Web search service as a case study, we highlight the challenges that modern Web services face in understanding and diagnosing the response time experienced by users. We show that search response time (SRT) varies widely over time and also exhibits counter-intuitive behavior. It is actually higher during off-peak hours, when the query load is lower, than during peak hours. To resolve this paradox and explain SRT variations in general, we develop an analysis framework that separates systemic variations due to periodic changes in service usage and anomalous variations due to unanticipated events such as failures and denial-of-service attacks. We find that systemic SRT variations are primarily caused by systemic changes in aggregate network characteristics, nature of user queries, and browser types. For instance, one reason for higher SRTs during off-peak hours is that during those hours a greater fraction of queries come from slower, mainly-residential networks. We also develop a technique that, by factoring out the impact of such variations, robustly detects and diagnoses performance anomalies in SRT. Deployment experience shows that our technique detects three times more true (operator-verified) anomalies than existing techniques.
我们使用一个大型Web搜索服务作为案例研究,重点介绍了现代Web服务在理解和诊断用户所经历的响应时间方面所面临的挑战。我们展示了搜索响应时间(SRT)随时间变化很大,并且还表现出反直觉的行为。在非高峰时段,当查询负载较低时,它实际上比高峰时段更高。为了解决这一矛盾并解释SRT的总体变化,我们开发了一个分析框架,将由于服务使用的周期性变化引起的系统变化和由于意外事件(如故障和拒绝服务攻击)引起的异常变化分开。我们发现,系统SRT变化主要是由聚合网络特征、用户查询性质和浏览器类型的系统变化引起的。例如,非高峰时段srt较高的一个原因是,在这些时间内,更多的查询来自较慢的、主要是住宅的网络。我们还开发了一种技术,通过分解这些变化的影响,稳健地检测和诊断SRT中的性能异常。部署经验表明,与现有技术相比,我们的技术检测到的真实异常(经操作人员验证)是现有技术的三倍。
{"title":"A provider-side view of web search response time","authors":"Yingying Chen, Ratul Mahajan, B. Sridharan, Zhi-Li Zhang","doi":"10.1145/2486001.2486035","DOIUrl":"https://doi.org/10.1145/2486001.2486035","url":null,"abstract":"Using a large Web search service as a case study, we highlight the challenges that modern Web services face in understanding and diagnosing the response time experienced by users. We show that search response time (SRT) varies widely over time and also exhibits counter-intuitive behavior. It is actually higher during off-peak hours, when the query load is lower, than during peak hours. To resolve this paradox and explain SRT variations in general, we develop an analysis framework that separates systemic variations due to periodic changes in service usage and anomalous variations due to unanticipated events such as failures and denial-of-service attacks. We find that systemic SRT variations are primarily caused by systemic changes in aggregate network characteristics, nature of user queries, and browser types. For instance, one reason for higher SRTs during off-peak hours is that during those hours a greater fraction of queries come from slower, mainly-residential networks. We also develop a technique that, by factoring out the impact of such variations, robustly detects and diagnoses performance anomalies in SRT. Deployment experience shows that our technique detects three times more true (operator-verified) anomalies than existing techniques.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134023970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Reducing web latency: the virtue of gentle aggression 减少网络延迟:温和攻击的优点
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486014
Tobias Flach, Nandita Dukkipati, A. Terzis, B. Raghavan, N. Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, R. Govindan
To serve users quickly, Web service providers build infrastructure closer to clients and use multi-stage transport connections. Although these changes reduce client-perceived round-trip times, TCP's current mechanisms fundamentally limit latency improvements. We performed a measurement study of a large Web service provider and found that, while connections with no loss complete close to the ideal latency of one round-trip time, TCP's timeout-driven recovery causes transfers with loss to take five times longer on average. In this paper, we present the design of novel loss recovery mechanisms for TCP that judiciously use redundant transmissions to minimize timeout-driven recovery. Proactive, Reactive, and Corrective are three qualitatively-different, easily-deployable mechanisms that (1) proactively recover from losses, (2) recover from them as quickly as possible, and (3) reconstruct packets to mask loss. Crucially, the mechanisms are compatible both with middleboxes and with TCP's existing congestion control and loss recovery. Our large-scale experiments on Google's production network that serves billions of flows demonstrate a 23% decrease in the mean and 47% in 99th percentile latency over today's TCP.
为了快速地为用户提供服务,Web服务提供者构建离客户端更近的基础设施,并使用多级传输连接。尽管这些更改减少了客户端感知到的往返时间,但TCP当前的机制从根本上限制了延迟的改进。我们对一家大型Web服务提供商进行了测量研究,发现虽然没有丢失的连接完全接近理想的一次往返延迟时间,但TCP超时驱动的恢复导致丢失传输的平均时间延长了五倍。在本文中,我们提出了一种新的TCP损失恢复机制的设计,该机制明智地使用冗余传输来最小化超时驱动的恢复。主动、被动和纠正是三种性质不同、易于部署的机制,它们可以(1)主动地从丢失中恢复,(2)尽可能快地从丢失中恢复,(3)重构数据包以掩盖丢失。至关重要的是,这些机制既与中间层兼容,也与TCP现有的拥塞控制和损失恢复兼容。我们在谷歌的生产网络上进行的大规模实验显示,与今天的TCP相比,平均延迟减少了23%,第99百分位延迟减少了47%。
{"title":"Reducing web latency: the virtue of gentle aggression","authors":"Tobias Flach, Nandita Dukkipati, A. Terzis, B. Raghavan, N. Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, R. Govindan","doi":"10.1145/2486001.2486014","DOIUrl":"https://doi.org/10.1145/2486001.2486014","url":null,"abstract":"To serve users quickly, Web service providers build infrastructure closer to clients and use multi-stage transport connections. Although these changes reduce client-perceived round-trip times, TCP's current mechanisms fundamentally limit latency improvements. We performed a measurement study of a large Web service provider and found that, while connections with no loss complete close to the ideal latency of one round-trip time, TCP's timeout-driven recovery causes transfers with loss to take five times longer on average. In this paper, we present the design of novel loss recovery mechanisms for TCP that judiciously use redundant transmissions to minimize timeout-driven recovery. Proactive, Reactive, and Corrective are three qualitatively-different, easily-deployable mechanisms that (1) proactively recover from losses, (2) recover from them as quickly as possible, and (3) reconstruct packets to mask loss. Crucially, the mechanisms are compatible both with middleboxes and with TCP's existing congestion control and loss recovery. Our large-scale experiments on Google's production network that serves billions of flows demonstrate a 23% decrease in the mean and 47% in 99th percentile latency over today's TCP.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132596235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 227
In-network caching assisted wireless AP storage management: challenges and algorithms 网络内缓存辅助无线AP存储管理:挑战和算法
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2491706
Zhongxing Ming, Mingwei Xu, Dan Wang
The goal of this paper is to improve wireless AP caching by leveraging in-network caching. We observe that by treating routers as an in-network storage extension, we can relieve the storage limitation of APs. The unique challenge is that APs and routers cannot have a full collaboration, which makes the problem different from traditional cooperative caching problems. We study how APs can optimize caching decisions by using in-network caching information without controlling routers.
本文的目标是通过利用网络内缓存来改进无线AP缓存。我们观察到,将路由器视为网络内存储的扩展,可以缓解ap的存储限制。唯一的挑战是ap和路由器不能完全协作,这使得该问题不同于传统的协作式缓存问题。我们研究了ap如何在不控制路由器的情况下通过使用网络内缓存信息来优化缓存决策。
{"title":"In-network caching assisted wireless AP storage management: challenges and algorithms","authors":"Zhongxing Ming, Mingwei Xu, Dan Wang","doi":"10.1145/2486001.2491706","DOIUrl":"https://doi.org/10.1145/2486001.2491706","url":null,"abstract":"The goal of this paper is to improve wireless AP caching by leveraging in-network caching. We observe that by treating routers as an in-network storage extension, we can relieve the storage limitation of APs. The unique challenge is that APs and routers cannot have a full collaboration, which makes the problem different from traditional cooperative caching problems. We study how APs can optimize caching decisions by using in-network caching information without controlling routers.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133639531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trinocular: understanding internet reliability through adaptive probing 三位一体:通过自适应探测理解互联网可靠性
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486017
Lin Quan, J. Heidemann, Y. Pradkin
Natural and human factors cause Internet outages---from big events like Hurricane Sandy in 2012 and the Egyptian Internet shutdown in Jan. 2011 to small outages every day that go unpublicized. We describe Trinocular, an outage detection system that uses active probing to understand reliability of edge networks. Trinocular is principled: deriving a simple model of the Internet that captures the information pertinent to outages, and populating that model through long-term data, and learning current network state through ICMP probes. It is parsimonious, using Bayesian inference to determine how many probes are needed. On average, each Trinocular instance sends fewer than 20 probes per hour to each /24 network block under study, increasing Internet "background radiation" by less than 0.7%. Trinocular is also predictable and precise: we provide known precision in outage timing and duration. Probing in rounds of 11 minutes, we detect 100% of outages one round or longer, and estimate outage duration within one-half round. Since we require little traffic, a single machine can track 3.4M /24 IPv4 blocks, all of the Internet currently suitable for analysis. We show that our approach is significantly more accurate than the best current methods, with about one-third fewer false conclusions, and about 30% greater coverage at constant accuracy. We validate our approach using controlled experiments, use Trinocular to analyze two days of Internet outages observed from three sites, and re-analyze three years of existing data to develop trends for the Internet.
自然和人为因素都会导致互联网中断——从2012年的飓风桑迪和2011年1月埃及互联网关闭这样的大事件,到每天不公开的小规模中断。我们描述了triinocular,一个使用主动探测来了解边缘网络可靠性的中断检测系统。Trinocular是原则性的:推导出一个简单的Internet模型,该模型捕获与中断相关的信息,并通过长期数据填充该模型,并通过ICMP探测了解当前的网络状态。它非常简洁,使用贝叶斯推理来确定需要多少探针。平均而言,每个Trinocular实例每小时向所研究的每24个网络块发送不到20个探针,使互联网“背景辐射”增加不到0.7%。Trinocular也是可预测和精确的:我们提供已知的停机时间和持续时间的精度。以11分钟为周期进行探测,我们在一轮或更长时间内检测到100%的中断,并在半轮内估计中断持续时间。由于我们需要的流量很少,一台机器可以跟踪3.4M /24个IPv4块,目前适合分析所有互联网。我们表明,我们的方法比目前最好的方法要准确得多,在恒定精度下,错误结论减少了约三分之一,覆盖范围增加了约30%。我们使用对照实验验证了我们的方法,使用Trinocular分析了从三个站点观察到的两天的互联网中断,并重新分析了三年的现有数据,以发展互联网的趋势。
{"title":"Trinocular: understanding internet reliability through adaptive probing","authors":"Lin Quan, J. Heidemann, Y. Pradkin","doi":"10.1145/2486001.2486017","DOIUrl":"https://doi.org/10.1145/2486001.2486017","url":null,"abstract":"Natural and human factors cause Internet outages---from big events like Hurricane Sandy in 2012 and the Egyptian Internet shutdown in Jan. 2011 to small outages every day that go unpublicized. We describe Trinocular, an outage detection system that uses active probing to understand reliability of edge networks. Trinocular is principled: deriving a simple model of the Internet that captures the information pertinent to outages, and populating that model through long-term data, and learning current network state through ICMP probes. It is parsimonious, using Bayesian inference to determine how many probes are needed. On average, each Trinocular instance sends fewer than 20 probes per hour to each /24 network block under study, increasing Internet \"background radiation\" by less than 0.7%. Trinocular is also predictable and precise: we provide known precision in outage timing and duration. Probing in rounds of 11 minutes, we detect 100% of outages one round or longer, and estimate outage duration within one-half round. Since we require little traffic, a single machine can track 3.4M /24 IPv4 blocks, all of the Internet currently suitable for analysis. We show that our approach is significantly more accurate than the best current methods, with about one-third fewer false conclusions, and about 30% greater coverage at constant accuracy. We validate our approach using controlled experiments, use Trinocular to analyze two days of Internet outages observed from three sites, and re-analyze three years of existing data to develop trends for the Internet.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Leveraging endpoint flexibility in data-intensive clusters 在数据密集型集群中利用端点灵活性
Pub Date : 2013-08-12 DOI: 10.1145/2486001.2486021
Mosharaf Chowdhury, Srikanth Kandula, I. Stoica
Many applications do not constrain the destinations of their network transfers. New opportunities emerge when such transfers contribute a large amount of network bytes. By choosing the endpoints to avoid congested links, completion times of these transfers as well as that of others without similar flexibility can be improved. In this paper, we focus on leveraging the flexibility in replica placement during writes to cluster file systems (CFSes), which account for almost half of all cross-rack traffic in data-intensive clusters. The replicas of a CFS write can be placed in any subset of machines as long as they are in multiple fault domains and ensure a balanced use of storage throughout the cluster. We study CFS interactions with the cluster network, analyze optimizations for replica placement, and propose Sinbad -- a system that identifies imbalance and adapts replica destinations to navigate around congested links. Experiments on EC2 and trace-driven simulations show that block writes complete 1.3X (respectively, 1.58X) faster as the network becomes more balanced. As a collateral benefit, end-to-end completion times of data-intensive jobs improve as well. Sinbad does so with little impact on the long-term storage balance.
许多应用程序不限制其网络传输的目的地。当这种传输贡献了大量的网络字节时,新的机会就出现了。通过选择端点来避免拥塞链接,这些传输的完成时间以及其他没有类似灵活性的传输的完成时间可以得到改善。在本文中,我们重点关注在写入集群文件系统(cfse)期间利用副本放置的灵活性,这几乎占数据密集型集群中所有跨机架流量的一半。CFS写入的副本可以放置在任何机器子集中,只要它们位于多个故障域中,并确保在整个集群中均衡使用存储。我们研究了CFS与集群网络的交互,分析了副本放置的优化,并提出了Sinbad——一个识别不平衡并适应副本目的地以绕过拥挤链接的系统。在EC2和跟踪驱动模拟上的实验表明,随着网络变得更加平衡,块写完成速度提高了1.3倍(分别为1.58倍)。附带的好处是,数据密集型作业的端到端完成时间也得到了改善。辛巴达这样做对长期存储平衡几乎没有影响。
{"title":"Leveraging endpoint flexibility in data-intensive clusters","authors":"Mosharaf Chowdhury, Srikanth Kandula, I. Stoica","doi":"10.1145/2486001.2486021","DOIUrl":"https://doi.org/10.1145/2486001.2486021","url":null,"abstract":"Many applications do not constrain the destinations of their network transfers. New opportunities emerge when such transfers contribute a large amount of network bytes. By choosing the endpoints to avoid congested links, completion times of these transfers as well as that of others without similar flexibility can be improved. In this paper, we focus on leveraging the flexibility in replica placement during writes to cluster file systems (CFSes), which account for almost half of all cross-rack traffic in data-intensive clusters. The replicas of a CFS write can be placed in any subset of machines as long as they are in multiple fault domains and ensure a balanced use of storage throughout the cluster. We study CFS interactions with the cluster network, analyze optimizations for replica placement, and propose Sinbad -- a system that identifies imbalance and adapts replica destinations to navigate around congested links. Experiments on EC2 and trace-driven simulations show that block writes complete 1.3X (respectively, 1.58X) faster as the network becomes more balanced. As a collateral benefit, end-to-end completion times of data-intensive jobs improve as well. Sinbad does so with little impact on the long-term storage balance.","PeriodicalId":159374,"journal":{"name":"Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 168
期刊
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1