首页 > 最新文献

Proceedings of the SIGCOMM '21 Poster and Demo Sessions最新文献

英文 中文
SCASys
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472857
Jiejian Wu, L. Kong, Haifeng Tang, Tom Z. J. Fu
Although a lot of congestion control algorithms have been proposed in the past thirty years, researchers pointed out that there is no single one that can achieve best performance in all kinds of network environments. However, service providers mostly deploy one dedicated congestion control algorithm on their servers, which may result in some users not being able to get a high-quality experience. To address this issue, we propose a decision-tree based smart congestion control algorithm selection system named SCASys. SCASys models the link environment based on real-time statistical data, and periodically selects the most suitable congestion control algorithm in order to adapt to the dynamically changing link environment. We test SCASys in two types of environments: steady links and dynamic links. The result shows SCASys can have better environment adaptability and always achieve better performance in various scenarios compared with CUBIC and BBR.
{"title":"SCASys","authors":"Jiejian Wu, L. Kong, Haifeng Tang, Tom Z. J. Fu","doi":"10.1145/3472716.3472857","DOIUrl":"https://doi.org/10.1145/3472716.3472857","url":null,"abstract":"Although a lot of congestion control algorithms have been proposed in the past thirty years, researchers pointed out that there is no single one that can achieve best performance in all kinds of network environments. However, service providers mostly deploy one dedicated congestion control algorithm on their servers, which may result in some users not being able to get a high-quality experience. To address this issue, we propose a decision-tree based smart congestion control algorithm selection system named SCASys. SCASys models the link environment based on real-time statistical data, and periodically selects the most suitable congestion control algorithm in order to adapt to the dynamically changing link environment. We test SCASys in two types of environments: steady links and dynamic links. The result shows SCASys can have better environment adaptability and always achieve better performance in various scenarios compared with CUBIC and BBR.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UQCom
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472859
Xinyang Liu, Xinhua Gao, Jiale Li, Yibo Wang, Chi Lin, Zhenquan Qin, Lei Wang
Underwater team members use gestures to exchange information with each other while working, but the way of using gestures to transform information is limited, fixed and prone to lead to ambiguity. If the transformed information is inaccurate or even wrong, it will definitely interfere with collaboration between underwater team members. In our poster, we present the design, implementation and evaluation of UQCom, a novel underwater secure communication method using 3D blue-green QR arrays based on image enhancement technology, to solve the problem mentioned above. We apply blue-green QR codes to underwater short range communication and utilize underwater image enhancement technology to address the unique issues in underwater environments such as turbid water and image distortion. A 3D QR displaying scheme is proposed to improve communication rate. UQCom can also ensure communication security via encryption algorithm. Extensive experiments with two commercial off-the-shelf (COTS) smartphones conducted in indoors and outdoors demonstrate that UQCom can achieve real-time and robust short range communication in underwater environments.
{"title":"UQCom","authors":"Xinyang Liu, Xinhua Gao, Jiale Li, Yibo Wang, Chi Lin, Zhenquan Qin, Lei Wang","doi":"10.1145/3472716.3472859","DOIUrl":"https://doi.org/10.1145/3472716.3472859","url":null,"abstract":"Underwater team members use gestures to exchange information with each other while working, but the way of using gestures to transform information is limited, fixed and prone to lead to ambiguity. If the transformed information is inaccurate or even wrong, it will definitely interfere with collaboration between underwater team members. In our poster, we present the design, implementation and evaluation of UQCom, a novel underwater secure communication method using 3D blue-green QR arrays based on image enhancement technology, to solve the problem mentioned above. We apply blue-green QR codes to underwater short range communication and utilize underwater image enhancement technology to address the unique issues in underwater environments such as turbid water and image distortion. A 3D QR displaying scheme is proposed to improve communication rate. UQCom can also ensure communication security via encryption algorithm. Extensive experiments with two commercial off-the-shelf (COTS) smartphones conducted in indoors and outdoors demonstrate that UQCom can achieve real-time and robust short range communication in underwater environments.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124139517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DNS water torture detection in the data plane 数据平面的DNS水刑检测
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472854
Alexander Kaplan, Shir Landau Feibish
DNS Water Torture (also known as Random Subdomain attack) has been gaining popularity since the severe impact of the 2016 Mirai attack on Dyn DNS servers, which caused a large number of sites to become unavailable. One existing solution is rate limiting, which is not effective in cases where the attack is highly distributed. A more robust solution is provided by DNSSEC, which enables a range of subdomains to be declared as non-existent following a single NXDOMAIN response. However, the deployment of DNSSEC has been limited and the resolver needs to explicitly support this feature. DNS resolver, meaning it does not require any resolver compatibility and can potentially react to the attack at an earlier stage and avoid much of the malicious traffic generated by the attack. We present WORD, a system for statistical detection of DNS Water Torture that is implemented directly in the data plane using the P4 language. WORD efficiently collects data about DNS requests and responses on a per-domain basis, and alerts the control plane if malicious traffic is detected. The solution we present succeeds in detecting the attack within the notably confined resources of the data plane, while reducing false positives by separately addressing domains which naturally have large amounts of subdomains (e.g. wordpress). In addition, our solution is easily expandable to further DNS related data plane processing, such as other types of DNS attacks, or collection of other DNS statistics in the data plane.
自2016年Mirai攻击Dyn DNS服务器造成大量网站不可用的严重影响以来,DNS水刑(也称为随机子域攻击)越来越受欢迎。现有的一种解决方案是速率限制,但在攻击高度分散的情况下并不有效。DNSSEC提供了一个更健壮的解决方案,它允许在单个NXDOMAIN响应之后将一系列子域声明为不存在。然而,DNSSEC的部署受到了限制,解析器需要显式地支持该特性。DNS解析器,这意味着它不需要任何解析器兼容性,并且可以在较早的阶段对攻击做出反应,并避免攻击产生的大部分恶意流量。我们提出了一个使用P4语言直接在数据平面上实现的DNS水刑统计检测系统WORD。WORD有效地收集DNS请求和响应的数据,并在检测到恶意流量时向控制平面发出警报。我们提出的解决方案成功地在数据平面的有限资源中检测攻击,同时通过单独寻址自然具有大量子域的域(例如wordpress)来减少误报。此外,我们的解决方案很容易扩展到进一步的DNS相关数据平面处理,例如其他类型的DNS攻击,或数据平面中其他DNS统计信息的收集。
{"title":"DNS water torture detection in the data plane","authors":"Alexander Kaplan, Shir Landau Feibish","doi":"10.1145/3472716.3472854","DOIUrl":"https://doi.org/10.1145/3472716.3472854","url":null,"abstract":"DNS Water Torture (also known as Random Subdomain attack) has been gaining popularity since the severe impact of the 2016 Mirai attack on Dyn DNS servers, which caused a large number of sites to become unavailable. One existing solution is rate limiting, which is not effective in cases where the attack is highly distributed. A more robust solution is provided by DNSSEC, which enables a range of subdomains to be declared as non-existent following a single NXDOMAIN response. However, the deployment of DNSSEC has been limited and the resolver needs to explicitly support this feature. DNS resolver, meaning it does not require any resolver compatibility and can potentially react to the attack at an earlier stage and avoid much of the malicious traffic generated by the attack. We present WORD, a system for statistical detection of DNS Water Torture that is implemented directly in the data plane using the P4 language. WORD efficiently collects data about DNS requests and responses on a per-domain basis, and alerts the control plane if malicious traffic is detected. The solution we present succeeds in detecting the attack within the notably confined resources of the data plane, while reducing false positives by separately addressing domains which naturally have large amounts of subdomains (e.g. wordpress). In addition, our solution is easily expandable to further DNS related data plane processing, such as other types of DNS attacks, or collection of other DNS statistics in the data plane.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134373302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Planter
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472846
Changgang Zheng, Noa Zilberman
Data classification within the network brings significant benefits in reaction time, servers offload and power efficiency. Still, only very simple models were mapped to the network. In-network classification will not be useful unless we manage to map complex machine learning models to network devices. We present Planter, an algorithm that maps a variety of ensemble models, such as XGBoost and Random Forest, to programmable switches. By overlapping trees within coded tables, Planter manages to map ensemble models to switches with high accuracy and low resource overhead.
{"title":"Planter","authors":"Changgang Zheng, Noa Zilberman","doi":"10.1145/3472716.3472846","DOIUrl":"https://doi.org/10.1145/3472716.3472846","url":null,"abstract":"Data classification within the network brings significant benefits in reaction time, servers offload and power efficiency. Still, only very simple models were mapped to the network. In-network classification will not be useful unless we manage to map complex machine learning models to network devices. We present Planter, an algorithm that maps a variety of ensemble models, such as XGBoost and Random Forest, to programmable switches. By overlapping trees within coded tables, Planter manages to map ensemble models to switches with high accuracy and low resource overhead.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Linc
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472850
Tony John, Piet De Vaere, C. Schutijser, A. Perrig, D. Hausheer
As industrial control systems are becoming increasingly interconnected, there is a rising need for secure and highly available communication as a commodity product. We introduce Linc, a communication gateway that leverages SCION, a next-generation Internet architecture to provide highly reliable and secure inter-domain connectivity for industrial applications.
{"title":"Linc","authors":"Tony John, Piet De Vaere, C. Schutijser, A. Perrig, D. Hausheer","doi":"10.1145/3472716.3472850","DOIUrl":"https://doi.org/10.1145/3472716.3472850","url":null,"abstract":"As industrial control systems are becoming increasingly interconnected, there is a rising need for secure and highly available communication as a commodity product. We introduce Linc, a communication gateway that leverages SCION, a next-generation Internet architecture to provide highly reliable and secure inter-domain connectivity for industrial applications.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intent-based policy optimization in SD-WAN SD-WAN中基于意图的策略优化
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472858
Pham Tran Anh Quang, S. Martin, Jérémie Leguay, Xuan Gong, Feng Zeng
To optimize bandwidth utilization in wide area networks, a controller typically maintains policies at edge routers. In this context, our demonstration presents a versatile policy optimization model that carefully selects the set of overlay links for each application based on its requirements and the overall intent of the operator. The optimization of policies is realized using an SLA prediction model for several intents. We demonstrate, for instance, that latency is improved by 40% when the high-quality intent is selected.
为了优化广域网的带宽利用率,控制器通常在边缘路由器上维护策略。在这种情况下,我们的演示展示了一个多功能策略优化模型,该模型根据每个应用程序的需求和运营商的总体意图仔细选择一组覆盖链接。策略的优化是使用针对多个意图的SLA预测模型实现的。例如,我们证明,当选择高质量的意图时,延迟提高了40%。
{"title":"Intent-based policy optimization in SD-WAN","authors":"Pham Tran Anh Quang, S. Martin, Jérémie Leguay, Xuan Gong, Feng Zeng","doi":"10.1145/3472716.3472858","DOIUrl":"https://doi.org/10.1145/3472716.3472858","url":null,"abstract":"To optimize bandwidth utilization in wide area networks, a controller typically maintains policies at edge routers. In this context, our demonstration presents a versatile policy optimization model that carefully selects the set of overlay links for each application based on its requirements and the overall intent of the operator. The optimization of policies is realized using an SLA prediction model for several intents. We demonstrate, for instance, that latency is improved by 40% when the high-quality intent is selected.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125951654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IGNNITION IGNNITION
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472853
David Pujol-Perich, J. Suárez-Varela, Miquel Ferriol-Galmés, Bo-Xi Wu, Shihan Xiao, Xiangle Cheng, A. Cabellos-Aparicio, P. Barlet-Ros
Graph Neural Networks (GNN) have recently exploded in the Machine Learning area as a novel technique for modeling graph-structured data. This makes them especially suitable for applications in the networking field, as communication networks inherently comprise graphs at many levels (e.g., topology, routing, user connections). In this demo, we will present IGNNITION, an open-source framework for fast prototyping of GNNs applied to communication networks. This framework is especially designed for network engineers and/or researchers with limited background on neural network programming. IGNNITION comprises a set of tools and functionalities that eases and accelerates the whole implementation process, from the design of a GNN model, to its training, evaluation, debugging, and integration into larger network applications. In the demo, we will show how a user can implement a complex GNN model applied to network performance modeling (RouteNet), following three simple steps.
{"title":"IGNNITION","authors":"David Pujol-Perich, J. Suárez-Varela, Miquel Ferriol-Galmés, Bo-Xi Wu, Shihan Xiao, Xiangle Cheng, A. Cabellos-Aparicio, P. Barlet-Ros","doi":"10.1145/3472716.3472853","DOIUrl":"https://doi.org/10.1145/3472716.3472853","url":null,"abstract":"Graph Neural Networks (GNN) have recently exploded in the Machine Learning area as a novel technique for modeling graph-structured data. This makes them especially suitable for applications in the networking field, as communication networks inherently comprise graphs at many levels (e.g., topology, routing, user connections). In this demo, we will present IGNNITION, an open-source framework for fast prototyping of GNNs applied to communication networks. This framework is especially designed for network engineers and/or researchers with limited background on neural network programming. IGNNITION comprises a set of tools and functionalities that eases and accelerates the whole implementation process, from the design of a GNN model, to its training, evaluation, debugging, and integration into larger network applications. In the demo, we will show how a user can implement a complex GNN model applied to network performance modeling (RouteNet), following three simple steps.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Federating trust: network orchestration for cross-boundary zero trust 联合信任:跨边界零信任的网络编排
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472865
K. Olson, Eric Keller
Zero Trust is an emerging security paradigm that does away with implicit zones of trust commonly employed within static, defense-in-depth, enterprise architectures. One of the core tenets of Zero Trust is that resource access is determined by dynamic policy - an intersection of trust in a user, the supporting application or service, the underlying network, and the devices which hold or process data. Establishing this overall assessment of trust serves well for centralized architectures where an administrator can establish and assess each of these trust enablers, such as in an enterprise network. However, shifting workloads to remote access, bring your own device (BYOD), and cloud hosting of collaborative services, to name a few, all challenge the ability of an administrator to effectively establish a complete Zero Trust architecture due to the inability to fully trust each component. This shift away from centrally managed architectures reveal a significant challenge in achieving complete Zero Trust: security is a function of many interactions, many of which an administer has no control over. Recently the term "Zero Trust 2.0" was coined as an evolution to Zero Trust which establishes identity as the new perimeter via an orchestration layer and machine learning capabilities~cite{trust}. However, this functionality still remains tied to centrally controlled architectures where an administrator can link together products and solutions to achieve a desired level of security. We argue that this orchestration needs to expand beyond these common enterprise boundaries in a way that trust can be guaranteed across disparate systems, networks, and servicers. Similar to identity federation, where a user can use credentials from one provider to access another competitors platform, federation of trust should serve as a guarantee for security across networks. In the remaining sections we propose what this trust federation mechanism could potentially look like.
零信任是一种新兴的安全范例,它消除了通常在静态、纵深防御的企业架构中使用的隐式信任区域。零信任的核心原则之一是,资源访问由动态策略决定——这是对用户、支持应用程序或服务、底层网络以及保存或处理数据的设备的信任的交集。建立信任的总体评估非常适用于集中式体系结构,管理员可以在其中建立和评估每个信任启用因素,例如在企业网络中。然而,将工作负载转移到远程访问、自带设备(BYOD)和协作服务的云托管等等,都挑战了管理员有效地建立完整的零信任架构的能力,因为无法完全信任每个组件。这种从集中管理架构的转变揭示了实现完全零信任的重大挑战:安全性是许多交互的功能,其中许多交互是管理员无法控制的。最近,“零信任2.0”这个术语被创造出来,作为零信任的进化,它通过编排层和机器学习功能将身份建立为新的边界cite{trust}。但是,此功能仍然与集中控制的体系结构相关联,管理员可以将产品和解决方案链接在一起,以实现所需的安全级别。我们认为,这种编排需要以一种可以保证跨不同系统、网络和服务的信任的方式扩展到这些共同的企业边界之外。与身份联合(用户可以使用来自一个提供者的凭据访问另一个竞争对手的平台)类似,信任联合应该作为跨网络安全的保证。在其余部分中,我们将提出这种信任联合机制可能是什么样子。
{"title":"Federating trust: network orchestration for cross-boundary zero trust","authors":"K. Olson, Eric Keller","doi":"10.1145/3472716.3472865","DOIUrl":"https://doi.org/10.1145/3472716.3472865","url":null,"abstract":"Zero Trust is an emerging security paradigm that does away with implicit zones of trust commonly employed within static, defense-in-depth, enterprise architectures. One of the core tenets of Zero Trust is that resource access is determined by dynamic policy - an intersection of trust in a user, the supporting application or service, the underlying network, and the devices which hold or process data. Establishing this overall assessment of trust serves well for centralized architectures where an administrator can establish and assess each of these trust enablers, such as in an enterprise network. However, shifting workloads to remote access, bring your own device (BYOD), and cloud hosting of collaborative services, to name a few, all challenge the ability of an administrator to effectively establish a complete Zero Trust architecture due to the inability to fully trust each component. This shift away from centrally managed architectures reveal a significant challenge in achieving complete Zero Trust: security is a function of many interactions, many of which an administer has no control over. Recently the term \"Zero Trust 2.0\" was coined as an evolution to Zero Trust which establishes identity as the new perimeter via an orchestration layer and machine learning capabilities~cite{trust}. However, this functionality still remains tied to centrally controlled architectures where an administrator can link together products and solutions to achieve a desired level of security. We argue that this orchestration needs to expand beyond these common enterprise boundaries in a way that trust can be guaranteed across disparate systems, networks, and servicers. Similar to identity federation, where a user can use credentials from one provider to access another competitors platform, federation of trust should serve as a guarantee for security across networks. In the remaining sections we propose what this trust federation mechanism could potentially look like.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modular switch deployment in programmable forwarding planes with switch (de)composer 模块化交换机部署在可编程转发平面与交换机(de)composer
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472856
Paula Duarte Bol, R. C. Lunardi, B. D. França, Weverton Cordeiro
We propose Switch(De)Composer, a solution for enabling network developers to leverage the One Big Switch abstraction to write modular switch code that can be deployed across a programmable forwarding plane while promoting reusability, maintainability, and efficient resource usage in switches.
我们提出了Switch(De)Composer,这是一个使网络开发人员能够利用One Big Switch抽象来编写模块化交换机代码的解决方案,这些代码可以在可编程转发平面上部署,同时提高交换机的可重用性、可维护性和有效的资源利用。
{"title":"Modular switch deployment in programmable forwarding planes with switch (de)composer","authors":"Paula Duarte Bol, R. C. Lunardi, B. D. França, Weverton Cordeiro","doi":"10.1145/3472716.3472856","DOIUrl":"https://doi.org/10.1145/3472716.3472856","url":null,"abstract":"We propose Switch(De)Composer, a solution for enabling network developers to leverage the One Big Switch abstraction to write modular switch code that can be deployed across a programmable forwarding plane while promoting reusability, maintainability, and efficient resource usage in switches.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132501794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockgraph proof-of-concept Blockgraph概念验证
Pub Date : 2021-08-23 DOI: 10.1145/3472716.3472866
David Cordova Morales, P. B. Velloso, Alexandre Guerre, T. Nguyen, G. Pujolle, K. A. Agha, Guillaume Dua
Blockgraph is a new structure of blockchain in which the blocks are interconnected in the form of a graph instead of a chain. Blockgraph has been designed to enable the use of blockchain in mobile adhoc networks and mesh networks by dealing with the problem of network partition due to node mobility. This paper presents a proof of the blockgraph concept using a testbed composed of five mesh routers. The demonstration shows that the blockgraph is created and maintained by the participant nodes in case of network split and merge.
区块图是区块链的一种新结构,其中区块以图的形式相互连接,而不是以链的形式。Blockgraph的设计目的是通过处理节点移动性导致的网络分区问题,使区块链能够在移动自组网和网状网络中使用。本文利用一个由5个网状路由器组成的测试平台对区块图概念进行了验证。演示表明,在网络分裂和合并的情况下,区块图是由参与节点创建和维护的。
{"title":"Blockgraph proof-of-concept","authors":"David Cordova Morales, P. B. Velloso, Alexandre Guerre, T. Nguyen, G. Pujolle, K. A. Agha, Guillaume Dua","doi":"10.1145/3472716.3472866","DOIUrl":"https://doi.org/10.1145/3472716.3472866","url":null,"abstract":"Blockgraph is a new structure of blockchain in which the blocks are interconnected in the form of a graph instead of a chain. Blockgraph has been designed to enable the use of blockchain in mobile adhoc networks and mesh networks by dealing with the problem of network partition due to node mobility. This paper presents a proof of the blockgraph concept using a testbed composed of five mesh routers. The demonstration shows that the blockgraph is created and maintained by the participant nodes in case of network split and merge.","PeriodicalId":178725,"journal":{"name":"Proceedings of the SIGCOMM '21 Poster and Demo Sessions","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the SIGCOMM '21 Poster and Demo Sessions
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1