首页 > 最新文献

Proceedings of The 6th International Conference on Innovation in Science and Technology最新文献

英文 中文
Auto-configuration of 802.11n WLANs 802.11n wlan的自动配置
Mustafa Y. Arslan, K. Pelechrinis, Ioannis Broustis, S. Krishnamurthy, Sateesh Addepalli, K. Papagiannaki
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of a wider band with CB can exacerbate interference effects. Furthermore, CB does not always provide benefits in interference-free settings, and can even degrade performance in some cases. We conduct an in-depth, experimental study to understand the implications of CB. Based on this study we design an auto-configuration framework, ACORN, for enterprise 802.11n WLANs. ACORN integrates the functions of user association and channel allocation, since our study reveals that they are tightly coupled when CB is used. We show that the channel allocation problem with the constraints of CB is NP-complete. Thus, ACORN uses an algorithm that provides a worst case approximation ratio of [EQUATION] with Δ being the maximum node degree in the network. We implement ACORN on our 802.11n testbed. Our experiments show that ACORN (i) outperforms previous approaches that are agnostic to CB constraints; it provides per-AP throughput gains from 1.5x to 6x and (ii) in practice, its channel allocation module achieves an approximation ratio much better than [EQUATION].
信道绑定(CB)将两个相邻的频带结合在一起,形成一个新的更宽的频带,以促进基于mimo的802.11n网络中的高数据速率传输。然而,使用更宽的波段与CB会加剧干扰效应。此外,CB并不总是在无干扰设置中提供好处,在某些情况下甚至会降低性能。我们进行了深入的实验研究,以了解CB的含义。在此基础上,我们设计了一个用于企业802.11n wlan的自动配置框架ACORN。ACORN集成了用户关联和信道分配的功能,因为我们的研究表明,当使用CB时,它们是紧密耦合的。我们证明了具有CB约束的信道分配问题是np完全的。因此,ACORN使用的算法提供最坏情况近似比为[EQUATION],其中Δ为网络中的最大节点度。我们在802.11n测试台上实现了ACORN。我们的实验表明,ACORN (i)优于以前对CB约束不可知的方法;它提供了从1.5倍到6倍的每个ap吞吐量增益,并且(ii)在实践中,它的信道分配模块实现了比[等式]更好的近似比率。
{"title":"Auto-configuration of 802.11n WLANs","authors":"Mustafa Y. Arslan, K. Pelechrinis, Ioannis Broustis, S. Krishnamurthy, Sateesh Addepalli, K. Papagiannaki","doi":"10.1145/1921168.1921204","DOIUrl":"https://doi.org/10.1145/1921168.1921204","url":null,"abstract":"Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of a wider band with CB can exacerbate interference effects. Furthermore, CB does not always provide benefits in interference-free settings, and can even degrade performance in some cases. We conduct an in-depth, experimental study to understand the implications of CB. Based on this study we design an auto-configuration framework, ACORN, for enterprise 802.11n WLANs. ACORN integrates the functions of user association and channel allocation, since our study reveals that they are tightly coupled when CB is used. We show that the channel allocation problem with the constraints of CB is NP-complete. Thus, ACORN uses an algorithm that provides a worst case approximation ratio of [EQUATION] with Δ being the maximum node degree in the network. We implement ACORN on our 802.11n testbed. Our experiments show that ACORN (i) outperforms previous approaches that are agnostic to CB constraints; it provides per-AP throughput gains from 1.5x to 6x and (ii) in practice, its channel allocation module achieves an approximation ratio much better than [EQUATION].","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88479277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Balancing throughput, robustness, and in-order delivery in P2P VoD P2P视频点播中吞吐量、鲁棒性和顺序传输的平衡
Bin Fan, D. Andersen, M. Kaminsky, K. Papagiannaki
Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood---yet choosing the right approach is critical to system performance. This paper takes a fresh look at the p2p VoD design space using a simple analytical model that focuses on the allocation of uplink bandwidth resource for different chunks across peers. We describe a fundamental tradeoff that exists between system throughput, sequentiality of downloaded content and robustness to heterogeneous network conditions and node capacities, and we prove that no system can achieve all three simultaneously. Empirical results from Emulab confirm the analysis and show how one might implement efficient peer-to-peer VoD streaming with an appropriate balance of the tradeoff.
近年来,点对点作为提供视频点播流媒体的一种很有前途的方式出现了。然而,设计空间是巨大的,仍然没有得到很好的理解——然而,选择正确的方法对系统性能至关重要。本文使用一个简单的分析模型对p2p视频点播设计空间进行了全新的审视,该模型关注的是跨对等体的不同块的上行带宽资源分配。我们描述了系统吞吐量、下载内容的顺序性以及对异构网络条件和节点容量的鲁棒性之间存在的基本权衡,并证明没有系统可以同时实现这三者。来自Emulab的实证结果证实了这一分析,并展示了如何在权衡的适当平衡下实现高效的点对点视频点播流。
{"title":"Balancing throughput, robustness, and in-order delivery in P2P VoD","authors":"Bin Fan, D. Andersen, M. Kaminsky, K. Papagiannaki","doi":"10.1145/1921168.1921182","DOIUrl":"https://doi.org/10.1145/1921168.1921182","url":null,"abstract":"Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood---yet choosing the right approach is critical to system performance. This paper takes a fresh look at the p2p VoD design space using a simple analytical model that focuses on the allocation of uplink bandwidth resource for different chunks across peers. We describe a fundamental tradeoff that exists between system throughput, sequentiality of downloaded content and robustness to heterogeneous network conditions and node capacities, and we prove that no system can achieve all three simultaneously. Empirical results from Emulab confirm the analysis and show how one might implement efficient peer-to-peer VoD streaming with an appropriate balance of the tradeoff.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90460162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Proceedings of the 6th International COnference 第六届国际会议论文集
J. D. Oliveira, M. Ott, T. Griffin, M. Médard
It is our great pleasure to welcome you to ACM CoNEXT 2010, the 6th International COnference on emerging Networking EXperiments and Technologies. The conference is hosted by Drexel University and is held in the City of Brotherly Love, Philadelphia. We hope that the vibe of the city in combination with an outstanding technical and social program will lead to stimulating discussions and exchange of ideas among the attending members of our world-spanning community. This year's edition continues the tradition of CoNEXT to foster the scientific and technological intersection between different research communities in networking from both academia and industry. The main conference is preceded by two interesting workshops that reflect the communities' renewed interest in fundamentally rethinking network architecture (ReArch) and what networking elements should and can do (PRESTO). In addition to those, we also have a student workshop to give the next generation of networking researchers a platform to discuss their work in an open and informal setting. The main conference is again organized along a single track of thematically grouped sessions to foster the interaction and discussions among all participants and across different points of views. CoNEXT strives to be an affordable conference and we managed to keep registration fees at the same level for the third consecutive year, despite a tough climate for attracting supporters. We are especially grateful to CISCO, for its outstanding commitment to research and education by becoming a Gold Supporter of ACM CoNEXT 2010; many thanks to our Bronze Supporter AT&T, and also to our Patrons: INTEL, NICTA and Drexel University. We thank the National Science Foundation and SIGCOMM for providing generous support for student travel grants.
我们非常高兴地欢迎您参加ACM CoNEXT 2010,第六届新兴网络实验与技术国际会议。会议由德雷克塞尔大学主办,在费城兄弟之爱城举行。我们希望这座城市的氛围与优秀的技术和社会项目相结合,能够在我们跨越世界的社区成员之间激发讨论和思想交流。今年的会议延续了CoNEXT的传统,旨在促进来自学术界和工业界的不同研究团体之间的科学和技术交流。主要会议之前有两个有趣的研讨会,反映了社区对从根本上重新思考网络架构(research)和网络元素应该和可以做什么(PRESTO)的新兴趣。除此之外,我们还有一个学生研讨会,为下一代网络研究人员提供一个平台,在一个开放和非正式的环境中讨论他们的工作。主要会议再次按照主题分组会议的单一轨道组织,以促进所有与会者之间和不同观点之间的互动和讨论。CoNEXT努力成为一个负担得起的会议,尽管在吸引支持者的艰难环境下,我们连续第三年将注册费保持在同一水平。我们特别感谢思科成为ACM CoNEXT 2010的金牌支持者,对研究和教育做出了杰出的承诺;非常感谢我们的铜级支持者AT&T,以及我们的赞助人:英特尔、NICTA和德雷塞尔大学。我们感谢美国国家科学基金会和SIGCOMM为学生旅行补助金提供的慷慨支持。
{"title":"Proceedings of the 6th International COnference","authors":"J. D. Oliveira, M. Ott, T. Griffin, M. Médard","doi":"10.1145/1921168","DOIUrl":"https://doi.org/10.1145/1921168","url":null,"abstract":"It is our great pleasure to welcome you to ACM CoNEXT 2010, the 6th International COnference on emerging Networking EXperiments and Technologies. The conference is hosted by Drexel University and is held in the City of Brotherly Love, Philadelphia. We hope that the vibe of the city in combination with an outstanding technical and social program will lead to stimulating discussions and exchange of ideas among the attending members of our world-spanning community. \u0000 \u0000This year's edition continues the tradition of CoNEXT to foster the scientific and technological intersection between different research communities in networking from both academia and industry. The main conference is preceded by two interesting workshops that reflect the communities' renewed interest in fundamentally rethinking network architecture (ReArch) and what networking elements should and can do (PRESTO). In addition to those, we also have a student workshop to give the next generation of networking researchers a platform to discuss their work in an open and informal setting. The main conference is again organized along a single track of thematically grouped sessions to foster the interaction and discussions among all participants and across different points of views. \u0000 \u0000CoNEXT strives to be an affordable conference and we managed to keep registration fees at the same level for the third consecutive year, despite a tough climate for attracting supporters. We are especially grateful to CISCO, for its outstanding commitment to research and education by becoming a Gold Supporter of ACM CoNEXT 2010; many thanks to our Bronze Supporter AT&T, and also to our Patrons: INTEL, NICTA and Drexel University. We thank the National Science Foundation and SIGCOMM for providing generous support for student travel grants.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91181492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Network-wide deployment of intrusion detection and prevention systems 全网部署入侵检测和防御系统
V. Sekar, Ravishankar Krishnaswamy, Anupam Gupta, M. Reiter
Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we explore an alternative design that exploits spatial, network-wide opportunities for distributing NIDS and NIPS functions. For the NIDS case, we design a linear programming formulation to assign detection responsibilities to nodes while ensuring that no node is overloaded. We describe a prototype NIDS implementation adapted from the Bro system to analyze traffic per these assignments, and demonstrate the advantages that this approach achieves. For NIPS, we show how to maximally leverage specialized hardware (e.g., TCAMs) to reduce the footprint of unwanted traffic on the network. Such hardware constraints make the optimization problem NP-hard, and we provide practical approximation algorithms based on randomized rounding.
传统的扩展网络入侵检测(NIDS)和入侵防御系统(NIPS)的工作主要集中在单一优势点的观点上。在本文中,我们探索了一种替代设计,利用空间,网络范围的机会来分布NIDS和NIPS功能。对于NIDS情况,我们设计了一个线性规划公式,在确保节点不过载的情况下,将检测职责分配给节点。我们描述了一个基于Bro系统的原型NIDS实现,用于分析每个任务的流量,并演示了该方法实现的优势。对于NIPS,我们将展示如何最大限度地利用专用硬件(例如,tcam)来减少网络上不需要的流量的占用。这种硬件约束使得优化问题np困难,我们提供了基于随机舍入的实用逼近算法。
{"title":"Network-wide deployment of intrusion detection and prevention systems","authors":"V. Sekar, Ravishankar Krishnaswamy, Anupam Gupta, M. Reiter","doi":"10.1145/1921168.1921192","DOIUrl":"https://doi.org/10.1145/1921168.1921192","url":null,"abstract":"Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we explore an alternative design that exploits spatial, network-wide opportunities for distributing NIDS and NIPS functions. For the NIDS case, we design a linear programming formulation to assign detection responsibilities to nodes while ensuring that no node is overloaded. We describe a prototype NIDS implementation adapted from the Bro system to analyze traffic per these assignments, and demonstrate the advantages that this approach achieves. For NIPS, we show how to maximally leverage specialized hardware (e.g., TCAMs) to reduce the footprint of unwanted traffic on the network. Such hardware constraints make the optimization problem NP-hard, and we provide practical approximation algorithms based on randomized rounding.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78142697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking MAWILab:结合各种异常检测器,用于自动异常标记和性能基准测试
Romain Fontugne, P. Borgnat, P. Abry, K. Fukuda
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist researchers in the evaluation of detectors by providing them with labeled anomaly traffic traces. We aim at automatically finding anomalies in the MAWI archive using a new methodology that combines different and independent detectors. A key challenge is to compare the alarms raised by these detectors, though they operate at different traffic granularities. The main contribution is to propose a reliable graph-based methodology that combines any anomaly detector outputs. We evaluated four unsupervised combination strategies; the best is the one that is based on dimensionality reduction. The synergy between anomaly detectors permits to detect twice as many anomalies as the most accurate detector, and to reject numerous false positive alarms reported by the detectors. Significant anomalous traffic features are extracted from reported alarms, hence the labels assigned to the MAWI archive are concise. The results on the MAWI traffic are publicly available and updated daily. Also, this approach permits to include the results of upcoming anomaly detectors so as to improve over time the quality and variety of labels.
对异常检测器的评估是交通监控中的一项关键任务,由于缺乏地面真实值而变得尤为困难。本文的目的是通过提供标记异常流量痕迹来帮助研究人员评估检测器。我们的目标是使用一种结合不同和独立探测器的新方法自动发现MAWI档案中的异常。一个关键的挑战是比较这些探测器发出的警报,尽管它们在不同的交通粒度下运行。主要贡献是提出了一种可靠的基于图的方法,该方法结合了任何异常检测器的输出。我们评估了四种无监督组合策略;最好的是基于降维的方法。异常检测器之间的协同作用允许检测到比最准确的检测器多两倍的异常,并拒绝检测器报告的大量误报警报。从上报的告警中提取重要的异常流量特征,因此分配给MAWI存档的标签是简洁的。MAWI流量的结果是公开的,并且每天更新。此外,这种方法允许包含即将到来的异常检测器的结果,以便随着时间的推移改进标签的质量和种类。
{"title":"MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking","authors":"Romain Fontugne, P. Borgnat, P. Abry, K. Fukuda","doi":"10.1145/1921168.1921179","DOIUrl":"https://doi.org/10.1145/1921168.1921179","url":null,"abstract":"Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist researchers in the evaluation of detectors by providing them with labeled anomaly traffic traces. We aim at automatically finding anomalies in the MAWI archive using a new methodology that combines different and independent detectors. A key challenge is to compare the alarms raised by these detectors, though they operate at different traffic granularities. The main contribution is to propose a reliable graph-based methodology that combines any anomaly detector outputs. We evaluated four unsupervised combination strategies; the best is the one that is based on dimensionality reduction. The synergy between anomaly detectors permits to detect twice as many anomalies as the most accurate detector, and to reject numerous false positive alarms reported by the detectors. Significant anomalous traffic features are extracted from reported alarms, hence the labels assigned to the MAWI archive are concise. The results on the MAWI traffic are publicly available and updated daily. Also, this approach permits to include the results of upcoming anomaly detectors so as to improve over time the quality and variety of labels.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82006632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 292
Assessing the vulnerability of replicated network services 评估复制网络服务的漏洞
G. Bissias, B. Levine, R. Sitaraman
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a service by connecting to one of a redundant set of servers. These networks are vulnerable to node and link failures, causing some clients to become disconnected from the servers. We develop algorithms that quantify and bound the inherent vulnerability of a clientserver network using semidefinite programming (SDP) and branch-and-cut techniques. Further, we develop a divide-and-conquer algorithm that solves the problem for large graphs. We use these techniques to show that: for the Philippine Power Grid removing just over 6% of the transmission lines will disconnect at least 20% but not more than 50% of the substations from all generators; on a large wireless mesh network disrupting 5% of wireless links between relays removes Internet access for half the relays; even after any 16% of Tier 2 ASes are removed, more than 50% of the remaining Tier 2 ASes will be connected to the Tier 1 backbone; when 300 roadblocks are erected in Michigan, it's possible to disconnect 28--43% of the population from all airports.
客户机-服务器网络是普遍的、基本的,包括Internet、电网和道路网络等关键网络。在客户机-服务器网络中,客户机通过连接到一组冗余服务器中的一个来获得服务。这些网络容易出现节点和链路故障,导致一些客户端与服务器断开连接。我们开发的算法,量化和绑定的客户端服务器网络的固有漏洞使用半确定规划(SDP)和分支切断技术。此外,我们开发了一种分治算法来解决大型图的问题。我们使用这些技术来表明:对于菲律宾电网来说,只要拆除6%以上的输电线路,就会使至少20%但不超过50%的变电站与所有发电机断开连接;在一个大型无线网状网络中,干扰了中继之间5%的无线链路,使一半的中继无法接入互联网;即使移除16%的Tier 2 ase,仍有超过50%的剩余Tier 2 ase连接到Tier 1骨干网;当密歇根州竖起300个路障时,28%至43%的人口就有可能与所有机场隔绝。
{"title":"Assessing the vulnerability of replicated network services","authors":"G. Bissias, B. Levine, R. Sitaraman","doi":"10.1145/1921168.1921200","DOIUrl":"https://doi.org/10.1145/1921168.1921200","url":null,"abstract":"Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a service by connecting to one of a redundant set of servers. These networks are vulnerable to node and link failures, causing some clients to become disconnected from the servers. We develop algorithms that quantify and bound the inherent vulnerability of a clientserver network using semidefinite programming (SDP) and branch-and-cut techniques. Further, we develop a divide-and-conquer algorithm that solves the problem for large graphs. We use these techniques to show that: for the Philippine Power Grid removing just over 6% of the transmission lines will disconnect at least 20% but not more than 50% of the substations from all generators; on a large wireless mesh network disrupting 5% of wireless links between relays removes Internet access for half the relays; even after any 16% of Tier 2 ASes are removed, more than 50% of the remaining Tier 2 ASes will be connected to the Tier 1 backbone; when 300 roadblocks are erected in Michigan, it's possible to disconnect 28--43% of the population from all airports.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78642008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LEGUP: using heterogeneity to reduce the cost of data center network upgrades LEGUP:利用异构性降低数据中心网络升级的成本
Andrew R. Curtis, S. Keshav, A. López-Ortiz
Fundamental limitations of traditional data center network architectures have led to the development of architectures that provide enormous bisection bandwidth for up to hundreds of thousands of servers. Because these architectures rely on homogeneous switches, implementing one in a legacy data center usually requires replacing most existing switches. Such forklift upgrades are typically prohibitively expensive; instead, a data center manager should be able to selectively add switches to boost bisection bandwidth. Doing so adds heterogeneity to the network's switches and heterogeneous high-performance interconnection topologies are not well understood. Therefore, we develop the theory of heterogeneous Clos networks. We show that our construction needs only as much link capacity as the classic Clos network to route the same traffic matrices and this bound is the optimal. Placing additional equipment in a highly constrained data center is challenging in practice, however. We propose LEGUP to design the topology and physical arrangement of such network upgrades or expansions. Compared to current solutions, we show that LEGUP finds network upgrades with more bisection bandwidth for half the cost. And when expanding a data center iteratively, LEGUP's network has 265% more bisection bandwidth than an iteratively upgraded fat-tree.
传统数据中心网络架构的基本限制导致了架构的发展,这些架构可以为多达数十万台服务器提供巨大的对分带宽。由于这些体系结构依赖于同构交换机,因此在遗留数据中心中实现此类交换机通常需要替换大多数现有交换机。这种叉车升级通常非常昂贵;相反,数据中心管理器应该能够有选择地添加交换机来提高对分带宽。这样做增加了网络交换机的异构性,并且异构的高性能互连拓扑还没有得到很好的理解。因此,我们发展了异构Clos网络理论。我们表明,我们的结构只需要与经典Clos网络一样多的链路容量来路由相同的流量矩阵,并且这个边界是最优的。然而,在高度受限的数据中心中放置额外的设备在实践中是具有挑战性的。我们提出LEGUP来设计这种网络升级或扩展的拓扑结构和物理布局。与目前的解决方案相比,我们表明LEGUP发现网络升级具有更多的平分带宽,成本减半。当迭代扩展数据中心时,LEGUP的网络比迭代升级的胖树多出265%的平分带宽。
{"title":"LEGUP: using heterogeneity to reduce the cost of data center network upgrades","authors":"Andrew R. Curtis, S. Keshav, A. López-Ortiz","doi":"10.1145/1921168.1921187","DOIUrl":"https://doi.org/10.1145/1921168.1921187","url":null,"abstract":"Fundamental limitations of traditional data center network architectures have led to the development of architectures that provide enormous bisection bandwidth for up to hundreds of thousands of servers. Because these architectures rely on homogeneous switches, implementing one in a legacy data center usually requires replacing most existing switches. Such forklift upgrades are typically prohibitively expensive; instead, a data center manager should be able to selectively add switches to boost bisection bandwidth. Doing so adds heterogeneity to the network's switches and heterogeneous high-performance interconnection topologies are not well understood. Therefore, we develop the theory of heterogeneous Clos networks. We show that our construction needs only as much link capacity as the classic Clos network to route the same traffic matrices and this bound is the optimal. Placing additional equipment in a highly constrained data center is challenging in practice, however. We propose LEGUP to design the topology and physical arrangement of such network upgrades or expansions. Compared to current solutions, we show that LEGUP finds network upgrades with more bisection bandwidth for half the cost. And when expanding a data center iteratively, LEGUP's network has 265% more bisection bandwidth than an iteratively upgraded fat-tree.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"36 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77477174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Is content publishing in BitTorrent altruistic or profit-driven? 在BitTorrent上发布内容是无私的还是逐利的?
R. C. Rumín, M. Kryczka, Ángel Cuevas, S. Kaune, Carmen Guerrero, R. Rejaie
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serious legal implications for users who publish the material (or publishers). This raises a question that whether (at least major) content publishers behave in an altruistic fashion or have other incentives such as financial. In this study, we identify the content publishers of more than 55K torrents in two major BitTorrent portals and examine their behavior. We demonstrate that a small fraction of publishers is responsible for 67% of the published content and 75% of the downloads. Our investigations reveal that these major publishers respond to two different profiles. On the one hand, antipiracy agencies and malicious publishers publish a large amount of fake files to protect copyrighted content and spread malware respectively. On the other hand, content publishing in BitTorrent is largely driven by companies with financial incentives. Therefore, if these companies lose their interest or are unable to publish content, BitTorrent traffic/portals may disappear or at least their associated traffic will be significantly reduced.
BitTorrent是最流行的P2P内容交付应用程序,个人用户可以与成千上万的其他用户共享各种类型的内容。BitTorrent的日益普及主要是由于消费者可以免费获得有价值的内容。然而,除了必需的资源之外,发布(共享)有价值的(通常是受版权保护的)内容对发布材料的用户(或发布者)有严重的法律影响。这就提出了一个问题,即内容发布者(至少是主要的内容发布者)是否以利他主义的方式行事,或者是否有其他动机,如经济动机。在这项研究中,我们在两个主要的BitTorrent门户网站中确定了超过55K种子的内容发布者,并检查了他们的行为。我们证明了一小部分发行商负责67%的已发布内容和75%的下载量。我们的调查显示,这些主要出版商会对两种不同的情况做出反应。一方面,反盗版机构和恶意发布者分别为保护正版内容和传播恶意软件而发布大量虚假文件。另一方面,BitTorrent上的内容发布主要是由有经济动机的公司驱动的。因此,如果这些公司失去兴趣或无法发布内容,BitTorrent流量/门户可能会消失,或者至少他们的相关流量将显著减少。
{"title":"Is content publishing in BitTorrent altruistic or profit-driven?","authors":"R. C. Rumín, M. Kryczka, Ángel Cuevas, S. Kaune, Carmen Guerrero, R. Rejaie","doi":"10.1145/1921168.1921183","DOIUrl":"https://doi.org/10.1145/1921168.1921183","url":null,"abstract":"BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serious legal implications for users who publish the material (or publishers). This raises a question that whether (at least major) content publishers behave in an altruistic fashion or have other incentives such as financial. In this study, we identify the content publishers of more than 55K torrents in two major BitTorrent portals and examine their behavior. We demonstrate that a small fraction of publishers is responsible for 67% of the published content and 75% of the downloads. Our investigations reveal that these major publishers respond to two different profiles. On the one hand, antipiracy agencies and malicious publishers publish a large amount of fake files to protect copyrighted content and spread malware respectively. On the other hand, content publishing in BitTorrent is largely driven by companies with financial incentives. Therefore, if these companies lose their interest or are unable to publish content, BitTorrent traffic/portals may disappear or at least their associated traffic will be significantly reduced.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"98 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80719560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Verifiable network-performance measurements 可验证的网络性能测量
K. Argyraki, Petros Maniatis, Ankit Singla
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. Instead, we propose Network Confessional, a new, systematic approach to the problem of forwarding-performance verification. Our system relies on voluntary reporting, allowing each network domain to disclose its loss and delay performance to its customers and peers and, potentially, a regulator. Most importantly, it enables verifiable performance measurements, i.e., domains cannot abuse it to significantly exaggerate their performance. Finally, our system is tunable, allowing each participating domain to determine how many resources to devote to it independently (i.e., without any inter-domain coordination), exposing a controllable trade-off between performance-verification quality and resource consumption. Our system comes at the cost of deploying modest functionality at the participating domains' border routers; we show that it requires reasonable resources, well within modern network capabilities.
在当前的互联网中,没有一种干净的方法可以让受影响的各方对转发性能差做出反应:为了检测和评估合同合作伙伴违反服务水平协议(SLA)的行为,域必须使用探针进行临时监控。相反,我们提出网络自白,一个新的,系统的方法来解决转发性能验证问题。我们的系统依赖于自愿报告,允许每个网络域向其客户和同行,甚至可能向监管机构披露其损失和延迟性能。最重要的是,它支持可验证的性能度量,也就是说,领域不能滥用它来显着夸大它们的性能。最后,我们的系统是可调的,允许每个参与域独立决定投入多少资源(即,不需要任何域间协调),在性能验证质量和资源消耗之间暴露出可控的权衡。我们的系统是以在参与域的边界路由器上部署适度功能为代价的;我们表明,它需要合理的资源,在现代网络能力范围内。
{"title":"Verifiable network-performance measurements","authors":"K. Argyraki, Petros Maniatis, Ankit Singla","doi":"10.1145/1921168.1921170","DOIUrl":"https://doi.org/10.1145/1921168.1921170","url":null,"abstract":"In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. Instead, we propose Network Confessional, a new, systematic approach to the problem of forwarding-performance verification. Our system relies on voluntary reporting, allowing each network domain to disclose its loss and delay performance to its customers and peers and, potentially, a regulator. Most importantly, it enables verifiable performance measurements, i.e., domains cannot abuse it to significantly exaggerate their performance. Finally, our system is tunable, allowing each participating domain to determine how many resources to devote to it independently (i.e., without any inter-domain coordination), exposing a controllable trade-off between performance-verification quality and resource consumption. Our system comes at the cost of deploying modest functionality at the participating domains' border routers; we show that it requires reasonable resources, well within modern network capabilities.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81781815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
Proceedings of The 6th International Conference on Innovation in Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1