首页 > 最新文献

Proceedings of The 6th International Conference on Innovation in Science and Technology最新文献

英文 中文
Exploiting locality of interest in online social networks 利用在线社交网络中的本地兴趣
Mike P. Wittie, V. Pejović, Lara B. Deek, K. Almeroth, Ben Y. Zhao
Online Social Networks (OSN) are fun, popular, and socially significant. An integral part of their success is the immense size of their global user base. To provide a consistent service to all users, Facebook, the world's largest OSN, is heavily dependent on centralized U.S. data centers, which renders service outside of the U.S. sluggish and wasteful of Internet bandwidth. In this paper, we investigate the detailed causes of these two problems and identify mitigation opportunities. Because details of Facebook's service remain proprietary, we treat the OSN as a black box and reverse engineer its operation from publicly available traces. We find that contrary to current wisdom, OSN state is amenable to partitioning and that its fine grained distribution and processing can significantly improve performance without loss in service consistency. Through simulations of reconstructed Facebook traffic over measured Internet paths, we show that user requests can be processed 79% faster and use 91% less bandwidth. We conclude that the partitioning of OSN state is an attractive scaling strategy for Facebook and other OSN services.
在线社交网络(OSN)是有趣的、受欢迎的、具有社会意义的。他们成功的一个组成部分是他们庞大的全球用户基础。为了向所有用户提供一致的服务,Facebook作为世界上最大的OSN,严重依赖于美国的集中数据中心,这使得美国以外的服务变得缓慢,并且浪费了互联网带宽。在本文中,我们调查了这两个问题的详细原因,并确定了缓解机会。由于Facebook服务的细节仍然是专有的,我们将OSN视为一个黑盒子,并根据公开可用的痕迹对其操作进行逆向工程。我们发现,与目前的认知相反,OSN状态可以进行分区,其细粒度的分布和处理可以显著提高性能,而不会损失服务一致性。通过在测量的互联网路径上模拟重建的Facebook流量,我们表明用户请求的处理速度可以提高79%,使用的带宽减少91%。我们得出结论,OSN状态的分区对于Facebook和其他OSN服务来说是一个有吸引力的扩展策略。
{"title":"Exploiting locality of interest in online social networks","authors":"Mike P. Wittie, V. Pejović, Lara B. Deek, K. Almeroth, Ben Y. Zhao","doi":"10.1145/1921168.1921201","DOIUrl":"https://doi.org/10.1145/1921168.1921201","url":null,"abstract":"Online Social Networks (OSN) are fun, popular, and socially significant. An integral part of their success is the immense size of their global user base. To provide a consistent service to all users, Facebook, the world's largest OSN, is heavily dependent on centralized U.S. data centers, which renders service outside of the U.S. sluggish and wasteful of Internet bandwidth. In this paper, we investigate the detailed causes of these two problems and identify mitigation opportunities. Because details of Facebook's service remain proprietary, we treat the OSN as a black box and reverse engineer its operation from publicly available traces. We find that contrary to current wisdom, OSN state is amenable to partitioning and that its fine grained distribution and processing can significantly improve performance without loss in service consistency. Through simulations of reconstructed Facebook traffic over measured Internet paths, we show that user requests can be processed 79% faster and use 91% less bandwidth. We conclude that the partitioning of OSN state is an attractive scaling strategy for Facebook and other OSN services.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90325897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
SecondNet: a data center network virtualization architecture with bandwidth guarantees SecondNet:具有带宽保障的数据中心网络虚拟化架构
Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, Yongguang Zhang
In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers because the resources allocated to VDCs can be rapidly adjusted as tenants' needs change. To enable the VDC abstraction, we design a data center network virtualization architecture called SecondNet. SecondNet achieves scalability by distributing all the virtual-to-physical mapping, routing, and bandwidth reservation state in server hypervisors. Its port-switching based source routing (PSSR) further makes SecondNet applicable to arbitrary network topologies using commodity servers and switches. SecondNet introduces a centralized VDC allocation algorithm for bandwidth guaranteed virtual to physical mapping. Simulations demonstrate that our VDC allocation achieves high network utilization and low time complexity. Our implementation and experiments show that we can build SecondNet on top of various network topologies, and SecondNet provides bandwidth guarantee and elasticity, as designed.
在本文中,我们提出虚拟数据中心(VDC)作为云中的多个租户的资源分配单位。vdc比物理数据中心更受欢迎,因为分配给vdc的资源可以随着租户需求的变化而快速调整。为了实现VDC抽象,我们设计了一个名为SecondNet的数据中心网络虚拟化体系结构。SecondNet通过在服务器管理程序中分布所有虚拟到物理的映射、路由和带宽保留状态来实现可伸缩性。它的基于端口交换的源路由(PSSR)进一步使SecondNet适用于使用商品服务器和交换机的任意网络拓扑。SecondNet引入了一种集中的VDC分配算法,用于保证带宽的虚拟到物理映射。仿真结果表明,该方法具有较高的网络利用率和较低的时间复杂度。我们的实现和实验表明,我们可以在各种网络拓扑上构建SecondNet,并且SecondNet如设计的那样提供带宽保证和弹性。
{"title":"SecondNet: a data center network virtualization architecture with bandwidth guarantees","authors":"Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, Yongguang Zhang","doi":"10.1145/1921168.1921188","DOIUrl":"https://doi.org/10.1145/1921168.1921188","url":null,"abstract":"In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers because the resources allocated to VDCs can be rapidly adjusted as tenants' needs change. To enable the VDC abstraction, we design a data center network virtualization architecture called SecondNet. SecondNet achieves scalability by distributing all the virtual-to-physical mapping, routing, and bandwidth reservation state in server hypervisors. Its port-switching based source routing (PSSR) further makes SecondNet applicable to arbitrary network topologies using commodity servers and switches. SecondNet introduces a centralized VDC allocation algorithm for bandwidth guaranteed virtual to physical mapping. Simulations demonstrate that our VDC allocation achieves high network utilization and low time complexity. Our implementation and experiments show that we can build SecondNet on top of various network topologies, and SecondNet provides bandwidth guarantee and elasticity, as designed.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72902532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 659
Personal data vaults: a locus of control for personal data streams 个人数据库:个人数据流的控制点
Min Y. Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, J. Burke, D. Estrin, Mark H. Hansen, R. Govindan
The increasing ubiquity of the mobile phone is creating many opportunities for personal context sensing, and will result in massive databases of individuals' sensitive information incorporating locations, movements, images, text annotations, and even health data. In existing system architectures, users upload their raw (unprocessed or filtered) data streams directly to content-service providers and have little control over their data once they "opt-in". We present Personal Data Vaults (PDVs), a privacy architecture in which individuals retain ownership of their data. Data are routinely filtered before being shared with content-service providers, and users or data custodian services can participate in making controlled data-sharing decisions. Introducing a PDV gives users flexible and granular access control over data. To reduce the burden on users and improve usability, we explore three mechanisms for managing data policies: Granular ACL, Trace-audit and Rule Recommender. We have implemented a proof-of-concept PDV and evaluated it using real data traces collected from two personal participatory sensing applications.
移动电话的日益普及为个人环境感知创造了许多机会,并将导致包含位置、运动、图像、文本注释甚至健康数据的个人敏感信息的庞大数据库。在现有的系统架构中,用户将他们的原始(未处理或过滤的)数据流直接上传到内容服务提供商,一旦他们“选择加入”,就几乎无法控制他们的数据。我们提出了个人数据库(pdv),这是一种个人保留其数据所有权的隐私架构。数据在与内容服务提供商共享之前通常会经过过滤,用户或数据托管服务可以参与制定受控的数据共享决策。引入PDV为用户提供了对数据的灵活和细粒度访问控制。为了减轻用户负担并提高可用性,我们探索了管理数据策略的三种机制:粒度ACL、跟踪审计和规则推荐。我们已经实现了一个概念验证PDV,并使用从两个个人参与式传感应用中收集的真实数据痕迹对其进行了评估。
{"title":"Personal data vaults: a locus of control for personal data streams","authors":"Min Y. Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, J. Burke, D. Estrin, Mark H. Hansen, R. Govindan","doi":"10.1145/1921168.1921191","DOIUrl":"https://doi.org/10.1145/1921168.1921191","url":null,"abstract":"The increasing ubiquity of the mobile phone is creating many opportunities for personal context sensing, and will result in massive databases of individuals' sensitive information incorporating locations, movements, images, text annotations, and even health data. In existing system architectures, users upload their raw (unprocessed or filtered) data streams directly to content-service providers and have little control over their data once they \"opt-in\". We present Personal Data Vaults (PDVs), a privacy architecture in which individuals retain ownership of their data. Data are routinely filtered before being shared with content-service providers, and users or data custodian services can participate in making controlled data-sharing decisions. Introducing a PDV gives users flexible and granular access control over data. To reduce the burden on users and improve usability, we explore three mechanisms for managing data policies: Granular ACL, Trace-audit and Rule Recommender. We have implemented a proof-of-concept PDV and evaluated it using real data traces collected from two personal participatory sensing applications.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85122975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 153
A cost comparison of datacenter network architectures 数据中心网络架构的成本比较
L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, I. Stoica
There is a growing body of research exploring new network architectures for the data center. These proposals all seek to improve the scalability and cost-effectiveness of current data center networks, but adopt very different approaches to doing so. For example, some proposals build networks entirely out of switches while others do so using a combination of switches and servers. How do these different network architectures compare? For that matter, by what metrics should we even begin to compare these architectures? Understanding the tradeoffs between different approaches is important both for operators making deployment decisions and to guide future research. In this paper, we take a first step toward understanding the tradeoffs between different data center network architectures. We use high-level models of different classes of data center networks and compare them on cost using both current and predicted trends in cost and power consumption.
为数据中心探索新的网络架构的研究越来越多。这些建议都寻求提高当前数据中心网络的可伸缩性和成本效益,但采用了非常不同的方法来实现这一目标。例如,一些建议完全使用交换机构建网络,而另一些建议则使用交换机和服务器的组合。这些不同的网络架构比较起来如何?就此而言,我们应该通过什么指标开始比较这些体系结构呢?了解不同方法之间的权衡对于作业者做出部署决策和指导未来的研究都很重要。在本文中,我们向理解不同数据中心网络体系结构之间的权衡迈出了第一步。我们使用不同类别的数据中心网络的高级模型,并使用当前和预测的成本和功耗趋势来比较它们的成本。
{"title":"A cost comparison of datacenter network architectures","authors":"L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, I. Stoica","doi":"10.1145/1921168.1921189","DOIUrl":"https://doi.org/10.1145/1921168.1921189","url":null,"abstract":"There is a growing body of research exploring new network architectures for the data center. These proposals all seek to improve the scalability and cost-effectiveness of current data center networks, but adopt very different approaches to doing so. For example, some proposals build networks entirely out of switches while others do so using a combination of switches and servers. How do these different network architectures compare? For that matter, by what metrics should we even begin to compare these architectures? Understanding the tradeoffs between different approaches is important both for operators making deployment decisions and to guide future research. In this paper, we take a first step toward understanding the tradeoffs between different data center network architectures. We use high-level models of different classes of data center networks and compare them on cost using both current and predicted trends in cost and power consumption.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"366 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84210936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh 互联网是扁平的:建模从传输层次到对等网络的转换
A. Dhamdhere, C. Dovrolis
Recent measurements and anecdotal evidence indicate that the Internet ecosystem is rapidly evolving from a multi-tier hierarchy built mostly with transit (customer-provider) links to a dense mesh formed with mostly peering links. This transition can have major impact on the global Internet economy as well as on the traffic flow and topological structure of the Internet. In this paper, we study this evolutionary transition with an agent-based network formation model that captures key aspects of the interdomain ecosystem, viz., interdomain traffic flow and routing, provider and peer selection strategies, geographical constraints, and the economics of transit and peering interconnections. The model predicts several substantial differences between the Hierarchical Internet and the Flat Internet in terms of topological structure, path lengths, interdomain traffic flow, and the profitability of transit providers. We also quantify the effect of the three factors driving this evolutionary transition. Finally, we examine a hypothetical scenario in which a large content provider produces more than half of the total Internet traffic.
最近的测量和轶事证据表明,互联网生态系统正在迅速从一个主要由传输(客户-提供商)链路构建的多层层次结构演变为一个主要由对等链路形成的密集网格。这种转变将对全球互联网经济以及互联网的流量和拓扑结构产生重大影响。在本文中,我们使用基于代理的网络形成模型来研究这种进化转变,该模型捕获了域间生态系统的关键方面,即域间流量和路由,提供商和对等体选择策略,地理约束以及过境和对等互连的经济性。该模型预测了分层互联网和扁平互联网在拓扑结构、路径长度、域间流量和运输提供商盈利能力方面的几个实质性差异。我们还量化了驱动这种进化转变的三个因素的影响。最后,我们研究了一个假设的场景,其中一个大型内容提供商产生了超过一半的总互联网流量。
{"title":"The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh","authors":"A. Dhamdhere, C. Dovrolis","doi":"10.1145/1921168.1921196","DOIUrl":"https://doi.org/10.1145/1921168.1921196","url":null,"abstract":"Recent measurements and anecdotal evidence indicate that the Internet ecosystem is rapidly evolving from a multi-tier hierarchy built mostly with transit (customer-provider) links to a dense mesh formed with mostly peering links. This transition can have major impact on the global Internet economy as well as on the traffic flow and topological structure of the Internet. In this paper, we study this evolutionary transition with an agent-based network formation model that captures key aspects of the interdomain ecosystem, viz., interdomain traffic flow and routing, provider and peer selection strategies, geographical constraints, and the economics of transit and peering interconnections. The model predicts several substantial differences between the Hierarchical Internet and the Flat Internet in terms of topological structure, path lengths, interdomain traffic flow, and the profitability of transit providers. We also quantify the effect of the three factors driving this evolutionary transition. Finally, we examine a hypothetical scenario in which a large content provider produces more than half of the total Internet traffic.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84318554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 190
Internet traffic classification demystified: on the sources of the discriminative power 互联网流量分类的揭秘:辨别力的来源
Yeon-sup Lim, Hyunchul Kim, Jiwoong Jeong, Chong-kwon Kim, T. Kwon, Yanghee Choi
Recent research on Internet traffic classification has yield a number of data mining techniques for distinguishing types of traffic, but no systematic analysis on "Why" some algorithms achieve high accuracies. In pursuit of empirically grounded answers to the "Why" question, which is critical in understanding and establishing a scientific ground for traffic classification research, this paper reveals the three sources of the discriminative power in classifying the Internet application traffic: (i) ports, (ii) the sizes of the first one-two (for UDP flows) or four-five (for TCP flows) packets, and (iii) discretization of those features. We find that C4.5 performs the best under any circumstances, as well as the reason why; because the algorithm discretizes input features during classification operations. We also find that the entropy-based Minimum Description Length discretization on ports and packet size features substantially improve the classification accuracy of every machine learning algorithm tested (by as much as 59.8%!) and make all of them achieve >93% accuracy on average without any algorithm-specific tuning processes. Our results indicate that dealing with the ports and packet size features as discrete nominal intervals, not as continuous numbers, is the essential basis for accurate traffic classification (i.e., the features should be discretized first), regardless of classification algorithms to use.
近年来对互联网流量分类的研究已经产生了许多用于区分流量类型的数据挖掘技术,但对于某些算法为什么能够达到较高的准确率却没有系统的分析。为了寻求“为什么”问题的实证答案,这对于理解和建立流量分类研究的科学基础至关重要,本文揭示了对互联网应用流量进行分类的判别能力的三个来源:(i)端口,(ii)前两个(UDP流)或四个(TCP流)数据包的大小,以及(iii)这些特征的离散化。我们发现C4.5在任何情况下都表现最好,以及原因;因为该算法在分类操作中离散化了输入特征。我们还发现,端口和数据包大小特征上基于熵的最小描述长度离散化大大提高了所测试的每种机器学习算法的分类准确率(高达59.8%!),并且在没有任何特定算法调优过程的情况下,使它们平均达到bb0 93%的准确率。我们的研究结果表明,无论使用哪种分类算法,将端口和数据包大小特征作为离散的标称间隔(而不是连续的数字)处理是准确流分类的必要基础(即首先应将特征离散化)。
{"title":"Internet traffic classification demystified: on the sources of the discriminative power","authors":"Yeon-sup Lim, Hyunchul Kim, Jiwoong Jeong, Chong-kwon Kim, T. Kwon, Yanghee Choi","doi":"10.1145/1921168.1921180","DOIUrl":"https://doi.org/10.1145/1921168.1921180","url":null,"abstract":"Recent research on Internet traffic classification has yield a number of data mining techniques for distinguishing types of traffic, but no systematic analysis on \"Why\" some algorithms achieve high accuracies. In pursuit of empirically grounded answers to the \"Why\" question, which is critical in understanding and establishing a scientific ground for traffic classification research, this paper reveals the three sources of the discriminative power in classifying the Internet application traffic: (i) ports, (ii) the sizes of the first one-two (for UDP flows) or four-five (for TCP flows) packets, and (iii) discretization of those features. We find that C4.5 performs the best under any circumstances, as well as the reason why; because the algorithm discretizes input features during classification operations. We also find that the entropy-based Minimum Description Length discretization on ports and packet size features substantially improve the classification accuracy of every machine learning algorithm tested (by as much as 59.8%!) and make all of them achieve >93% accuracy on average without any algorithm-specific tuning processes. Our results indicate that dealing with the ports and packet size features as discrete nominal intervals, not as continuous numbers, is the essential basis for accurate traffic classification (i.e., the features should be discretized first), regardless of classification algorithms to use.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76021333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
Inferring invisible traffic 推断不可见流量
V. Bharti, P. Kankar, L. Setia, Gonca Gürsun, Anukool Lakhina, M. Crovella
A traffic matrix encompassing the entire Internet would be very valuable. Unfortunately, from any given vantage point in the network, most traffic is invisible. In this paper we describe results that hold some promise for this problem. First, we show a new characterization result: traffic matrices (TMs) typically show very low effective rank. This result refers to TMs that are purely spatial (have no temporal component), over a wide range of spatial granularities. Next, we define an inference problem whose solution allows one to infer invisible TM elements. This problem relies crucially on an atomicity property we define. Finally, we show example solutions of this inference problem via two different methods: regularized regression and matrix completion. The example consists of an AS inferring the amount of invisible traffic passing between other pairs of ASes. Using this example we illustrate the accuracy of the methods as a function of spatial granularity.
一个包含整个互联网的流量矩阵将是非常有价值的。不幸的是,从网络中任何给定的有利位置来看,大多数流量都是不可见的。在本文中,我们描述了一些对这个问题有希望的结果。首先,我们展示了一个新的表征结果:流量矩阵(TMs)通常显示非常低的有效秩。这个结果是指在很大的空间粒度范围内,纯空间(没有时间成分)的tm。接下来,我们定义一个推理问题,其解决方案允许推断不可见的TM元素。这个问题主要依赖于我们定义的原子性。最后,我们通过正则化回归和矩阵补全两种不同的方法给出了该推理问题的示例解。该示例包括一个AS推断在其他AS对之间传递的不可见流量的数量。通过这个例子,我们说明了这些方法作为空间粒度函数的准确性。
{"title":"Inferring invisible traffic","authors":"V. Bharti, P. Kankar, L. Setia, Gonca Gürsun, Anukool Lakhina, M. Crovella","doi":"10.1145/1921168.1921197","DOIUrl":"https://doi.org/10.1145/1921168.1921197","url":null,"abstract":"A traffic matrix encompassing the entire Internet would be very valuable. Unfortunately, from any given vantage point in the network, most traffic is invisible. In this paper we describe results that hold some promise for this problem. First, we show a new characterization result: traffic matrices (TMs) typically show very low effective rank. This result refers to TMs that are purely spatial (have no temporal component), over a wide range of spatial granularities. Next, we define an inference problem whose solution allows one to infer invisible TM elements. This problem relies crucially on an atomicity property we define. Finally, we show example solutions of this inference problem via two different methods: regularized regression and matrix completion. The example consists of an AS inferring the amount of invisible traffic passing between other pairs of ASes. Using this example we illustrate the accuracy of the methods as a function of spatial granularity.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78545673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Scalable routing on flat names 基于平面名称的可扩展路由
Ankit Singla, Brighten Godfrey, K. Fall, G. Iannaccone, S. Ratnasamy
We introduce a protocol which routes on flat, location-independent identifiers with guaranteed scalability and low stretch. Our design builds on theoretical advances in the area of compact routing, and is the first to realize these guarantees in a dynamic distributed setting.
我们介绍了一种基于平面的、与位置无关的标识符的路由协议,它保证了可扩展性和低扩展性。我们的设计基于紧凑路由领域的理论进步,并且是第一个在动态分布式设置中实现这些保证的设计。
{"title":"Scalable routing on flat names","authors":"Ankit Singla, Brighten Godfrey, K. Fall, G. Iannaccone, S. Ratnasamy","doi":"10.1145/1921168.1921195","DOIUrl":"https://doi.org/10.1145/1921168.1921195","url":null,"abstract":"We introduce a protocol which routes on flat, location-independent identifiers with guaranteed scalability and low stretch. Our design builds on theoretical advances in the area of compact routing, and is the first to realize these guarantees in a dynamic distributed setting.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80148004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Spatio-temporal patterns in network events 网络事件的时空模式
Ting Wang, M. Srivatsa, D. Agrawal, Ling Liu
Operational networks typically generate massive monitoring data that consist of local (in both space and time) observations of the status of the networks. It is often hypothesized that such data exhibit both spatial and temporal correlation based on the underlying network topology and time of occurrence; identifying such correlation patterns offers valuable insights into global network phenomena (e.g., fault cascading in communication networks). In this paper we introduce a new class of models suitable for learning, indexing, and identifying spatio-temporal patterns in network monitoring data. We exemplify our techniques with the application of fault diagnosis in enterprise networks. We show how it can help network management systems (NMSes) to effciently detect and localize potential faults (e.g., failure of routing protocols or network equipments) by analyzing massive operational event streams (e.g., alerts, alarms, and metrics). We provide results from extensive experimental studies over real network event and topology datasets to explore the effcacy of our solution.
运行网络通常产生大量监测数据,这些数据包括对网络状态的本地(在空间和时间上)观察。通常假设这些数据显示基于底层网络拓扑结构和发生时间的空间和时间相关性;识别这种相关模式提供了对全球网络现象(例如,通信网络中的故障级联)有价值的见解。本文介绍了一类新的模型,适用于网络监测数据中的时空模式的学习、索引和识别。最后以故障诊断在企业网络中的应用为例。我们展示了它如何通过分析大量操作事件流(例如,警报、警报和度量)来帮助网络管理系统(nms)有效地检测和定位潜在故障(例如,路由协议或网络设备的故障)。我们提供了在真实网络事件和拓扑数据集上进行的大量实验研究的结果,以探索我们的解决方案的有效性。
{"title":"Spatio-temporal patterns in network events","authors":"Ting Wang, M. Srivatsa, D. Agrawal, Ling Liu","doi":"10.1145/1921168.1921172","DOIUrl":"https://doi.org/10.1145/1921168.1921172","url":null,"abstract":"Operational networks typically generate massive monitoring data that consist of local (in both space and time) observations of the status of the networks. It is often hypothesized that such data exhibit both spatial and temporal correlation based on the underlying network topology and time of occurrence; identifying such correlation patterns offers valuable insights into global network phenomena (e.g., fault cascading in communication networks). In this paper we introduce a new class of models suitable for learning, indexing, and identifying spatio-temporal patterns in network monitoring data. We exemplify our techniques with the application of fault diagnosis in enterprise networks. We show how it can help network management systems (NMSes) to effciently detect and localize potential faults (e.g., failure of routing protocols or network equipments) by analyzing massive operational event streams (e.g., alerts, alarms, and metrics). We provide results from extensive experimental studies over real network event and topology datasets to explore the effcacy of our solution.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77823279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Enabling high-bandwidth vehicular content distribution 实现高带宽车载内容分发
Upendra Shevade, Yi-Chao Chen, L. Qiu, Yin Zhang, V. Chandar, M. Han, H. Song, Yousuk Seung
We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby access points (APs) to download the content of interest. To fully take advantage of such transient contact with APs, we proactively push content to the APs that the vehicles will likely visit in the near future. In this way, vehicles can enjoy the full wireless capacity instead of being bottle-necked by the Internet connectivity, which is either slow or even unavailable. We develop a new algorithm for predicting the APs that will soon be visited by the vehicles. We then develop a replication scheme that leverages the synergy among (i) Internet connectivity (which is persistent but has limited coverage and low bandwidth), (ii) local wireless connectivity (which has high bandwidth but transient duration), (iii) vehicular relay connectivity (which has high bandwidth but high delay), and (iv) mesh connectivity among APs (which has high bandwidth but low coverage). We demonstrate the effectiveness of VCD system using trace-driven simulation and Emulab emulation based on real taxi traces. We further deploy VCD in two vehicular networks: one using 802.11b and the other using 802.11n, to demonstrate its effectiveness.
我们提出了VCD,一种在车载网络中实现高带宽内容分发的新系统。在VCD中,车辆可以随时与附近的接入点(ap)通信以下载感兴趣的内容。为了充分利用这种与ap的短暂接触,我们主动向车辆在不久的将来可能访问的ap推送内容。通过这种方式,车辆可以享受到充分的无线容量,而不是被互联网连接的瓶颈所束缚,要么很慢,要么甚至不可用。我们开发了一种新的算法来预测车辆即将访问的ap。然后,我们开发了一种复制方案,利用(i)互联网连接(持久但覆盖范围有限,带宽低),(ii)本地无线连接(具有高带宽但瞬变持续时间),(iii)车载中继连接(具有高带宽但高延迟)以及(iv) ap之间的网状连接(具有高带宽但覆盖范围低)之间的协同作用。我们使用轨迹驱动仿真和基于真实出租车轨迹的Emulab仿真来验证VCD系统的有效性。我们进一步在两个车载网络中部署VCD:一个使用802.11b,另一个使用802.11n,以证明其有效性。
{"title":"Enabling high-bandwidth vehicular content distribution","authors":"Upendra Shevade, Yi-Chao Chen, L. Qiu, Yin Zhang, V. Chandar, M. Han, H. Song, Yousuk Seung","doi":"10.1145/1921168.1921199","DOIUrl":"https://doi.org/10.1145/1921168.1921199","url":null,"abstract":"We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby access points (APs) to download the content of interest. To fully take advantage of such transient contact with APs, we proactively push content to the APs that the vehicles will likely visit in the near future. In this way, vehicles can enjoy the full wireless capacity instead of being bottle-necked by the Internet connectivity, which is either slow or even unavailable. We develop a new algorithm for predicting the APs that will soon be visited by the vehicles. We then develop a replication scheme that leverages the synergy among (i) Internet connectivity (which is persistent but has limited coverage and low bandwidth), (ii) local wireless connectivity (which has high bandwidth but transient duration), (iii) vehicular relay connectivity (which has high bandwidth but high delay), and (iv) mesh connectivity among APs (which has high bandwidth but low coverage). We demonstrate the effectiveness of VCD system using trace-driven simulation and Emulab emulation based on real taxi traces. We further deploy VCD in two vehicular networks: one using 802.11b and the other using 802.11n, to demonstrate its effectiveness.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90120054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
Proceedings of The 6th International Conference on Innovation in Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1