首页 > 最新文献

2021 IEEE 29th International Conference on Network Protocols (ICNP)最新文献

英文 中文
Poster: Enabling Fast Forwarding in Hybrid Software-Defined Networks 海报:在混合软件定义网络中启用快速转发
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651943
Yijun Sun, Zehua Guo, Songshi Dou, Junjie Zhang, Changlin Li, Xiang Ouyang
Emerging Software-Defined Networking (SDN) technique brings new opportunities to improve network performance. Some SDN-enabled programmable switches are deployed in legacy networks, and thus legacy and programmable switches could coexist, generating hybrid SDNs. In this paper, we study the node upgrade for layer-2 hybrid SDN and propose Shortcutter to accelerate the transmission. Preliminary results show that the proposed Shortcutter can reduce the forwarding path’s length 7% on average, compared with baseline solutions.
新兴的软件定义网络(SDN)技术为提高网络性能带来了新的机遇。一些支持sdn的可编程交换机部署在传统网络中,因此传统交换机和可编程交换机可以共存,从而生成混合sdn。本文对二层混合SDN的节点升级进行了研究,并提出了加快传输速度的捷径。初步结果表明,与基线方案相比,所提出的捷径方案平均可使转发路径长度减少7%。
{"title":"Poster: Enabling Fast Forwarding in Hybrid Software-Defined Networks","authors":"Yijun Sun, Zehua Guo, Songshi Dou, Junjie Zhang, Changlin Li, Xiang Ouyang","doi":"10.1109/ICNP52444.2021.9651943","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651943","url":null,"abstract":"Emerging Software-Defined Networking (SDN) technique brings new opportunities to improve network performance. Some SDN-enabled programmable switches are deployed in legacy networks, and thus legacy and programmable switches could coexist, generating hybrid SDNs. In this paper, we study the node upgrade for layer-2 hybrid SDN and propose Shortcutter to accelerate the transmission. Preliminary results show that the proposed Shortcutter can reduce the forwarding path’s length 7% on average, compared with baseline solutions.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: Data Collection for ML Classification of Encrypted Messaging Applications 海报:加密消息应用的ML分类数据收集
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651948
Jason Hussey, Ethan Taylor, Kerri Stone, T. Camp
Network traffic classification is used to identify the nature of traffic on a network. Entities capable of monitoring net-work traffic use classification for all manner of reasons, including identification of mobile applications being used on the network. It is possible that the usage of encrypted messaging applications by users on these networks can be detected, betraying elements of their privacy.In this paper, we describe a system that leverages campus network resources to generate real-world data alongside a more curated dataset captured from Android application traffic. We also explore the ability of machine learning (ML) models to accurately classify traffic from these encrypted messaging applications. Understanding what is revealed from network data is important given that the use of these applications is meant to maximize privacy in the first place.
网络流分类用于识别网络中流量的性质。能够监控网络流量的实体出于各种原因使用分类,包括识别网络上使用的移动应用程序。用户在这些网络上使用的加密消息传递应用程序有可能被检测到,从而泄露了他们的隐私。在本文中,我们描述了一个利用校园网资源生成真实世界数据的系统,以及从Android应用程序流量中捕获的更精心策划的数据集。我们还探索了机器学习(ML)模型准确分类来自这些加密消息传递应用程序的流量的能力。考虑到使用这些应用程序首先是为了最大限度地保护隐私,了解从网络数据中泄露的内容非常重要。
{"title":"Poster: Data Collection for ML Classification of Encrypted Messaging Applications","authors":"Jason Hussey, Ethan Taylor, Kerri Stone, T. Camp","doi":"10.1109/ICNP52444.2021.9651948","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651948","url":null,"abstract":"Network traffic classification is used to identify the nature of traffic on a network. Entities capable of monitoring net-work traffic use classification for all manner of reasons, including identification of mobile applications being used on the network. It is possible that the usage of encrypted messaging applications by users on these networks can be detected, betraying elements of their privacy.In this paper, we describe a system that leverages campus network resources to generate real-world data alongside a more curated dataset captured from Android application traffic. We also explore the ability of machine learning (ML) models to accurately classify traffic from these encrypted messaging applications. Understanding what is revealed from network data is important given that the use of these applications is meant to maximize privacy in the first place.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISRaft Consensus Algorithm for Autonomous Units 自治单元的ISRaft一致性算法
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651979
Linir Zamir, Aman Shaan, Mehrdad Nojoumian
Consensus protocols are a key feature in decentral-ized systems where multiple unreliable nodes operate, e.g., in Blockchain technologies with many worldwide applications such as supply chain management, cryptocurrencies and information sharing. ISRaft is a consensus protocol built upon Raft, a previously developed protocol that is used for replicated state machines when a group of nodes is required to achieve a consensus related to the state of the machine. This paper therefore proposes an alternative version of the ISRaft consensus protocol to allow communication among nodes in a secured fashion while maintaining the security features of the original ISRaft algorithm even in the presence of adversarial nodes. The proposed model utilizes a trust parameter to enforce cooperation, i.e., a trust value is assigned to each node to prevent malicious activities over time. This is a practical solution for autonomous units with resource-constrained devices where a regular encrypted communication method can negatively affect the system performance.
共识协议是多个不可靠节点运行的去中心化系统的一个关键特征,例如,在区块链技术中,供应链管理、加密货币和信息共享等许多全球应用。ISRaft是建立在Raft基础上的共识协议,Raft是一种以前开发的协议,用于复制状态机,当需要一组节点达成与机器状态相关的共识时。因此,本文提出了ISRaft共识协议的替代版本,允许节点之间以安全的方式进行通信,同时即使在存在对抗节点的情况下也保持原始ISRaft算法的安全特性。该模型利用信任参数来强制合作,即为每个节点分配信任值,以防止恶意活动。对于具有资源受限设备的自治单元,这是一种实用的解决方案,其中常规加密通信方法可能会对系统性能产生负面影响。
{"title":"ISRaft Consensus Algorithm for Autonomous Units","authors":"Linir Zamir, Aman Shaan, Mehrdad Nojoumian","doi":"10.1109/ICNP52444.2021.9651979","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651979","url":null,"abstract":"Consensus protocols are a key feature in decentral-ized systems where multiple unreliable nodes operate, e.g., in Blockchain technologies with many worldwide applications such as supply chain management, cryptocurrencies and information sharing. ISRaft is a consensus protocol built upon Raft, a previously developed protocol that is used for replicated state machines when a group of nodes is required to achieve a consensus related to the state of the machine. This paper therefore proposes an alternative version of the ISRaft consensus protocol to allow communication among nodes in a secured fashion while maintaining the security features of the original ISRaft algorithm even in the presence of adversarial nodes. The proposed model utilizes a trust parameter to enforce cooperation, i.e., a trust value is assigned to each node to prevent malicious activities over time. This is a practical solution for autonomous units with resource-constrained devices where a regular encrypted communication method can negatively affect the system performance.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133589163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
STIP: A new model of trusted network 一种新的可信网络模型
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651913
Sara Bitan, Adi Molkho
We present STIP, a new model for Scalable Trusted IP networks, that are secure and resilient to cyber-attacks without impairing reliability. STIP addresses managed network use-cases including enterprise network authentication and authorization, and ISP use-cases, including trust based routing, and application aware networking. It can provide an enabling infrastructure that improves resilience to the painful BGP hijacking and distributed denial of service attacks.At the data plane, STIP consists of a trusted forwarding engine, that uses authenticated trust extensions to process traffic reliably. At the control and management plane STIP divides the network into trust domains that evaluate trustworthiness of devices in the domain, and distribute it securely using transitive trust. Our vision is Internet-wide STIP deployment . We present a migration process based on trust domains that can be used to gradually upgrade current IP networks to STIP.
我们提出了一种可扩展可信IP网络的新模型STIP,它既安全又能抵御网络攻击,又不损害可靠性。STIP用于管理网络用例,包括企业网络认证和授权,以及ISP用例,包括基于信任的路由和应用感知组网。它可以提供一个支持基础设施,提高对痛苦的BGP劫持和分布式拒绝服务攻击的弹性。在数据平面,STIP由一个可信转发引擎组成,该引擎使用经过认证的信任扩展来可靠地处理流量。在控制和管理平面,STIP将网络划分为信任域,评估域中设备的可信度,并使用可传递信任进行安全分发。我们的愿景是在互联网范围内部署STIP。我们提出了一个基于信任域的迁移过程,可用于逐步将当前IP网络升级到STIP。
{"title":"STIP: A new model of trusted network","authors":"Sara Bitan, Adi Molkho","doi":"10.1109/ICNP52444.2021.9651913","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651913","url":null,"abstract":"We present STIP, a new model for Scalable Trusted IP networks, that are secure and resilient to cyber-attacks without impairing reliability. STIP addresses managed network use-cases including enterprise network authentication and authorization, and ISP use-cases, including trust based routing, and application aware networking. It can provide an enabling infrastructure that improves resilience to the painful BGP hijacking and distributed denial of service attacks.At the data plane, STIP consists of a trusted forwarding engine, that uses authenticated trust extensions to process traffic reliably. At the control and management plane STIP divides the network into trust domains that evaluate trustworthiness of devices in the domain, and distribute it securely using transitive trust. Our vision is Internet-wide STIP deployment . We present a migration process based on trust domains that can be used to gradually upgrade current IP networks to STIP.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poster: Reverse-Path Congestion Notification: Accelerating the Congestion Control Feedback Loop 海报:反向路径拥塞通知:加速拥塞控制反馈循环
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651961
Ralf Kundel, Nehal Baganal Krishna, Christoph Gärtner, Tobias Meuser, Amr Rizk
Congestion control mechanisms in computer networks rely mainly on a feedback loop having a reaction time equal to the flow RTT. Reducing this feedback time helps the sender to react faster to changing network conditions such as congestion. In this work, we propose reverse-path congestion notification on top of programmable networking switches. Our approach can significantly lower the reaction time, such that the congestion control implementation can adapt much faster to changing network conditions. The proposed approach aims to work with current TCP implementations with no required changes to the communication endpoints. Last, we show how the presented approach could be realized by utilizing off-the-shelf programmable switches.
计算机网络中的拥塞控制机制主要依赖于一个反应时间等于流RTT的反馈回路。减少这种反馈时间有助于发送方更快地响应不断变化的网络条件,如拥塞。在这项工作中,我们提出了在可编程网络交换机上的反向路径拥塞通知。我们的方法可以显著降低反应时间,这样拥塞控制实现可以更快地适应不断变化的网络条件。提出的方法旨在与当前的TCP实现一起工作,而不需要对通信端点进行更改。最后,我们展示了如何利用现成的可编程开关来实现所提出的方法。
{"title":"Poster: Reverse-Path Congestion Notification: Accelerating the Congestion Control Feedback Loop","authors":"Ralf Kundel, Nehal Baganal Krishna, Christoph Gärtner, Tobias Meuser, Amr Rizk","doi":"10.1109/ICNP52444.2021.9651961","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651961","url":null,"abstract":"Congestion control mechanisms in computer networks rely mainly on a feedback loop having a reaction time equal to the flow RTT. Reducing this feedback time helps the sender to react faster to changing network conditions such as congestion. In this work, we propose reverse-path congestion notification on top of programmable networking switches. Our approach can significantly lower the reaction time, such that the congestion control implementation can adapt much faster to changing network conditions. The proposed approach aims to work with current TCP implementations with no required changes to the communication endpoints. Last, we show how the presented approach could be realized by utilizing off-the-shelf programmable switches.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poster: Connected Vehicles using Short-range (Wi-Fi & IEEE 802.11p) and Long-range Cellular Networks (LTE & 5G) 海报:使用短距离(Wi-Fi和IEEE 802.11p)和远程蜂窝网络(LTE和5G)的联网汽车
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651959
Muhammad Naeem Tahir, M. Katz, Zunera Javed
In recent years, the vehicular ad hoc networking (VANET) concept has supported the development of emerging safety related applications for vehicles based on cooperative awareness between vehicles. This cooperative awareness can be achieved by exploiting wireless sensors and technologies to transmit periodic messages to neighboring vehicles. These messages normally contain information regarding vehicles, such as position, speed, distance between vehicles, etc. For the transfer of safety messages, Wi-Fi and the suit of IEEE 802.11p/WAVE protocols were commonly used initially but now cellular-based LTE and 5G are the emerging technologies for VANETs. In this paper, a comparison is performed considering the European ITS-G5 standard, Wi-Fi, LTE and 5G by exchanging safety messages in VANETs. We have exchanged real-time road weather and traffic observation data to evaluate the performance of the aforementioned wireless technologies in terms of successful message delivery probability. Our results reveal that due to weak communication links and the lack of line of sight (LOS) communication for Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) scenarios, Wi-Fi and 802.11p are outperformed by LTE and 5G networks.
近年来,车辆自组织网络(VANET)概念支持了基于车辆间协作感知的新兴车辆安全相关应用的发展。这种协同感知可以通过利用无线传感器和技术向相邻车辆发送周期性信息来实现。这些信息通常包含有关车辆的信息,如位置、速度、车辆之间的距离等。对于安全信息的传输,最初通常使用Wi-Fi和IEEE 802.11p/WAVE协议,但现在基于蜂窝的LTE和5G是vanet的新兴技术。本文通过在VANETs中交换安全信息,对欧洲ITS-G5标准、Wi-Fi、LTE和5G进行了比较。我们交换了实时道路天气和交通观测数据,以评估上述无线技术在成功传递信息概率方面的表现。我们的研究结果显示,由于通信链路薄弱和缺乏车辆对基础设施(V2I)和车辆对车辆(V2V)场景的视线(LOS)通信,Wi-Fi和802.11p的性能优于LTE和5G网络。
{"title":"Poster: Connected Vehicles using Short-range (Wi-Fi & IEEE 802.11p) and Long-range Cellular Networks (LTE & 5G)","authors":"Muhammad Naeem Tahir, M. Katz, Zunera Javed","doi":"10.1109/ICNP52444.2021.9651959","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651959","url":null,"abstract":"In recent years, the vehicular ad hoc networking (VANET) concept has supported the development of emerging safety related applications for vehicles based on cooperative awareness between vehicles. This cooperative awareness can be achieved by exploiting wireless sensors and technologies to transmit periodic messages to neighboring vehicles. These messages normally contain information regarding vehicles, such as position, speed, distance between vehicles, etc. For the transfer of safety messages, Wi-Fi and the suit of IEEE 802.11p/WAVE protocols were commonly used initially but now cellular-based LTE and 5G are the emerging technologies for VANETs. In this paper, a comparison is performed considering the European ITS-G5 standard, Wi-Fi, LTE and 5G by exchanging safety messages in VANETs. We have exchanged real-time road weather and traffic observation data to evaluate the performance of the aforementioned wireless technologies in terms of successful message delivery probability. Our results reveal that due to weak communication links and the lack of line of sight (LOS) communication for Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) scenarios, Wi-Fi and 802.11p are outperformed by LTE and 5G networks.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Network Attacks using Federated Learning for IoT Devices 使用物联网设备的联邦学习检测网络攻击
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651915
Osama Shahid, Viraaji Mothukuri, Seyedamin Pouriyeh, R. Parizi, H. Shahriar
Billions of IoT devices are connected to networks all around us, enabling cyber-physical systems. These devices can carry and generate user-sensitive data, examples of such devices are smartwatches, medical equipment, and smart home gadgets. Individual IoT devices have some form of intrusion detection system integrated, but once they are all connected, a network threat to one device could mean a threat to many. IoT devices must have a robust intrusion detection system that would keep devices secure over a network. To aid with this, we provide a machine learning solution that adheres to Global Data Protection Regulation by keeping the user data secure locally on the IoT device itself. We propose a Federated Learning (FL) approach that capitalizes on a decentralized and collaborative way of training machine learning models. In this study, we practice federated learning technique to train and create a robust intrusion detection model for the security of IoT devices. We evaluate our proposed approach using three different use-cases to show the security enhancements that improve using the FL technique, resulting in a more reliable performance in this domain.
数十亿物联网设备连接到我们周围的网络,使网络物理系统成为可能。这些设备可以携带和生成用户敏感数据,例如智能手表、医疗设备和智能家居设备。单个物联网设备集成了某种形式的入侵检测系统,但一旦它们全部连接起来,对一个设备的网络威胁可能意味着对许多设备的威胁。物联网设备必须具有强大的入侵检测系统,以确保设备在网络上的安全。为了帮助解决这一问题,我们提供了一种机器学习解决方案,该解决方案通过在物联网设备本身上保持本地用户数据的安全来遵守全球数据保护条例。我们提出了一种联邦学习(FL)方法,该方法利用分散和协作的方式来训练机器学习模型。在这项研究中,我们实践联邦学习技术来训练和创建一个健壮的入侵检测模型,用于物联网设备的安全。我们使用三个不同的用例来评估我们提出的方法,以展示使用FL技术改进的安全性增强,从而在该领域获得更可靠的性能。
{"title":"Detecting Network Attacks using Federated Learning for IoT Devices","authors":"Osama Shahid, Viraaji Mothukuri, Seyedamin Pouriyeh, R. Parizi, H. Shahriar","doi":"10.1109/ICNP52444.2021.9651915","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651915","url":null,"abstract":"Billions of IoT devices are connected to networks all around us, enabling cyber-physical systems. These devices can carry and generate user-sensitive data, examples of such devices are smartwatches, medical equipment, and smart home gadgets. Individual IoT devices have some form of intrusion detection system integrated, but once they are all connected, a network threat to one device could mean a threat to many. IoT devices must have a robust intrusion detection system that would keep devices secure over a network. To aid with this, we provide a machine learning solution that adheres to Global Data Protection Regulation by keeping the user data secure locally on the IoT device itself. We propose a Federated Learning (FL) approach that capitalizes on a decentralized and collaborative way of training machine learning models. In this study, we practice federated learning technique to train and create a robust intrusion detection model for the security of IoT devices. We evaluate our proposed approach using three different use-cases to show the security enhancements that improve using the FL technique, resulting in a more reliable performance in this domain.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
pMACH: Power and Migration Aware Container scHeduling pMACH:电源和迁移感知容器调度
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651911
Sourav Panda, K. Ramakrishnan, L. Bhuyan
Data center workload fluctuations need periodic, but careful scheduling to minimize power consumption while meeting the task completion time requirements. Existing data center scheduling systems tightly pack containers to save power. However, with the growth of multi-tiered applications, there is a significant need to account for the affinity between application components, to minimize communication overheads and latency. Centralized container scheduling systems using graph partitioning algorithms cause a significant number of task migrations, with associated downtime.We design pMACH, a novel distributed container scheduling scheme for optimizing both power and task completion time in data centers. It minimizes task migrations and packs frequently communicating containers together without overloading servers. pMACH operates at peak energy efficiency, thus reducing energy consumption while also providing greater headroom for unpredictable workload spikes. We also propose in-network monitoring using smartNICs (sNIC) to measure the communications and then perform scheduling in a hierarchical, parallelized framework to achieve high performance and scalability. pMACH is based on incremental partitioning and it leverages the previous scheduling decision to significantly reduce the number of containers moved between servers, avoiding application downtime.Both testbed measurements and large-scale trace-driven simulations show that pMACH saves at least 13.44% more power compared to previous scheduling systems. It speeds task completion, reducing the 95th percentile by a factor of 1.76-2.11 compared to existing container scheduling schemes. Compared to other static graph-based approaches, our incremental partitioning technique reduces migrations per epoch by 82%.
数据中心工作负载的波动需要周期性地、谨慎地进行调度,以便在满足任务完成时间要求的同时,最大限度地减少功耗。现有的数据中心调度系统紧密打包容器以节省电力。然而,随着多层应用程序的增长,非常需要考虑应用程序组件之间的关联,以最小化通信开销和延迟。使用图分区算法的集中式容器调度系统会导致大量的任务迁移,并伴有相关的停机时间。我们设计了一种新的分布式容器调度方案pMACH,用于优化数据中心的功耗和任务完成时间。它最大限度地减少了任务迁移,并将频繁通信的容器打包在一起,而不会使服务器过载。pMACH以最高的能源效率运行,从而降低了能源消耗,同时还为不可预测的工作负载峰值提供了更大的空间。我们还建议使用智能网卡(sNIC)进行网络监控,以测量通信,然后在分层并行框架中执行调度,以实现高性能和可扩展性。pMACH基于增量分区,它利用以前的调度决策来显著减少在服务器之间移动的容器数量,从而避免应用程序停机。试验台测量和大规模跟踪驱动仿真都表明,与以前的调度系统相比,pMACH至少节省13.44%的功率。它加快了任务的完成,与现有的集装箱调度方案相比,将第95个百分位数减少了1.76-2.11。与其他基于静态图的方法相比,我们的增量分区技术将每个epoch的迁移减少了82%。
{"title":"pMACH: Power and Migration Aware Container scHeduling","authors":"Sourav Panda, K. Ramakrishnan, L. Bhuyan","doi":"10.1109/ICNP52444.2021.9651911","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651911","url":null,"abstract":"Data center workload fluctuations need periodic, but careful scheduling to minimize power consumption while meeting the task completion time requirements. Existing data center scheduling systems tightly pack containers to save power. However, with the growth of multi-tiered applications, there is a significant need to account for the affinity between application components, to minimize communication overheads and latency. Centralized container scheduling systems using graph partitioning algorithms cause a significant number of task migrations, with associated downtime.We design pMACH, a novel distributed container scheduling scheme for optimizing both power and task completion time in data centers. It minimizes task migrations and packs frequently communicating containers together without overloading servers. pMACH operates at peak energy efficiency, thus reducing energy consumption while also providing greater headroom for unpredictable workload spikes. We also propose in-network monitoring using smartNICs (sNIC) to measure the communications and then perform scheduling in a hierarchical, parallelized framework to achieve high performance and scalability. pMACH is based on incremental partitioning and it leverages the previous scheduling decision to significantly reduce the number of containers moved between servers, avoiding application downtime.Both testbed measurements and large-scale trace-driven simulations show that pMACH saves at least 13.44% more power compared to previous scheduling systems. It speeds task completion, reducing the 95th percentile by a factor of 1.76-2.11 compared to existing container scheduling schemes. Compared to other static graph-based approaches, our incremental partitioning technique reduces migrations per epoch by 82%.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Copyright notice] (版权)
Pub Date : 2021-11-01 DOI: 10.1109/icnp52444.2021.9651947
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icnp52444.2021.9651947","DOIUrl":"https://doi.org/10.1109/icnp52444.2021.9651947","url":null,"abstract":"","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124358063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learned FIB: Fast IP Forwarding without Longest Prefix Matching Learned FIB:不进行最长前缀匹配的快速IP转发
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651956
Shunsuke Higuchi, Y. Koizumi, Junji Takemasa, A. Tagami, T. Hasegawa
This paper proposes an IP forwarding information base (FIB) encoding leveraging an emerging data structure called a learned index , which uses machine learning to associate key-position pairs in a key-value store. A learned index for FIB lookups is expected to yield a more compact representation and faster lookups compared to existing FIBs based on tries or hash tables, at the cost of efficient FIB updates, which is difficult to support with a learned index. We optimize our implementation for lookup speed, exploiting that for efficient FIB lookups it is enough to approximate the key-position pairs with a piece-wise linear function, instead of having to learn the key-position pairs. The experiments using real BGP routing information snapshots suggest that the size of the proposed FIB is compact and lookup speed is sufficiently fast regardless of the length of matched prefixes.
本文提出了一种IP转发信息库(FIB)编码,利用一种新兴的数据结构称为学习索引,它使用机器学习来关联键值存储中的键位置对。与基于尝试或哈希表的现有FIB相比,用于FIB查找的学习索引预计会产生更紧凑的表示和更快的查找,但代价是FIB更新效率低,而学习索引很难支持这一点。我们优化了查找速度的实现,利用有效的FIB查找,用分段线性函数近似键位置对就足够了,而不必学习键位置对。使用真实BGP路由信息快照的实验表明,无论匹配前缀的长度如何,所提出的FIB都具有紧凑的大小和足够快的查找速度。
{"title":"Learned FIB: Fast IP Forwarding without Longest Prefix Matching","authors":"Shunsuke Higuchi, Y. Koizumi, Junji Takemasa, A. Tagami, T. Hasegawa","doi":"10.1109/ICNP52444.2021.9651956","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651956","url":null,"abstract":"This paper proposes an IP forwarding information base (FIB) encoding leveraging an emerging data structure called a learned index , which uses machine learning to associate key-position pairs in a key-value store. A learned index for FIB lookups is expected to yield a more compact representation and faster lookups compared to existing FIBs based on tries or hash tables, at the cost of efficient FIB updates, which is difficult to support with a learned index. We optimize our implementation for lookup speed, exploiting that for efficient FIB lookups it is enough to approximate the key-position pairs with a piece-wise linear function, instead of having to learn the key-position pairs. The experiments using real BGP routing information snapshots suggest that the size of the proposed FIB is compact and lookup speed is sufficiently fast regardless of the length of matched prefixes.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 29th International Conference on Network Protocols (ICNP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1