首页 > 最新文献

Hotnets-IX最新文献

英文 中文
Using strongly typed networking to architect for tussle 使用强类型网络来构建争斗
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868456
C. Muthukrishnan, V. Paxson, M. Allman, Aditya Akella
Today's networks discriminate towards or against traffic for a wide range of reasons, and in response end users and their applications increasingly attempt to evade monitoring and control, resulting in an ongoing tussle whose roots run deep. In this work we explore an architectural paradigm that can accommodate such tussles in a systematic and transparent fashion. The key idea at the core of our design is strongly typed networking: the notion that application messages contain type information that fully describes the content being transferred. Our framework allows for transparency between parties which then leads to dialog and choice for both users and service providers. While in the early stages, we provide a possible framework for directly addressing the tussle between end users and "the network" without resorting to an ever-increasing degree of obfuscation and inference.
今天的网络由于各种各样的原因对流量进行歧视或排斥,作为回应,终端用户及其应用程序越来越多地试图逃避监控和控制,从而导致了根深蒂固的持续争斗。在这项工作中,我们探索了一种建筑范式,可以以系统和透明的方式容纳这种争论。我们设计的核心关键思想是强类型网络:应用程序消息包含完整描述传输内容的类型信息的概念。我们的框架允许各方之间的透明度,从而为用户和服务提供商带来对话和选择。在早期阶段,我们提供了一个可能的框架来直接解决最终用户和“网络”之间的纠纷,而不需要诉诸于不断增加的混淆和推理程度。
{"title":"Using strongly typed networking to architect for tussle","authors":"C. Muthukrishnan, V. Paxson, M. Allman, Aditya Akella","doi":"10.1145/1868447.1868456","DOIUrl":"https://doi.org/10.1145/1868447.1868456","url":null,"abstract":"Today's networks discriminate towards or against traffic for a wide range of reasons, and in response end users and their applications increasingly attempt to evade monitoring and control, resulting in an ongoing tussle whose roots run deep. In this work we explore an architectural paradigm that can accommodate such tussles in a systematic and transparent fashion. The key idea at the core of our design is strongly typed networking: the notion that application messages contain type information that fully describes the content being transferred. Our framework allows for transparency between parties which then leads to dialog and choice for both users and service providers. While in the early stages, we provide a possible framework for directly addressing the tussle between end users and \"the network\" without resorting to an ever-increasing degree of obfuscation and inference.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proteus: a topology malleable data center network Proteus:一个拓扑可延展的数据中心网络
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868455
Ankit Singla, Atul Singh, Kishore Ramachandran, Lei Xu, Yueping Zhang
Full-bandwidth connectivity between all servers of a data center may be necessary for all-to-all traffic patterns, but such interconnects suffer from high cost, complexity, and energy consumption. Recent work has argued that if all-to-all traffic is uncommon, oversubscribed network architectures that can adapt the topology to meet traffic demands, are sufficient. In line with this work, we propose Proteus, an all-optical architecture targeting unprecedented topology-flexibility, lower complexity and higher energy efficiency.
数据中心所有服务器之间的全带宽连接对于所有到所有的流量模式可能是必要的,但是这种互连存在高成本、复杂性和能耗的问题。最近的研究认为,如果全对全流量不常见,那么能够适应拓扑以满足流量需求的超额订阅网络架构就足够了。根据这项工作,我们提出了Proteus,一种针对前所未有的拓扑灵活性,更低的复杂性和更高的能源效率的全光架构。
{"title":"Proteus: a topology malleable data center network","authors":"Ankit Singla, Atul Singh, Kishore Ramachandran, Lei Xu, Yueping Zhang","doi":"10.1145/1868447.1868455","DOIUrl":"https://doi.org/10.1145/1868447.1868455","url":null,"abstract":"Full-bandwidth connectivity between all servers of a data center may be necessary for all-to-all traffic patterns, but such interconnects suffer from high cost, complexity, and energy consumption. Recent work has argued that if all-to-all traffic is uncommon, oversubscribed network architectures that can adapt the topology to meet traffic demands, are sufficient. In line with this work, we propose Proteus, an all-optical architecture targeting unprecedented topology-flexibility, lower complexity and higher energy efficiency.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 244
SideCar: building programmable datacenter networks without programmable switches SideCar:构建没有可编程交换机的可编程数据中心网络
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868468
Alan Shieh, Srikanth Kandula, E. G. Sirer
This paper examines an extreme point in the design space of programmable switches and network policy enforcement. Rather than relying on extensive changes to switches to provide more programmability, SideCar distributes custom processing code between shims running on every end host and general purpose sidecar processors, such as server blades, connected to each switch via commonly available redirection mechanisms. This provides applications with pervasive network instrumentation and programmability on the forwarding plane. While not a perfect replacement for programmable switches, this solves several pressing problems while requiring little or no change to existing switches. In particular, in the context of public cloud data centers with 1000s of tenants, we present novel solutions for multicast, controllable network bandwidth allocation (e.g., use-what-you-pay-for), and reachability isolation (e.g., a tenant's VM only sees other VMs of the tenant and shared services).
本文研究了可编程交换机和网络策略执行设计空间中的一个极端点。SideCar没有依赖于对交换机进行广泛的更改来提供更多的可编程性,而是在每个终端主机上运行的shim和通用SideCar处理器(如服务器刀片)之间分发自定义处理代码,这些处理器通过常用的重定向机制连接到每个交换机。这为应用程序提供了广泛的网络检测和转发平面上的可编程性。虽然不是可编程开关的完美替代品,但这解决了几个紧迫的问题,同时几乎不需要对现有开关进行更改。特别是,在拥有数千个租户的公共云数据中心的背景下,我们提出了针对多播、可控网络带宽分配(例如,按需付费)和可达性隔离(例如,租户的VM只能看到租户和共享服务的其他VM)的新颖解决方案。
{"title":"SideCar: building programmable datacenter networks without programmable switches","authors":"Alan Shieh, Srikanth Kandula, E. G. Sirer","doi":"10.1145/1868447.1868468","DOIUrl":"https://doi.org/10.1145/1868447.1868468","url":null,"abstract":"This paper examines an extreme point in the design space of programmable switches and network policy enforcement. Rather than relying on extensive changes to switches to provide more programmability, SideCar distributes custom processing code between shims running on every end host and general purpose sidecar processors, such as server blades, connected to each switch via commonly available redirection mechanisms. This provides applications with pervasive network instrumentation and programmability on the forwarding plane. While not a perfect replacement for programmable switches, this solves several pressing problems while requiring little or no change to existing switches. In particular, in the context of public cloud data centers with 1000s of tenants, we present novel solutions for multicast, controllable network bandwidth allocation (e.g., use-what-you-pay-for), and reachability isolation (e.g., a tenant's VM only sees other VMs of the tenant and shared services).","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126830908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 166
Successive interference cancellation: a back-of-the-envelope perspective 连续干扰消除:一个粗略的视角
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868464
Souvik Sen, N. Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in communications literature, emerging software radios are making practical experimentation feasible. This motivates us to study the extent of throughput gains possible with SIC from a MAC layer perspective. Contrary to our initial expectation, we find that the gains from SIC are not easily available in many realistic situations. Moreover, we observe that the scope for SIC gets squeezed by the advances in bitrate adaptation, casting doubt on the future of SIC based protocols.
连续干扰消除(SIC)是一种物理层功能,它允许接收端对同时到达的数据包进行解码。虽然该技术在通信文献中众所周知,但新兴的软件无线电正在使实际实验变得可行。这促使我们从MAC层的角度研究SIC可能获得的吞吐量增益程度。与我们最初的预期相反,我们发现SIC的收益在许多现实情况下并不容易获得。此外,我们观察到,由于比特率适应的进步,SIC的范围受到了挤压,这使人们对基于SIC的协议的未来产生了怀疑。
{"title":"Successive interference cancellation: a back-of-the-envelope perspective","authors":"Souvik Sen, N. Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi","doi":"10.1145/1868447.1868464","DOIUrl":"https://doi.org/10.1145/1868447.1868464","url":null,"abstract":"Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in communications literature, emerging software radios are making practical experimentation feasible. This motivates us to study the extent of throughput gains possible with SIC from a MAC layer perspective. Contrary to our initial expectation, we find that the gains from SIC are not easily available in many realistic situations. Moreover, we observe that the scope for SIC gets squeezed by the advances in bitrate adaptation, casting doubt on the future of SIC based protocols.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125163285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 113
A network in a laptop: rapid prototyping for software-defined networks 笔记本电脑中的网络:软件定义网络的快速原型
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868466
Bob Lantz, Brandon Heller, N. McKeown
Mininet is a system for rapidly prototyping large networks on the constrained resources of a single laptop. The lightweight approach of using OS-level virtualization features, including processes and network namespaces, allows it to scale to hundreds of nodes. Experiences with our initial implementation suggest that the ability to run, poke, and debug in real time represents a qualitative change in workflow. We share supporting case studies culled from over 100 users, at 18 institutions, who have developed Software-Defined Networks (SDN). Ultimately, we think the greatest value of Mininet will be supporting collaborative network research, by enabling self-contained SDN prototypes which anyone with a PC can download, run, evaluate, explore, tweak, and build upon.
Mininet是一个在一台笔记本电脑的有限资源上快速构建大型网络的系统。使用操作系统级虚拟化特性(包括进程和网络名称空间)的轻量级方法允许它扩展到数百个节点。我们最初实现的经验表明,实时运行、戳戳和调试的能力代表了工作流程中的一个质的变化。我们分享从开发软件定义网络(SDN)的18个机构的100多个用户中挑选出来的支持性案例研究。最终,我们认为Mininet的最大价值将是支持协作网络研究,通过启用独立的SDN原型,任何人都可以用PC下载、运行、评估、探索、调整和构建。
{"title":"A network in a laptop: rapid prototyping for software-defined networks","authors":"Bob Lantz, Brandon Heller, N. McKeown","doi":"10.1145/1868447.1868466","DOIUrl":"https://doi.org/10.1145/1868447.1868466","url":null,"abstract":"Mininet is a system for rapidly prototyping large networks on the constrained resources of a single laptop. The lightweight approach of using OS-level virtualization features, including processes and network namespaces, allows it to scale to hundreds of nodes. Experiences with our initial implementation suggest that the ability to run, poke, and debug in real time represents a qualitative change in workflow. We share supporting case studies culled from over 100 users, at 18 institutions, who have developed Software-Defined Networks (SDN). Ultimately, we think the greatest value of Mininet will be supporting collaborative network research, by enabling self-contained SDN prototypes which anyone with a PC can download, run, evaluate, explore, tweak, and build upon.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122565327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2013
A case for information-bound referencing 信息绑定引用的案例
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868451
Ashok Anand, Aditya Akella, V. Sekar, S. Seshan
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol, host, and filename. Some past efforts have decoupled this binding to a certain degree; e.g., creating links that bind to byte-level data. We argue that these systems do not go far enough. Our key observation is that users really care about the intent of the referenced link and are relatively agnostic to the byte-level representation. Based on this observation, we argue that references should be bound to the underlying information associated with the referenced content. We call such references Information-Bound References (IBR). In this paper, we focus on the challenges of creating IBRs for multimedia data, since these form a dominant fraction of Internet traffic today. We explore the trade-offs of various alternatives for generating and using IBRs. We identify that it is possible to adapt multimedia fingerprinting algorithms in the literature to generate IBRs.
链接和内容引用构成了当今用户交互方式的基础。不幸的是,现在使用的链接(url)很脆弱,因为它们严格指定了协议、主机和文件名。过去的一些努力已经在一定程度上解耦了这种绑定;例如,创建绑定到字节级数据的链接。我们认为这些系统走得还不够远。我们的关键观察是,用户真正关心的是被引用链接的意图,而对字节级表示相对不可知。基于这一观察,我们认为引用应该绑定到与引用内容相关的底层信息。我们称这种引用为信息绑定引用(IBR)。在本文中,我们将重点讨论为多媒体数据创建ibr所面临的挑战,因为这些数据构成了当今互联网流量的主要部分。我们将探讨生成和使用ibr的各种替代方案的权衡。我们发现有可能采用文献中的多媒体指纹识别算法来生成ibr。
{"title":"A case for information-bound referencing","authors":"Ashok Anand, Aditya Akella, V. Sekar, S. Seshan","doi":"10.1145/1868447.1868451","DOIUrl":"https://doi.org/10.1145/1868447.1868451","url":null,"abstract":"Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol, host, and filename. Some past efforts have decoupled this binding to a certain degree; e.g., creating links that bind to byte-level data. We argue that these systems do not go far enough. Our key observation is that users really care about the intent of the referenced link and are relatively agnostic to the byte-level representation. Based on this observation, we argue that references should be bound to the underlying information associated with the referenced content. We call such references Information-Bound References (IBR). In this paper, we focus on the challenges of creating IBRs for multimedia data, since these form a dominant fraction of Internet traffic today. We explore the trade-offs of various alternatives for generating and using IBRs. We identify that it is possible to adapt multimedia fingerprinting algorithms in the literature to generate IBRs.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134564194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Listen (on the frequency domain) before you talk 说话前先听(在频域上)
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868463
Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi
Conventional WiFi networks perform channel contention in time domain. This is known to be wasteful because the channel is forced to remain idle, while all contending nodes are backing off for multiple time slots. This paper proposes to break away from convention and recreate the backing off operation in the frequency domain. Our basic idea is to pretend that OFDM subcarriers are integer numbers, and thereby, view today's random backoff process as equivalent to transmitting on a randomly chosen subcarrier. By employing a second antenna to listen to all the subcarriers, each node can determine whether its chosen integer (or subcarrier) is the smallest among all others. In fact, each node can even determine the rank of its chosen integer, enabling the feasibility of a TDMA-like schedule from every round of contention. We develop these ideas into a Time to Frequency (T2F) protocol and prototype it on a small testbed of 8 USRPs. Experiments confirm its feasibility, along with promising throughput gains of more than 35% at high bit rates. A fuller design and thorough evaluation of T2F is a topic of ongoing work.
传统WiFi网络在时域内进行信道争用。众所周知,这是一种浪费,因为通道被迫保持空闲状态,而所有竞争节点都退出多个时隙。本文提出了打破常规,在频域内重建退变运算的方法。我们的基本思想是假设OFDM子载波是整数,因此,将今天的随机回退过程视为等同于在随机选择的子载波上传输。通过使用第二个天线来监听所有子载波,每个节点可以确定其选择的整数(或子载波)是否在所有其他整数中最小。实际上,每个节点甚至可以确定其选择的整数的秩,从而在每一轮争用中实现类似tdma的调度的可行性。我们将这些想法发展成时间对频率(T2F)协议,并在8个usrp的小型测试平台上对其进行原型化。实验证实了它的可行性,以及在高比特率下超过35%的吞吐量增益。更全面地设计和彻底地评估T2F是一个正在进行的工作主题。
{"title":"Listen (on the frequency domain) before you talk","authors":"Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi","doi":"10.1145/1868447.1868463","DOIUrl":"https://doi.org/10.1145/1868447.1868463","url":null,"abstract":"Conventional WiFi networks perform channel contention in time domain. This is known to be wasteful because the channel is forced to remain idle, while all contending nodes are backing off for multiple time slots. This paper proposes to break away from convention and recreate the backing off operation in the frequency domain. Our basic idea is to pretend that OFDM subcarriers are integer numbers, and thereby, view today's random backoff process as equivalent to transmitting on a randomly chosen subcarrier. By employing a second antenna to listen to all the subcarriers, each node can determine whether its chosen integer (or subcarrier) is the smallest among all others. In fact, each node can even determine the rank of its chosen integer, enabling the feasibility of a TDMA-like schedule from every round of contention. We develop these ideas into a Time to Frequency (T2F) protocol and prototype it on a small testbed of 8 USRPs. Experiments confirm its feasibility, along with promising throughput gains of more than 35% at high bit rates. A fuller design and thorough evaluation of T2F is a topic of ongoing work.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"104 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114094100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
SecureAngle: improving wireless security using angle-of-arrival information SecureAngle:使用到达角度信息提高无线安全性
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868458
Jie Xiong, K. Jamieson
Wireless networks play an important role in our everyday lives, at the workplace and at home. However, they are also relatively vulnerable: physically located off site, attackers can circumvent wireless security protocols such as WEP, WPA, and even to some extent WPA2, presenting a security risk to the entire network. To address this problem, we propose SecureAngle, a system designed to operate alongside existing wireless security protocols, adding defense in depth. SecureAngle leverages multi-antenna APs to profile the directions at which a client's signal arrives, using this angle-of-arrival (AoA) information to construct signatures that uniquely identify each client. We identify SecureAngle's role of providing a fine-grained location service in a multi-path indoor environment. With this location information, we investigate how an AP might create a "virtual fence" that drops frames received from clients physically located outside a building or office. With SecureAngle signatures, we also identify how an AP can prevent malicious parties from spoofing the link-layer address of legitimate clients. We discuss how SecureAngle might aid whitespace radios in yielding to incumbent transmitters, as well as its role in directional downlink transmissions with uplink AoA information.
无线网络在我们的日常生活、工作场所和家庭中扮演着重要的角色。但是,它们也相对容易受到攻击:攻击者可以绕过WEP、WPA,甚至在一定程度上可以绕过WPA2等无线安全协议,给整个网络带来安全风险。为了解决这个问题,我们提出了SecureAngle,这是一个设计用于与现有无线安全协议一起工作的系统,增加了深度防御。SecureAngle利用多天线接入点来分析客户端信号到达的方向,并使用此到达角(AoA)信息构建唯一标识每个客户端的签名。我们确定SecureAngle的作用是在多路径室内环境中提供细粒度定位服务。有了这些位置信息,我们将研究AP如何创建一个“虚拟围栏”,以丢弃从位于建筑物或办公室外的物理客户端接收的帧。通过SecureAngle签名,我们还可以确定AP如何防止恶意方欺骗合法客户端的链路层地址。我们讨论了SecureAngle如何帮助空白无线电向现有发射机屈服,以及它在具有上行AoA信息的定向下行链路传输中的作用。
{"title":"SecureAngle: improving wireless security using angle-of-arrival information","authors":"Jie Xiong, K. Jamieson","doi":"10.1145/1868447.1868458","DOIUrl":"https://doi.org/10.1145/1868447.1868458","url":null,"abstract":"Wireless networks play an important role in our everyday lives, at the workplace and at home. However, they are also relatively vulnerable: physically located off site, attackers can circumvent wireless security protocols such as WEP, WPA, and even to some extent WPA2, presenting a security risk to the entire network. To address this problem, we propose SecureAngle, a system designed to operate alongside existing wireless security protocols, adding defense in depth. SecureAngle leverages multi-antenna APs to profile the directions at which a client's signal arrives, using this angle-of-arrival (AoA) information to construct signatures that uniquely identify each client. We identify SecureAngle's role of providing a fine-grained location service in a multi-path indoor environment. With this location information, we investigate how an AP might create a \"virtual fence\" that drops frames received from clients physically located outside a building or office. With SecureAngle signatures, we also identify how an AP can prevent malicious parties from spoofing the link-layer address of legitimate clients. We discuss how SecureAngle might aid whitespace radios in yielding to incumbent transmitters, as well as its role in directional downlink transmissions with uplink AoA information.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Packet re-cycling: eliminating packet losses due to network failures 报文回收:消除网络故障造成的丢包
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868449
Suksant Sae Lor, R. Landa, M. Rio
This paper presents Packet Re-cycling (PR), a technique that takes advantage of cellular graph embeddings to reroute packets that would otherwise be dropped in case of link or node failures. The technique employs only one bit in the packet header to cover any single link failures, and in the order of log2(d) bits to cover all non-disconnecting failure combinations, where d is the diameter of the network. We show that our routing strategy is effective and that its path length stretch is acceptable for realistic topologies. The packet header overhead incurred by PR is very small, and the extra memory and packet processing time required to implement it at each router are insignificant. This makes PR suitable for loss-sensitive, mission-critical network applications.
本文介绍了数据包再循环(PR),这是一种利用蜂窝图嵌入来重路由数据包的技术,否则这些数据包将在链路或节点故障的情况下被丢弃。该技术仅在包头中使用1位来覆盖任何单个链路故障,并以log2(d)位的顺序覆盖所有非断开故障组合,其中d是网络的直径。我们证明了我们的路由策略是有效的,并且它的路径长度拉伸对于现实拓扑是可以接受的。由PR引起的包头开销非常小,并且在每个路由器上实现它所需的额外内存和包处理时间微不足道。这使得PR适用于对损失敏感的任务关键型网络应用程序。
{"title":"Packet re-cycling: eliminating packet losses due to network failures","authors":"Suksant Sae Lor, R. Landa, M. Rio","doi":"10.1145/1868447.1868449","DOIUrl":"https://doi.org/10.1145/1868447.1868449","url":null,"abstract":"This paper presents Packet Re-cycling (PR), a technique that takes advantage of cellular graph embeddings to reroute packets that would otherwise be dropped in case of link or node failures. The technique employs only one bit in the packet header to cover any single link failures, and in the order of log2(d) bits to cover all non-disconnecting failure combinations, where d is the diameter of the network. We show that our routing strategy is effective and that its path length stretch is acceptable for realistic topologies. The packet header overhead incurred by PR is very small, and the extra memory and packet processing time required to implement it at each router are insignificant. This makes PR suitable for loss-sensitive, mission-critical network applications.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127774088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
DevoFlow: cost-effective flow management for high performance enterprise networks DevoFlow:高性能企业网络的高性价比流量管理
Pub Date : 2010-10-20 DOI: 10.1145/1868447.1868448
J. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, Andrew R. Curtis, S. Banerjee
The OpenFlow framework enables flow-level control over Ethernet switching, as well as centralized visibility of the flows in the network. OpenFlow's coupling of these features comes with costs, however: the distributed-system costs of involving the OpenFlow controller on flow setups, and the switch-implementation costs of involving the switch's control plane too often. In this paper, we analyze the overheads, and we propose DevoFlow, a modification of the OpenFlow model in which we try to gently break the coupling between centralized control and centralized visibility, in a way that maintains a useful amount of visibility without imposing unnecessary costs.
OpenFlow框架支持对以太网交换的流级控制,以及对网络中流的集中可见性。然而,OpenFlow对这些特性的耦合带来了成本:在流程设置中涉及OpenFlow控制器的分布式系统成本,以及过于频繁地涉及交换机控制平面的交换机实现成本。在本文中,我们分析了开销,并提出了DevoFlow,这是OpenFlow模型的一种修改,我们试图轻轻地打破集中控制和集中可见性之间的耦合,以保持有用的可见性而不施加不必要的成本的方式。
{"title":"DevoFlow: cost-effective flow management for high performance enterprise networks","authors":"J. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, Andrew R. Curtis, S. Banerjee","doi":"10.1145/1868447.1868448","DOIUrl":"https://doi.org/10.1145/1868447.1868448","url":null,"abstract":"The OpenFlow framework enables flow-level control over Ethernet switching, as well as centralized visibility of the flows in the network. OpenFlow's coupling of these features comes with costs, however: the distributed-system costs of involving the OpenFlow controller on flow setups, and the switch-implementation costs of involving the switch's control plane too often.\u0000 In this paper, we analyze the overheads, and we propose DevoFlow, a modification of the OpenFlow model in which we try to gently break the coupling between centralized control and centralized visibility, in a way that maintains a useful amount of visibility without imposing unnecessary costs.","PeriodicalId":408335,"journal":{"name":"Hotnets-IX","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114221802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 153
期刊
Hotnets-IX
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1