Refraction networking is a promising censorship circumvention technique in which a participating router along the path to an innocuous destination deflects traffic to a covert site that is otherwise blocked by the censor. However, refraction networking faces major practical challenges due to performance issues and various attacks (e.g., routing-around-the-decoy and fingerprinting). Given that many sites are now hosted in the cloud, data centers offer an advantageous setting to implement refraction networking due to the physical proximity and similarity of hosted sites. We propose REDACT, a novel class of refraction networking solutions where the decoy router is a border router of a multi-tenant data center and the decoy and covert sites are tenants within the same data center. We highlight one specific example REDACT protocol, which leverages TLS session resumption to address the performance and implementation challenges in prior refraction networking protocols. REDACT also offers scope for other designs with different realistic use cases and assumptions.
{"title":"REDACT","authors":"Arjun Devraj, Liang Wang, J. Rexford","doi":"10.1145/3503954.3503957","DOIUrl":"https://doi.org/10.1145/3503954.3503957","url":null,"abstract":"Refraction networking is a promising censorship circumvention technique in which a participating router along the path to an innocuous destination deflects traffic to a covert site that is otherwise blocked by the censor. However, refraction networking faces major practical challenges due to performance issues and various attacks (e.g., routing-around-the-decoy and fingerprinting). Given that many sites are now hosted in the cloud, data centers offer an advantageous setting to implement refraction networking due to the physical proximity and similarity of hosted sites. We propose REDACT, a novel class of refraction networking solutions where the decoy router is a border router of a multi-tenant data center and the decoy and covert sites are tenants within the same data center. We highlight one specific example REDACT protocol, which leverages TLS session resumption to address the performance and implementation challenges in prior refraction networking protocols. REDACT also offers scope for other designs with different realistic use cases and assumptions.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"57 1","pages":"15 - 22"},"PeriodicalIF":2.8,"publicationDate":"2021-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73911939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This October 2021 issue contains two technical papers, two educational contributions, and one editorial note.
这个2021年10月的问题包含两篇技术论文,两篇教育贡献和一篇社论。
{"title":"The October 2021 issue","authors":"S. Uhlig","doi":"10.1145/3503954.3503955","DOIUrl":"https://doi.org/10.1145/3503954.3503955","url":null,"abstract":"This October 2021 issue contains two technical papers, two educational contributions, and one editorial note.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"50 1","pages":"1 - 1"},"PeriodicalIF":2.8,"publicationDate":"2021-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79951040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luke Hsiao, Brooke Krajancich, P. Levis, Gordon Wetzstein, Keith Winstein
Virtual reality systems today cannot yet stream immersive, retina-quality virtual reality video over a network. One of the greatest challenges to this goal is the sheer data rates required to transmit retina-quality video frames at high resolutions and frame rates. Recent work has leveraged the decay of visual acuity in human perception in novel gaze-contingent video compression techniques. In this paper, we show that reducing the motion-to-photon latency of a system itself is a key method for improving the compression ratio of gaze-contingent compression. Our key finding is that a client and streaming server system with sub-15ms latency can achieve 5x better compression than traditional techniques while also using simpler software algorithms than previous work.
{"title":"Towards retina-quality VR video streaming","authors":"Luke Hsiao, Brooke Krajancich, P. Levis, Gordon Wetzstein, Keith Winstein","doi":"10.1145/3523230.3523233","DOIUrl":"https://doi.org/10.1145/3523230.3523233","url":null,"abstract":"Virtual reality systems today cannot yet stream immersive, retina-quality virtual reality video over a network. One of the greatest challenges to this goal is the sheer data rates required to transmit retina-quality video frames at high resolutions and frame rates. Recent work has leveraged the decay of visual acuity in human perception in novel gaze-contingent video compression techniques. In this paper, we show that reducing the motion-to-photon latency of a system itself is a key method for improving the compression ratio of gaze-contingent compression. Our key finding is that a client and streaming server system with sub-15ms latency can achieve 5x better compression than traditional techniques while also using simpler software algorithms than previous work.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"57 1","pages":"10 - 19"},"PeriodicalIF":2.8,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91339941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Limited domains were defined conceptually in RFC 8799 to cater to requirements and behaviours that extend the dominant view of IP packet delivery in the Internet. This paper argues not only that limited domains have been with us from the very beginning of the Internet but also that they have been shaping innovation of Internet technologies ever since, and will continue to do so. In order to build limited domains that successfully interoperate with the existing Internet, we propose an architectural framework as a blueprint. We discuss the role of the IETF in ensuring continued innovation in Internet technologies by embracing the wider research community's work on limited domain technology, leading to our key insight that Limited Domains are not only considered useful but a must to sustain innovation.
{"title":"Limited domains considered useful","authors":"B. Carpenter, J. Crowcroft, D. Trossen","doi":"10.1145/3477482.3477487","DOIUrl":"https://doi.org/10.1145/3477482.3477487","url":null,"abstract":"Limited domains were defined conceptually in RFC 8799 to cater to requirements and behaviours that extend the dominant view of IP packet delivery in the Internet. This paper argues not only that limited domains have been with us from the very beginning of the Internet but also that they have been shaping innovation of Internet technologies ever since, and will continue to do so. In order to build limited domains that successfully interoperate with the existing Internet, we propose an architectural framework as a blueprint. We discuss the role of the IETF in ensuring continued innovation in Internet technologies by embracing the wider research community's work on limited domain technology, leading to our key insight that Limited Domains are not only considered useful but a must to sustain innovation.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"177 1","pages":"22 - 28"},"PeriodicalIF":2.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75987375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Welzl, S. Oepen, Cezary Jaskula, C. Griwodz, Safiqul Islam
RFC 9000, published in May 2021, marks an important milestone for the Internet's standardization body, the Internet Engineering Task Force (IETF): finally, the specification of the QUIC protocol is available. QUIC is the result of a five-year effort - and it is also the second of two major protocols (the first being SPDY, which later became HTTP/2) that Google LLC first deployed, and then brought to the IETF for standardization. This begs the question: when big players follow such a "shoot first, discuss later" approach, is IETF collaboration still "real", or is the IETF now being (mis-)used to approve protocols for standardization when they are already practically established, without really actively involving anyone but the main proponents?
{"title":"Collaboration in the IETF","authors":"M. Welzl, S. Oepen, Cezary Jaskula, C. Griwodz, Safiqul Islam","doi":"10.1145/3477482.3477488","DOIUrl":"https://doi.org/10.1145/3477482.3477488","url":null,"abstract":"RFC 9000, published in May 2021, marks an important milestone for the Internet's standardization body, the Internet Engineering Task Force (IETF): finally, the specification of the QUIC protocol is available. QUIC is the result of a five-year effort - and it is also the second of two major protocols (the first being SPDY, which later became HTTP/2) that Google LLC first deployed, and then brought to the IETF for standardization. This begs the question: when big players follow such a \"shoot first, discuss later\" approach, is IETF collaboration still \"real\", or is the IETF now being (mis-)used to approve protocols for standardization when they are already practically established, without really actively involving anyone but the main proponents?","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"14 1","pages":"29 - 32"},"PeriodicalIF":2.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77757017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The July 2021 issue","authors":"S. Uhlig","doi":"10.1145/3477482.3477483","DOIUrl":"https://doi.org/10.1145/3477482.3477483","url":null,"abstract":"Presentation of the July 2021 issue of CCR.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"15 1","pages":"1 - 1"},"PeriodicalIF":2.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88962835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An earlier study observed that until 2008, the size of the BGP4 system for IPv4 appeared to have grown approximately in proportion to the square root of the host count of the globally addressable Internet. This article revisits this study by including IPv4 data until 2020 and adding IPv6 data. The results indicate that BGP4 for IPv4 is continuing to scale steadily even as IPv4 approaches its end of life, and that it is working as it should for IPv6, except for a slight concern that the number of announced routes is trending upwards faster as time goes on.
{"title":"A square law revisited","authors":"B. Carpenter","doi":"10.1145/3477482.3477490","DOIUrl":"https://doi.org/10.1145/3477482.3477490","url":null,"abstract":"An earlier study observed that until 2008, the size of the BGP4 system for IPv4 appeared to have grown approximately in proportion to the square root of the host count of the globally addressable Internet. This article revisits this study by including IPv4 data until 2020 and adding IPv6 data. The results indicate that BGP4 for IPv4 is continuing to scale steadily even as IPv4 approaches its end of life, and that it is working as it should for IPv6, except for a slight concern that the number of announced routes is trending upwards faster as time goes on.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"15 1","pages":"41 - 45"},"PeriodicalIF":2.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81786050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Suárez-Varela, Miquel Ferriol Galmés, Albert Lopez, Paul Almasan, G. Bernárdez, David Pujol-Perich, Krzysztof Rusek, Loïck Bonniot, C. Neumann, François Schnitzler, François Taïani, Martin Happ, Christian Maier, J. Du, Matthias Herlich, P. Dorfinger, N. Hainke, Stefan Venz, John A. Wegener, H. Wissing, Bo-Xi Wu, Shihan Xiao, P. Barlet-Ros, A. Cabellos-Aparicio
During the last decade, Machine Learning (ML) has increasingly become a hot topic in the field of Computer Networks and is expected to be gradually adopted for a plethora of control, monitoring and management tasks in real-world deployments. This poses the need to count on new generations of students, researchers and practitioners with a solid background in ML applied to networks. During 2020, the International Telecommunication Union (ITU) has organized the "ITU AI/ML in 5G challenge", an open global competition that has introduced to a broad audience some of the current main challenges in ML for networks. This large-scale initiative has gathered 23 different challenges proposed by network operators, equipment manufacturers and academia, and has attracted a total of 1300+ participants from 60+ countries. This paper narrates our experience organizing one of the proposed challenges: the "Graph Neural Networking Challenge 2020". We describe the problem presented to participants, the tools and resources provided, some organization aspects and participation statistics, an outline of the top-3 awarded solutions, and a summary with some lessons learned during all this journey. As a result, this challenge leaves a curated set of educational resources openly available to anyone interested in the topic.
{"title":"The graph neural networking challenge","authors":"J. Suárez-Varela, Miquel Ferriol Galmés, Albert Lopez, Paul Almasan, G. Bernárdez, David Pujol-Perich, Krzysztof Rusek, Loïck Bonniot, C. Neumann, François Schnitzler, François Taïani, Martin Happ, Christian Maier, J. Du, Matthias Herlich, P. Dorfinger, N. Hainke, Stefan Venz, John A. Wegener, H. Wissing, Bo-Xi Wu, Shihan Xiao, P. Barlet-Ros, A. Cabellos-Aparicio","doi":"10.1145/3477482.3477485","DOIUrl":"https://doi.org/10.1145/3477482.3477485","url":null,"abstract":"During the last decade, Machine Learning (ML) has increasingly become a hot topic in the field of Computer Networks and is expected to be gradually adopted for a plethora of control, monitoring and management tasks in real-world deployments. This poses the need to count on new generations of students, researchers and practitioners with a solid background in ML applied to networks. During 2020, the International Telecommunication Union (ITU) has organized the \"ITU AI/ML in 5G challenge\", an open global competition that has introduced to a broad audience some of the current main challenges in ML for networks. This large-scale initiative has gathered 23 different challenges proposed by network operators, equipment manufacturers and academia, and has attracted a total of 1300+ participants from 60+ countries. This paper narrates our experience organizing one of the proposed challenges: the \"Graph Neural Networking Challenge 2020\". We describe the problem presented to participants, the tools and resources provided, some organization aspects and participation statistics, an outline of the top-3 awarded solutions, and a summary with some lessons learned during all this journey. As a result, this challenge leaves a curated set of educational resources openly available to anyone interested in the topic.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"284 1","pages":"9 - 16"},"PeriodicalIF":2.8,"publicationDate":"2021-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80237250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Claffy, D. Clark, J. Heidemann, F. Bustamante, M. Jonker, Aaron Schulman, E. Zegura
In January and April 2021 we held the Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR) with the goal of understanding challenges in network and security data set collection and sharing. Most workshop attendees provided white papers describing their perspectives, and many participated in short-talks and discussion in two virtual workshops over five days. That discussion produced consensus around several points. First, many aspects of the Internet are characterized by decreasing visibility of important network properties, which is in tension with the Internet's role as critical infrastructure. We discussed three specific research areas that illustrate this tension: security, Internet access; and mobile networking. We discussed visibility challenges at all layers of the networking stack, and the challenge of gathering data and validating inferences. Important data sets require longitudinal (long-term, ongoing) data collection and sharing, support for which is more challenging for Internet research than other fields. We discussed why a combination of technical and policy methods are necessary to safeguard privacy when using or sharing measurement data. Workshop participant proposed several opportunities to accelerate progress, some of which require coordination across government, industry, and academia.
{"title":"Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021) final report","authors":"K. Claffy, D. Clark, J. Heidemann, F. Bustamante, M. Jonker, Aaron Schulman, E. Zegura","doi":"10.1145/3477482.3477489","DOIUrl":"https://doi.org/10.1145/3477482.3477489","url":null,"abstract":"In January and April 2021 we held the Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR) with the goal of understanding challenges in network and security data set collection and sharing. Most workshop attendees provided white papers describing their perspectives, and many participated in short-talks and discussion in two virtual workshops over five days. That discussion produced consensus around several points. First, many aspects of the Internet are characterized by decreasing visibility of important network properties, which is in tension with the Internet's role as critical infrastructure. We discussed three specific research areas that illustrate this tension: security, Internet access; and mobile networking. We discussed visibility challenges at all layers of the networking stack, and the challenge of gathering data and validating inferences. Important data sets require longitudinal (long-term, ongoing) data collection and sharing, support for which is more challenging for Internet research than other fields. We discussed why a combination of technical and policy methods are necessary to safeguard privacy when using or sharing measurement data. Workshop participant proposed several opportunities to accelerate progress, some of which require coordination across government, industry, and academia.","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"1 1","pages":"33 - 40"},"PeriodicalIF":2.8,"publicationDate":"2021-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76055807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This interview is part of a series on Great Educators in Computer Networking, where we interview some of the most impactful and skilled educators in our field. Here, we interviewed Australian Bruce Davie, the self-described computer scientist/engineer/runner/cyclist, who agreed to talk to us about his thoughts on computer networking education, his role in it, his thoughts about the big ideas in our field, and how the pandemic is changing our work. Bruce has over 30 years of industry experience and is well known for a broad spectrum of educational initiatives such as co-authoring several textbooks, as well as his contributions to many networking standards and technologies, including IP quality of service, network virtualization, software defined networking, and more
{"title":"Great educators in computer networking","authors":"M. Caesar, Bruce S. Davie","doi":"10.1145/3464994.3465001","DOIUrl":"https://doi.org/10.1145/3464994.3465001","url":null,"abstract":"This interview is part of a series on Great Educators in Computer Networking, where we interview some of the most impactful and skilled educators in our field. Here, we interviewed Australian Bruce Davie, the self-described computer scientist/engineer/runner/cyclist, who agreed to talk to us about his thoughts on computer networking education, his role in it, his thoughts about the big ideas in our field, and how the pandemic is changing our work. Bruce has over 30 years of industry experience and is well known for a broad spectrum of educational initiatives such as co-authoring several textbooks, as well as his contributions to many networking standards and technologies, including IP quality of service, network virtualization, software defined networking, and more","PeriodicalId":50646,"journal":{"name":"ACM Sigcomm Computer Communication Review","volume":"15 12 1","pages":"31 - 37"},"PeriodicalIF":2.8,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86981299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}