Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3230718acmconferencesBook PagePublication PagesancsConference Proceedingsconference-collections
ANCS '18: Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ANCS '18: Symposium on Architectures for Networking and Communications Systems Ithaca New York July 23 - 24, 2018
ISBN:
978-1-4503-5902-3
Published:
23 July 2018
Sponsors:
SIGCOMM, SIGARCH, IEEE CS

Reflects downloads up to 03 Mar 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Public Access
Dark packets and the end of network scaling

Today 100GbE network interfaces are commercially available, with 400GbE proposals already in the standardization process. In this environment, a major bottleneck is DRAM latency, which has stagnated at 100ns per access. Beyond 100GbE, all packet sizes ...

research-article
Open Access
Grafting sockets for fast container networking

This paper proposes a novel approach for fast container networking that enables applications in containers to utilize host network stacks directly with proper access control. Our approach, called socket-grafting, offers a new socket-layer communication ...

research-article
Public Access
Bayesian factor analysis and performance measurement of the Linux forwarding architecture

Linux software routers have many configuration options, most of which have received little attention from researchers. Over time, multiqueue NICs, NUMA architectures, and many changes to the kernel have altered the forwarding landscape. Here we ...

Cuckoo++ hash tables: high-performance hash tables for networking applications

Hash tables are essential data-structures for networking applications (e.g., connection tracking, firewalls, network address translators). Among these, cuckoo hash tables provide excellent performance by processing lookups with very few memory accesses (...

research-article
Scalable high-speed NDN name lookup

Name lookup is a core function of the Named Data Networking (NDN) forwarding plane. It performs a name-based longest prefix match lookup against a large amount of variable-length, hierarchical name prefixes. NDN name lookup suffers a scalability ...

research-article
Network-wide routing-oblivious heavy hitters

The recent introduction of SDN allows deploying new centralized network algorithms that dramatically improve the network operation. Many of these solutions rely on the assumption that the centralized controller merges data from different Network ...

research-article
Public Access
Evaluating the performance of software NICs for 100-gb/s datacenter traffic control

Modern-day datacenters are constantly evolving and scaling to serve more users. Network traffic and flow control is a critical component to enable this trend, and there is a significant amount of new research in this space. Researchers need a platform ...

research-article
Characterizing the algorithmic complexity of reconfigurable data center architectures

Emerging data center architectures are becoming reconfigurable. While prior work has shown the practical benefits of reconfigurable topologies, the underlying algorithmic complexity is not yet well understood. In particular, most reconfigurable ...

research-article
PFCA: a programmable FIB caching architecture

Ternary Content-Addressable Memory (TCAM) chips are used to store Forwarding Information Bases (FIB) in modern routers. TCAM provides next hop lookup for IP packets at the line-rate. However, TCAM is expensive and energy-consuming; in addition, the ...

research-article
Regular expression matching with pipelined delayed input DFAs for high-speed networks

Regular expression matching (RE matching) is a widely used operation in network security monitoring applications. With the speed of network links increasing to 100 Gbps and 400 Gbps, it is necessary to speed up packet processing and provide RE matching ...

research-article
Public Access
Data-driven resource flexing for network functions visualization

Resource flexing is the notion of allocating resources on-demand as workload changes. This is a key advantage of Virtualized Network Functions (VNFs) over their non-virtualized counterparts. However, it is difficult to balance the timeliness and ...

research-article
Open Access
VNF chain allocation and management at data center scale

Recent advances in network function virtualization have prompted the research community to consider data-center-scale deployments. However, existing tools, such as E2 and SOL, limit VNF chain allocation to rack-scale and provide limited support for ...

research-article
FTvNF: fault tolerant virtual network functions

One of the major concerns about Network Function Virtualization (NFV) is the reduced stability of virtual network functions (VNFs), compared to dedicated hardware appliances. Stateful VNFs make recovery a complex process, where a major concern is how to ...

poster
Umbrella: a unified software defined development framework

The Northbound (NB) APIs that SDN controllers provide differ in terms of architecture, syntax, naming convention, data resources, and usage. Using NB APIs to write SDN applications makes each application dependent on the API of a specific controller. To ...

poster
Position-aware cuckoo filters

Cuckoo filters have been recently proposed as an efficient structure to perform approximate membership checks. In this paper, it is shown that the false positive rate of a cuckoo filter can be reduced by storing in addition to the fingerprint the ...

poster
Towards a highly scalable network tester

High end networked-systems have quickly climbed from a throughput of gigabits/sec to terabits/sec, and are approaching petabits/sec. Alas, network testing equipment has not scaled: it remained either low throughput or extremely expensive. With suitable ...

poster
Network traffic adaptive S-MAC protocol for wireless sensor network

The S-MAC protocol is a very classic competition-based MAC protocol [1]. Many MAC protocols proposed are modified on the basis of S-MAC protocol. However, most of the current improvements to traffic adaptation are for one or both of backoff mechanism [2]...

poster
LAMP: prompt layer 7 attack mitigation with programmable data planes

While there are various methods to detect application layer attacks or intrusion attempts on an individual end host, it is not efficient to provide all end hosts in the network with heavy-duty defense systems or software firewalls. In this work, we ...

poster
Toward incremental FIB aggregation with quick selections (FAQS)

FIB aggregation is the most feasible solution to mitigate FIB overflow. We present FAQS, an algorithm that uses a single tree traversal to perform faster FIB aggregation and update handling. FAQS is 2.53 and 1.75 times faster than the-state-of-the-art ...

poster
Query language for large-scale P4 network debugging

Diagnosing and solving problems in a contemporary data-center can be a daunting task. By merging network topology information with state collection, this poster abstract explores a new way to look at the network monitoring and troubleshooting problem. ...

poster
VNF chain abstraction for cloud service providers

We propose VNF chain abstraction to decouple a tenant's view of the VNF chain from the cloud provider's implementation. We motivate the benefits of such an abstraction for the cloud provider as well as the tenants, and outline the challenges a cloud ...

poster
Evaluating the benefits of caching and stateless forwarding in mobile information-centric networks

Caching content at storage-enabled network nodes is one of the salient features of Information-centric Networking (ICN). Most existing ICN caching and routing strategies have been designed for and evaluated in static networks [2], while mobile networks ...

poster
Multi-core HTB for bandwidth sharing

Rate limiting with bandwidth-sharing is important and widely used in various scenarios such as multi-tenant cloud. We propose a new rate limiting architecture which fully utilizes the parallel computing capabilities on the multi-core platforms. With ...

poster
APF: fast network all-pair reachability calculation

Network verification, which is mainly about checking network states against network invariants or operator beliefs, has been a popular research thesis recently. Fast calculation of all-pair reachability of the network beforehand for further query or ...

poster
Application-transparent scheduling of socket system calls on many-core systems

As the number of cores equipped in network servers is rapidly increasing, a greater number of processes or threads run concurrently. However, if these tasks invoke system calls frequently, they are not executed as concurrently as expected due to the ...

poster
Hardware acceleration of intrusion detection systems for high-speed networks

Intrusion Detection Systems (IDS) are among popular technologies for securing computer networks. However, their high computational complexity makes it hard to meet performance goals of modern high-speed networks. This paper aims at an acceleration of ...

Contributors
  • Carnegie Mellon University
  • University of Oxford
  1. Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems
      Please enable JavaScript to view thecomments powered by Disqus.

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 88 of 314 submissions, 28%
      YearSubmittedAcceptedRate
      ANCS '16581221%
      ANCS '14571933%
      ANCS '11622032%
      ANCS '08671725%
      ANCS '07702029%
      Overall3148828%