Export Citations
No abstract available.
Proceeding Downloads
Dark packets and the end of network scaling
Today 100GbE network interfaces are commercially available, with 400GbE proposals already in the standardization process. In this environment, a major bottleneck is DRAM latency, which has stagnated at 100ns per access. Beyond 100GbE, all packet sizes ...
Grafting sockets for fast container networking
This paper proposes a novel approach for fast container networking that enables applications in containers to utilize host network stacks directly with proper access control. Our approach, called socket-grafting, offers a new socket-layer communication ...
Bayesian factor analysis and performance measurement of the Linux forwarding architecture
Linux software routers have many configuration options, most of which have received little attention from researchers. Over time, multiqueue NICs, NUMA architectures, and many changes to the kernel have altered the forwarding landscape. Here we ...
Cuckoo++ hash tables: high-performance hash tables for networking applications
Hash tables are essential data-structures for networking applications (e.g., connection tracking, firewalls, network address translators). Among these, cuckoo hash tables provide excellent performance by processing lookups with very few memory accesses (...
Scalable high-speed NDN name lookup
Name lookup is a core function of the Named Data Networking (NDN) forwarding plane. It performs a name-based longest prefix match lookup against a large amount of variable-length, hierarchical name prefixes. NDN name lookup suffers a scalability ...
Network-wide routing-oblivious heavy hitters
The recent introduction of SDN allows deploying new centralized network algorithms that dramatically improve the network operation. Many of these solutions rely on the assumption that the centralized controller merges data from different Network ...
Evaluating the performance of software NICs for 100-gb/s datacenter traffic control
Modern-day datacenters are constantly evolving and scaling to serve more users. Network traffic and flow control is a critical component to enable this trend, and there is a significant amount of new research in this space. Researchers need a platform ...
Characterizing the algorithmic complexity of reconfigurable data center architectures
Emerging data center architectures are becoming reconfigurable. While prior work has shown the practical benefits of reconfigurable topologies, the underlying algorithmic complexity is not yet well understood. In particular, most reconfigurable ...
PFCA: a programmable FIB caching architecture
Ternary Content-Addressable Memory (TCAM) chips are used to store Forwarding Information Bases (FIB) in modern routers. TCAM provides next hop lookup for IP packets at the line-rate. However, TCAM is expensive and energy-consuming; in addition, the ...
Regular expression matching with pipelined delayed input DFAs for high-speed networks
Regular expression matching (RE matching) is a widely used operation in network security monitoring applications. With the speed of network links increasing to 100 Gbps and 400 Gbps, it is necessary to speed up packet processing and provide RE matching ...
Data-driven resource flexing for network functions visualization
Resource flexing is the notion of allocating resources on-demand as workload changes. This is a key advantage of Virtualized Network Functions (VNFs) over their non-virtualized counterparts. However, it is difficult to balance the timeliness and ...
VNF chain allocation and management at data center scale
Recent advances in network function virtualization have prompted the research community to consider data-center-scale deployments. However, existing tools, such as E2 and SOL, limit VNF chain allocation to rack-scale and provide limited support for ...
FTvNF: fault tolerant virtual network functions
One of the major concerns about Network Function Virtualization (NFV) is the reduced stability of virtual network functions (VNFs), compared to dedicated hardware appliances. Stateful VNFs make recovery a complex process, where a major concern is how to ...
Umbrella: a unified software defined development framework
The Northbound (NB) APIs that SDN controllers provide differ in terms of architecture, syntax, naming convention, data resources, and usage. Using NB APIs to write SDN applications makes each application dependent on the API of a specific controller. To ...
Position-aware cuckoo filters
Cuckoo filters have been recently proposed as an efficient structure to perform approximate membership checks. In this paper, it is shown that the false positive rate of a cuckoo filter can be reduced by storing in addition to the fingerprint the ...
Towards a highly scalable network tester
High end networked-systems have quickly climbed from a throughput of gigabits/sec to terabits/sec, and are approaching petabits/sec. Alas, network testing equipment has not scaled: it remained either low throughput or extremely expensive. With suitable ...
Network traffic adaptive S-MAC protocol for wireless sensor network
The S-MAC protocol is a very classic competition-based MAC protocol [1]. Many MAC protocols proposed are modified on the basis of S-MAC protocol. However, most of the current improvements to traffic adaptation are for one or both of backoff mechanism [2]...
LAMP: prompt layer 7 attack mitigation with programmable data planes
While there are various methods to detect application layer attacks or intrusion attempts on an individual end host, it is not efficient to provide all end hosts in the network with heavy-duty defense systems or software firewalls. In this work, we ...
Toward incremental FIB aggregation with quick selections (FAQS)
FIB aggregation is the most feasible solution to mitigate FIB overflow. We present FAQS, an algorithm that uses a single tree traversal to perform faster FIB aggregation and update handling. FAQS is 2.53 and 1.75 times faster than the-state-of-the-art ...
Query language for large-scale P4 network debugging
Diagnosing and solving problems in a contemporary data-center can be a daunting task. By merging network topology information with state collection, this poster abstract explores a new way to look at the network monitoring and troubleshooting problem. ...
VNF chain abstraction for cloud service providers
We propose VNF chain abstraction to decouple a tenant's view of the VNF chain from the cloud provider's implementation. We motivate the benefits of such an abstraction for the cloud provider as well as the tenants, and outline the challenges a cloud ...
Evaluating the benefits of caching and stateless forwarding in mobile information-centric networks
Caching content at storage-enabled network nodes is one of the salient features of Information-centric Networking (ICN). Most existing ICN caching and routing strategies have been designed for and evaluated in static networks [2], while mobile networks ...
Multi-core HTB for bandwidth sharing
Rate limiting with bandwidth-sharing is important and widely used in various scenarios such as multi-tenant cloud. We propose a new rate limiting architecture which fully utilizes the parallel computing capabilities on the multi-core platforms. With ...
APF: fast network all-pair reachability calculation
Network verification, which is mainly about checking network states against network invariants or operator beliefs, has been a popular research thesis recently. Fast calculation of all-pair reachability of the network beforehand for further query or ...
Application-transparent scheduling of socket system calls on many-core systems
As the number of cores equipped in network servers is rapidly increasing, a greater number of processes or threads run concurrently. However, if these tasks invoke system calls frequently, they are not executed as concurrently as expected due to the ...
Hardware acceleration of intrusion detection systems for high-speed networks
Intrusion Detection Systems (IDS) are among popular technologies for securing computer networks. However, their high computational complexity makes it hard to meet performance goals of modern high-speed networks. This paper aims at an acceleration of ...
- Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems