| 354 | <a class="EntryGoto" id="Araji, B. and Gurkan, D."></a> |
| 355 | <b class="myheading" style="position: relative; left: 5%;">Araji, B. and Gurkan, D.</b> |
| 356 | |
| 357 | <div class="BibEntry"> |
| 358 | |
| 359 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 360 | |
| 361 | <li> |
| 362 | |
| 363 | |
| 364 | <tr> |
| 365 | <td valign="top">Author</td> |
| 366 | <td valign="top">Araji, B. and Gurkan, D.</td> |
| 367 | </tr> |
| 368 | |
| 369 | <tr> |
| 370 | <td valign="top">Title</td> |
| 371 | <td valign="top">Embedding Switch Number, Port Number, and MAC Address (ESPM) within the IPv6 Address</td> |
| 372 | </tr> |
| 373 | |
| 374 | <tr> |
| 375 | <td valign="top">Booktitle</td> |
| 376 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 377 | </tr> |
| 378 | |
| 379 | <tr> |
| 380 | <td valign="top">Publisher</td> |
| 381 | <td valign="top">IEEE</td> |
| 382 | </tr> |
| 383 | |
| 384 | <tr> |
| 385 | <td valign="top">Year</td> |
| 386 | <td valign="top">2014</td> |
| 387 | </tr> |
| 388 | |
| 389 | <tr> |
| 390 | <td valign="top">Abstract</td> |
| 391 | <td valign="top">IPv4 protocol, the famous 32-bit address, has been used in networks for many decades [1] and would not have sustained its usability without NAT. IPv6 protocol with its 128-bit address, provides slight routing information [2]. In this paper, we present ESPM, Embedding Switch ID, Port number and MAC Address within IPv6 protocol and SDN technology, imposing a device connectivity hierarchy upon the address space. We amend the IPv6 global addressing scheme for hosts to include their MAC address as well as the switch ID and Switch port number that they are connected to. This scheme encodes information that would ordinarily require a lookup or query packets(ARP) and decrease CAM table entries on the switch by forwarding the packets using the ESPM algorithm. After processing ESPM algorithm to check for OF controller ID, OF switch ID, and the port ID, the amount of total packets transferred on the network to fulfill an ICMP request-reply process decreased by 28.1% in 1-switch-2 hosts. In order to demonstrate the feasibility of such an addressing scheme, we use POF controller and POF switch [3] to emulate ESPM implementation and then measure the impact on the number of network management packets transferred between hosts during connectivity tests.</td> |
| 392 | </tr> |
| 393 | |
| 394 | |
| 395 | |
| 396 | <tr> |
| 397 | <td valign="top">DOI</td> |
| 398 | <td valign="top">10.1109/gree.2014.20</td> |
| 399 | </tr> |
| 400 | |
| 401 | |
| 402 | |
| 403 | <tr> |
| 404 | <td valign="top">URL</td> |
| 405 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.20">http://dx.doi.org/10.1109/gree.2014.20</a></td> |
| 406 | </tr> |
| 407 | |
| 408 | |
| 409 | </li> |
| 410 | |
| 411 | </table></div><br><br> |
| 412 | |
| 413 | |
| 414 | |
| 415 | |
354 | 416 | <a class="EntryGoto" id="Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge"></a> |
355 | 417 | <b class="myheading" style="position: relative; left: 5%;">Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b> |
| 473 | <a class="EntryGoto" id="Babaoglu, A. C. and Dutta, R."></a> |
| 474 | <b class="myheading" style="position: relative; left: 5%;">Babaoglu, A. C. and Dutta, R.</b> |
| 475 | |
| 476 | <div class="BibEntry"> |
| 477 | |
| 478 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 479 | |
| 480 | <li> |
| 481 | |
| 482 | |
| 483 | <tr> |
| 484 | <td valign="top">Author</td> |
| 485 | <td valign="top">Babaoglu, A. C. and Dutta, R.</td> |
| 486 | </tr> |
| 487 | |
| 488 | <tr> |
| 489 | <td valign="top">Title</td> |
| 490 | <td valign="top">A GENI Meso-Scale Experiment of a Verification Service</td> |
| 491 | </tr> |
| 492 | |
| 493 | <tr> |
| 494 | <td valign="top">Booktitle</td> |
| 495 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 496 | </tr> |
| 497 | |
| 498 | <tr> |
| 499 | <td valign="top">Publisher</td> |
| 500 | <td valign="top">IEEE</td> |
| 501 | </tr> |
| 502 | |
| 503 | <tr> |
| 504 | <td valign="top">Year</td> |
| 505 | <td valign="top">2014</td> |
| 506 | </tr> |
| 507 | |
| 508 | <tr> |
| 509 | <td valign="top">Abstract</td> |
| 510 | <td valign="top">In this work, we demonstrate the real world results of a verification service that verifies the performance of a set of network providers by measuring the user flows, using GENI experimental facility. We first give an overview of the architectural components and their interactions to enable such a verification capability. We then give the experiment setup details followed by the numerical results for various network measurement metrics and the evaluation of these results.</td> |
| 511 | </tr> |
| 512 | |
| 513 | |
| 514 | |
| 515 | <tr> |
| 516 | <td valign="top">DOI</td> |
| 517 | <td valign="top">10.1109/gree.2014.13</td> |
| 518 | </tr> |
| 519 | |
| 520 | |
| 521 | |
| 522 | <tr> |
| 523 | <td valign="top">URL</td> |
| 524 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.13">http://dx.doi.org/10.1109/gree.2014.13</a></td> |
| 525 | </tr> |
| 526 | |
| 527 | |
| 528 | </li> |
| 529 | |
| 530 | </table></div><br><br> |
| 531 | |
| 532 | |
| 533 | |
| 534 | |
| 825 | <a class="EntryGoto" id="Bejerano, Y. and Ferragut, J. and Guo, K. and Gupta, V. and Gutterman, C. and Nandagopal, T. and Zussman, G."></a> |
| 826 | <b class="myheading" style="position: relative; left: 5%;">Bejerano, Y. and Ferragut, J. and Guo, K. and Gupta, V. and Gutterman, C. and Nandagopal, T. and Zussman, G.</b> |
| 827 | |
| 828 | <div class="BibEntry"> |
| 829 | |
| 830 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 831 | |
| 832 | <li> |
| 833 | |
| 834 | |
| 835 | <tr> |
| 836 | <td valign="top">Author</td> |
| 837 | <td valign="top">Bejerano, Y. and Ferragut, J. and Guo, K. and Gupta, V. and Gutterman, C. and Nandagopal, T. and Zussman, G.</td> |
| 838 | </tr> |
| 839 | |
| 840 | <tr> |
| 841 | <td valign="top">Title</td> |
| 842 | <td valign="top">Experimental Evaluation of a Scalable WiFi Multicast Scheme in the ORBIT Testbed</td> |
| 843 | </tr> |
| 844 | |
| 845 | <tr> |
| 846 | <td valign="top">Booktitle</td> |
| 847 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 848 | </tr> |
| 849 | |
| 850 | <tr> |
| 851 | <td valign="top">Publisher</td> |
| 852 | <td valign="top">IEEE</td> |
| 853 | </tr> |
| 854 | |
| 855 | <tr> |
| 856 | <td valign="top">Year</td> |
| 857 | <td valign="top">2014</td> |
| 858 | </tr> |
| 859 | |
| 860 | <tr> |
| 861 | <td valign="top">Abstract</td> |
| 862 | <td valign="top">IEEE 802.11-based wireless local area networks, referred to as WiFi, have been globally deployed and the vast majority of the mobile devices are currently WiFi-enabled. While WiFi has been proposed for multimedia content distribution, its lack of adequate support for multicast services hinders its ability to provide multimedia content distribution to a large number of devices. In earlier work, we proposed a dynamic scheme called AMuSe that selects a subset of the multicast receivers as feedback nodes. The feedback nodes periodically send information about channel quality to the multicast sender and the sender in turn can optimize multicast service quality, e.g., by dynamically adjusting transmission bit-rate. In this paper, we discuss several experimental results for the performance evaluation of AMuSe. Our experiments use more than 250 nodes placed in a grid topology in the ORBIT testbed. We consider different experimental scenarios: with and without the presence of external noise. Our focus is on studying the performance of WiFi nodes in WiFi multicast and establishing the conditions that make AMuSe an attractive scheme for feedback in WiFi multicast.</td> |
| 863 | </tr> |
| 864 | |
| 865 | |
| 866 | |
| 867 | <tr> |
| 868 | <td valign="top">DOI</td> |
| 869 | <td valign="top">10.1109/gree.2014.22</td> |
| 870 | </tr> |
| 871 | |
| 872 | |
| 873 | |
| 874 | <tr> |
| 875 | <td valign="top">URL</td> |
| 876 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.22">http://dx.doi.org/10.1109/gree.2014.22</a></td> |
| 877 | </tr> |
| 878 | |
| 879 | |
| 880 | </li> |
| 881 | |
| 882 | </table></div><br><br> |
| 883 | |
| 884 | |
| 885 | |
| 886 | |
701 | 887 | <a class="EntryGoto" id="Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan"></a> |
702 | 888 | <b class="myheading" style="position: relative; left: 5%;">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</b> |
| 1482 | <a class="EntryGoto" id="Calyam, P. and Seetharam, S. and Antequera, R. B."></a> |
| 1483 | <b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Seetharam, S. and Antequera, R. B.</b> |
| 1484 | |
| 1485 | <div class="BibEntry"> |
| 1486 | |
| 1487 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 1488 | |
| 1489 | <li> |
| 1490 | |
| 1491 | |
| 1492 | <tr> |
| 1493 | <td valign="top">Author</td> |
| 1494 | <td valign="top">Calyam, P. and Seetharam, S. and Antequera, R. B.</td> |
| 1495 | </tr> |
| 1496 | |
| 1497 | <tr> |
| 1498 | <td valign="top">Title</td> |
| 1499 | <td valign="top">GENI Laboratory Exercises Development for a Cloud Computing Course</td> |
| 1500 | </tr> |
| 1501 | |
| 1502 | <tr> |
| 1503 | <td valign="top">Booktitle</td> |
| 1504 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 1505 | </tr> |
| 1506 | |
| 1507 | <tr> |
| 1508 | <td valign="top">Publisher</td> |
| 1509 | <td valign="top">IEEE</td> |
| 1510 | </tr> |
| 1511 | |
| 1512 | <tr> |
| 1513 | <td valign="top">Year</td> |
| 1514 | <td valign="top">2014</td> |
| 1515 | </tr> |
| 1516 | |
| 1517 | <tr> |
| 1518 | <td valign="top">Abstract</td> |
| 1519 | <td valign="top">Cloud computing education involves integration of computing theories and information technologies in new and interesting ways. It can enable students to architect scalable infrastructures and develop web-service based applications utilizing distributed systems. In this paper, we describe our efforts, experiences and findings in the development of laboratory exercises that utilize GENI infrastructure in a cloud computing course offered at University of Missouri in Fall 2013. Three sets of laboratory exercises were developed and administered for 30 undergraduate/graduate students to help them gain skills in computer and network virtualization, and also to prepare them for distributed system programming projects. We found that the GENI infrastructure provides unique capabilities for student training, and combining it with lab exercises that use public clouds such as Amazon Web Services can provide an overall rich set of hands-on learning opportunities.</td> |
| 1520 | </tr> |
| 1521 | |
| 1522 | |
| 1523 | |
| 1524 | <tr> |
| 1525 | <td valign="top">DOI</td> |
| 1526 | <td valign="top">10.1109/gree.2014.15</td> |
| 1527 | </tr> |
| 1528 | |
| 1529 | |
| 1530 | |
| 1531 | <tr> |
| 1532 | <td valign="top">URL</td> |
| 1533 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.15">http://dx.doi.org/10.1109/gree.2014.15</a></td> |
| 1534 | </tr> |
| 1535 | |
| 1536 | |
| 1537 | </li> |
| 1538 | |
| 1539 | </table></div><br><br> |
| 1540 | |
| 1541 | |
| 1542 | |
| 1543 | |
1296 | 1544 | <a class="EntryGoto" id="Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A."></a> |
1297 | 1545 | <b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</b> |
| 2000 | <a class="EntryGoto" id="Dane, L. and Gurkan, D."></a> |
| 2001 | <b class="myheading" style="position: relative; left: 5%;">Dane, L. and Gurkan, D.</b> |
| 2002 | |
| 2003 | <div class="BibEntry"> |
| 2004 | |
| 2005 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2006 | |
| 2007 | <li> |
| 2008 | |
| 2009 | |
| 2010 | <tr> |
| 2011 | <td valign="top">Author</td> |
| 2012 | <td valign="top">Dane, L. and Gurkan, D.</td> |
| 2013 | </tr> |
| 2014 | |
| 2015 | <tr> |
| 2016 | <td valign="top">Title</td> |
| 2017 | <td valign="top">GENI with a Network Processing Unit: Enriching SDN Application Experiments</td> |
| 2018 | </tr> |
| 2019 | |
| 2020 | <tr> |
| 2021 | <td valign="top">Booktitle</td> |
| 2022 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 2023 | </tr> |
| 2024 | |
| 2025 | <tr> |
| 2026 | <td valign="top">Publisher</td> |
| 2027 | <td valign="top">IEEE</td> |
| 2028 | </tr> |
| 2029 | |
| 2030 | <tr> |
| 2031 | <td valign="top">Year</td> |
| 2032 | <td valign="top">2014</td> |
| 2033 | </tr> |
| 2034 | |
| 2035 | <tr> |
| 2036 | <td valign="top">Abstract</td> |
| 2037 | <td valign="top">This paper reports the integration of Dell's specialized split data plane (SDP) OpenFlow switch into the GENI testbed. In addition, the paper outlines the research directions in network science and engineering that such a switch may enable together with a new perspective on education in network programming. An SDP switch can be used to perform some specialized processing on flows with special hardware accelerators in addition to hosting any application (running on a Linux OS) that a user may insert on the path of a flow. The SDP switch is composed of a Dell switch (PowerConnect 7024) with an internal physical connection to a sub-unit, Network Processor Unit (NPU), by Cavium Networks. Hosting an OpenvSwitch on the NPU with open hosting of Linux applications enables software-defined networking experiments. The integration challenges/process associated with this unit is presented as a future reference to other such foreign box integrations.</td> |
| 2038 | </tr> |
| 2039 | |
| 2040 | |
| 2041 | |
| 2042 | <tr> |
| 2043 | <td valign="top">DOI</td> |
| 2044 | <td valign="top">10.1109/gree.2014.27</td> |
| 2045 | </tr> |
| 2046 | |
| 2047 | |
| 2048 | |
| 2049 | <tr> |
| 2050 | <td valign="top">URL</td> |
| 2051 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.27">http://dx.doi.org/10.1109/gree.2014.27</a></td> |
| 2052 | </tr> |
| 2053 | |
| 2054 | |
| 2055 | </li> |
| 2056 | |
| 2057 | </table></div><br><br> |
| 2058 | |
| 2059 | |
| 2060 | |
| 2061 | |
1752 | 2062 | <a class="EntryGoto" id="Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D."></a> |
1753 | 2063 | <b class="myheading" style="position: relative; left: 5%;">Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D.</b> |
| 2942 | <a class="EntryGoto" id="Ghaffarinejad, A. and Syrotiuk, V. R."></a> |
| 2943 | <b class="myheading" style="position: relative; left: 5%;">Ghaffarinejad, A. and Syrotiuk, V. R.</b> |
| 2944 | |
| 2945 | <div class="BibEntry"> |
| 2946 | |
| 2947 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2948 | |
| 2949 | <li> |
| 2950 | |
| 2951 | |
| 2952 | <tr> |
| 2953 | <td valign="top">Author</td> |
| 2954 | <td valign="top">Ghaffarinejad, A. and Syrotiuk, V. R.</td> |
| 2955 | </tr> |
| 2956 | |
| 2957 | <tr> |
| 2958 | <td valign="top">Title</td> |
| 2959 | <td valign="top">Load Balancing in a Campus Network Using Software Defined Networking</td> |
| 2960 | </tr> |
| 2961 | |
| 2962 | <tr> |
| 2963 | <td valign="top">Booktitle</td> |
| 2964 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 2965 | </tr> |
| 2966 | |
| 2967 | <tr> |
| 2968 | <td valign="top">Publisher</td> |
| 2969 | <td valign="top">IEEE</td> |
| 2970 | </tr> |
| 2971 | |
| 2972 | <tr> |
| 2973 | <td valign="top">Year</td> |
| 2974 | <td valign="top">2014</td> |
| 2975 | </tr> |
| 2976 | |
| 2977 | <tr> |
| 2978 | <td valign="top">Abstract</td> |
| 2979 | <td valign="top">Today, commercial load balancers are often in use, including in the production network at Arizona State University (ASU). One of the main issues such load balancers face is that they use a static scheme for load distribution. However, at particular times of the academic year, such as during course registration, the network exhibits significant variations in both temporal and spatial traffic characteristics. At these times, students experience much greater latency and become frustrated with the network service. To address this problem, our aim is to develop an SDN-based approach to load balancing to better cope with the traffic variation.</td> |
| 2980 | </tr> |
| 2981 | |
| 2982 | |
| 2983 | |
| 2984 | <tr> |
| 2985 | <td valign="top">DOI</td> |
| 2986 | <td valign="top">10.1109/gree.2014.9</td> |
| 2987 | </tr> |
| 2988 | |
| 2989 | |
| 2990 | |
| 2991 | <tr> |
| 2992 | <td valign="top">URL</td> |
| 2993 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.9">http://dx.doi.org/10.1109/gree.2014.9</a></td> |
| 2994 | </tr> |
| 2995 | |
| 2996 | |
| 2997 | </li> |
| 2998 | |
| 2999 | </table></div><br><br> |
| 3000 | |
| 3001 | |
| 3002 | |
| 3003 | |
2632 | 3004 | <a class="EntryGoto" id="Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David"></a> |
2633 | 3005 | <b class="myheading" style="position: relative; left: 5%;">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</b> |
| 3490 | <a class="EntryGoto" id="Huang, Shu and Xu, Hao and Xin, Yufeng and Brieger, L. and Moore, R. and Rajasekar, A."></a> |
| 3491 | <b class="myheading" style="position: relative; left: 5%;">Huang, Shu and Xu, Hao and Xin, Yufeng and Brieger, L. and Moore, R. and Rajasekar, A.</b> |
| 3492 | |
| 3493 | <div class="BibEntry"> |
| 3494 | |
| 3495 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3496 | |
| 3497 | <li> |
| 3498 | |
| 3499 | |
| 3500 | <tr> |
| 3501 | <td valign="top">Author</td> |
| 3502 | <td valign="top">Huang, Shu and Xu, Hao and Xin, Yufeng and Brieger, L. and Moore, R. and Rajasekar, A.</td> |
| 3503 | </tr> |
| 3504 | |
| 3505 | <tr> |
| 3506 | <td valign="top">Title</td> |
| 3507 | <td valign="top">A Framework for Integration of Rule-Oriented Data Management Policies with Network Policies</td> |
| 3508 | </tr> |
| 3509 | |
| 3510 | <tr> |
| 3511 | <td valign="top">Booktitle</td> |
| 3512 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 3513 | </tr> |
| 3514 | |
| 3515 | <tr> |
| 3516 | <td valign="top">Publisher</td> |
| 3517 | <td valign="top">IEEE</td> |
| 3518 | </tr> |
| 3519 | |
| 3520 | <tr> |
| 3521 | <td valign="top">Year</td> |
| 3522 | <td valign="top">2014</td> |
| 3523 | </tr> |
| 3524 | |
| 3525 | <tr> |
| 3526 | <td valign="top">Abstract</td> |
| 3527 | <td valign="top">Traditionally data management software running on top of the Internet has very limited primitives to interact with the networking layer. This limitation has become a major road-block to develop next generation data management applications requiring high-bandwidth and dynamic network configuration. In this work, we present a policy-driven software framework that acts as an adaptation layer between the data management software and SDN networks. This framework allows a tight coupling between the data grid and the network and therefore makes complex workflow-like cross-layer computation possible. We have prototyped this adaptation layer integrated with iRODS, a popular policy-driven data grid software and Floodlight, a popular OpenFlow controller, and demonstrate how network policies become part of the overall data grid policies to improve the application performance.</td> |
| 3528 | </tr> |
| 3529 | |
| 3530 | |
| 3531 | |
| 3532 | <tr> |
| 3533 | <td valign="top">DOI</td> |
| 3534 | <td valign="top">10.1109/gree.2014.19</td> |
| 3535 | </tr> |
| 3536 | |
| 3537 | |
| 3538 | |
| 3539 | <tr> |
| 3540 | <td valign="top">URL</td> |
| 3541 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.19">http://dx.doi.org/10.1109/gree.2014.19</a></td> |
| 3542 | </tr> |
| 3543 | |
| 3544 | |
| 3545 | </li> |
| 3546 | |
| 3547 | </table></div><br><br> |
| 3548 | |
| 3549 | |
| 3550 | |
| 3551 | |
| 3805 | <a class="EntryGoto" id="Kangarlou, A. and Xu, Dongyan and Kozat, U. C. and Padala, P. and Lantz, B. and Igarashi, K."></a> |
| 3806 | <b class="myheading" style="position: relative; left: 5%;">Kangarlou, A. and Xu, Dongyan and Kozat, U. C. and Padala, P. and Lantz, B. and Igarashi, K.</b> |
| 3807 | |
| 3808 | <div class="BibEntry"> |
| 3809 | |
| 3810 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3811 | |
| 3812 | <li> |
| 3813 | |
| 3814 | |
| 3815 | <tr> |
| 3816 | <td valign="top">Author</td> |
| 3817 | <td valign="top">Kangarlou, A. and Xu, Dongyan and Kozat, U. C. and Padala, P. and Lantz, B. and Igarashi, K.</td> |
| 3818 | </tr> |
| 3819 | |
| 3820 | <tr> |
| 3821 | <td valign="top">Title</td> |
| 3822 | <td valign="top">In-network live snapshot service for recovering virtual infrastructures</td> |
| 3823 | </tr> |
| 3824 | |
| 3825 | <tr> |
| 3826 | <td valign="top">Journal</td> |
| 3827 | <td valign="top">Network, IEEE</td> |
| 3828 | </tr> |
| 3829 | |
| 3830 | <tr> |
| 3831 | <td valign="top">Publisher</td> |
| 3832 | <td valign="top">IEEE</td> |
| 3833 | </tr> |
| 3834 | |
| 3835 | <tr> |
| 3836 | <td valign="top">Year</td> |
| 3837 | <td valign="top">2011</td> |
| 3838 | </tr> |
| 3839 | |
| 3840 | <tr> |
| 3841 | <td valign="top">Abstract</td> |
| 3842 | <td valign="top">Infrastructure as a Service (IaaS) has become an increasingly popular type of service for both private and public clouds. The virtual infrastructures that enable IaaS support multitenancy by multiplexing the computational resources of data centers and result in substantial reductions in operational costs. Since hardware and software failures occur on a routine basis in large-scale systems, it is imperative for cloud providers to offer various failure recovery options for distributed services hosted on such infrastructures. In this article we present GENI-VIOLIN, a new cloud capability that can checkpoint a stateful distributed service while incurring very low overhead. The unique aspect of GENI-VIOLIN compared to previous work is that GENI-VIOLIN exploits programmable OpenFlow switches to provide checkpointing services in the network, thereby requiring minimal changes to the end host virtualization framework. We have developed a prototype of GENI-VIOLIN using the GENI infrastructure, and have demonstrated GENI-VIOLIN's checkpoint and restore capability across multiple GENI sites.</td> |
| 3843 | </tr> |
| 3844 | |
| 3845 | |
| 3846 | |
| 3847 | <tr> |
| 3848 | <td valign="top">DOI</td> |
| 3849 | <td valign="top">10.1109/mnet.2011.5958003</td> |
| 3850 | </tr> |
| 3851 | |
| 3852 | |
| 3853 | |
| 3854 | <tr> |
| 3855 | <td valign="top">URL</td> |
| 3856 | <td valign="top"><a href="http://dx.doi.org/10.1109/mnet.2011.5958003">http://dx.doi.org/10.1109/mnet.2011.5958003</a></td> |
| 3857 | </tr> |
| 3858 | |
| 3859 | |
| 3860 | </li> |
| 3861 | |
| 3862 | </table></div><br><br> |
| 3863 | |
| 3864 | |
| 3865 | |
| 3866 | |
| 4430 | <a class="EntryGoto" id="Kuai, Meng and Hong, Xiaoyan and Flores, R. R."></a> |
| 4431 | <b class="myheading" style="position: relative; left: 5%;">Kuai, Meng and Hong, Xiaoyan and Flores, R. R.</b> |
| 4432 | |
| 4433 | <div class="BibEntry"> |
| 4434 | |
| 4435 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4436 | |
| 4437 | <li> |
| 4438 | |
| 4439 | |
| 4440 | <tr> |
| 4441 | <td valign="top">Author</td> |
| 4442 | <td valign="top">Kuai, Meng and Hong, Xiaoyan and Flores, R. R.</td> |
| 4443 | </tr> |
| 4444 | |
| 4445 | <tr> |
| 4446 | <td valign="top">Title</td> |
| 4447 | <td valign="top">Evaluating Interest Broadcast in Vehicular Named Data Networking</td> |
| 4448 | </tr> |
| 4449 | |
| 4450 | <tr> |
| 4451 | <td valign="top">Booktitle</td> |
| 4452 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 4453 | </tr> |
| 4454 | |
| 4455 | <tr> |
| 4456 | <td valign="top">Publisher</td> |
| 4457 | <td valign="top">IEEE</td> |
| 4458 | </tr> |
| 4459 | |
| 4460 | <tr> |
| 4461 | <td valign="top">Year</td> |
| 4462 | <td valign="top">2014</td> |
| 4463 | </tr> |
| 4464 | |
| 4465 | <tr> |
| 4466 | <td valign="top">Abstract</td> |
| 4467 | <td valign="top">Vehicular Ad-hoc Networks (VANETs) are expected to provide assistance to various applications, such as accident notification and emergency announcement. Named Data Networking (NDN) has been recognized as a more suitable architecture than TCP/IP for application in VANETs due to its ability to handle high mobility and intermittent connectivity. The Vehicular NDN (V-NDN) has further made special architectural modifications for VANETs. However, V-NDN can be challenged in its extensive use of broadcast in dense network situations. For example, broadcasting of interest packets could lead to more collisions. In this study, we explore the broadcast performance of V-NDN using the ORBIT testbed. Our experimental results show that VNDN suffers an increased loss ratio in dense network scenarios because of Wifi broadcast collision, and it is important to find a suitable range of values to be distributed by the collision avoidance timer before transmission.</td> |
| 4468 | </tr> |
| 4469 | |
| 4470 | |
| 4471 | |
| 4472 | <tr> |
| 4473 | <td valign="top">DOI</td> |
| 4474 | <td valign="top">10.1109/gree.2014.23</td> |
| 4475 | </tr> |
| 4476 | |
| 4477 | |
| 4478 | |
| 4479 | <tr> |
| 4480 | <td valign="top">URL</td> |
| 4481 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.23">http://dx.doi.org/10.1109/gree.2014.23</a></td> |
| 4482 | </tr> |
| 4483 | |
| 4484 | |
| 4485 | </li> |
| 4486 | |
| 4487 | </table></div><br><br> |
| 4488 | |
| 4489 | |
| 4490 | |
| 4491 | |
| 4921 | <a class="EntryGoto" id="Liu, J. and Abu Obaida, M. and Dos Santos, F."></a> |
| 4922 | <b class="myheading" style="position: relative; left: 5%;">Liu, J. and Abu Obaida, M. and Dos Santos, F.</b> |
| 4923 | |
| 4924 | <div class="BibEntry"> |
| 4925 | |
| 4926 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4927 | |
| 4928 | <li> |
| 4929 | |
| 4930 | |
| 4931 | <tr> |
| 4932 | <td valign="top">Author</td> |
| 4933 | <td valign="top">Liu, J. and Abu Obaida, M. and Dos Santos, F.</td> |
| 4934 | </tr> |
| 4935 | |
| 4936 | <tr> |
| 4937 | <td valign="top">Title</td> |
| 4938 | <td valign="top">Toward PrimoGENI Constellation for Distributed At-Scale Hybrid Network Test</td> |
| 4939 | </tr> |
| 4940 | |
| 4941 | <tr> |
| 4942 | <td valign="top">Booktitle</td> |
| 4943 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 4944 | </tr> |
| 4945 | |
| 4946 | <tr> |
| 4947 | <td valign="top">Publisher</td> |
| 4948 | <td valign="top">IEEE</td> |
| 4949 | </tr> |
| 4950 | |
| 4951 | <tr> |
| 4952 | <td valign="top">Year</td> |
| 4953 | <td valign="top">2014</td> |
| 4954 | </tr> |
| 4955 | |
| 4956 | <tr> |
| 4957 | <td valign="top">Abstract</td> |
| 4958 | <td valign="top">PrimoGENI provides a GENI aggregate interface through which experimenters can launch large-scale network experiments on GENI resources consisting of both simulated network and real instances of network applications directly running on either virtual or physical machines. Real network traffic generated by the network applications can be introduced into the simulated network in real time and be subjected to proper delays and losses according to the simulated network conditions. To leverage the previous PrimoGENI prototype activities, PrimoGENI Constellation is a newly launched project, which will focus specifically on facilitating distributed at-scale hybrid experiments for real-world high-impact applications. In this paper, we provide an overview of the major achievements of PrimoGENI, and more importantly, discuss the ongoing efforts in PrimoGENI Constellation aiming to achieve the full potential of the hybrid network experiment approach. The main thrusts of PrimoGENI Constellation include: 1) supporting at-scale network experiments potentially distributed on different types of GENI resources in accordance with the GENI experiment workflow, 2) focusing on target applications supporting prominent and high-impact future Internet research, and 3) building the user community through extensive education and research training, and online archives of experiment results and user experiences.</td> |
| 4959 | </tr> |
| 4960 | |
| 4961 | |
| 4962 | |
| 4963 | <tr> |
| 4964 | <td valign="top">DOI</td> |
| 4965 | <td valign="top">10.1109/gree.2014.10</td> |
| 4966 | </tr> |
| 4967 | |
| 4968 | |
| 4969 | |
| 4970 | <tr> |
| 4971 | <td valign="top">URL</td> |
| 4972 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.10">http://dx.doi.org/10.1109/gree.2014.10</a></td> |
| 4973 | </tr> |
| 4974 | |
| 4975 | |
| 4976 | </li> |
| 4977 | |
| 4978 | </table></div><br><br> |
| 4979 | |
| 4980 | |
| 4981 | |
| 4982 | |
| 5104 | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
| 5105 | </tr> |
| 5106 | |
| 5107 | <tr> |
| 5108 | <td valign="top">Year</td> |
| 5109 | <td valign="top">2012</td> |
| 5110 | </tr> |
| 5111 | |
| 5112 | |
| 5113 | |
| 5114 | <tr> |
| 5115 | <td valign="top">DOI</td> |
| 5116 | <td valign="top">10.1109/NOMS.2012.6211961</td> |
| 5117 | </tr> |
| 5118 | |
| 5119 | |
| 5120 | |
| 5121 | <tr> |
| 5122 | <td valign="top">URL</td> |
| 5123 | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
| 5124 | </tr> |
| 5125 | |
| 5126 | |
| 5127 | </li> |
| 5128 | |
| 5129 | </table></div><br><br> |
| 5130 | |
| 5131 | |
| 5132 | <div class="BibEntry"> |
| 5133 | |
| 5134 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5135 | |
| 5136 | <li> |
| 5137 | |
| 5138 | |
| 5139 | <tr> |
| 5140 | <td valign="top">Author</td> |
| 5141 | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
| 5142 | </tr> |
| 5143 | |
| 5144 | <tr> |
| 5145 | <td valign="top">Title</td> |
| 5146 | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
| 5147 | </tr> |
| 5148 | |
| 5149 | <tr> |
| 5150 | <td valign="top">Booktitle</td> |
4527 | | <div class="BibEntry"> |
4528 | | |
4529 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4530 | | |
4531 | | <li> |
4532 | | |
4533 | | |
4534 | | <tr> |
4535 | | <td valign="top">Author</td> |
4536 | | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
4537 | | </tr> |
4538 | | |
4539 | | <tr> |
4540 | | <td valign="top">Title</td> |
4541 | | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
4542 | | </tr> |
4543 | | |
4544 | | <tr> |
4545 | | <td valign="top">Booktitle</td> |
4546 | | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
4547 | | </tr> |
4548 | | |
4549 | | <tr> |
4550 | | <td valign="top">Year</td> |
4551 | | <td valign="top">2012</td> |
4552 | | </tr> |
4553 | | |
4554 | | |
4555 | | |
4556 | | <tr> |
4557 | | <td valign="top">DOI</td> |
4558 | | <td valign="top">10.1109/NOMS.2012.6211961</td> |
4559 | | </tr> |
4560 | | |
4561 | | |
4562 | | |
4563 | | <tr> |
4564 | | <td valign="top">URL</td> |
4565 | | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
4566 | | </tr> |
4567 | | |
4568 | | |
4569 | | </li> |
4570 | | |
4571 | | </table></div><br><br> |
4572 | | |
4573 | | |
| 5325 | <a class="EntryGoto" id="Malishevskiy, A. and Gurkan, D. and Dane, L. and Narisetty, R. and Narayan, S. and Bailey, S."></a> |
| 5326 | <b class="myheading" style="position: relative; left: 5%;">Malishevskiy, A. and Gurkan, D. and Dane, L. and Narisetty, R. and Narayan, S. and Bailey, S.</b> |
| 5327 | |
| 5328 | <div class="BibEntry"> |
| 5329 | |
| 5330 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5331 | |
| 5332 | <li> |
| 5333 | |
| 5334 | |
| 5335 | <tr> |
| 5336 | <td valign="top">Author</td> |
| 5337 | <td valign="top">Malishevskiy, A. and Gurkan, D. and Dane, L. and Narisetty, R. and Narayan, S. and Bailey, S.</td> |
| 5338 | </tr> |
| 5339 | |
| 5340 | <tr> |
| 5341 | <td valign="top">Title</td> |
| 5342 | <td valign="top">OpenFlow-Based Network Management with Visualization of Managed Elements</td> |
| 5343 | </tr> |
| 5344 | |
| 5345 | <tr> |
| 5346 | <td valign="top">Booktitle</td> |
| 5347 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 5348 | </tr> |
| 5349 | |
| 5350 | <tr> |
| 5351 | <td valign="top">Publisher</td> |
| 5352 | <td valign="top">IEEE</td> |
| 5353 | </tr> |
| 5354 | |
| 5355 | <tr> |
| 5356 | <td valign="top">Year</td> |
| 5357 | <td valign="top">2014</td> |
| 5358 | </tr> |
| 5359 | |
| 5360 | <tr> |
| 5361 | <td valign="top">Abstract</td> |
| 5362 | <td valign="top">The new software defined networking (SDN) paradigm advocates separating the data plane and the control plane, making network switches simple packet forwarding devices and leaving a logically-centralized software to control the behavior of the network. SDN introduces new possibilities for a centralized network management and configuration. The main benefit is having the programmability of the forwarding tables according to the needs of the applications. Therefore, efficient and effective management of network resources becomes even more crucial in providing effective control plane functionality to the applications. OpenFlow standardization efforts at the Open Networking Foundation resulted in an OpenFlow Configuration (OFConfig) specification to address the management of resources in networks with OpenFlow-enabled switches. We report the implementation of an intuitively easy to use interface for the OpenFlow-capable logical devices as managed resources in a SDN.</td> |
| 5363 | </tr> |
| 5364 | |
| 5365 | |
| 5366 | |
| 5367 | <tr> |
| 5368 | <td valign="top">DOI</td> |
| 5369 | <td valign="top">10.1109/gree.2014.21</td> |
| 5370 | </tr> |
| 5371 | |
| 5372 | |
| 5373 | |
| 5374 | <tr> |
| 5375 | <td valign="top">URL</td> |
| 5376 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.21">http://dx.doi.org/10.1109/gree.2014.21</a></td> |
| 5377 | </tr> |
| 5378 | |
| 5379 | |
| 5380 | </li> |
| 5381 | |
| 5382 | </table></div><br><br> |
| 5383 | |
| 5384 | |
| 5385 | |
| 5386 | |
| 5439 | <a class="EntryGoto" id="Mandal, A. and Ruth, P. and Baldin, I. and Xin, Yufeng and Castillo, C. and Rynge, M. and Deelman, E."></a> |
| 5440 | <b class="myheading" style="position: relative; left: 5%;">Mandal, A. and Ruth, P. and Baldin, I. and Xin, Yufeng and Castillo, C. and Rynge, M. and Deelman, E.</b> |
| 5441 | |
| 5442 | <div class="BibEntry"> |
| 5443 | |
| 5444 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5445 | |
| 5446 | <li> |
| 5447 | |
| 5448 | |
| 5449 | <tr> |
| 5450 | <td valign="top">Author</td> |
| 5451 | <td valign="top">Mandal, A. and Ruth, P. and Baldin, I. and Xin, Yufeng and Castillo, C. and Rynge, M. and Deelman, E.</td> |
| 5452 | </tr> |
| 5453 | |
| 5454 | <tr> |
| 5455 | <td valign="top">Title</td> |
| 5456 | <td valign="top">Leveraging and Adapting ExoGENI Infrastructure for Data-Driven Domain Science Workflows</td> |
| 5457 | </tr> |
| 5458 | |
| 5459 | <tr> |
| 5460 | <td valign="top">Booktitle</td> |
| 5461 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 5462 | </tr> |
| 5463 | |
| 5464 | <tr> |
| 5465 | <td valign="top">Publisher</td> |
| 5466 | <td valign="top">IEEE</td> |
| 5467 | </tr> |
| 5468 | |
| 5469 | <tr> |
| 5470 | <td valign="top">Year</td> |
| 5471 | <td valign="top">2014</td> |
| 5472 | </tr> |
| 5473 | |
| 5474 | <tr> |
| 5475 | <td valign="top">Abstract</td> |
| 5476 | <td valign="top">In this paper, we present our ongoing work on a novel use of networked cloud infrastructures like GENI for running adaptive domain science applications. We specifically report our recent experience at the SC'13 conference with showcasing a dynamically adaptable cloud infrastructure driven by the demand of a data-driven scientific workflow. Our work used resources from ExoGENI - a Networked Infrastructure-as-a-Service (NIaaS) testbed funded through NSF's Global Environment for Network Innovation (GENI) project. We used on-ramps to compute and data resources in the RENCI SC'13 booth to a large dynamically provisioned 'slice' spanning multiple ExoGENI cloud sites that were interconnected using dynamically provisioned connections from Internet2, NLR and ESnet. The slice was used to execute a scientific workflow driven from a computer in the RENCI SC'13 booth connected to the slice via SCinet. A closed-loop control mechanism leveraging a monitoring infrastructure based on persistent queries adapted the slice to the demands of the workflow as it executed.</td> |
| 5477 | </tr> |
| 5478 | |
| 5479 | |
| 5480 | |
| 5481 | <tr> |
| 5482 | <td valign="top">DOI</td> |
| 5483 | <td valign="top">10.1109/gree.2014.12</td> |
| 5484 | </tr> |
| 5485 | |
| 5486 | |
| 5487 | |
| 5488 | <tr> |
| 5489 | <td valign="top">URL</td> |
| 5490 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.12">http://dx.doi.org/10.1109/gree.2014.12</a></td> |
| 5491 | </tr> |
| 5492 | |
| 5493 | |
| 5494 | </li> |
| 5495 | |
| 5496 | </table></div><br><br> |
| 5497 | |
| 5498 | |
| 5499 | |
| 5500 | |
| 5677 | <a class="EntryGoto" id="Maziku, H. and Shetty, S."></a> |
| 5678 | <b class="myheading" style="position: relative; left: 5%;">Maziku, H. and Shetty, S.</b> |
| 5679 | |
| 5680 | <div class="BibEntry"> |
| 5681 | |
| 5682 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5683 | |
| 5684 | <li> |
| 5685 | |
| 5686 | |
| 5687 | <tr> |
| 5688 | <td valign="top">Author</td> |
| 5689 | <td valign="top">Maziku, H. and Shetty, S.</td> |
| 5690 | </tr> |
| 5691 | |
| 5692 | <tr> |
| 5693 | <td valign="top">Title</td> |
| 5694 | <td valign="top">Network Aware VM Migration in Cloud Data Centers</td> |
| 5695 | </tr> |
| 5696 | |
| 5697 | <tr> |
| 5698 | <td valign="top">Booktitle</td> |
| 5699 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 5700 | </tr> |
| 5701 | |
| 5702 | <tr> |
| 5703 | <td valign="top">Publisher</td> |
| 5704 | <td valign="top">IEEE</td> |
| 5705 | </tr> |
| 5706 | |
| 5707 | <tr> |
| 5708 | <td valign="top">Year</td> |
| 5709 | <td valign="top">2014</td> |
| 5710 | </tr> |
| 5711 | |
| 5712 | <tr> |
| 5713 | <td valign="top">Abstract</td> |
| 5714 | <td valign="top">Host virtualization allows data centers to live migrate an entire virtual Machine (VM) to support data center maintenance, disaster avoidance and workload balancing. Live VM Migration can consume nearly the entire bandwidth for memory intensive applications which impacts the performance of competing flows in the network. A network-aware VM Migration operation ensures a fair share allocation of network resources, leading to a seamless Virtual Machine mobility while minimizing degradation of network performance. Recently, VMPatrol was proposed as a network aware VM Migration model which uses a single physical machine and QoS policies to simulate and implement a cost of migration model. However, the performance evaluation of VMPatrol was conducted in an emulated environment. In this paper, we empirically evaluate the performance of VMPatrol in an experimental GENI testbed characterized by wide-area network dynamics and realistic traffic scenarios. We deploy OpenFlow end to end QoS policies to reserve minimum bandwidths required for successful VM Migration. Preliminary results demonstrate that enforcing QoS policies in terms of bandwidth reservation relieves the network of possible overloads during migration. The results indicate that time taken to complete VM Migration depends on VM's memory size, VM page dirty rate and the available bandwidth. The results also indicate that length of stop copy phase and minimum required progress amount are critical parameters in estimating the VM migration cost.</td> |
| 5715 | </tr> |
| 5716 | |
| 5717 | |
| 5718 | |
| 5719 | <tr> |
| 5720 | <td valign="top">DOI</td> |
| 5721 | <td valign="top">10.1109/gree.2014.18</td> |
| 5722 | </tr> |
| 5723 | |
| 5724 | |
| 5725 | |
| 5726 | <tr> |
| 5727 | <td valign="top">URL</td> |
| 5728 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.18">http://dx.doi.org/10.1109/gree.2014.18</a></td> |
| 5729 | </tr> |
| 5730 | |
| 5731 | |
| 5732 | </li> |
| 5733 | |
| 5734 | </table></div><br><br> |
| 5735 | |
| 5736 | |
| 5737 | |
| 5738 | |
| 5910 | <a class="EntryGoto" id="Mekky, H. and Jin, Cheng and Zhang, Zhi-Li"></a> |
| 5911 | <b class="myheading" style="position: relative; left: 5%;">Mekky, H. and Jin, Cheng and Zhang, Zhi-Li</b> |
| 5912 | |
| 5913 | <div class="BibEntry"> |
| 5914 | |
| 5915 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5916 | |
| 5917 | <li> |
| 5918 | |
| 5919 | |
| 5920 | <tr> |
| 5921 | <td valign="top">Author</td> |
| 5922 | <td valign="top">Mekky, H. and Jin, Cheng and Zhang, Zhi-Li</td> |
| 5923 | </tr> |
| 5924 | |
| 5925 | <tr> |
| 5926 | <td valign="top">Title</td> |
| 5927 | <td valign="top">VIRO-GENI: SDN-Based Approach for a Non-IP Protocol in GENI</td> |
| 5928 | </tr> |
| 5929 | |
| 5930 | <tr> |
| 5931 | <td valign="top">Booktitle</td> |
| 5932 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 5933 | </tr> |
| 5934 | |
| 5935 | <tr> |
| 5936 | <td valign="top">Publisher</td> |
| 5937 | <td valign="top">IEEE</td> |
| 5938 | </tr> |
| 5939 | |
| 5940 | <tr> |
| 5941 | <td valign="top">Year</td> |
| 5942 | <td valign="top">2014</td> |
| 5943 | </tr> |
| 5944 | |
| 5945 | <tr> |
| 5946 | <td valign="top">Abstract</td> |
| 5947 | <td valign="top">Non-IP protocols always presented a challenge for network researchers to deploy and test at large scale. GENI infrastructure presents a testbed to deploy large scale network experiments, however, non-IP protocols still raises a challenge to deploy since IP is the narrow waist of the Internet. SDN provides an opportunity implement non-IP protocols, however, the OpenFlow standard is still tied to Ethernet/IP/TCP protocol stack. In the paper, we utilize SDN to provide a framework to deploy and test a non-IP protocol, Virtual Id Routing (VIRO), in GENI using an extended Open vSwitch platform.</td> |
| 5948 | </tr> |
| 5949 | |
| 5950 | |
| 5951 | |
| 5952 | <tr> |
| 5953 | <td valign="top">DOI</td> |
| 5954 | <td valign="top">10.1109/gree.2014.14</td> |
| 5955 | </tr> |
| 5956 | |
| 5957 | |
| 5958 | |
| 5959 | <tr> |
| 5960 | <td valign="top">URL</td> |
| 5961 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.14">http://dx.doi.org/10.1109/gree.2014.14</a></td> |
| 5962 | </tr> |
| 5963 | |
| 5964 | |
| 5965 | </li> |
| 5966 | |
| 5967 | </table></div><br><br> |
| 5968 | |
| 5969 | |
| 5970 | |
| 5971 | |
| 7809 | <a class="EntryGoto" id="Sterbenz, JamesP and Çetinkaya, EgemenK and Hameed, MahmoodA and Jabbar, Abdul and Qian, Shi and Rohrer, JustinP"></a> |
| 7810 | <b class="myheading" style="position: relative; left: 5%;">Sterbenz, JamesP and Çetinkaya, EgemenK and Hameed, MahmoodA and Jabbar, Abdul and Qian, Shi and Rohrer, JustinP</b> |
| 7811 | |
| 7812 | <div class="BibEntry"> |
| 7813 | |
| 7814 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 7815 | |
| 7816 | <li> |
| 7817 | |
| 7818 | |
| 7819 | <tr> |
| 7820 | <td valign="top">Author</td> |
| 7821 | <td valign="top">Sterbenz, JamesP and Çetinkaya, EgemenK and Hameed, MahmoodA and Jabbar, Abdul and Qian, Shi and Rohrer, JustinP</td> |
| 7822 | </tr> |
| 7823 | |
| 7824 | <tr> |
| 7825 | <td valign="top">Title</td> |
| 7826 | <td valign="top">Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation</td> |
| 7827 | </tr> |
| 7828 | |
| 7829 | <tr> |
| 7830 | <td valign="top">Journal</td> |
| 7831 | <td valign="top">Telecommunication Systems</td> |
| 7832 | </tr> |
| 7833 | |
| 7834 | <tr> |
| 7835 | <td valign="top">Booktitle</td> |
| 7836 | <td valign="top">Telecommunication Systems</td> |
| 7837 | </tr> |
| 7838 | |
| 7839 | <tr> |
| 7840 | <td valign="top">Publisher</td> |
| 7841 | <td valign="top">Springer US</td> |
| 7842 | </tr> |
| 7843 | |
| 7844 | <tr> |
| 7845 | <td valign="top">Year</td> |
| 7846 | <td valign="top">2013</td> |
| 7847 | </tr> |
| 7848 | |
| 7849 | <tr> |
| 7850 | <td valign="top">Abstract</td> |
| 7851 | <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of future networks. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of topology generation, analytical, simulation, and experimental emulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td> |
| 7852 | </tr> |
| 7853 | |
| 7854 | |
| 7855 | |
| 7856 | <tr> |
| 7857 | <td valign="top">DOI</td> |
| 7858 | <td valign="top">10.1007/s11235-011-9573-6</td> |
| 7859 | </tr> |
| 7860 | |
| 7861 | |
| 7862 | |
| 7863 | <tr> |
| 7864 | <td valign="top">URL</td> |
| 7865 | <td valign="top"><a href="http://dx.doi.org/10.1007/s11235-011-9573-6">http://dx.doi.org/10.1007/s11235-011-9573-6</a></td> |
| 7866 | </tr> |
| 7867 | |
| 7868 | |
| 7869 | </li> |
| 7870 | |
| 7871 | </table></div><br><br> |
| 7872 | |
| 7873 | |
| 7874 | |
| 7875 | |
6941 | 7876 | <a class="EntryGoto" id="Suñé, M. and Bergesio, L. and Woesner, H. and Rothe, T. and K\\opsel, A. and Colle, D. and Puype, B. and Simeonidou, D. and Nejabati, R. and Channegowda, M. and Kind, M. and Dietz, T. and Autenrieth, A. and Kotronis, V. and Salvadori, E. and Salsano, S. and K\\orner, M. and Sharma, S."></a> |
6942 | 7877 | <b class="myheading" style="position: relative; left: 5%;">Suñé, M. and Bergesio, L. and Woesner, H. and Rothe, T. and K\\opsel, A. and Colle, D. and Puype, B. and Simeonidou, D. and Nejabati, R. and Channegowda, M. and Kind, M. and Dietz, T. and Autenrieth, A. and Kotronis, V. and Salvadori, E. and Salsano, S. and K\\orner, M. and Sharma, S.</b> |
| 8972 | <a class="EntryGoto" id="Velusamy, G. and Gurkan, D. and Narayan, S. and Baily, S."></a> |
| 8973 | <b class="myheading" style="position: relative; left: 5%;">Velusamy, G. and Gurkan, D. and Narayan, S. and Baily, S.</b> |
| 8974 | |
| 8975 | <div class="BibEntry"> |
| 8976 | |
| 8977 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 8978 | |
| 8979 | <li> |
| 8980 | |
| 8981 | |
| 8982 | <tr> |
| 8983 | <td valign="top">Author</td> |
| 8984 | <td valign="top">Velusamy, G. and Gurkan, D. and Narayan, S. and Baily, S.</td> |
| 8985 | </tr> |
| 8986 | |
| 8987 | <tr> |
| 8988 | <td valign="top">Title</td> |
| 8989 | <td valign="top">Fault-Tolerant OpenFlow-Based Software Switch Architecture with LINC Switches for a Reliable Network Data Exchange</td> |
| 8990 | </tr> |
| 8991 | |
| 8992 | <tr> |
| 8993 | <td valign="top">Booktitle</td> |
| 8994 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 8995 | </tr> |
| 8996 | |
| 8997 | <tr> |
| 8998 | <td valign="top">Publisher</td> |
| 8999 | <td valign="top">IEEE</td> |
| 9000 | </tr> |
| 9001 | |
| 9002 | <tr> |
| 9003 | <td valign="top">Year</td> |
| 9004 | <td valign="top">2014</td> |
| 9005 | </tr> |
| 9006 | |
| 9007 | <tr> |
| 9008 | <td valign="top">Abstract</td> |
| 9009 | <td valign="top">The switches are essential for forwarding the packets in a local area network. If a switch fails, then the packets are not able to reach their destination, in spite of their long journey from the source. The new trend in Software Defined Networking (SDN) has made the use of software switches such as the OpenvSwitch quite popular. These software switches are used in data centers to connect virtual machines on which application servers are deployed. Such switches have the advantages of software: ease of development and flexibility, with less optimal testing and reliability measures than hardware systems. The Software switches are required to be resilient to failure because the applications servers which are running from the VMs which are connected through them should always be connected with its clients. So fault-tolerance becomes an important aspect in the use of software switches. In this paper, we explore one mechanism for fault tolerance of LINC (Link Is Not Closed), an open source OpenFlow switch, which is written in Erlang programming language. Distributed system, concurrency, and fault-tolerance are built-in features of Erlang. We leverage these features of Erlang to realize a fault-tolerant distributed LINC switch system.</td> |
| 9010 | </tr> |
| 9011 | |
| 9012 | |
| 9013 | |
| 9014 | <tr> |
| 9015 | <td valign="top">DOI</td> |
| 9016 | <td valign="top">10.1109/gree.2014.17</td> |
| 9017 | </tr> |
| 9018 | |
| 9019 | |
| 9020 | |
| 9021 | <tr> |
| 9022 | <td valign="top">URL</td> |
| 9023 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.17">http://dx.doi.org/10.1109/gree.2014.17</a></td> |
| 9024 | </tr> |
| 9025 | |
| 9026 | |
| 9027 | </li> |
| 9028 | |
| 9029 | </table></div><br><br> |
| 9030 | |
| 9031 | |
| 9032 | |
| 9033 | |
| 9277 | <a class="EntryGoto" id="Wang, Yuefeng and Matta, I. and Akhtar, N."></a> |
| 9278 | <b class="myheading" style="position: relative; left: 5%;">Wang, Yuefeng and Matta, I. and Akhtar, N.</b> |
| 9279 | |
| 9280 | <div class="BibEntry"> |
| 9281 | |
| 9282 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 9283 | |
| 9284 | <li> |
| 9285 | |
| 9286 | |
| 9287 | <tr> |
| 9288 | <td valign="top">Author</td> |
| 9289 | <td valign="top">Wang, Yuefeng and Matta, I. and Akhtar, N.</td> |
| 9290 | </tr> |
| 9291 | |
| 9292 | <tr> |
| 9293 | <td valign="top">Title</td> |
| 9294 | <td valign="top">Experimenting with Routing Policies Using ProtoRINA over GENI</td> |
| 9295 | </tr> |
| 9296 | |
| 9297 | <tr> |
| 9298 | <td valign="top">Booktitle</td> |
| 9299 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 9300 | </tr> |
| 9301 | |
| 9302 | <tr> |
| 9303 | <td valign="top">Publisher</td> |
| 9304 | <td valign="top">IEEE</td> |
| 9305 | </tr> |
| 9306 | |
| 9307 | <tr> |
| 9308 | <td valign="top">Year</td> |
| 9309 | <td valign="top">2014</td> |
| 9310 | </tr> |
| 9311 | |
| 9312 | <tr> |
| 9313 | <td valign="top">Abstract</td> |
| 9314 | <td valign="top">ProtoRINA is a user-space prototype of the Recursive InterNetwork Architecture (RINA), a new architecture that overcomes inherent weaknesses of the current Internet, e:g:, security, mobility, and manageability. By separating mechanisms and policies, RINA supports the programmability of different control and management policies over different communication scopes while using the same mechanisms. GENI (Global Environment for Network Innovations) provides a large-scale virtual network testbed that supports experimentation and possible deployment of future network architectures. In this paper, using ProtoRINA over GENI resources, we demonstrate how RINA's support for the scoping of routing control and management, and instantiation of different routing policies, can be leveraged to yield faster convergence and lower routing overhead in the face of node or link failures.</td> |
| 9315 | </tr> |
| 9316 | |
| 9317 | |
| 9318 | |
| 9319 | <tr> |
| 9320 | <td valign="top">DOI</td> |
| 9321 | <td valign="top">10.1109/gree.2014.11</td> |
| 9322 | </tr> |
| 9323 | |
| 9324 | |
| 9325 | |
| 9326 | <tr> |
| 9327 | <td valign="top">URL</td> |
| 9328 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.11">http://dx.doi.org/10.1109/gree.2014.11</a></td> |
| 9329 | </tr> |
| 9330 | |
| 9331 | |
| 9332 | </li> |
| 9333 | |
| 9334 | </table></div><br><br> |
| 9335 | |
| 9336 | |
| 9337 | |
| 9338 | |
| 9597 | <a class="EntryGoto" id="Xu, Gang and Amariucai, G. and Guan, Yong"></a> |
| 9598 | <b class="myheading" style="position: relative; left: 5%;">Xu, Gang and Amariucai, G. and Guan, Yong</b> |
| 9599 | |
| 9600 | <div class="BibEntry"> |
| 9601 | |
| 9602 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 9603 | |
| 9604 | <li> |
| 9605 | |
| 9606 | |
| 9607 | <tr> |
| 9608 | <td valign="top">Author</td> |
| 9609 | <td valign="top">Xu, Gang and Amariucai, G. and Guan, Yong</td> |
| 9610 | </tr> |
| 9611 | |
| 9612 | <tr> |
| 9613 | <td valign="top">Title</td> |
| 9614 | <td valign="top">Delegation of Computation with Verification Outsourcing Using GENI Infrastructure</td> |
| 9615 | </tr> |
| 9616 | |
| 9617 | <tr> |
| 9618 | <td valign="top">Booktitle</td> |
| 9619 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 9620 | </tr> |
| 9621 | |
| 9622 | <tr> |
| 9623 | <td valign="top">Publisher</td> |
| 9624 | <td valign="top">IEEE</td> |
| 9625 | </tr> |
| 9626 | |
| 9627 | <tr> |
| 9628 | <td valign="top">Year</td> |
| 9629 | <td valign="top">2014</td> |
| 9630 | </tr> |
| 9631 | |
| 9632 | <tr> |
| 9633 | <td valign="top">Abstract</td> |
| 9634 | <td valign="top">In the new cloud computing paradigm, outsourcing computation is a fundamental principle. Among its various aspects, the correctness of the computation result remains paramount. This motivates the birth of verifiable computation, which aims at efficiently checking the result for general-purpose computation. Although significant progress has been made in verifiable computation towards practice, the verifier's workload still remains too high. Only through batching or amortizing the very expensive investment over a large number of computation instances, can the verifiers cost be less than re-computing the computation task from the scratch. In the work of delegation of verification (PODC'13), Xu et al. proposes that the client can also outsource (again) the verification to a third party. However, whether this idea is feasible in large scale network is not clear. In this paper, we propose to adopt the Global Environment for Network Innovation (GENI) infrastructure, which is known as a mature virtual laboratory for exploring future Internet to investigate the feasibility of outsourcing computation/verification in large scale networks.</td> |
| 9635 | </tr> |
| 9636 | |
| 9637 | |
| 9638 | |
| 9639 | <tr> |
| 9640 | <td valign="top">DOI</td> |
| 9641 | <td valign="top">10.1109/gree.2014.16</td> |
| 9642 | </tr> |
| 9643 | |
| 9644 | |
| 9645 | |
| 9646 | <tr> |
| 9647 | <td valign="top">URL</td> |
| 9648 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.16">http://dx.doi.org/10.1109/gree.2014.16</a></td> |
| 9649 | </tr> |
| 9650 | |
| 9651 | |
| 9652 | </li> |
| 9653 | |
| 9654 | </table></div><br><br> |
| 9655 | |
| 9656 | |
| 9657 | |
| 9658 | |
| 9835 | <a class="EntryGoto" id="Yi, Ping and Fei, Zongming"></a> |
| 9836 | <b class="myheading" style="position: relative; left: 5%;">Yi, Ping and Fei, Zongming</b> |
| 9837 | |
| 9838 | <div class="BibEntry"> |
| 9839 | |
| 9840 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 9841 | |
| 9842 | <li> |
| 9843 | |
| 9844 | |
| 9845 | <tr> |
| 9846 | <td valign="top">Author</td> |
| 9847 | <td valign="top">Yi, Ping and Fei, Zongming</td> |
| 9848 | </tr> |
| 9849 | |
| 9850 | <tr> |
| 9851 | <td valign="top">Title</td> |
| 9852 | <td valign="top">Characterizing the GENI Networks</td> |
| 9853 | </tr> |
| 9854 | |
| 9855 | <tr> |
| 9856 | <td valign="top">Booktitle</td> |
| 9857 | <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td> |
| 9858 | </tr> |
| 9859 | |
| 9860 | <tr> |
| 9861 | <td valign="top">Publisher</td> |
| 9862 | <td valign="top">IEEE</td> |
| 9863 | </tr> |
| 9864 | |
| 9865 | <tr> |
| 9866 | <td valign="top">Year</td> |
| 9867 | <td valign="top">2014</td> |
| 9868 | </tr> |
| 9869 | |
| 9870 | <tr> |
| 9871 | <td valign="top">Abstract</td> |
| 9872 | <td valign="top">After several spirals of development, GENI has evolved into a rich-featured environment with comprehensive support. Researchers have started to use it as a testing environment for their research projects, as evidenced by new GENI projects on shakedown experiments. However, it is not clear what we can expect from the GENI testbeds from a performance perspective. Some fundamental questions we can ask are: What are the bandwidth and latency of a link that connects two VMs from two different GENI aggregates? Do they change a lot over time? What kind of distribution do they follow? Are they aggregate dependent? The goal of this study is to characterize the links of the GENI networks and provide guidance to GENI experimenters. The information collected can be helpful for designing GENI experiments in selecting where resources should be reserved.</td> |
| 9873 | </tr> |
| 9874 | |
| 9875 | |
| 9876 | |
| 9877 | <tr> |
| 9878 | <td valign="top">DOI</td> |
| 9879 | <td valign="top">10.1109/gree.2014.8</td> |
| 9880 | </tr> |
| 9881 | |
| 9882 | |
| 9883 | |
| 9884 | <tr> |
| 9885 | <td valign="top">URL</td> |
| 9886 | <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.8">http://dx.doi.org/10.1109/gree.2014.8</a></td> |
| 9887 | </tr> |
| 9888 | |
| 9889 | |
| 9890 | </li> |
| 9891 | |
| 9892 | </table></div><br><br> |
| 9893 | |
| 9894 | |
| 9895 | |
| 9896 | |