| 86 | <b>Alali, Fatma and Veeraraghavan, Malathi</b> |
| 87 | , "A cross-layer design for large transfers in SDNs." |
| 88 | 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, |
| 89 | 2016. |
| 90 | doi:10.1109/icufn.2016.7537142. |
| 91 | <a href="http://dx.doi.org/10.1109/icufn.2016.7537142">http://dx.doi.org/10.1109/icufn.2016.7537142</a> |
| 92 | <br><br><b>Abstract: </b>Software Defined Network (SDN) technologies have enabled the introduction of new services such as dynamic Layer-1 (L1) circuits and Layer-2 (L2) virtual circuits (VCs). This work presents a cross-layer design that leverages transport- and link-layer protocols to enable the full use of high-rate circuits/VCs to achieve high-throughput transfers. Three cases are considered: (i) single circuit/rate-guaranteed VC for a single large transfer from a server, (ii) multiple simultaneous large transfers from a server, and (iii) semi-rate-guaranteed VC. Circuit TCP (CTCP) and the Token Bucket Filter (TBF) queueing discipline of the Linux traffic control (tc) utility are recommended for the first case, and parameter selection methods are provided. For the second case, the tc Hierarchical Token Bucket (HTB) discipline is recommended as it supports dynamic additions and deletions of classes without impact on ongoing large-transfer flows using existing classes. For the third case, CTCP is recommended if the large-transfer throughput is the primary concern, while HTCP is recommended if higher consideration is given to other flows. |
| 93 | </li> |
| 94 | <br> |
| 95 | |
| 96 | |
| 97 | |
| 98 | <li> |
698 | | , "Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks." |
699 | | Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA, |
700 | | 2013. |
701 | | doi:10.1109/icpp.2013.28. |
702 | | <a href="http://dx.doi.org/10.1109/icpp.2013.28">http://dx.doi.org/10.1109/icpp.2013.28</a> |
703 | | <br><br><b>Abstract: </b>In this paper, we focus on distributed file search over a delay tolerant network (DTN) formed by mobile devices that exhibit the characteristics of social networks. Current file search methods in MANETs/DTNs are either content-based or contact-based. The former builds routing tables for node contents but is not resilient to high node mobility, while the latter exploits node contact patterns in the social networks but may lead to high latency. Recent research also reveal the importance of interests in realizing efficient file dissemination in DTNs. In this paper, we first analyze node interest and mobility from real traces, which confirms the shortcomings of a contact based method and show the importance of considering both content/interest and contact in file search. We then propose Cont2, a social-aware file search method which leverages both node social interests (content) and contact patterns to enhance search efficiency. First, considering people with common interests tend to share files and gather together, Cont2 virtually groups common-interest nodes into a community to direct file search. Second, considering human mobility follows a certain pattern, Cont2 exploits nodes that have high contact frequency with the queried content. Third, Cont2 also exploits active nodes that have more connections to others as a complementary approach to expedite file search. Trace-driven experimental on the real-world GENI test bed and NS-2 simulator show that Cont2 can significantly improve the search efficiency compared to current methods. |
704 | | </li> |
705 | | <br> |
706 | | |
707 | | <li> |
708 | | <b>Chen, Kang and Shen, Haiying</b> |
| 717 | </li> |
| 718 | <br> |
| 719 | |
| 720 | <li> |
| 721 | <b>Chen, Kang and Shen, Haiying</b> |
| 722 | , "Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks." |
| 723 | Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA, |
| 724 | 2013. |
| 725 | doi:10.1109/icpp.2013.28. |
| 726 | <a href="http://dx.doi.org/10.1109/icpp.2013.28">http://dx.doi.org/10.1109/icpp.2013.28</a> |
| 727 | <br><br><b>Abstract: </b>In this paper, we focus on distributed file search over a delay tolerant network (DTN) formed by mobile devices that exhibit the characteristics of social networks. Current file search methods in MANETs/DTNs are either content-based or contact-based. The former builds routing tables for node contents but is not resilient to high node mobility, while the latter exploits node contact patterns in the social networks but may lead to high latency. Recent research also reveal the importance of interests in realizing efficient file dissemination in DTNs. In this paper, we first analyze node interest and mobility from real traces, which confirms the shortcomings of a contact based method and show the importance of considering both content/interest and contact in file search. We then propose Cont2, a social-aware file search method which leverages both node social interests (content) and contact patterns to enhance search efficiency. First, considering people with common interests tend to share files and gather together, Cont2 virtually groups common-interest nodes into a community to direct file search. Second, considering human mobility follows a certain pattern, Cont2 exploits nodes that have high contact frequency with the queried content. Third, Cont2 also exploits active nodes that have more connections to others as a complementary approach to expedite file search. Trace-driven experimental on the real-world GENI test bed and NS-2 simulator show that Cont2 can significantly improve the search efficiency compared to current methods. |
| 833 | <li> |
| 834 | <b>Chin, Tommy and Xiong, Kaiqi</b> |
| 835 | , "MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks." |
| 836 | Wireless Algorithms, Systems, and Applications, Springer International Publishing, |
| 837 | 2016. |
| 838 | doi:10.1007/978-3-319-42836-9_43. |
| 839 | <a href="http://dx.doi.org/10.1007/978-3-319-42836-9_43">http://dx.doi.org/10.1007/978-3-319-42836-9_43</a> |
| 840 | <br><br><b>Abstract: </b>This paper addresses one major concern on how to secure the location information of a base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting or damaging the wireless base station can be catastrophic for a WSN. To aid in the mitigation of this challenge, we present Moving Proximity Base Station Defense (MPBSD), a Moving Target Defense (MTD) approach to concealing the location of a base station within a WSN. In this approach, we employ multiple base stations to serve a WSN where one of the multiple base stations is elected to serve the WSN in a specific period of time. Specifically, our approach periodically changes the designation over a period of time to provide obscurity in the location information of the base station. We further evaluate MPBSD using a real-world testbed environment utilizing Wi-Fi frequencies. Our results show that MPBSD is an effective MTD approach to securing base stations for a WSN in term of sensory performance such as end-to-end delay. |
| 841 | </li> |
| 842 | <br> |
| 843 | |
1485 | | , "SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP." |
1486 | | Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE, |
1487 | | 2015. |
1488 | | doi:10.1109/iccw.2015.7247436. |
1489 | | <a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a> |
1490 | | <br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates. |
1491 | | </li> |
1492 | | <br> |
1493 | | |
1494 | | <li> |
1495 | | <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b> |
1500 | 1513 | <a href="http://dx.doi.org/10.1109/noms.2016.7502805">http://dx.doi.org/10.1109/noms.2016.7502805</a> |
1501 | 1514 | <br><br><b>Abstract: </b>Dynamic Adaptive Streaming over HTTP (DASH) enables the video player to adapt the bitrate of the video while streaming to ensure playback without interruptions even with varying throughput. A DASH server hosts multiple representations of the same video, each of which is broken down into small segments of fixed playback duration. The video bitrate adaptation is purely driven by the player at the endhost. Typically, the player employs an Adaptive Bitrate (ABR) algorithm, that determines the most appropriate representation for the next segment to be downloaded, based on the current network conditions and user preferences. The aim of an ABR algorithm is to dynamically manage the Quality of Experience (QoE) of the user during the playback. ABR algorithms manage the QoE by maximizing the bitrate while at the same time trying to minimize the other QoE metrics: playback start time, duration and number of buffering events, and the number of bitrate switching events. Typically, the ABR algorithms manage the QoE by using the measured network throughput and buffer occupancy to adapt the playback bitrate. However, due to the video encoding schemes employed, the sizes of the individual segments may vary significantly. For low bandwidth networks, fluctuation in the segment sizes results in inaccurate estimation the expected segment fetch times, thereby resulting in inaccurate estimation of the optimum bitrate. In this paper we demonstrate how the Segment-Aware Rate Adaptation (SARA) algorithm, that considers the measured throughput, buffer occupancy, and the variation in segment sizes helps in better management of the users' QoE in a DASH system. By comparing with a typical throughput-based and buffer-based adaptation algorithm under varying network conditions, we demonstrate that SARA manages the QoE better, especially in a low bandwidth network. We also developed AStream, an open-source Python-based emulated DASH-video player that was used to evaluate three different ABR algor- thms and measure the QoE metrics with each of them. |
| 1515 | </li> |
| 1516 | <br> |
| 1517 | |
| 1518 | <li> |
| 1519 | <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b> |
| 1520 | , "SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP." |
| 1521 | Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE, |
| 1522 | 2015. |
| 1523 | doi:10.1109/iccw.2015.7247436. |
| 1524 | <a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a> |
| 1525 | <br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates. |
| 2025 | , "Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange." |
| 2026 | Computer Networks, |
| 2027 | 2014. |
| 2028 | doi:10.1016/j.bjp.2013.12.024. |
| 2029 | <a href="http://dx.doi.org/10.1016/j.bjp.2013.12.024">http://dx.doi.org/10.1016/j.bjp.2013.12.024</a> |
| 2030 | <br><br><b>Abstract: </b>Large scale national and international experimental research environments are required to advance communication services and supporting network architecture, technology, and infrastructure. Theories and concepts are often explored using simulation and modeling techniques within labs or on small scale testbeds. However, while such testbeds are valuable resources for the research process, these facilities alone cannot provide an appropriate approximation of the real world conditions required to explore ideas at scale. Very large scale global, experimental network research capabilities are required to deeply investigate innovative concepts. For many years, network testbeds were created to address fairly specific, well defined, limited research goals, and they were implemented for fairly short periods. Recently, taking advantage of a number of macro information technology trends, such as virtualization and programmable resources, several network research communities have been developing innovative types of network research environments. Instead of designing traditional network testbeds, research communities are designing large scale, highly flexible distributed platforms that can be used to create many different types of testbeds. Also, rather than creating short term testbeds for limited research objectives, these new environments are being designed as long term persistent resources to support many types of experimental research. This paper describes the motivations for this trend, provides several examples of large scale distributed network research environments based on the Global Lambda Integrated Facility (GLIF) and the StarLight Exchange Facility, including the Global Environment for Network Innovation (GENI), and indicates emerging future trends for these types of environments. |
| 2031 | </li> |
| 2032 | <br> |
| 2033 | |
| 2034 | <li> |
| 2035 | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
| 2036 | , "Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques." |
| 2037 | Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA, |
| 2038 | 2016. |
| 2039 | doi:10.1145/2955193.2955194. |
| 2040 | <a href="http://dx.doi.org/10.1145/2955193.2955194">http://dx.doi.org/10.1145/2955193.2955194</a> |
| 2041 | <br><br><b>Abstract: </b>Providing services for multiple tenants within a single or federated distributed cloud environment requires a variety of special considerations related to network design, provisioning, and operations. Especially important are multiple topics concerning the implementation of multiple parallel programmable virtual networks for large numbers of tenants, who require autonomous management, control, and data planes. This paper provides an overview of some of the challenges that arise from developing and implementing parallel programmable virtual networks, describes experiences with several experimental techniques for addressing those challenges based on large scale distributed testbeds, and presents the results of the experiments that were conducted. Distributed environments used include a distributed cloud testbed, the Chameleon Cloud, sponsored by the National Science Foundation's NSFCloud program, the NSF's Global Environment for Network Innovations (GENI), an international distributed OpenFlow testbed, and the Open Science Data Cloud. |
| 2042 | </li> |
| 2043 | <br> |
| 2044 | |
| 2045 | <li> |
| 2046 | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
2007 | | </li> |
2008 | | <br> |
2009 | | |
2010 | | <li> |
2011 | | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
2012 | | , "Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange." |
2013 | | Computer Networks, |
2014 | | 2014. |
2015 | | doi:10.1016/j.bjp.2013.12.024. |
2016 | | <a href="http://dx.doi.org/10.1016/j.bjp.2013.12.024">http://dx.doi.org/10.1016/j.bjp.2013.12.024</a> |
2017 | | <br><br><b>Abstract: </b>Large scale national and international experimental research environments are required to advance communication services and supporting network architecture, technology, and infrastructure. Theories and concepts are often explored using simulation and modeling techniques within labs or on small scale testbeds. However, while such testbeds are valuable resources for the research process, these facilities alone cannot provide an appropriate approximation of the real world conditions required to explore ideas at scale. Very large scale global, experimental network research capabilities are required to deeply investigate innovative concepts. For many years, network testbeds were created to address fairly specific, well defined, limited research goals, and they were implemented for fairly short periods. Recently, taking advantage of a number of macro information technology trends, such as virtualization and programmable resources, several network research communities have been developing innovative types of network research environments. Instead of designing traditional network testbeds, research communities are designing large scale, highly flexible distributed platforms that can be used to create many different types of testbeds. Also, rather than creating short term testbeds for limited research objectives, these new environments are being designed as long term persistent resources to support many types of experimental research. This paper describes the motivations for this trend, provides several examples of large scale distributed network research environments based on the Global Lambda Integrated Facility (GLIF) and the StarLight Exchange Facility, including the Global Environment for Network Innovation (GENI), and indicates emerging future trends for these types of environments. |
2335 | | , "Performance Analysis of DDoS Detection Methods on Real Network." |
2336 | | First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, |
2337 | | 2012. |
2338 | | |
2339 | | |
2340 | | <br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic. |
2341 | | </li> |
2342 | | <br> |
2343 | | |
2344 | | <li> |
2345 | | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
| 2376 | </li> |
| 2377 | <br> |
| 2378 | |
| 2379 | <li> |
| 2380 | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
| 2381 | , "Performance Analysis of DDoS Detection Methods on Real Network." |
| 2382 | First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, |
| 2383 | 2012. |
| 2384 | |
| 2385 | |
| 2386 | <br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic. |
| 2471 | <b>Rahimi, Reza and Veeraraghavan, M. and Nakajima, Y. and Takahashi, H. and Nakajima, Y. and Okamoto, S. and Yamanaka, N.</b> |
| 2472 | , "A high-performance OpenFlow software switch." |
| 2473 | 2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR), IEEE, |
| 2474 | 2016. |
| 2475 | doi:10.1109/hpsr.2016.7525645. |
| 2476 | <a href="http://dx.doi.org/10.1109/hpsr.2016.7525645">http://dx.doi.org/10.1109/hpsr.2016.7525645</a> |
| 2477 | <br><br><b>Abstract: </b>Software switches offer flexibility to service providers but potentially suffer from low performance. A software switch called Lagopus was implemented using Intel's Data Plane Development Kit (DPDK), which offers libraries for high-performance packet handling. Prior work on software switches focused on characterizing packet forwarding throughput. In this work, we evaluated the impact of certain parameters and settings in Lagopus on application performance and studied packet drop rates. The importance of receive-thread packet classification for load balancing and to send delay-sensitive flows to a different worker thread from high-throughput flows was first demonstrated. Next, we showed that a loop-count variable used to control packet batching should be kept small in case link utilization is low. Finally, we showed that packet drop rate could be non-zero when the OpenFlow table size is large and packet arrival rate is high, and interestingly, the packet drop rate was higher with four worker threads than with a single worker thread. This implies a need for careful calibration and planning of the parameters of parallelization. |
| 2478 | </li> |
| 2479 | <br> |
| 2480 | |
| 2481 | |
| 2482 | |
| 2483 | <li> |
| 3212 | <b>Ujcich, Benjamin E.</b> |
| 3213 | , "An Attack Model, Language, and Injector for the Control Plane of Software-Defined Networks (Master's Thesis)." |
| 3214 | |
| 3215 | 2016. |
| 3216 | |
| 3217 | <a href="https://www.perform.illinois.edu/Papers/USAN_papers/16UJC01.pdf">https://www.perform.illinois.edu/Papers/USAN_papers/16UJC01.pdf</a> |
| 3218 | <br><br><b>Abstract: </b>Software-defined networking (SDN) is an emerging paradigm that differs from traditional approaches to computer networking by decoupling how traffic forwarding should be performed from the traffic itself, logically centralizing the related decisions through one or more controllers, and providing a standardized control protocol among network forwarding devices (e.g., switches) and controller(s). Much of the recent research in the networking community has focused on what is now possible because of the exibility of SDN architectures, but what is less understood is 1) the resilience of SDN to intentional, malicious attacks against system components and 2) how the control protocol affects and is affected by these attacks. Significant challenges include systematically establishing what attacks are possible in the control protocol and understanding the ramifications of attacks on controllers, switches, network applications, and overall network behavior. This thesis introduces a model, a language, and an injector for describing and injecting attacks into the control plane of the OpenFlow-based SDN architecture. First, we define an attack model that models the components in the SDN network and the assumptions about an attacker's capabilities against control plane messages. Second, we define an attack language that allows for attacks to be described based on the semantics of the OpenFlow protocol. Third, we describe an attack injection architecture that uses the aforementioned attack model and language to actuate attacks that demonstrate vulnerabilities in the design, implementation, and configuration of an SDN-based architecture. Finally, we motivate our design with an enterprise network use case and demonstrate the efficacy of our injector by injecting attacks and understanding the attacks' results. |
| 3219 | </li> |
| 3220 | <br> |
| 3221 | |
| 3222 | |
| 3223 | |
| 3224 | <li> |
| 3549 | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
| 3550 | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
| 3551 | 2014. |
| 3552 | doi:10.1145/2627566.2627573. |
| 3553 | <a href="http://dx.doi.org/10.1145/2627566.2627573">http://dx.doi.org/10.1145/2627566.2627573</a> |
| 3554 | <br><br><b>Abstract: </b>Due to the economy of scale of Ethernet networks and available dynamic circuit capability from the major national research and educational networks, VLAN (Virtual LAN) based virtual networking solution has been successfully adopted in some advanced distributed cloud systems. However, there are two major constraints in this adaptation: (1) dynamic circuit service is far from pervasive; (2) there is only limited VLAN tags offered by regional network service providers. In this paper, after examining layer-2 networking in large-scale distributed cloud environments, we present a graph theoretical model to study the network capacity in terms of the number of inter-cloud connections that can co-exist. We further design the algorithms to achieve this capacity for both point-to-point and multi-point inter-cloud connections in both static and dynamic scenarios. We also study a general topology embedding problem based on this model. As tagging is a common mechanism for isolating communication channels in other network layers, the proposed models and algorithms can be extended to optical and IP networks. |
| 3555 | </li> |
| 3556 | <br> |
| 3557 | |
| 3558 | <li> |
| 3559 | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
3494 | | </li> |
3495 | | <br> |
3496 | | |
3497 | | <li> |
3498 | | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
3499 | | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
3500 | | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
3501 | | 2014. |
3502 | | doi:10.1145/2627566.2627573. |
3503 | | <a href="http://dx.doi.org/10.1145/2627566.2627573">http://dx.doi.org/10.1145/2627566.2627573</a> |
3504 | | <br><br><b>Abstract: </b>Due to the economy of scale of Ethernet networks and available dynamic circuit capability from the major national research and educational networks, VLAN (Virtual LAN) based virtual networking solution has been successfully adopted in some advanced distributed cloud systems. However, there are two major constraints in this adaptation: (1) dynamic circuit service is far from pervasive; (2) there is only limited VLAN tags offered by regional network service providers. In this paper, after examining layer-2 networking in large-scale distributed cloud environments, we present a graph theoretical model to study the network capacity in terms of the number of inter-cloud connections that can co-exist. We further design the algorithms to achieve this capacity for both point-to-point and multi-point inter-cloud connections in both static and dynamic scenarios. We also study a general topology embedding problem based on this model. As tagging is a common mechanism for isolating communication channels in other network layers, the proposed models and algorithms can be extended to optical and IP networks. |
| 5459 | , "Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange." |
| 5460 | Computer Networks, |
| 5461 | 2014. |
| 5462 | doi:10.1016/j.bjp.2013.12.024. |
| 5463 | </li> |
| 5464 | <br> |
| 5465 | |
| 5466 | <li> |
| 5467 | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
| 5468 | , "Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques." |
| 5469 | Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA, |
| 5470 | 2016. |
| 5471 | doi:10.1145/2955193.2955194. |
| 5472 | </li> |
| 5473 | <br> |
| 5474 | |
| 5475 | <li> |
| 5476 | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
| 5750 | , "Operational System Testing for Designed in Security." |
| 5751 | Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, |
| 5752 | 2013. |
| 5753 | doi:10.1145/2459976.2460038. |
| 5754 | </li> |
| 5755 | <br> |
| 5756 | |
| 5757 | <li> |
| 5758 | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
5664 | | </li> |
5665 | | <br> |
5666 | | |
5667 | | <li> |
5668 | | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
5669 | | , "Operational System Testing for Designed in Security." |
5670 | | Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, |
5671 | | 2013. |
5672 | | doi:10.1145/2459976.2460038. |
| 5835 | <b>Rahimi, Reza and Veeraraghavan, M. and Nakajima, Y. and Takahashi, H. and Nakajima, Y. and Okamoto, S. and Yamanaka, N.</b> |
| 5836 | , "A high-performance OpenFlow software switch." |
| 5837 | 2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR), IEEE, |
| 5838 | 2016. |
| 5839 | doi:10.1109/hpsr.2016.7525645. |
| 5840 | </li> |
| 5841 | <br> |
| 5842 | |
| 5843 | |
| 5844 | |
| 5845 | <li> |
| 6747 | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
| 6748 | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
| 6749 | 2014. |
| 6750 | doi:10.1145/2627566.2627573. |
| 6751 | </li> |
| 6752 | <br> |
| 6753 | |
| 6754 | <li> |
| 6755 | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
6639 | | </li> |
6640 | | <br> |
6641 | | |
6642 | | <li> |
6643 | | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
6644 | | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
6645 | | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
6646 | | 2014. |
6647 | | doi:10.1145/2627566.2627573. |