| 554 | <b>Bhat, Shireesh and Udechukwu, Robinson and Dutta, Rudra and Rouskas, George N.</b> |
| 555 | , "Inception to application: A GENI based prototype of an open Marketplace for network services." |
| 556 | 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, IEEE, |
| 557 | 2016. |
| 558 | doi:10.1109/infcomw.2016.7562244. |
| 559 | <a href="http://dx.doi.org/10.1109/infcomw.2016.7562244">http://dx.doi.org/10.1109/infcomw.2016.7562244</a> |
| 560 | <br><br><b>Abstract: </b>Choice-based network architecture enables users the power to choose services from a set of network service offerings from multiple providers within a marketplace. To facilitate marketplace alternatives and enable fine-grain service composition, a common service specification should represent a general-extensible design for describing a service. This allows users to discover, negotiate, and purchase network services from service providers using service advertisements in the marketplace. We have successfully developed a ChoiceNet prototype which rectifies some of the shortcomings of the earlier prototypes and demonstrates a contractual agreement between multiple network service providers to realize multiple end-to-end application scenarios using the common service specification within the GENI environment. Our implementation showcases the integration of two contrasting payment models for the procurement of contractual agreements for network services. Successful agreements results in the provisioning of the advertised network services. This demo helps in visualizing the network service life cycle as seen by the Marketplace. |
| 561 | </li> |
| 562 | <br> |
| 563 | |
| 564 | |
| 565 | |
| 566 | <li> |
| 1068 | <b>Duplyakin, Dmitry and Ricci, Robert</b> |
| 1069 | , "Introducing configuration management capabilities into CloudLab experiments." |
| 1070 | 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, IEEE, |
| 1071 | 2016. |
| 1072 | doi:10.1109/infcomw.2016.7562042. |
| 1073 | <a href="http://dx.doi.org/10.1109/infcomw.2016.7562042">http://dx.doi.org/10.1109/infcomw.2016.7562042</a> |
| 1074 | <br><br><b>Abstract: </b>Users of CloudLab (and other GENI-derived testbeds) commonly use image snapshots to preserve their working environments and to share them with other users. While snapshots re-create software environments byte-for-byte, they are not conducive to composing multiple environments, nor are they good for experiments that must run across many versions of their environments with subtle differences. This paper describes our initial work on an alternative experiment management system. This system is built on expendable instances of the Chef configuration management system, and can be used ” on top of” existing testbeds. |
| 1075 | </li> |
| 1076 | <br> |
| 1077 | |
| 1078 | |
| 1079 | |
| 1080 | <li> |
| 1482 | <b>Griffioen, James and Wolf, Tilman and Calvert, Kenneth L.</b> |
| 1483 | , "A Coin-Operated Software-Defined Exchange." |
| 1484 | 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, IEEE, |
| 1485 | 2016. |
| 1486 | doi:10.1109/icccn.2016.7568473. |
| 1487 | <a href="http://dx.doi.org/10.1109/icccn.2016.7568473">http://dx.doi.org/10.1109/icccn.2016.7568473</a> |
| 1488 | <br><br><b>Abstract: </b>Internet Exchange Points (IXPs) play a major role in the current Internet architecture, serving as the connection point between Internet Service Providers (ISPs). Software-Defined Exchange Points (SDXs)-programmable versions of Internet Exchange Points (IXPs)-have been proposed as a way to give ISPs finer-grained control over the way packets are routed between ISPs. Leveraging software-defined networking (SDN) technology, an SDX enables control software to insert forwarding rules that route traffic on the granularity of individual flows. In this paper, we describe work-in-progress developing controllers for Software-Defined Internet Exchange Points that facilitate dynamic establishment of forwarding relationships between transit ISPs. The core hypothesis of our work is that the SDX can serve as a trusted intermediary, both facilitating establishment of dynamic peering agreements between ISPs, and enforcing their routing policies. Moreover, this building block, which we dub the Coin-Operated SDX, can be used to construct much more dynamic and fine-grained end-to-end routing services than are possible in today's infrastructure. In our model, each ISP independently but cooperatively defines the policies that the SDX enforces on its behalf. The SDX may also serve as a clearinghouse for the inter-ISP economic transactions that drive these policies, i.e., as Economic SDX (ESDX). We describe the overall architecture of a Coin-Op SDX, as well as the specific operations it must support to offer dynamic services. We believe that Coin-Op SDX can play a critical role in future software-defined inter-domain Internet infrastructure. |
| 1489 | </li> |
| 1490 | <br> |
| 1491 | |
| 1492 | |
| 1493 | |
| 1494 | <li> |
| 2233 | , "Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques." |
| 2234 | Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA, |
| 2235 | 2016. |
| 2236 | doi:10.1145/2955193.2955194. |
| 2237 | <a href="http://dx.doi.org/10.1145/2955193.2955194">http://dx.doi.org/10.1145/2955193.2955194</a> |
| 2238 | <br><br><b>Abstract: </b>Providing services for multiple tenants within a single or federated distributed cloud environment requires a variety of special considerations related to network design, provisioning, and operations. Especially important are multiple topics concerning the implementation of multiple parallel programmable virtual networks for large numbers of tenants, who require autonomous management, control, and data planes. This paper provides an overview of some of the challenges that arise from developing and implementing parallel programmable virtual networks, describes experiences with several experimental techniques for addressing those challenges based on large scale distributed testbeds, and presents the results of the experiments that were conducted. Distributed environments used include a distributed cloud testbed, the Chameleon Cloud, sponsored by the National Science Foundation's NSFCloud program, the NSF's Global Environment for Network Innovations (GENI), an international distributed OpenFlow testbed, and the Open Science Data Cloud. |
| 2239 | </li> |
| 2240 | <br> |
| 2241 | |
| 2242 | <li> |
| 2243 | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
| 2244 | , "Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies." |
| 2245 | Teletraffic Congress (ITC), 2014 26th International, IEEE, |
| 2246 | 2014. |
| 2247 | doi:10.1109/itc.2014.6932970. |
| 2248 | <a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a> |
| 2249 | <br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs. |
| 2250 | </li> |
| 2251 | <br> |
| 2252 | |
| 2253 | <li> |
| 2254 | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
2198 | 2259 | <a href="http://dx.doi.org/10.1016/j.bjp.2013.12.024">http://dx.doi.org/10.1016/j.bjp.2013.12.024</a> |
2199 | 2260 | <br><br><b>Abstract: </b>Large scale national and international experimental research environments are required to advance communication services and supporting network architecture, technology, and infrastructure. Theories and concepts are often explored using simulation and modeling techniques within labs or on small scale testbeds. However, while such testbeds are valuable resources for the research process, these facilities alone cannot provide an appropriate approximation of the real world conditions required to explore ideas at scale. Very large scale global, experimental network research capabilities are required to deeply investigate innovative concepts. For many years, network testbeds were created to address fairly specific, well defined, limited research goals, and they were implemented for fairly short periods. Recently, taking advantage of a number of macro information technology trends, such as virtualization and programmable resources, several network research communities have been developing innovative types of network research environments. Instead of designing traditional network testbeds, research communities are designing large scale, highly flexible distributed platforms that can be used to create many different types of testbeds. Also, rather than creating short term testbeds for limited research objectives, these new environments are being designed as long term persistent resources to support many types of experimental research. This paper describes the motivations for this trend, provides several examples of large scale distributed network research environments based on the Global Lambda Integrated Facility (GLIF) and the StarLight Exchange Facility, including the Global Environment for Network Innovation (GENI), and indicates emerging future trends for these types of environments. |
2200 | | </li> |
2201 | | <br> |
2202 | | |
2203 | | <li> |
2204 | | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
2205 | | , "Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies." |
2206 | | Teletraffic Congress (ITC), 2014 26th International, IEEE, |
2207 | | 2014. |
2208 | | doi:10.1109/itc.2014.6932970. |
2209 | | <a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a> |
2210 | | <br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs. |
2211 | | </li> |
2212 | | <br> |
2213 | | |
2214 | | <li> |
2215 | | <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b> |
2216 | | , "Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques." |
2217 | | Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA, |
2218 | | 2016. |
2219 | | doi:10.1145/2955193.2955194. |
2220 | | <a href="http://dx.doi.org/10.1145/2955193.2955194">http://dx.doi.org/10.1145/2955193.2955194</a> |
2221 | | <br><br><b>Abstract: </b>Providing services for multiple tenants within a single or federated distributed cloud environment requires a variety of special considerations related to network design, provisioning, and operations. Especially important are multiple topics concerning the implementation of multiple parallel programmable virtual networks for large numbers of tenants, who require autonomous management, control, and data planes. This paper provides an overview of some of the challenges that arise from developing and implementing parallel programmable virtual networks, describes experiences with several experimental techniques for addressing those challenges based on large scale distributed testbeds, and presents the results of the experiments that were conducted. Distributed environments used include a distributed cloud testbed, the Chameleon Cloud, sponsored by the National Science Foundation's NSFCloud program, the NSF's Global Environment for Network Innovations (GENI), an international distributed OpenFlow testbed, and the Open Science Data Cloud. |
| 2475 | <b>Morsey, Mohamed and Willner, Alexander and Loughnane, Robyn and Giatili, Mary and Papagianni, Chrysa and Baldin, Ilya and Grosso, Paola and Al-Hazmi, Yahya</b> |
| 2476 | , "DBcloud: Semantic Dataset for the cloud." |
| 2477 | 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, IEEE, |
| 2478 | 2016. |
| 2479 | doi:10.1109/infcomw.2016.7562073. |
| 2480 | <a href="http://dx.doi.org/10.1109/infcomw.2016.7562073">http://dx.doi.org/10.1109/infcomw.2016.7562073</a> |
| 2481 | <br><br><b>Abstract: </b>In cloud environments, the process of matching requests from users with the available computing resources is a challenging task. This is even more complex in federated environments, where multiple providers cooperate to offer enhanced services, suitable for distributed applications. In order to resolve these issues, a powerful modeling methodology can be adopted to facilitate expressing both the request and the available computing resources. This, in turn, leads to an effective matching between the request and the provisioned resources. For this purpose, the Open-Multinet ontologies were developed, which leverage the expressive power of Semantic Web technologies to describe infrastructure components and services. These ontologies have been adopted in a number of federated testbeds. In this article, DBcloud is presented, a system that provides access to Open-Multinet open data via endpoints. DBcloud can be used to simplify the process of discovery and provisioning of cloud resources and services. |
| 2482 | </li> |
| 2483 | <br> |
| 2484 | |
| 2485 | |
| 2486 | |
| 2487 | <li> |
| 2629 | |
| 2630 | <li> |
| 2631 | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
| 2632 | , "Operational System Testing for Designed in Security." |
| 2633 | Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, |
| 2634 | 2013. |
| 2635 | doi:10.1145/2459976.2460038. |
| 2636 | <a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a> |
| 2637 | <br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities. |
| 2638 | </li> |
| 2639 | <br> |
| 2640 | |
| 2641 | <li> |
| 2642 | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
| 2643 | , "Performance Analysis of DDoS Detection Methods on Real Network." |
| 2644 | First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, |
| 2645 | 2012. |
| 2646 | |
| 2647 | |
| 2648 | <br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic. |
| 2649 | </li> |
| 2650 | <br> |
2589 | | <li> |
2590 | | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
2591 | | , "Performance Analysis of DDoS Detection Methods on Real Network." |
2592 | | First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, |
2593 | | 2012. |
2594 | | |
2595 | | |
2596 | | <br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic. |
2597 | | </li> |
2598 | | <br> |
2599 | | |
2600 | | <li> |
2601 | | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
2602 | | , "Operational System Testing for Designed in Security." |
2603 | | Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, |
2604 | | 2013. |
2605 | | doi:10.1145/2459976.2460038. |
2606 | | <a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a> |
2607 | | <br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities. |
2608 | | </li> |
2609 | | <br> |
2610 | | |
| 3017 | <b>Rivera, Sergio and Fei, Zongming and Griffioen, James</b> |
| 3018 | , "RAPTOR: A REST API translaTOR for OpenFlow controllers." |
| 3019 | 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, IEEE, |
| 3020 | 2016. |
| 3021 | doi:10.1109/infcomw.2016.7562096. |
| 3022 | <a href="http://dx.doi.org/10.1109/infcomw.2016.7562096">http://dx.doi.org/10.1109/infcomw.2016.7562096</a> |
| 3023 | <br><br><b>Abstract: </b>Many Software-Defined Networking (SDN) controllers support a ” northbound interface” by which applications can interact with the SDN controller and (indirectly) control the underlying SDN network. The absence of a standard for the northbound interface of these controllers makes it difficult for application developers to create interoperable/portable code (i.e., code that works with any SDN controller). Developers are forced to re-write almost all of their code every time they want to support a new controller. This tedious and time consuming process is typically a start-over software development cycle that involves learning new APIs, data models, and controller-specific conventions. In this paper, we present RAPTOR, a REST-based API translaTOR service for SDN networks that allows users to develop their network control software independent of any particular SDN controller. RAPTOR exposes its own REST-based API functions and data models to user applications and translates application requests into controller-specific northbound interface calls. To demonstrate the viability of RAPTOR, we implemented and deployed RAPTOR in GENI and used it in conjunction with different types of controllers. We also developed GENI Desktop modules that interacted with RAPTOR to install, list, delete and monitor end-to-end flows regardless of the controller used for controlling the underlying switches. |
| 3024 | </li> |
| 3025 | <br> |
| 3026 | |
| 3027 | |
| 3028 | |
| 3029 | <li> |
3603 | | , "PrimoGENI for hybrid network simulation and emulation experiments in GENI." |
3604 | | Journal of Simulation, |
3605 | | 2012. |
3606 | | doi:10.1057/jos.2012.5. |
3607 | | <a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a> |
3608 | | <br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach. |
3609 | | </li> |
3610 | | <br> |
3611 | | |
3612 | | <li> |
3613 | | <b>Van Vorst, N. and Erazo, M. and Liu, J.</b> |
| 3674 | </li> |
| 3675 | <br> |
| 3676 | |
| 3677 | <li> |
| 3678 | <b>Van Vorst, N. and Erazo, M. and Liu, J.</b> |
| 3679 | , "PrimoGENI for hybrid network simulation and emulation experiments in GENI." |
| 3680 | Journal of Simulation, |
| 3681 | 2012. |
| 3682 | doi:10.1057/jos.2012.5. |
| 3683 | <a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a> |
| 3684 | <br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach. |
| 3952 | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
| 3953 | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
| 3954 | 2014. |
| 3955 | doi:10.1145/2627566.2627573. |
| 3956 | <a href="http://dx.doi.org/10.1145/2627566.2627573">http://dx.doi.org/10.1145/2627566.2627573</a> |
| 3957 | <br><br><b>Abstract: </b>Due to the economy of scale of Ethernet networks and available dynamic circuit capability from the major national research and educational networks, VLAN (Virtual LAN) based virtual networking solution has been successfully adopted in some advanced distributed cloud systems. However, there are two major constraints in this adaptation: (1) dynamic circuit service is far from pervasive; (2) there is only limited VLAN tags offered by regional network service providers. In this paper, after examining layer-2 networking in large-scale distributed cloud environments, we present a graph theoretical model to study the network capacity in terms of the number of inter-cloud connections that can co-exist. We further design the algorithms to achieve this capacity for both point-to-point and multi-point inter-cloud connections in both static and dynamic scenarios. We also study a general topology embedding problem based on this model. As tagging is a common mechanism for isolating communication channels in other network layers, the proposed models and algorithms can be extended to optical and IP networks. |
| 3958 | </li> |
| 3959 | <br> |
| 3960 | |
| 3961 | <li> |
| 3962 | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
3893 | | </li> |
3894 | | <br> |
3895 | | |
3896 | | <li> |
3897 | | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
3898 | | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
3899 | | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
3900 | | 2014. |
3901 | | doi:10.1145/2627566.2627573. |
3902 | | <a href="http://dx.doi.org/10.1145/2627566.2627573">http://dx.doi.org/10.1145/2627566.2627573</a> |
3903 | | <br><br><b>Abstract: </b>Due to the economy of scale of Ethernet networks and available dynamic circuit capability from the major national research and educational networks, VLAN (Virtual LAN) based virtual networking solution has been successfully adopted in some advanced distributed cloud systems. However, there are two major constraints in this adaptation: (1) dynamic circuit service is far from pervasive; (2) there is only limited VLAN tags offered by regional network service providers. In this paper, after examining layer-2 networking in large-scale distributed cloud environments, we present a graph theoretical model to study the network capacity in terms of the number of inter-cloud connections that can co-exist. We further design the algorithms to achieve this capacity for both point-to-point and multi-point inter-cloud connections in both static and dynamic scenarios. We also study a general topology embedding problem based on this model. As tagging is a common mechanism for isolating communication channels in other network layers, the proposed models and algorithms can be extended to optical and IP networks. |
| 4619 | <b>Bhat, Shireesh and Udechukwu, Robinson and Dutta, Rudra and Rouskas, George N.</b> |
| 4620 | , "Inception to application: A GENI based prototype of an open Marketplace for network services." |
| 4621 | 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, IEEE, |
| 4622 | 2016. |
| 4623 | doi:10.1109/infcomw.2016.7562244. |
| 4624 | </li> |
| 4625 | <br> |
| 4626 | |
| 4627 | |
| 4628 | |
| 4629 | <li> |
5940 | | , "Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange." |
5941 | | Computer Networks, |
5942 | | 2014. |
5943 | | doi:10.1016/j.bjp.2013.12.024. |
| 6038 | , "Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques." |
| 6039 | Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA, |
| 6040 | 2016. |
| 6041 | doi:10.1145/2955193.2955194. |
5958 | | , "Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques." |
5959 | | Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA, |
5960 | | 2016. |
5961 | | doi:10.1145/2955193.2955194. |
| 6056 | , "Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange." |
| 6057 | Computer Networks, |
| 6058 | 2014. |
| 6059 | doi:10.1016/j.bjp.2013.12.024. |
| 6242 | <b>Morsey, Mohamed and Willner, Alexander and Loughnane, Robyn and Giatili, Mary and Papagianni, Chrysa and Baldin, Ilya and Grosso, Paola and Al-Hazmi, Yahya</b> |
| 6243 | , "DBcloud: Semantic Dataset for the cloud." |
| 6244 | 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, IEEE, |
| 6245 | 2016. |
| 6246 | doi:10.1109/infcomw.2016.7562073. |
| 6247 | </li> |
| 6248 | <br> |
| 6249 | |
| 6250 | |
| 6251 | |
| 6252 | <li> |
| 6372 | |
| 6373 | <li> |
| 6374 | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
| 6375 | , "Operational System Testing for Designed in Security." |
| 6376 | Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, |
| 6377 | 2013. |
| 6378 | doi:10.1145/2459976.2460038. |
| 6379 | </li> |
| 6380 | <br> |
| 6381 | |
| 6382 | <li> |
| 6383 | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
| 6384 | , "Performance Analysis of DDoS Detection Methods on Real Network." |
| 6385 | First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, |
| 6386 | 2012. |
| 6387 | |
| 6388 | </li> |
| 6389 | <br> |
6273 | | <li> |
6274 | | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
6275 | | , "Performance Analysis of DDoS Detection Methods on Real Network." |
6276 | | First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, |
6277 | | 2012. |
6278 | | |
6279 | | </li> |
6280 | | <br> |
6281 | | |
6282 | | <li> |
6283 | | <b>Ozcelik, Ilker and Brooks, Richard R.</b> |
6284 | | , "Operational System Testing for Designed in Security." |
6285 | | Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, |
6286 | | 2013. |
6287 | | doi:10.1145/2459976.2460038. |
6288 | | </li> |
6289 | | <br> |
6290 | | |
| 7491 | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
| 7492 | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
| 7493 | 2014. |
| 7494 | doi:10.1145/2627566.2627573. |
| 7495 | </li> |
| 7496 | <br> |
| 7497 | |
| 7498 | <li> |
| 7499 | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
7375 | | </li> |
7376 | | <br> |
7377 | | |
7378 | | <li> |
7379 | | <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> |
7380 | | , "Capacity of Inter-cloud Layer-2 Virtual Networking." |
7381 | | Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, |
7382 | | 2014. |
7383 | | doi:10.1145/2627566.2627573. |