Changes between Version 47 and Version 48 of GENIBibliography


Ignore:
Timestamp:
09/28/16 13:28:55 (8 years ago)
Author:
Mark Berman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v47 v48  
    604604
    605605<li>
     606<b>Bozakov, Zdravko and Rizk, Amr and Bhat, Divyashri and Zink, Michael</b>
     607, &quot;Measurement-based flow characterization in centrally controlled networks.&quot;
     608IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, IEEE,
     6092016.
     610doi:10.1109/infocom.2016.7524331.
     611<a href="http://dx.doi.org/10.1109/infocom.2016.7524331">http://dx.doi.org/10.1109/infocom.2016.7524331</a>
     612<br><br><b>Abstract: </b>In this work we outline a framework for measurement-based performance evaluation in SDN environments. The SDN paradigm, which is based on a strict separation of the network logic from the underlying physical substrate, necessitates a comprehensive global view of the network state. To augment the network representation, we propose mechanisms for extracting traffic characteristics from network observations which are used to derive performance metrics. Such metrics can be exploited by SDN applications to optimize the performance of SDN services. Given the bursty nature of network traffic and the well known adverse impact of this property on network performance, we propose an approach for extracting flow autocorrelations from switch counters. Our main contribution is a random sampling approach that reduces the monitoring overhead while enabling a fine grained characterization of the flow autocorrelation structure. We analytically evaluate the impact of random sampling and demonstrate how services may use the estimated traffic properties to compute useful performance metrics.
     613</li>
     614<br>
     615
     616
     617
     618<li>
    606619<b>Brinn, Marshall</b>
    607620, &quot;GENI Architecture Foundation.&quot;
     
    787800<li>
    788801<b>Chen, Kang and Shen, Haiying</b>
    789 , &quot;Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks.&quot;
    790 Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA,
    791 2013.
    792 doi:10.1109/icpp.2013.28.
    793 <a href="http://dx.doi.org/10.1109/icpp.2013.28">http://dx.doi.org/10.1109/icpp.2013.28</a>
    794 <br><br><b>Abstract: </b>In this paper, we focus on distributed file search over a delay tolerant network (DTN) formed by mobile devices that exhibit the characteristics of social networks. Current file search methods in MANETs/DTNs are either content-based or contact-based. The former builds routing tables for node contents but is not resilient to high node mobility, while the latter exploits node contact patterns in the social networks but may lead to high latency. Recent research also reveal the importance of interests in realizing efficient file dissemination in DTNs. In this paper, we first analyze node interest and mobility from real traces, which confirms the shortcomings of a contact based method and show the importance of considering both content/interest and contact in file search. We then propose Cont2, a social-aware file search method which leverages both node social interests (content) and contact patterns to enhance search efficiency. First, considering people with common interests tend to share files and gather together, Cont2 virtually groups common-interest nodes into a community to direct file search. Second, considering human mobility follows a certain pattern, Cont2 exploits nodes that have high contact frequency with the queried content. Third, Cont2 also exploits active nodes that have more connections to others as a complementary approach to expedite file search. Trace-driven experimental on the real-world GENI test bed and NS-2 simulator show that Cont2 can significantly improve the search efficiency compared to current methods.
    795 </li>
    796 <br>
    797 
    798 <li>
    799 <b>Chen, Kang and Shen, Haiying</b>
    800802, &quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot;
    801803Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,
     
    804806<a href="http://dx.doi.org/10.1109/icnp.2011.6089056">http://dx.doi.org/10.1109/icnp.2011.6089056</a>
    805807<br><br><b>Abstract: </b>File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of MANETs including node mobility and limited communication range and resource. An intuitive method to alleviate this problem is to create file replicas in the network. However, despite the efforts on file replication, no research has focused on the global optimal replica sharing with minimum average querying delay. Specifically, current file replication protocols in MANETs have two shortcomings. First, they lack a rule to allocate limited resource to different files in order to minimize the average querying delay. Second, they simply consider storage as resource for replicas, but neglect the fact that the file holders' frequency of meeting other nodes also plays an important role in determining file availability. A node having a higher meeting frequency with others provides higher availability to its files. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. We theoretically study the influence of resource allocation on the average querying delay and derive a resource allocation rule to minimize the average querying delay. We further propose a distributed file replication protocol that follows the rule. The trace-driven experiments on both the real-world GENI testbed and NS-2 show that our protocol can achieve shorter average querying delay at lower cost than current replication protocols, which justifies the correctness of our theoretical analysis and the effectiveness of the proposed protocol.
     808</li>
     809<br>
     810
     811<li>
     812<b>Chen, Kang and Shen, Haiying</b>
     813, &quot;Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks.&quot;
     814Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA,
     8152013.
     816doi:10.1109/icpp.2013.28.
     817<a href="http://dx.doi.org/10.1109/icpp.2013.28">http://dx.doi.org/10.1109/icpp.2013.28</a>
     818<br><br><b>Abstract: </b>In this paper, we focus on distributed file search over a delay tolerant network (DTN) formed by mobile devices that exhibit the characteristics of social networks. Current file search methods in MANETs/DTNs are either content-based or contact-based. The former builds routing tables for node contents but is not resilient to high node mobility, while the latter exploits node contact patterns in the social networks but may lead to high latency. Recent research also reveal the importance of interests in realizing efficient file dissemination in DTNs. In this paper, we first analyze node interest and mobility from real traces, which confirms the shortcomings of a contact based method and show the importance of considering both content/interest and contact in file search. We then propose Cont2, a social-aware file search method which leverages both node social interests (content) and contact patterns to enhance search efficiency. First, considering people with common interests tend to share files and gather together, Cont2 virtually groups common-interest nodes into a community to direct file search. Second, considering human mobility follows a certain pattern, Cont2 exploits nodes that have high contact frequency with the queried content. Third, Cont2 also exploits active nodes that have more connections to others as a complementary approach to expedite file search. Trace-driven experimental on the real-world GENI test bed and NS-2 simulator show that Cont2 can significantly improve the search efficiency compared to current methods.
    806819</li>
    807820<br>
     
    889902<li>
    890903<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
     904, &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot;
     905Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
     9062015.
     907doi:10.1109/milcom.2015.7357519.
     908<a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a>
     909<br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability.
     910</li>
     911<br>
     912
     913<li>
     914<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    891915, &quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot;
    892916Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,
     
    895919<a href="http://dx.doi.org/10.1109/icdcsw.2015.27">http://dx.doi.org/10.1109/icdcsw.2015.27</a>
    896920<br><br><b>Abstract: </b>Software-defined networking (SDN) and Open Flow have been driving new security applications and services. However, even if some of these studies provide interesting visions of what can be achieved, they stop short of presenting realistic application scenarios and experimental results. In this paper, we discuss a novel attack detection approach that coordinates monitors distributed over a network and controllers centralized on an SDN Open Virtual Switch (OVS), selectively inspecting network packets on demand. With different scale of network views and information availability, these two elements collaboratively detect signature constituents of an attack. Therefore, this approach is able to quickly issue an alert against potential threats followed by careful verification for high accuracy, while balancing the workload on the OVS. We have applied this method for detection and mitigation of TCP SYN flood attacks on Global Environment for Network Innovations (GENI). This realistic experimentation has provided us with insightful findings helpful toward a systematic methodology of SDN-supported attack detection and containment.
    897 </li>
    898 <br>
    899 
    900 <li>
    901 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    902 , &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot;
    903 Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
    904 2015.
    905 doi:10.1109/milcom.2015.7357519.
    906 <a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a>
    907 <br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability.
    908921</li>
    909922<br>
     
    16891702<li>
    16901703<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
     1704, &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot;
     1705Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
     17062015.
     1707doi:10.1109/iccw.2015.7247436.
     1708<a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a>
     1709<br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates.
     1710</li>
     1711<br>
     1712
     1713<li>
     1714<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    16911715, &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot;
    16921716NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
     
    16951719<a href="http://dx.doi.org/10.1109/noms.2016.7502805">http://dx.doi.org/10.1109/noms.2016.7502805</a>
    16961720<br><br><b>Abstract: </b>Dynamic Adaptive Streaming over HTTP (DASH) enables the video player to adapt the bitrate of the video while streaming to ensure playback without interruptions even with varying throughput. A DASH server hosts multiple representations of the same video, each of which is broken down into small segments of fixed playback duration. The video bitrate adaptation is purely driven by the player at the endhost. Typically, the player employs an Adaptive Bitrate (ABR) algorithm, that determines the most appropriate representation for the next segment to be downloaded, based on the current network conditions and user preferences. The aim of an ABR algorithm is to dynamically manage the Quality of Experience (QoE) of the user during the playback. ABR algorithms manage the QoE by maximizing the bitrate while at the same time trying to minimize the other QoE metrics: playback start time, duration and number of buffering events, and the number of bitrate switching events. Typically, the ABR algorithms manage the QoE by using the measured network throughput and buffer occupancy to adapt the playback bitrate. However, due to the video encoding schemes employed, the sizes of the individual segments may vary significantly. For low bandwidth networks, fluctuation in the segment sizes results in inaccurate estimation the expected segment fetch times, thereby resulting in inaccurate estimation of the optimum bitrate. In this paper we demonstrate how the Segment-Aware Rate Adaptation (SARA) algorithm, that considers the measured throughput, buffer occupancy, and the variation in segment sizes helps in better management of the users' QoE in a DASH system. By comparing with a typical throughput-based and buffer-based adaptation algorithm under varying network conditions, we demonstrate that SARA manages the QoE better, especially in a low bandwidth network. We also developed AStream, an open-source Python-based emulated DASH-video player that was used to evaluate three different ABR algor- thms and measure the QoE metrics with each of them.
    1697 </li>
    1698 <br>
    1699 
    1700 <li>
    1701 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    1702 , &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot;
    1703 Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
    1704 2015.
    1705 doi:10.1109/iccw.2015.7247436.
    1706 <a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a>
    1707 <br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates.
    17081721</li>
    17091722<br>
     
    18691882<li>
    18701883<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
     1884, &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot;
     1885First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
     18862012.
     1887
     1888
     1889<br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.
     1890</li>
     1891<br>
     1892
     1893<li>
     1894<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    18711895, &quot;Network capabilities of cloud services for a real time scientific application.&quot;
    1872189637th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE,
     
    18751899<a href="http://dx.doi.org/10.1109/lcn.2012.6423665">http://dx.doi.org/10.1109/lcn.2012.6423665</a>
    18761900<br><br><b>Abstract: </b>Dedicating high-end servers for executing scientific applications that run intermittently, such as severe weather detection or generalized weather forecasting, wastes resources. While the Infrastructure-as-a-Service (IaaS) model used by today's cloud platforms is well-suited for the bursty computational demands of these applications, it is unclear if the network capabilities of today's cloud platforms are sufficient. In this paper, we analyze the networking capabilities of multiple commercial (Amazon's EC2 and Rackspace) and research (GENICloud and ExoGENI cloud) platforms in the context of a Nowcasting application, a forecasting algorithm for highly accurate, near-term, e.g., 5-20 minutes, weather predictions. The application has both computational and network requirements. While it executes rarely, whenever severe weather approaches, it benefits from an IaaS model; However, since its results are time-critical, enough bandwidth must be available to transmit radar data to cloud platforms before it becomes stale. We conduct network capacity measurements between radar sites and cloud platforms throughout the country. Our results indicate that ExoGENI cloud performs the best for both serial and parallel data transfer with an average throughput of 110.22 Mbps and 17.2 Mbps, respectively. We also found that the cloud services perform better in the distributed data transfer case, where a subset of nodes transmit data in parallel to a cloud instance. Ultimately, we conclude that commercial and research clouds are capable of providing sufficient bandwidth for our real-time Nowcasting application.
    1877 </li>
    1878 <br>
    1879 
    1880 <li>
    1881 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    1882 , &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot;
    1883 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
    1884 2012.
    1885 
    1886 
    1887 <br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.
    18881901</li>
    18891902<br>
     
    20352048
    20362049<li>
     2050<b>Li, Ting and Liu, Jason</b>
     2051, &quot;Cluster-Based Spatiotemporal Background Traffic Generation for Network Simulation.&quot;
     2052ACM Trans. Model. Comput. Simul., ACM, New York, NY, USA,
     20532014.
     2054doi:10.1145/2667222.
     2055<a href="http://dx.doi.org/10.1145/2667222">http://dx.doi.org/10.1145/2667222</a>
     2056<br><br><b>Abstract: </b>To reduce the computational complexity of large-scale network simulation, one needs to distinguish foreground traffic generated by the target applications one intends to study from background traffic that represents the bulk of the network traffic generated by other applications. Background traffic competes with foreground traffic for network resources and consequently plays an important role in determining the behavior of network applications. Existing background traffic models either operate only at coarse time granularity or focus only on individual links. There is little insight on how to meaningfully apply realistic background traffic over the entire network. In this article, we propose a method for generating background traffic with spatial and temporal characteristics observed from real traffic traces. We apply data clustering techniques to describe the behavior of end hosts as a function of multidimensional attributes and group them into distinct classes, and then map the classes to simulated routers so that we can generate traffic in accordance with the cluster-level statistics. The proposed traffic generator makes no assumption on the target network topology. It is also capable of scaling the generated traffic so that the traffic intensity can be varied accordingly in order to test applications under different and yet realistic network conditions. Experiments show that our method is able to generate traffic that maintains the same spatial and temporal characteristics as in the observed traffic traces.
     2057</li>
     2058<br>
     2059
     2060
     2061
     2062<li>
    20372063<b>Li, Ting and Van Vorst, Nathanael and Liu, Jason</b>
    20382064, &quot;A Rate-based TCP Traffic Model to Accelerate Network Simulation.&quot;
     
    20682094<a href="http://dx.doi.org/10.1109/gree.2014.10">http://dx.doi.org/10.1109/gree.2014.10</a>
    20692095<br><br><b>Abstract: </b>PrimoGENI provides a GENI aggregate interface through which experimenters can launch large-scale network experiments on GENI resources consisting of both simulated network and real instances of network applications directly running on either virtual or physical machines. Real network traffic generated by the network applications can be introduced into the simulated network in real time and be subjected to proper delays and losses according to the simulated network conditions. To leverage the previous PrimoGENI prototype activities, PrimoGENI Constellation is a newly launched project, which will focus specifically on facilitating distributed at-scale hybrid experiments for real-world high-impact applications. In this paper, we provide an overview of the major achievements of PrimoGENI, and more importantly, discuss the ongoing efforts in PrimoGENI Constellation aiming to achieve the full potential of the hybrid network experiment approach. The main thrusts of PrimoGENI Constellation include: 1) supporting at-scale network experiments potentially distributed on different types of GENI resources in accordance with the GENI experiment workflow, 2) focusing on target applications supporting prominent and high-impact future Internet research, and 3) building the user community through extensive education and research training, and online archives of experiment results and user experiences.
     2096</li>
     2097<br>
     2098
     2099
     2100
     2101<li>
     2102<b>Liu, Jason and Marcondes, Cesar and Ahmed, Musa and Rong, Rong</b>
     2103, &quot;Toward Scalable Emulation of Future Internet Applications with Simulation Symbiosis.&quot;
     21042015 IEEE/ACM 19th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Chengdu, China, IEEE,
     21052015.
     2106doi:10.1109/ds-rt.2015.19.
     2107<a href="http://dx.doi.org/10.1109/ds-rt.2015.19">http://dx.doi.org/10.1109/ds-rt.2015.19</a>
     2108<br><br><b>Abstract: </b>Mininet is a popular container-based emulation environment built on Linux for testing Open Flow applications. Using Mininet, one can compose an experimental network using a set of virtual hosts and virtual switches with flexibility. However, it is well understood that Mininet can only provide a limited capacity, both for CPU and network I/O, due to its underlying physical constraints. We propose a method for combining simulation and emulation to improve the scalability of network experiments. This is achieved by applying the symbiotic approach to effectively integrate emulation and simulation for hybrid experimentation. In this case, one can use Mininet to directly run Open Flow applications on the virtual machines and software switches, with network connectivity represented by detailed simulation at scale.
    20702109</li>
    20712110<br>
     
    22312270<li>
    22322271<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
     2272, &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot;
     2273Teletraffic Congress (ITC), 2014 26th International, IEEE,
     22742014.
     2275doi:10.1109/itc.2014.6932970.
     2276<a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a>
     2277<br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs.
     2278</li>
     2279<br>
     2280
     2281<li>
     2282<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    22332283, &quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot;
    22342284Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,
     
    22372287<a href="http://dx.doi.org/10.1145/2955193.2955194">http://dx.doi.org/10.1145/2955193.2955194</a>
    22382288<br><br><b>Abstract: </b>Providing services for multiple tenants within a single or federated distributed cloud environment requires a variety of special considerations related to network design, provisioning, and operations. Especially important are multiple topics concerning the implementation of multiple parallel programmable virtual networks for large numbers of tenants, who require autonomous management, control, and data planes. This paper provides an overview of some of the challenges that arise from developing and implementing parallel programmable virtual networks, describes experiences with several experimental techniques for addressing those challenges based on large scale distributed testbeds, and presents the results of the experiments that were conducted. Distributed environments used include a distributed cloud testbed, the Chameleon Cloud, sponsored by the National Science Foundation's NSFCloud program, the NSF's Global Environment for Network Innovations (GENI), an international distributed OpenFlow testbed, and the Open Science Data Cloud.
    2239 </li>
    2240 <br>
    2241 
    2242 <li>
    2243 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    2244 , &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot;
    2245 Teletraffic Congress (ITC), 2014 26th International, IEEE,
    2246 2014.
    2247 doi:10.1109/itc.2014.6932970.
    2248 <a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a>
    2249 <br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs.
    22502289</li>
    22512290<br>
     
    26302669<li>
    26312670<b>Ozcelik, Ilker and Brooks, Richard R.</b>
    2632 , &quot;Operational System Testing for Designed in Security.&quot;
    2633 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
    2634 2013.
    2635 doi:10.1145/2459976.2460038.
    2636 <a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a>
    2637 <br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.
    2638 </li>
    2639 <br>
    2640 
    2641 <li>
    2642 <b>Ozcelik, Ilker and Brooks, Richard R.</b>
    26432671, &quot;Performance Analysis of DDoS Detection Methods on Real Network.&quot;
    26442672First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
     
    26612689<br>
    26622690
     2691<li>
     2692<b>Ozcelik, Ilker and Brooks, Richard R.</b>
     2693, &quot;Operational System Testing for Designed in Security.&quot;
     2694Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
     26952013.
     2696doi:10.1145/2459976.2460038.
     2697<a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a>
     2698<br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.
     2699</li>
     2700<br>
     2701
    26632702
    26642703
     
    27442783<b>Rahimi, Reza and Veeraraghavan, M. and Nakajima, Y. and Takahashi, H. and Nakajima, Y. and Okamoto, S. and Yamanaka, N.</b>
    27452784, &quot;A high-performance OpenFlow software switch.&quot;
    2746 2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR), IEEE,
     27852016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR), Yokohama, Japan, IEEE,
    274727862016.
    27482787doi:10.1109/hpsr.2016.7525645.
     
    36663705<li>
    36673706<b>Van Vorst, N. and Erazo, M. and Liu, J.</b>
     3707, &quot;PrimoGENI for hybrid network simulation and emulation experiments in GENI.&quot;
     3708Journal of Simulation,
     37092012.
     3710doi:10.1057/jos.2012.5.
     3711<a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a>
     3712<br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach.
     3713</li>
     3714<br>
     3715
     3716<li>
     3717<b>Van Vorst, N. and Erazo, M. and Liu, J.</b>
    36683718, &quot;PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI.&quot;
    36693719Principles of Advanced and Distributed Simulation (PADS), 2011 IEEE Workshop on, Nice, France, IEEE,
     
    36723722<a href="http://dx.doi.org/10.1109/pads.2011.5936747">http://dx.doi.org/10.1109/pads.2011.5936747</a>
    36733723<br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform -- a &#x76;&#x0308;irtual laboratory'' for the design, implementation and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines and local cluster nodes running virtual machines to seamlessly interoperate with the simulated network running within a designated &#x73;&#x0308;lice'' of resources. We show the results of our preliminary validation and performance studies to demonstrate the capabilities and limitations of our approach.
    3674 </li>
    3675 <br>
    3676 
    3677 <li>
    3678 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b>
    3679 , &quot;PrimoGENI for hybrid network simulation and emulation experiments in GENI.&quot;
    3680 Journal of Simulation,
    3681 2012.
    3682 doi:10.1057/jos.2012.5.
    3683 <a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a>
    3684 <br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach.
    36853724</li>
    36863725<br>
     
    46614700
    46624701<li>
     4702<b>Bozakov, Zdravko and Rizk, Amr and Bhat, Divyashri and Zink, Michael</b>
     4703, &quot;Measurement-based flow characterization in centrally controlled networks.&quot
     4704IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, IEEE,
     47052016.
     4706doi:10.1109/infocom.2016.7524331.
     4707</li>
     4708<br>
     4709
     4710
     4711
     4712<li>
    46634713<b>Brinn, Marshall</b>
    46644714, &quot;GENI Architecture Foundation.&quot
     
    48164866<li>
    48174867<b>Chen, Kang and Shen, Haiying</b>
    4818 , &quot;Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks.&quot
    4819 Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA,
    4820 2013.
    4821 doi:10.1109/icpp.2013.28.
    4822 </li>
    4823 <br>
    4824 
    4825 <li>
    4826 <b>Chen, Kang and Shen, Haiying</b>
    48274868, &quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot
    48284869Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,
    482948702011.
    48304871doi:10.1109/icnp.2011.6089056.
     4872</li>
     4873<br>
     4874
     4875<li>
     4876<b>Chen, Kang and Shen, Haiying</b>
     4877, &quot;Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks.&quot
     4878Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA,
     48792013.
     4880doi:10.1109/icpp.2013.28.
    48314881</li>
    48324882<br>
     
    49024952<li>
    49034953<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
     4954, &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot
     4955Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
     49562015.
     4957doi:10.1109/milcom.2015.7357519.
     4958</li>
     4959<br>
     4960
     4961<li>
     4962<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    49044963, &quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot
    49054964Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,
    490649652015.
    49074966doi:10.1109/icdcsw.2015.27.
    4908 </li>
    4909 <br>
    4910 
    4911 <li>
    4912 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    4913 , &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot
    4914 Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
    4915 2015.
    4916 doi:10.1109/milcom.2015.7357519.
    49174967</li>
    49184968<br>
     
    55785628<li>
    55795629<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
     5630, &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot
     5631Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
     56322015.
     5633doi:10.1109/iccw.2015.7247436.
     5634</li>
     5635<br>
     5636
     5637<li>
     5638<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    55805639, &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot
    55815640NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
    558256412016.
    55835642doi:10.1109/noms.2016.7502805.
    5584 </li>
    5585 <br>
    5586 
    5587 <li>
    5588 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    5589 , &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot
    5590 Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
    5591 2015.
    5592 doi:10.1109/iccw.2015.7247436.
    55935643</li>
    55945644<br>
     
    57305780<li>
    57315781<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
     5782, &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot
     5783First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
     57842012.
     5785
     5786</li>
     5787<br>
     5788
     5789<li>
     5790<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    57325791, &quot;Network capabilities of cloud services for a real time scientific application.&quot
    5733579237th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE,
    573457932012.
    57355794doi:10.1109/lcn.2012.6423665.
    5736 </li>
    5737 <br>
    5738 
    5739 <li>
    5740 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    5741 , &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot
    5742 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
    5743 2012.
    5744 
    57455795</li>
    57465796<br>
     
    58705920
    58715921<li>
     5922<b>Li, Ting and Liu, Jason</b>
     5923, &quot;Cluster-Based Spatiotemporal Background Traffic Generation for Network Simulation.&quot
     5924ACM Trans. Model. Comput. Simul., ACM, New York, NY, USA,
     59252014.
     5926doi:10.1145/2667222.
     5927</li>
     5928<br>
     5929
     5930
     5931
     5932<li>
    58725933<b>Li, Ting and Van Vorst, Nathanael and Liu, Jason</b>
    58735934, &quot;A Rate-based TCP Traffic Model to Accelerate Network Simulation.&quot
     
    589759582014.
    58985959doi:10.1109/gree.2014.10.
     5960</li>
     5961<br>
     5962
     5963
     5964
     5965<li>
     5966<b>Liu, Jason and Marcondes, Cesar and Ahmed, Musa and Rong, Rong</b>
     5967, &quot;Toward Scalable Emulation of Future Internet Applications with Simulation Symbiosis.&quot
     59682015 IEEE/ACM 19th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Chengdu, China, IEEE,
     59692015.
     5970doi:10.1109/ds-rt.2015.19.
    58995971</li>
    59005972<br>
     
    60366108<li>
    60376109<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
     6110, &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot
     6111Teletraffic Congress (ITC), 2014 26th International, IEEE,
     61122014.
     6113doi:10.1109/itc.2014.6932970.
     6114</li>
     6115<br>
     6116
     6117<li>
     6118<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    60386119, &quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot
    60396120Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,
    604061212016.
    60416122doi:10.1145/2955193.2955194.
    6042 </li>
    6043 <br>
    6044 
    6045 <li>
    6046 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    6047 , &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot
    6048 Teletraffic Congress (ITC), 2014 26th International, IEEE,
    6049 2014.
    6050 doi:10.1109/itc.2014.6932970.
    60516123</li>
    60526124<br>
     
    63736445<li>
    63746446<b>Ozcelik, Ilker and Brooks, Richard R.</b>
    6375 , &quot;Operational System Testing for Designed in Security.&quot
    6376 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
    6377 2013.
    6378 doi:10.1145/2459976.2460038.
    6379 </li>
    6380 <br>
    6381 
    6382 <li>
    6383 <b>Ozcelik, Ilker and Brooks, Richard R.</b>
    63846447, &quot;Performance Analysis of DDoS Detection Methods on Real Network.&quot
    63856448First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
     
    63986461<br>
    63996462
     6463<li>
     6464<b>Ozcelik, Ilker and Brooks, Richard R.</b>
     6465, &quot;Operational System Testing for Designed in Security.&quot
     6466Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
     64672013.
     6468doi:10.1145/2459976.2460038.
     6469</li>
     6470<br>
     6471
    64006472
    64016473
     
    64696541<b>Rahimi, Reza and Veeraraghavan, M. and Nakajima, Y. and Takahashi, H. and Nakajima, Y. and Okamoto, S. and Yamanaka, N.</b>
    64706542, &quot;A high-performance OpenFlow software switch.&quot
    6471 2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR), IEEE,
     65432016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR), Yokohama, Japan, IEEE,
    647265442016.
    64736545doi:10.1109/hpsr.2016.7525645.
     
    72497321<li>
    72507322<b>Van Vorst, N. and Erazo, M. and Liu, J.</b>
     7323, &quot;PrimoGENI for hybrid network simulation and emulation experiments in GENI.&quot
     7324Journal of Simulation,
     73252012.
     7326doi:10.1057/jos.2012.5.
     7327</li>
     7328<br>
     7329
     7330<li>
     7331<b>Van Vorst, N. and Erazo, M. and Liu, J.</b>
    72517332, &quot;PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI.&quot
    72527333Principles of Advanced and Distributed Simulation (PADS), 2011 IEEE Workshop on, Nice, France, IEEE,
    725373342011.
    72547335doi:10.1109/pads.2011.5936747.
    7255 </li>
    7256 <br>
    7257 
    7258 <li>
    7259 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b>
    7260 , &quot;PrimoGENI for hybrid network simulation and emulation experiments in GENI.&quot
    7261 Journal of Simulation,
    7262 2012.
    7263 doi:10.1057/jos.2012.5.
    72647336</li>
    72657337<br>