Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperAugust 2024
POSTER: User-Controllable Congestion Mitigation for Low-Latency Applications
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosAugust 2024, Pages 54–56https://doi.org/10.1145/3672202.3673740Since the beginning of the decade, real-time communication (RTC) protocols, including video conferencing applications, cloud gaming, and VR/AR streaming, have rapidly expanded over the Internet. With the eventual arrival of the metaverse, RTC traffic is ...
- research-articleAugust 2024
CCAnalyzer: An Efficient and Nearly-Passive Congestion Control Classifier
ACM SIGCOMM '24: Proceedings of the ACM SIGCOMM 2024 ConferenceAugust 2024, Pages 181–196https://doi.org/10.1145/3651890.3672255We present CCAnalyzer, a novel classifier for deployed Internet congestion control algorithms (CCAs) which is more accurate, more generalizable, and more human-interpretable than prior classifiers. CCAnalyzer requires no knowledge of the underlying CCA ...
- research-articleAugust 2024
Prudentia: Findings of an Internet Fairness Watchdog
- Adithya Abraham Philip,
- Rukshani Athapathu,
- Ranysha Ware,
- Fabian Francis Mkocheko,
- Alexis Schlomer,
- Mengrou Shou,
- Zili Meng,
- Srinivasan Seshan,
- Justine Sherry
ACM SIGCOMM '24: Proceedings of the ACM SIGCOMM 2024 ConferenceAugust 2024, Pages 506–520https://doi.org/10.1145/3651890.3672229With the rise of heterogeneous congestion control algorithms and increasingly complex application control loops (e.g. adaptive bitrate algorithms), the Internet community has expressed growing concern that network bandwidth allocations are unfairly ...
- research-articleJune 2024
Impossibility Results for Data-Center Routing with Congestion Control and Unsplittable Flows
PODC '24: Proceedings of the 43rd ACM Symposium on Principles of Distributed ComputingJune 2024, Pages 358–368https://doi.org/10.1145/3662158.3662777Clos networks have a long history in networking. In early telephone networks and classic network flow problems, Clos networks have been shown to emulate the performance properties of an ideal macro-switch connecting sources to destinations. Therefore, ...
- research-articleFebruary 2024
The I/O Driven Server: From SmartNICs to Data Movement Controllers
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 53, Issue 3October 2023, Pages 9–17https://doi.org/10.1145/3649171.3649174Many researchers are turning to SmartNIC offloads to improve the performance of high-performance networked systems. In this editorial, I discuss why SmartNICs are an especially powerful form factor for improving I/O intensive applications, and how their ...
-
- research-articleNovember 2023
How I Learned to Stop Worrying About CCA Contention
- Lloyd Brown,
- Yash Kothari,
- Akshay Narayan,
- Arvind Krishnamurthy,
- Aurojit Panda,
- Justine Sherry,
- Scott Shenker
HotNets '23: Proceedings of the 22nd ACM Workshop on Hot Topics in NetworksNovember 2023, Pages 229–237https://doi.org/10.1145/3626111.3628204This paper asks whether inter-flow contention between congestion control algorithms (CCAs) is a dominant factor in determining a flow's bandwidth allocation in today's Internet. We hypothesize that CCA contention typically does not determine a flow's ...
- research-articleNovember 2023
Of Apples and Oranges: Fair Comparisons in Heterogenous Systems Evaluation
HotNets '23: Proceedings of the 22nd ACM Workshop on Hot Topics in NetworksNovember 2023, Pages 1–8https://doi.org/10.1145/3626111.3628186Accelerators, such as GPUs, SmartNICs and FPGAs, are common components of research systems today. This paper focuses on the question of how to fairly compare these systems. This is challenging because it requires comparing systems that use different ...
Tigger: A Database Proxy That Bounces with User-Bypass
- Matthew Butrovich,
- Karthik Ramanathan,
- John Rollinson,
- Wan Shen Lim,
- William Zhang,
- Justine Sherry,
- Andrew Pavlo
Proceedings of the VLDB Endowment (PVLDB), Volume 16, Issue 11Pages 3335–3348https://doi.org/10.14778/3611479.3611530Developers often deploy database-specific network proxies whereby applications connect transparently to the proxy instead of directly connecting to the database management system (DBMS). This indirection improves system performance through connection ...
- research-articleOctober 2022
The ukrainian internet under attack: an NDT perspective
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferenceOctober 2022, Pages 166–178https://doi.org/10.1145/3517745.3561449On February 24, 2022, Russia began a large-scale invasion of Ukraine, the first widespread conflict in a country with high levels of network penetration. Because the Internet was designed with resilience under warfare in mind, the war in Ukraine offers ...
- research-articleOctober 2022
Automatic generation of network function accelerators using component-based synthesis
- Francisco Pereira,
- Gonçalo Matos,
- Hugo Sadok,
- Daehyeok Kim,
- Ruben Martins,
- Justine Sherry,
- Fernando M. V. Ramos,
- Luis Pedrosa
SOSR '22: Proceedings of the Symposium on SDN ResearchOctober 2022, Pages 89–97https://doi.org/10.1145/3563647.3563656Designing networked systems that take best advantage of heterogeneous dataplanes - e.g., dividing packet processing across both a PISA switch and an x86 CPU - can improve performance, efficiency, and resource consumption. However, programming for ...
- demonstrationOctober 2022
Pigasus 2.0: making the pigasus IDS robust to attacks and different workloads
SIGCOMM '22: Proceedings of the SIGCOMM '22 Poster and Demo SessionsAugust 2022, Pages 61–62https://doi.org/10.1145/3546037.3546065Intrusion Detection and Prevention Systems (IDS/IPSes) are critical components of the service chain for many network deployments. Ever-increasing network line rates and security threats have imposed substantial performance and correctness requirements on ...
- research-articleAugust 2022
SurgeProtector: mitigating temporal algorithmic complexity attacks using adversarial scheduling
SIGCOMM '22: Proceedings of the ACM SIGCOMM 2022 ConferenceAugust 2022, Pages 723–738https://doi.org/10.1145/3544216.3544250Denial-of-Service (DoS) attacks are the bane of public-facing network deployments. Algorithmic complexity attacks (ACAs) are a class of DoS attacks where an attacker uses a small amount of adversarial traffic to induce a large amount of work in the ...
- research-articleAugust 2022
Achieving consistent low latency for wireless real-time communications with the shortest control loop
SIGCOMM '22: Proceedings of the ACM SIGCOMM 2022 ConferenceAugust 2022, Pages 193–206https://doi.org/10.1145/3544216.3544225Real-time communication (RTC) applications like video conferencing or cloud gaming require consistent low latency to provide a seamless interactive experience. However, wireless networks including WiFi and cellular, albeit providing a satisfactory median ...
- research-articleNovember 2021
Counterfeiting Congestion Control Algorithms
HotNets '21: Proceedings of the 20th ACM Workshop on Hot Topics in NetworksNovember 2021, Pages 132–139https://doi.org/10.1145/3484266.3487381Congestion Control Algorithms (CCAs) impact numerous desirable Internet properties such as performance, stability, and fairness. Hence, the networking community invests substantial effort into studying whether new algorithms are safe for wide-scale ...
- short-paperNovember 2021
Revisiting TCP congestion control throughput models & fairness properties at scale
IMC '21: Proceedings of the 21st ACM Internet Measurement ConferenceNovember 2021, Pages 96–103https://doi.org/10.1145/3487552.3487834Much of our understanding of congestion control algorithm (CCA) throughput and fairness is derived from models and measurements that (implicitly) assume congestion occurs in the last mile. That is, these studies evaluated CCAs in "small scale" edge ...
- research-articleJune 2021
We need kernel interposition over the network dataplane
- Hugo Sadok,
- Zhipeng Zhao,
- Valerie Choung,
- Nirav Atre,
- Daniel S. Berger,
- James C. Hoe,
- Aurojit Panda,
- Justine Sherry
HotOS '21: Proceedings of the Workshop on Hot Topics in Operating SystemsJune 2021, Pages 152–158https://doi.org/10.1145/3458336.3465281Kernel-bypass networking, which allows applications to circumvent the kernel and interface directly with NIC hardware, is one of the main tools for improving application network performance. However, allowing applications to circumvent the kernel makes ...
- research-articleNovember 2020
Achieving 100Gbps intrusion prevention on a single server
OSDI'20: Proceedings of the 14th USENIX Conference on Operating Systems Design and ImplementationNovember 2020, Article No.: 61, Pages 1083–1100Intrusion Detection and Prevention Systems (IDS/IPS) are among the most demanding stateful network functions. Today's network operators are faced with securing 100Gbps networks with 100K+ concurrent connections by deploying IDS/IPSes to search for 10K+ ...
- research-articleJuly 2020
Caching with Delayed Hits
SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communicationJuly 2020, Pages 495–513https://doi.org/10.1145/3387514.3405883Caches are at the heart of latency-sensitive systems. In this paper, we identify a growing challenge for the design of latency-minimizing caches called delayed hits. Delayed hits occur at high throughput, when multiple requests to the same object queue ...
- research-articleJuly 2020
Contention-Aware Performance Prediction For Virtualized Network Functions
SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communicationJuly 2020, Pages 270–282https://doi.org/10.1145/3387514.3405868At the core of Network Functions Virtualization lie Network Functions (NFs) that run co-resident on the same server, contend over its hardware resources and, thus, might suffer from reduced performance relative to running alone on the same hardware. ...