Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
What is the next hop to more granular routing models?
HotNets '24: Proceedings of the 23rd ACM Workshop on Hot Topics in NetworksPages 343–351https://doi.org/10.1145/3696348.3696859Despite its widespread use, the "Gao-Rexford" model has long been recognized for its limitations in accurately capturing Internet routing behavior. However, the root causes of these limitations remain poorly understood, due to the lack of ground truth ...
- research-articleSeptember 2024
Does Rate Adaptation at Daily Timescales Make Sense?
ACM SIGEnergy Energy Informatics Review (SIGENERGY-EIR), Volume 4, Issue 3Pages 73–79https://doi.org/10.1145/3698365.3698377Today, networking hardware is not fast enough to save energy with rate adaptation. Or is it? While we are not (yet) able to turn on and off line cards in milliseconds, we can do so a couple of times per day. The question is, does it make sense to save ...
- research-articleAugust 2024
On Sample Selection for Continual Learning: A Video Streaming Case Study
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 54, Issue 2Pages 10–35https://doi.org/10.1145/3687234.3687237Machine learning (ML) is a powerful tool to model the complexity of communication networks. As networks evolve, we cannot only train once and deploy. Retraining models, known as continual learning, is necessary. Yet, to date, there is no established ...
-
- research-articleMarch 2024
Canary: Congestion-aware in-network allreduce using dynamic trees
Future Generation Computer Systems (FGCS), Volume 152, Issue CPages 70–82https://doi.org/10.1016/j.future.2023.10.010AbstractThe allreduce operation is an essential building block for many distributed applications, ranging from the training of deep learning models to scientific computing. In an allreduce operation, data from multiple hosts is aggregated together and ...
Highlights- In-network offload can improve allreduce performance up to 2x.
- Existing approaches are prone to congestion due to static network paths selection.
- Canary is the first congestion-aware in-network allreduce algorithm.
- Canary ...
- abstractDecember 2023
Causality Analysis in Control Plane Verification
CoNEXT-SW '23: Proceedings of the on CoNEXT Student Workshop 2023Pages 5–6https://doi.org/10.1145/3630202.3630237Control plane verification promises to help operators build reliable networks by reporting a counterexample that violates the specification. However, a single counterexample imposes a major challenge for operators to understand and repair the violation.
...
- abstractDecember 2023
Predicting Specification Violations During BGP Convergence
CoNEXT-SW '23: Proceedings of the on CoNEXT Student Workshop 2023Pages 25–26https://doi.org/10.1145/3630202.3630235Analyzing a network's behavior during convergence is challenging due to its highly non-deterministic nature. To address this, we developed BGPseer, the first analyzer that predicts specification violations during BGP convergence without network ...
- posterDecember 2023
Poster: What Keeps Your Network up at Night?
CoNEXT 2023: Companion of the 19th International Conference on emerging Networking EXperiments and TechnologiesPages 59–60https://doi.org/10.1145/3624354.3630092The demand for ever-faster links and devices is competing with the need to make networks more energy-efficient. One energy-saving technique is shutting down dispensable parts of the network. In this work, we investigate the limits of link sleeping; i.e., ...
- research-articleNovember 2023
QVISOR: Virtualizing Packet Scheduling Policies
HotNets '23: Proceedings of the 22nd ACM Workshop on Hot Topics in NetworksPages 238–244https://doi.org/10.1145/3626111.3628179The concept of programmable packet scheduling has been recently introduced, enabling the programming of scheduling algorithms into existing data planes without requiring new hardware designs. Notably, several programmable schedulers have been proposed, ...
- research-articleOctober 2023
The Internet of Tomorrow Must Sleep More and Grow Old
ACM SIGEnergy Energy Informatics Review (SIGENERGY-EIR), Volume 3, Issue 3Pages 27–32https://doi.org/10.1145/3630614.3630620Today, the ICT industry has a massive carbon footprint (a few percent of worldwide emissions) and one of the fastest growth rates. The Internet accounts for a large part of that footprint while being also energy inefficient; i.e., the total energy cost ...
- posterSeptember 2023
Poster: Learning distributions to detect anomalies using all the network traffic
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 1108–1110https://doi.org/10.1145/3603269.3610837Anomaly detection is an essential building block of many applications, including DDoS detection, root cause analysis, traffic estimation, and change detection. A vital part of detecting anomalies is establishing a sense of normality, e.g., by learning ...
Taming the transient while reconfiguring BGP
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 77–93https://doi.org/10.1145/3603269.3604855BGP reconfigurations are a daily occurrence for most network operators, especially in large networks. Yet, performing safe and robust BGP reconfiguration changes is still an open problem. Few BGP reconfiguration techniques exist, and they are either (i) ...
- research-articleAugust 2023
Does rate adaptation at daily timescales make sense?
HotCarbon '23: Proceedings of the 2nd Workshop on Sustainable Computer SystemsArticle No.: 17, Pages 1–7https://doi.org/10.1145/3604930.3605713Today, networking hardware is not fast enough to save energy with rate adaptation. Or is it? While we are not (yet) able to turn on and off line cards in milliseconds, we can do so a couple of times per day. The question is, does it make sense to save ...
- ArticleJune 2023
FnF-BFT: A BFT Protocol with Provable Performance Under Attack
Structural Information and Communication ComplexityPages 165–198https://doi.org/10.1007/978-3-031-32733-9_9AbstractWe introduce FnF-BFT, the first partially synchronous BFT protocol with performance guarantees under truly byzantine attacks during stable networking conditions. At its core, FnF-BFT parallelizes the execution of requests by allowing all replicas ...
- research-articleDecember 2022
Reducing P4 language's voluminosity using higher-level constructs
EuroP4 '22: Proceedings of the 5th International Workshop on P4 in EuropePages 19–25https://doi.org/10.1145/3565475.3569078Over the last years, P4 has positioned itself as the primary language for data-plane programming. Despite its constant evolution, the P4 language still "suffers" from one significant limitation: the voluminosity of its code. P4 applications easily reach ...
- research-articleNovember 2022
Learning to configure computer networks with neural algorithmic reasoning
NIPS '22: Proceedings of the 36th International Conference on Neural Information Processing SystemsArticle No.: 53, Pages 730–742We present a new method for scaling automatic configuration of computer networks. The key idea is to relax the computationally hard search problem of finding a configuration that satisfes a given specification into an approximate objective amenable to ...
- research-articleNovember 2022
A new hope for network model generalization
HotNets '22: Proceedings of the 21st ACM Workshop on Hot Topics in NetworksPages 152–159https://doi.org/10.1145/3563766.3564104Generalizing machine learning (ML) models for network traffic dynamics tends to be considered a lost cause. Hence for every new task, we design new models and train them on model-specific datasets closely mimicking the deployment environments. Yet, an ...
- research-articleNovember 2022
Generating representative, live network traffic out of millions of code repositories
HotNets '22: Proceedings of the 21st ACM Workshop on Hot Topics in NetworksPages 1–7https://doi.org/10.1145/3563766.3564084In theory, any network operator, developer, or vendor should have access to large amounts of live network traffic for testing their solutions. In practice, though, that is not the case. Network actors instead have to use packet traces or synthetic ...
- research-articleOctober 2022
"Is my internet down?": sifting through user-affecting outages with Google trends
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 290–297https://doi.org/10.1145/3517745.3561428What are the worst outages for Internet users? How long do they last, and how wide are they? Such questions are hard to answer via traditional outage detection and analysis techniques, as they conventionally rely on network-level signals and do not ...