- Sponsor:
- sigcomm
We take great pleasure in welcoming you to 2nd Cloud-Assisted Networking (CAN) 2017 Workshop co-located with ACM CoNEXT in Seoul/Incheon, South Korea. CAN'17 continues the pursuit of providing a forum to bring together researchers focusing on proactively integrating cloud resources and network components to solve complex networking problems as started by 1st CAN workshop.
Proceeding Downloads
Considerations on deploying high-performance container-based NFV
Over the last few years, the idea of network function virtualization (NFV) has become widespread, shifting the workload of hardware-based middleboxes onto applications on commodity hardware. Virtual machine is the common building block of the NFV ...
Towards optimal adaptation of NFV packet processing to modern CPU memory architectures
Network Functions Virtualization (NFV) aims to move network functions away from expensive hardware appliances to off-the-shelf server hardware. NFV promises higher flexibility and cost reduction for the network operator. In order to achieve high ...
Unveiling performance of NFV software dataplanes
The key technology of NFV is software dateplane, which has attracted much attention in both academia and industry recently. Yet, in practice, there is very little understanding about its performance till now. We make a comprehensive measurement study of ...
SDN on ACIDs
Software-defined networks (SDN) do not guarantee coherent network operations, when uncoordinated SDN applications concurrently update the network forwarding state. As this problem has not so far received considerable attention, in this paper, we ...
Switch-visor: towards infrastructure-level virtualization of SDN switches
To test and update switch operating systems, developers and testers need to install run beta-switch OSes (switch agents) alongside production versions. However, today's network virtualization solutions fail to support infrastructure-level virtualization ...
Cloud assisted home networks
Managed services for the home have traditionally been shunned by Internet Service Providers (ISPs) as having high overheads and low margins. In this paper we argue that the maturing ecosystem around Software Defined Networking (SDN) changes the equation,...
MISE: MIddleboxes SElection for multi-domain service function chains
In-network services, usually implemented through middle-boxes, play a key role in today's Internet. They enhance end-to-end connections with the ability to provide content optimization, performance enhancement, privacy protection, etc. Multiple in-...
DeepFlow: a deep learning framework for software-defined measurement
Providing fine grained traffic measurement is crucial for many network management tasks such as traffic engineering, anomaly detection, traffic accounting, and load balancing. Software-defined networks can potentially enable fine-grained measurement by ...
Controlling migration performance of virtual machines according to user's requirements
Live Virtual Machine (VM) migration is an important technology for cloud management and guaranteeing a high service quality. However, existing studies are mainly focusing on improving migration performance but without much consideration of user's ...
Semantic virtualization for Edge-IoT cloud: issues and challenges
It is well expected that a collection of smart objects such as IoT devices dynamically form an edge cloud allowing acquiring, storing, communicating, and processing of information done at the edge of the network. Edge cloud workers (i.e. IoT devices) ...
Cloud-assisted trajectory data management and analysis: a case study
Massive trajectory data with spatio-temporal information are generated from various devices everyday. Due to a wide variety of devices and data collection methods, these data differ in terms of frequency and precision, which brings challenges to data ...
Fending off IoT-hunting attacks at home networks
Many attacks target vulnerabilities of home IoT devices, such as bugs in outdated software and weak passwords. The home network is at a vantage point for deploying security appliances to deal with such IoT attacks. We propose a comprehensive home ...
- Proceedings of the 2nd Workshop on Cloud-Assisted Networking