Source Accountability with Domain-brokered Privacy
Taeho Lee (Speaker), Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig
There are two network design objectives: accountability and privacy. And they are conflicting in network design.
This works tries to arrive a solution that both features are preserved.
The limitations of current best practice, APIP SIGCOMM’14, is two-fold: selective packet authentication and error reporting.
The speaker defines two objectives in a formal way: source accountability and communication privacy.
The solution has three components:
1/ ISP as accountability agent and privacy broker.
2/ Ephemeral ID: temporary network address given by the ISP
3/ Certificate for Ephemeral ID given from ISP to host
Q: Privacy guarantee under analysis with temporal correlation?
A: (wasn’t able to catch)
Q: About trust model. The solution does not trust ISP for the communication content, while it trusts ISP for hiding the identity of users.
A: It is a problem of balancing. You have to leak some info to enable the communicate, while still you want protect the most important part which is the content that could be seen.
A NEaT Design for Reliable and Scalable Network Stacks
Tomas Hruby (Speaker), Cristiano Giuffrida Lionel Sambuc Herbert Bos Andrew S. Tanenbaum
There are two expectations for OS design: reliability and scalable.
The current commodity OS might be scalable but not reliable.
As the reliability is achieved by testing and bug fixing, but not originated from design scheme.
The speaker argues the the key for reliability is fault isolation.
However physical isolation is not performant as it introduces communication overhead.
The proposition of this work bases on microkernel, where system processes are spread over dedicated cores.
This is not a scaling design, as there could be bottle necks come from single component.
A nature thinking is to replicate those component to scale up, in a way that:
1/ application don't need to know the system replica numbers;
2/ replicas work independently;
3/ no sharing among replicas, so there is no locks.
The proposed network stack implementation allows the shared memory among network stack replicas.
Q: How network stack replicas work together, e.g. DHCP lease from different replica?
A: There is only one single ip for the entire stack. And communications took place among replicas.
Q: Comment on lock-free.
A: It’s more about the way you programme, thread based or state-machine based.
Q: Fairness issue.
A: Components only run for a short time. Fairness can thus be achieved in a dynamic fashion.
ACACIA — Context-aware edge computing for continuous interactive applications over mobile networks
Junguk Cho (Speaker), Karthikeyan Sundaresan, Rajesh Mahindra, Jacobus Van der Merwe, Sampath Rangarajan
Continuous Interactive applications (CI) requires short latency.
Current enablers for CI:
1/ computation offloading to cloud;
2/ mobile networks, e.g. 5G;
3/ NFV & SDN;
4/ mobile edge computation;
5/ user context: location and interest of users.
Previous works mainly take a standalone approach.
The speak argues that it is not enough and thus proposes an end2end design, incorporating application, mobile network and user at the same time to delivery small delay for CI.
Then the speak presents the three components of the design.
1/ user context discovery
It uses publish and subscribe mechanism.
User pushes interest to LTE modem filter.
The later then listens the broadcast and sees if there is a match.
2/ mobile edge network
In this part, the speak explains how CI apps establishes new connection to mobile edge network.
3/ context aware application
App aware of user location can reduce searching space and reduce latency.
LTE-direct publisher is used to locate user.
Then follows the implementation and evaluation.
Q: Localisation accuracy.
A: Not as accurate as dedicated approach; but the work has shown the feasibility and latency decrease already. 3 meter error; with more publisher, error will further decrease.
Q: How about combining WIFI with LTE-direct publisher?
A: The design is extensible. But the author don't want to include other radio technologies for power consumption considerations.
Q: There are two mobile cores: EPC + EPC in mobile edge. How the two cores synchronise for a single user?
A: According to fig.5 in the article, the SGW-C & PGW-U insert rules into MEC basing on the user information to enable the connection from user to MEC.
Lying your way to be better traffic engineering
Marco Chiesa (Speaker), Gábor Rétvári, Michael Schapira
This work aims at enhancing the traditional TE scheme, in the situation where accurate knowledge on traffic demand is not available.
The problem is formulated as: given the network topology and traffic demand as input, construct per-destination DAG and traffic split that minimises the worst case link utilisation.
The speaker then decomposes the above problem into three steps:
1/ DAG construction.
In this step, shortest DAG is first calculated, then augmented with heuristics.
2/ traffic split in DAG
In order to reach optimality with reasonable computable complexity; the speaker casts the problem as a mixed linear-geometric programming problem.
3/ Legacy router configuration
One major contribution of the work is, when actual traffic deviates from the input traffic demand (i.e., with traffic uncertainty), the proposed scheme largely outperforms traditional TE scheme.
Q: Is split calculated for each TM snapshot over time?
A: The split is calculated for base TM.
Q: How it compares to source-destination networking?
A: They are two different settings. With source routing, you have more routing capability, but it is not compatible with traditional networking.
Q: What's the connection to SDN?
A: This work differs from traditional OSPF TE at these points 1/ explicit per dest DAG, instead of shortest DAG; 2/ per destination DAG and 3/ weighted in DAG split. Fibbing is just a way of implementing the proposed scheme. Other SDN configuration frameworks shall as well work.
I'm very excited after reading this blog. Each and every idea are really awesome.ReplyDelete
Photoshop Classes in Chennai
Photoshop Classes for Photographers
Drupal Training in Chennai
Manual Testing Training in Chennai
Mobile Testing Training in Chennai
Photoshop Classes in anna nagar
On the off chance that you have any thought in your brain, at that point you can say that to your planning firm. There are a lot of intriguing logo structuring thoughts you can discover on web and you can even have concoct one. logo design serviceReplyDelete
The article is so informative. This is more helpful for ourReplyDelete
selenium training in chennai
selenium online courses best selenium online training
selenium testing training
Thanks for sharing.
This is the first & best article to make me satisfied by presenting good content. I feel so happy and delighted. Thank you so much for this article.ReplyDelete
Learn Best Digital Marketing Course in Chennai
Digital Marketing Course Training with Placement in Chennai
Best Big Data Course Training with Placement in Chennai
Big Data Analytics and Hadoop Course Training in Chennai
Best Data Science Course Training with Placement in Chennai
Data Science Online Certification Course Training in Chennai
Learn Best Android Development Course Training Institute in Chennai
Android Application Development Programming Course Training in Chennai
Learn Best AngularJS 4 Course Online Training and Placement Institute in Chennai
Learn Digital Marketing Course Training in Chennai
Digital Marketing Training with Placement Institute in Chennai
Learn Seo Course Training Institute in Chennai
Learn Social Media Marketing Training with Placement Institute in Chennai
Thanks for sharing an informative blog keep rocking bring more details.I like the helpful info you provide in your articles. I’ll bookmark your weblog and check again here regularly. I am quite sure I will learn much new stuff right here! Good luck for the next!ReplyDelete
Web Designing Training Institute in Chennai | web design training class in chennai | web designing course in chennai with placement
Mobile Application Development Courses in chennai
Data Science Training in Chennai | Data Science courses in Chennai
Professional packers and movers in chennai | PDY Packers | Household Goods Shifting
Web Designing Training Institute in Chennai | Web Designing courses in Chennai
Google ads services | Google Ads Management agency
Web Designing Course in Chennai | Web Designing Training in Chennai
Nice post. I learned some new information. Thanks for sharing.....A lot of opportunities are provided by the Sarkari Job, for which aspirants dream of. A huge number of vacancies are released We bring to you all the relevant notifications of government-jobs, which are updated 24 X 7....ReplyDelete
شركة اصباغ الكويت اصباغ الكويت
شراء اثاث مستعمل الكويت شركة شراء اثاث مستعمل الكويت
فني كهربائي منازل الكويت كهربائي منازل بالكويت
شركة مكافحة البق الكويت افضل شركة مكافحة البق الكويت
شركة مكافحة حشرات الكويت افضل شركة مكافحة الحشرات الكويت
نقل عفش مبارك الكبير شركة نقل عفش مبارك الكبير
Good Post! Thank you so much for sharing this pretty post, it was so good to read and useful to improve my knowledge as updated one, keep blogging.ReplyDelete
Microsoft Windows Azure Training | Online Course | Certification in chennai | Microsoft Windows Azure Training | Online Course | Certification in bangalore | Microsoft Windows Azure Training | Online Course | Certification in hyderabad | Microsoft Windows Azure Training | Online Course | Certification in pune
Thanks for any other informative website. Where else may just I am getting that type of information written in such an ideal approach? I have a undertaking that I am simply now working on, and I have been at the look out for such information. ยูฟ่าสล็อตReplyDelete
Appreciation for sharing this bend towards. I in truth other than your weblog uncover no think about packs. you have in truth shared an illuminating and drawing in weblog dissipate following individuals.. Free Quick Heal Product KeyReplyDelete
i'm glad to find this say incredibly profitable for me, since it involves part of are searching for. I consistently choose to affirmation the man or woman content and this case I found in you announce. much gratitude to you for sharing. Wifi Password Hacker For PcReplyDelete
Ive been attempting to find a few respectable stuff concerning the challenge and dock't had any good fortune going on till this narrowing, You simply got a subsidiary biggest lover!.. Good Bye WishesReplyDelete