By Topic

Architectures for Networking and Communications Systems (ANCS), 2011 Seventh ACM/IEEE Symposium on

Date 3-4 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 50
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2564 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (108 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (145 KB) | HTML iconHTML
    Freely Available from IEEE
  • Symposium Organization

    Publication Year: 2011, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2011, Page(s):xv - xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ally: OS-Transparent Packet Inspection Using Sequestered Cores

    Publication Year: 2011, Page(s):1 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (947 KB) | HTML iconHTML

    This paper presents Ally, a server platform architecture that supports compute-intensive management services on multi-core processors. Ally introduces simple hardware mechanisms to sequester cores to run a separate software environment dedicated to management tasks, including packet processing software appliances (e.g. for Deep Packet Inspection, DPI) with efficient mechanisms to safely and transp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 400 Gb/s Programmable Packet Parsing on a Single FPGA

    Publication Year: 2011, Page(s):12 - 23
    Cited by:  Papers (25)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Packet parsing is necessary at all points in the modern networking infrastructure, to support packet classification and security functions, as well as for protocol implementation. Increasingly high line rates call for advanced hardware packet processing solutions, while increasing rates of change call for high-level programmability of these solutions. This paper presents an approach for harnessing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chain-Based DFA Deflation for Fast and Scalable Regular Expression Matching Using TCAM

    Publication Year: 2011, Page(s):24 - 35
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Regular expression matching is the core engine of many network functions such as intrusion detection, protocol analysis and so on. In spite of intensive research, we are still in need of a method for fast and scalable regular expression matching, where it takes one simple memory lookup to match each input character (like DFA) and storage space growing linearly with regular expression pattern set s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AC-Suffix-Tree: Buffer Free String Matching on Out-of-Sequence Packets

    Publication Year: 2011, Page(s):36 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    TCP and IP fragmentation can be used to evade signature detection at Intrusion Detection/Prevention System (IDS / IPS). Such fragments may arrive out-of-sequence to escape from being detected by the string matching algorithm of IDS / IPS. The common defense is buffering and reassembling packets. However, buffering of out-of-sequence packets can become impractical on high speed links due to limited... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-AHRW: An Energy-Efficient Adaptive Hash Scheduler for Stream Processing on Multi-core Servers

    Publication Year: 2011, Page(s):45 - 56
    Cited by:  Papers (3)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    We study a streaming network application-video transcoding to be executed on a multi-core server. It is important for the scheduler to minimize the total processing time and preserve good video quality in an energy-efficient manner. However, the performance of existing scheduling schemes is largely limited by ineffective use of the multi-core architecture characteristic and undifferentiated transc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive Model-Based Thermal Management for Network Applications

    Publication Year: 2011, Page(s):57 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1927 KB) | HTML iconHTML

    As processor power density has increased at an alarming rate, chip/core temperature control becomes critical in satisfying given thermal constraint and avoiding hotspots. Unlike "run-to-finish" applications whose temperature will simply rise to saturation point and then stabilize, network applications do periodic packet processing, which causes temperature to rise and fall over time. However, no e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HPC-Mesh: A Homogeneous Parallel Concentrated Mesh for Fault-Tolerance and Energy Savings

    Publication Year: 2011, Page(s):69 - 80
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1940 KB) | HTML iconHTML

    We present the Homogeneous-Parallel-Concentrated-Mesh topology (HPC-Mesh). This NoC topology provides four disjoint homogeneous concentrated mesh networks. The network interface at each core provides connectivity to all these networks by using a novel injection algorithm. Indeed, the topology is dynamically adjusted to the working conditions of the network, minimizing power consumption by using on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating Sketch-Based Computations with GPU: A Case Study for Network Traffic Change Detection

    Publication Year: 2011, Page(s):81 - 82
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Sketch-based algorithms are widely used in networking applications due to its many good attributes. We propose to use Graphics Processing Unit (GPU) as an accelerating engine to offload heavy sketch computations for network traffic change detection. Our experiment results show that GPU can conduct fast change detection with query operation up to 9 million distinct keys per second. It is capable of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Implementation of Dynamic Protocol Stacks

    Publication Year: 2011, Page(s):83 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Network programming is widely understood as programming strictly defined socket interfaces. Only some frameworks have made a step towards real network programming by decomposing networking functionality into small modular blocks that can be assembled in a flexible manner. In this paper, we tackle the challenge of accommodating 3 partially conflicting objectives: (i) high flexibility for network pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast and Compact Regular Expression Matching Using Character Substitution

    Publication Year: 2011, Page(s):85 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Regular expression (Reg Ex) matching plays an important role in many modern intrusion detection systems (IDS). DFA is an effective way to perform regular expression matching. However, the prohibitive memory requirement makes DFAs impractical for many real world rule sets. In this paper we propose a method to dramatically reduce the DFA memory usage and still provide guaranteed matching speed. A sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Content Distribution on Datacenter Networks

    Publication Year: 2011, Page(s):87 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Peer-to-peer (P2P) applications distribute large files fast. That makes them popular on the Internet and has motivated their use on data center networks. On data center networks, however, these Internet applications waste bandwidth. To fully use available bandwidth, we propose the P2P copy (PCP) application. Results with a prototype show that PCP reduces content distribution times by an order of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Path Performance of Packet Cache Router Using Multi-core Network Processor

    Publication Year: 2011, Page(s):89 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    The packet cache router enabling the packet-level redundant data elimination is effective to reduce the P2P swarm traffic traversing ISP inter-domain links. To deploy the packet cache router in the ISP networks, the high performance packet processing is required. In this paper, we implement a packet cache router by a multi-core network processor using fast path/slow path application structure and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inferring Packet Processing Behavior Using Input/Output Monitors

    Publication Year: 2011, Page(s):91 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Programmable packet processors have replaced traditional fixed-function custom logic in the data path of routers. This programmability introduces new vulnerabilities in these systems that can lead to new types of network attacks. We propose a modular packet processor monitoring technique that can help in detecting and avoiding such attacks. Using information about the processing time distribution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Filtering Predicates Composition with Finite State Automata

    Publication Year: 2011, Page(s):93 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Network virtualization has gained a lot of attention recently, because of some new interesting proposals in the field (i.e. Open Flow). This trend has had the effect of pushing some filtering operations up at the software level: i.e. extract a potentially large number of protocol fields from a packet, or dynamically combine different filters. The time constraints of working at line rate force the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.