skip to main content
article
Free Access

Experience-driven experimental systems research

Published:01 November 2007Publication History
Skip Abstract Section

Abstract

The most direct way toward understanding whether PlanetLab and other such systems serve their purpose is to build, deploy, and use them.

References

  1. Anderson, A., Peterson, L., Shenker, S., and Turner, J. Overcoming the Internet impasse through virtualization. IEEE Computer 38, 4 (Apr. 2005), 34--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Park, K. and Pai, V. Scale and performance in the CoBlitz large-file distribution service. In Proceedings of the Third Symposium on Networked Systems Design and Implementation (San Jose, CA, May 8--10). USENIX Association, Berkeley, CA, 2006, 29--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Park, K. and Pai, V. CoMon: A mostly scalable monitoring system for PlanetLab. ACM SIGOPS Operating Systems Review 40, 1 (Jan. 2006), 65--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Park, K., Pai, V., Lee, K.-W., and Calo, S. Securing Web service by automatic robot detection. In Proceedings of the 2006 Usenix Annual Technical Conference (Boston, MA, May 30--June 3). USENIX Association, Berkeley, CA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Park, K., Pai, V., Peterson, L., and Wang, Z. CoDNS: Improving DNS performance and reliability via cooperative lookups. In Proceedings of the Sixth Symposium on Operating System Design and Implementation (San Francisco, Dec. 6--8). USENIX Association, Berkeley, CA, 2004, 199--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Peterson, L., Bavier, A., Fiuczynski, M., and Muir, S. Experiences building PlanetLab. In Proceedings of the Seventh Symposium on Operating System Design and Implementation (Seattle, WA, Nov. 6--8). USENIX Association, Berkeley, CA, 2006, 351--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Poole, L. and Pai, V. ConfiDNS: Leveraging scale and history to improve DNS security. In Proceedings of the Third USENIX Workshop on Real, Large Distributed Systems (Seattle, WA, Nov. 5). USENIX Association, Berkeley, CA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Soltesz, S., Potzl, H., Fiuczynski, M., Bavier, A., and Peterson, L. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In Proceedings of EuroSys 2007 (Lisbon, Portugal, Mar. 21--23, 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Wang, L., Pai, V., and Peterson, L. The effectiveness of request redirection on CDN robustness. In Proceedings of the Fifth Symposium on Operating System Design and Implementation (Boston, Dec. 9--11). USENIX Association, Berkeley, CA, 2002, 345--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Wang, L., Park, K., Pang, R., Pai, V., and Peterson, L. Reliability and security in the CoDeeN content distribution network. In Proceedings of the 2004 USENIX Annual Technical Conference (Boston, MA, June 27--July 2). USENIX Association, Berkeley, CA, 2004, 171--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zhang, M., Ruan, Y., Pai, V., and Rexford, J. How DNS misnaming distorts Internet topology mapping. In Proceedings of the 2006 USENIX Annual Technical Conference (Boston, June). USENIX Association, Berkeley, CA, 2006, 369--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zhang, M., Zhang, C., Pai, V., Peterson, L., and Wang, R. PlanetSeer: Internet path failure monitoring and characterization in wide-area services. In Proceedings of the Sixth Symposium on Operating System Design and Implementation (San Francisco, Dec. 6--8). USENIX Association, Berkeley, CA, 2004, 167--182. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Experience-driven experimental systems research

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image Communications of the ACM
                    Communications of the ACM  Volume 50, Issue 11
                    November 2007
                    90 pages
                    ISSN:0001-0782
                    EISSN:1557-7317
                    DOI:10.1145/1297797
                    Issue’s Table of Contents

                    Copyright © 2007 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 November 2007

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • article

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader

                  HTML Format

                  View this article in HTML Format .

                  View HTML Format