skip to main content
10.1145/3005745acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
HotNets '16: Proceedings of the 15th ACM Workshop on Hot Topics in Networks
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HotNets-XV: The 15th ACM Workshop on Hot Topics in Networks Atlanta GA USA November 9 - 10, 2016
ISBN:
978-1-4503-4661-0
Published:
09 November 2016
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Open Access
Helping the Lone Operator in the Vast Frontier

While the networking literature is replete with work on managing and operating networks---from the specifics of protocols to the design of management tools and architectures---there is comparatively little work on planning a network to be rolled out. In ...

research-article
A Case for Personal Virtual Networks

Our mobile devices regularly encounter and connect to multiple networks to maintain seamless connectivity. While this enables a variety of services we increasingly rely on, these ubiquitous network connections raise a number of important concerns. Our ...

research-article
Towards Comprehensive Repositories of Opinions

Despite the popularity of recommendation services (such as Yelp, Healthgrades, and Angie’s List), for a majority of entities listed on these services, one has to rely on opinions shared by a few users. We argue that this paucity of reviews for most ...

research-article
A Knowledge-Based Systems Approach to Reason About Networking

Most unwritten languages today have no known grammar, and are rather governed by ``unspoken rules''. Similarly, we think that the young discipline of networking is still a practice that lacks a deep understanding of the rules that govern it. This ...

research-article
Automatic Synthesis of NF Models by Program Analysis

Network functions (NFs), like firewall, NAT, IDS, have been widely deployed in today’s modern networks. However, currently there is no standard specification or modeling language that can accurately describe the complexity and diversity of different ...

research-article
Public Access
Canaries in the Network

Updating a large network deployment is a dangerous process. Regardless of whether the operation is a switch BGP configuration change or a network-wide SDN controller upgrade, misconfigurations and bugs can potentially cause network outages and downtime ...

research-article
FreeFlow: High Performance Container Networking

With the tremendous popularity gained by container technology, many applications are being containerized: splitting into numerous containers connected by networks. However, current container networking solutions have either bad performance or poor ...

research-article
Resource Management with Deep Reinforcement Learning

Resource management problems in systems and networking often manifest as difficult online decision making tasks where appropriate solutions depend on understanding the workload and environment. Inspired by recent advances in deep reinforcement learning ...

research-article
Public Access
Towards a Redundancy-Aware Network Stack for Data Centers

In this paper, we make a case for a redundancy-aware network stack (RANS) for data centers. In RANS, applications expose information about replicas to the network, which in turn, uses duplicate requests to improve performance of typical applications by ...

research-article
Fat-FREE Topologies

With the growing size of data center networks, full-bandwidth connectivity between all pairs of servers is becoming difficult and expensive to scale. Thus, numerous recent topology proposals incorporate reconfigurable wireless and optical connectivity, ...

research-article
Flat-tree: A Convertible Data Center Network Architecture from Clos to Random Graph

Clos networks are easy to implement, whereas random graphs have good performance. We propose flat-tree, a convertible data center network architecture, to combine the best of both worlds. Flat-tree can change the network topology dynamically, so the ...

research-article
Public Access
P-FatTree: A multi-channel datacenter network topology

The bandwidth and latency requirements of next-generation datacenter networks stress the limits of CMOS manufacturing. A key trend in their design will be a move from single-channel links and switches to multi-channel links and switches. Today's network ...

research-article
Unlocking Credit Loop Deadlocks

The recently emerging Converged Enhanced Ethernet (CEE) data center networks rely on layer-2 flow control in order to support packet loss sensitive transport protocols, such as RDMA and FCoE. Although lossless networks were proven to improve end-to-end ...

research-article
Deadlocks in Datacenter Networks: Why Do They Form, and How to Avoid Them

Driven by the need for ultra-low latency, high throughput and low CPU overhead, Remote Direct Memory Access (RDMA) is being deployed by many cloud providers. To deploy RDMA in Ethernet networks, Priority-based Flow Control (PFC) must be used. PFC, ...

research-article
Switches are Monitors Too!: Stateful Property Monitoring as a Switch Design Criterion

Testing and debugging networks /in situ/ is notoriously difficult. Many vital correctness properties involve histories over multiple packets (e.g., prior established connections). Checking such properties requires /cross-packet state/, which cannot be ...

research-article
Public Access
Network Monitoring as a Streaming Analytics Problem

Programmable switches potentially make it easier to perform flexible network monitoring queries at line rate, and scalable stream processors make it possible to fuse data streams to answer more sophisticated queries about the network in real-time. ...

research-article
Mille-Feuille: Putting ISP traffic under the scalpel

For Internet Service Provider (ISP) operators, getting an accurate picture of how their network behaves is challenging. Given the traffic volumes that their networks carry and the impossibility to control end-hosts, ISP operators are typically forced to ...

research-article
Independent Auditing of Online Display Advertising Campaigns

The reported lack of transparency of the online advertising market may seriously affect the interests of advertisers. In this paper, we present a novel methodology that allows advertisers to independently assess the quality of display advertising ...

research-article
Public Access
The Impact of Brokers on the Future of Content Delivery

Various trends are reshaping content delivery on the Internet: the explosive growth of traffic due to video, users' increasing expectations for higher quality of experience (QoE), and the proliferation of server capacity from a variety of sources (e.g., ...

research-article
Public Access
Rethinking Cloud Service Marketplaces

Services offered by cloud providers (e.g., for key-value storage and for redirecting clients to nearby data centers) simplify the development of applications deployed in the cloud. However, since any cloud provider’s service offerings are far from ...

research-article
Exploiting Multipath Congestion Control for Fun and Profit

Multipath congestion control prefers sending more traffic over paths with lower loss rates. This behaviour is key to achieving resource pooling and efficiently allocating resources in multipath networks. However, loss rates can be manipulated in the ...

research-article
Public Access
Rack-level Congestion Control

Many data center traffic patterns exhibit abundant concurrent connections and high churn. In the face of these characteristics, server-centric congestion control is a poor fit—each connection, no matter how small, must start from scratch when testing ...

research-article
Public Access
CLOVE: How I learned to stop worrying about the core and love the edge

Multi-tenant datacenters predominantly use equal-cost multipath (ECMP) routing to distribute traffic over multiple network paths. However, ECMP static hashing causes unequal load-balancing and collisions, leading to low throughput and high latencies. ...

research-article
Cutting the Cord in Virtual Reality

Today's virtual reality (VR) headsets require a cable connection to a PC or game console. This cable significantly limits the player’s mobility and hence her/his VR experience. The high data rate requirement of this link (multiple Gbps) precludes its ...

research-article
Millimeter Wave Communications: From Point-to-Point Links to Agile Network Connections

Millimeter wave (mmWave) technologies promise to revolutionize wireless networks by enabling multi-gigabit data rates. However, they suffer from high attenuation, and hence have to use highly directional antennas to focus their power on the receiver. ...

research-article
Trimming the Smartphone Network Stack

Network transmissions are the cornerstone of most mobile apps today, and a main contributor to energy consumption. We use a componentized energy model to quantify energy use by device, and observe significant energy consumption by the CPU in network ...

research-article
PASTE: Network Stacks Must Integrate with NVMM Abstractions

This paper argues that the lack of explicit support for non-volatile main memory (NVMM) in network stacks fundamentally limits application performance. NVMM devices have been integrated into general-purpose OSes by providing familiar file-based ...

research-article
Public Access
Hardware-Software Co-Design for Network Performance Measurement

Diagnosing performance problems in networks is important, for example to determine where packets experience high latency or loss. However, existing performance diagnoses are constrained by limited switch mechanisms for measurement. Alternatively, ...

research-article
Public Access
Dispersing Asymmetric DDoS Attacks with SplitStack

This paper presents SplitStack, an architecture targeted at mitigating asymmetric DDoS attacks. These attacks are particularly challenging, since attackers can use a limited amount of resources to trigger exhaustion of a particular type of system ...

research-article
The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet

Existing security mechanisms for managing the Internet infrastructural resources like IP addresses, AS numbers, BGP advertisements and DNS mappings rely on a Public Key Infrastructure (PKI) that can be potentially compromised by state actors and ...

Contributors
  • Georgia Institute of Technology
  • University of California, San Diego

Recommendations

Acceptance Rates

HotNets '16 Paper Acceptance Rate30of108submissions,28%Overall Acceptance Rate110of460submissions,24%
YearSubmittedAcceptedRate
HotNets '171242823%
HotNets '161083028%
HotNets-XIII1182622%
HotNets-XII1102624%
Overall46011024%