ACM SIGCOMM 2019, Beijing, China
MENU

ACM SIGCOMM 2019 Wednesday Program

  • Wednesday, August 21, 2019

  • 8:30 am - 7:00 pm Registration Desk

    Location: Shangri-La Hotel Lobby

  • Drink and Snack throughout the entire day (outside of conference rooms)

  • 9:00 am - 10:15 am 50th-anniversary Panel

    Location: Valley Wing Ballroom, 2nd floor

  • 10:15 am - 10:45 am Tea/Coffee Break

  • 10:45 am - 12:00 pm Technical Session 4: Building on New Physical Layers

    Location: Valley Wing Ballroom, 2nd floor
    Session Chair: Ben Zhao

  • A Link Layer Protocol for Quantum Networks

    Axel Dahlberg, Matthew Skrzypczyk, Tim Coopmans, Leon Wubben, Filip Rozpedek, Matteo Pompili, Arian Stolk, Przemysław Pawełczak (QuTech, TU Delft), Rob Knegjens, Julio de Oliveira Filho (QuTech, TNO), Ronald Hanson, Stephanie Wehner (QuTech, TU Delft)

    • Abstract: Quantum communication brings radically new capabilities that are provably impossible to attain in any classical network. Here, we take the first step from a physics experiment to a fully fledged quantum internet system. We propose a functional allocation of a quantum network stack and construct the first physical and link layer protocols that turn ad-hoc physics experiments producing heralded entanglement between quantum processors into a well-defined and robust service. This lays the groundwork for designing and implementing scalable control and application protocols in platform-independent software. To design our protocol, we identify use cases, as well as fundamental and technological design considerations of quantum network hardware, illustrated by considering the state-of-the-art quantum processor platform available to us (Nitrogen-Vacancy (NV) centers in diamond). Using a purpose built discrete event simulator for quantum networks, we examine the robustness and performance of our protocol using extensive simulations on a supercomputing cluster. We perform a full implementation of our protocol, where we successfully validate the physical simulation model against data gathered from the NV hardware. We first observe that our protocol is robust even in a regime of exaggerated losses of classical control messages with only little impact on the performance of the system. We proceed to study the performance of our protocols for 169 distinct simulation scenarios, including tradeoffs between traditional performance metrics such as throughput and the quality of entanglement. Finally, we initiate the study of quantum network scheduling strategies to optimize protocol performance for different use cases.

       

  • A Millimeter Wave Network for Billions of Things

    Mohammad Hossein Mazaheri, Soroush Ameli, Ali Abedi, Omid Abari (University of Waterloo)

    • Abstract: With the advent of the Internet of Things (IoT), billions of new connected devices will come online, placing a huge strain on today's WiFi and cellular spectrum. This problem will be further exacerbated by the fact that many of these IoT devices are low-power devices that use low-rate modulation schemes and therefore do not use the spectrum efficiently. Millimeter wave (mmWave) technology promises to revolutionize wireless networks and solve spectrum shortage problem through the usage of massive chunks of high-frequency spectrum. However, adapting this technology presents challenges. Past work has addressed challenges in using mmWave for emerging applications, such as 5G, virtual reality and data centers, which require multiple-gigabits-per-second links, while having substantial energy and computing power. In contrast, this paper focuses on designing a mmWave network for low-power, low-cost IoT devices. We address the key challenges that prevent existing mmWave technology from being used for such IoT devices. First, current mmWave radios are power hungry and expensive. Second, mmWave radios use highly directional antennas to search for the best beam alignment. Existing beam searching techniques are complex and require feedback from access point (AP), which makes them unsuitable for low-power, low-cost IoT devices. We present mmX, a novel mmWave network that addresses existing challenges in exploiting mmWave for IoT devices. We implemented mmX and evaluated it empirically.

       

  • Underwater Backscatter Networking

    JunSu Jang, Fadel Adib (MIT)

    • Abstract: We present Piezo-Acoustic Backscatter (PAB), the first technology that enables backscatter networking in underwater environments. PAB relies on the piezoelectric effect to enable underwater communication and sensing at near-zero power. Its architecture is inspired by radio backscatter which works well in air but cannot work well underwater due to the exponential attenuation of radio signals in water. PAB nodes harvest energy from underwater acoustic signals using piezoelectric interfaces and communicate by modulating the piezoelectric impedance. Our design introduces innovations that enable concurrent multiple access through circuit-based frequency tuning of backscatter modulation and a MAC that exploits the properties of PAB nodes to deliver higher network throughput and decode network collisions. We built a prototype of our design using custom-designed, mechanically fabricated transducers and an end-to-end battery-free hardware implementation. We tested our nodes in large experimental water tanks at the MIT Sea Grant. Our results demonstrate single-link throughputs up to 3 kbps and power-up ranges up to 10 m. Finally, we show how our design can be used to measure acidity, temperature, and pressure. Looking ahead, the system can be used in ocean exploration, marine life sensing, and underwater climate change monitoring.

       

  • 11:30 am - 1:30 pm Lunch

    Location: Garden Wing Ballroom, 1st floor and Valley Wing Jade Room, 3rd floor

  • 12:10 pm - 1:25 pm Topic Preview 2

    Location: Valley Wing Ruby Ballroom, 3rd floor
    Session chair: Paolo Costa (Microsoft Research, UK)

  • Technical Session 6: New Ways to Solve Old Problems

    Chen Tian (Nanjing University)

  • Technical Session 7: Applications

    Muhammad Shahbaz (Stanford University)

  • Technical Session 8: NICs and Switches

    Gianni Antichi (Queen Mary University of London, UK)

  • Technical Session 9: Video

    Wenwu Zhu (Tsinghua University)

  • Technical Session 10: New Control Plane Operations

    Chen Avin (Ben Gurion University of the Negev)

  • 1:30 pm - 2:45 pm Technical Session 5: Formal Network Analysis

    Location: Valley Wing Ballroom, 2nd floor
    Session Chair: Alex Snoeren

  • Validating Datacenters at Scale

    Karthick Jayaraman (Microsoft), Nikolaj Bjorner (Microsoft Research) ,Jitu Padhye, Amar Agrawal, Ashish Bhargava, Paul-Andre C Bissonnette, Shane Foster, Andrew Helwer, Mark Kasten, Ivan Lee, Anup Namdhari, Haseeb Niaz, Aniruddha Parkhi, Hanukumar Pinnamraju, Adrian Power, Neha Milind Raje, Parag Sharma (Microsoft)

    • Abstract: We describe our experiences using formal methods and automated theorem proving for network operation at scale. The experiences are based on developing and applying the SecGuru and RCDC (Reality Checker for Data-Centers) tools in Azure. SecGuru has been used since 2013 and thus, is arguably a pioneering industrial deployment of network verification. SecGuru is used for validating ACLs and more recently RCDC checks forwarding tables at Azure scale. A central technical angle is that we use local contracts and local checks, that can be performed at scale in parallel, and without maintaining global snapshots, to validate global properties of data-center networks. Specifications leverage declarative encodings of configurations and automated theorem proving for validation. We describe how intent is automatically derived from network architectures and verification is incorporated as prechecks for making changes, live monitoring, and for evolving legacy policies. We document how network verification, grounded in architectural constraints, can be integral to operating a reliable cloud at scale.

       

  • Safely and Automatically Updating In-Network ACL Configurations with Intent Language

    Bingchuan Tian (Nanjing University), Xinyi Zhang (University of California Santa Barbara), Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang (Alibaba Group), Da Yu (Brown University), Chen Tian (Nanjing University), Haitao Zheng, Ben Y. Zhao (University of Chicago)

    • Abstract: In-network Access Control List (ACL) is an important technique in ensuring network-wide connectivity and security. As cloud-scale WANs today constantly evolve in size and complexity, in-network ACL rules are becoming increasingly more complex. This presents a great challenge to the updating process of ACL configurations: network operators are frequently required to update "tangled" ACL rules across thousands of devices to meet diverse business requirements, and even a single ACL misconfiguration may lead to network disruptions. Such increasing challenges call for an automated system to improve the efficiency and correctness of ACL updates. This paper presents Jinjing, a system that aids Alibaba’s network operators in automatically and correctly updating ACL configurations in Alibaba’s global WAN. Jinjing allows the operators to express in a declarative language, named LAI, their update intent (e.g., ACL migration and traffic control). Then, Jinjing automatically synthesizes ACL update plans that satisfy their intent. At the heart of Jinjing, we develop a set of novel verification and synthesis techniques to rigorously guarantee the correctness of update plans. In Alibaba, our operators have used Jinjing to efficiently update their ACLs and have thus prevented significant service downtime.

       

  • Formal Specification and Testing of QUIC

    Kennneth L McMillan (Microsoft Research), Lenore D Zuck (UIC)

    • Abstract: QUIC is a new Internet secure transport protocol currently in the process of IETF standardization. It is intended as a replacement for the TLS/TCP stack and will be the basis of HTTP/3, the next official version of the hypertext transfer protocol. As a result, it is likely in the near future to carry a substantial fraction of traffic on the Internet. In this case study, we describe our experience applying a methodology of compositional specification-based testing to QUIC. We develop a formal specification of the wire protocol, and use this specification to generate automated randomized testers for implementation of QUIC. The testers effectively take one role of the QUIC protocl, interacting with the other role to generate full protocol executions, and verifying that the implementations conform to the forma specification. This form of testing generates significantly more diverse stimulus and a stronger correctness criterion than interoperability testing, the primary method used to date to validate QUIC and its implementations. As a result, numerous implementation errors have been found. These include some vulnerabilities at the protocol and implementation levels, including an off-path denial of service scenario and an information leak similar to the "heartbleed" vulnerability in OpenSSL.

       

  • 2:45 pm - 3:15 pm Tea/Coffee Break

  • 3:15 pm - 4:55 pm Poster, Demo & CCR papers

    Location: Valley Wing Ballroom, 2nd floor
    Best of CCR session chair: Sergey Gorinsky (IMDEA Networks Institute)

  • (3:15 pm - 3:40 pm) Looking for Hypergiants in PeeringDB

    Timm Böttger, Felix Cuadrado, and Steve Uhlig (Queen Mary University of London)

    • Abstract: Hypergiants, such as Google or Netflix, are important organisations in the Internet ecosystem, due to their sheer impact in terms of traffic volume exchanged. However, the research community still lacks a sufficiently crisp definition for them, beyond naming specific instances of them. In this paper we analyse PeeringDB data and identify features that differentiate hypergiants from the other organisations. To this end, we first characterise the organisations present in PeeringDB, allowing us to identify discriminating properties of these organisations. We then use these properties to separate the data in two clusters, differentiating hypergiants from other organisations. We conclude this paper by investigating how hypergiants and other organisations exploit the IXP ecosystem to reach the global IPv4 space.

       

  • (3:40 pm - 4:05 pm) The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research

    Vaibhav Bajpai (TU Munich), Anna Brunstrom (Karlstad University), Anja Feldmann (Max Planck Institute for Informatics), Wolfgang Kellerer (TU Munich), Aiko Pras (University of Twente), Henning Schulzrinne (Columbia University), Georgios Smaragdakis (TU Berlin), Matthias Wählisch (FU Berlin), and Klaus Wehrle (RWTH Aachen University)

    • Abstract: Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and network systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.

       

  • 4:55 pm - 6:00 pm Business meeting

    Location: Valley Wing Ballroom, 2nd floor

  • 6:30 pm - 9:00 pm Banquet

    Location: Royal Cuisine Museum
    Notice: Shuttle buses depart from Shangri-La Hotel Lobby during 5:30 pm – 6:30 pm

The final program may be adjusted.