Zum Hauptinhalt springen

Showing 1–21 of 21 results for author: Shenker, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.07753  [pdf, other

    cs.NI

    Bringing Reconfigurability to the Network Stack

    Authors: Akshay Narayan, Aurojit Panda, Mohammad Alizadeh, Hari Balakrishnan, Arvind Krishnamurthy, Scott Shenker

    Abstract: Reconfiguring the network stack allows applications to specialize the implementations of communication libraries depending on where they run, the requests they serve, and the performance they need to provide. Specializing applications in this way is challenging because developers need to choose the libraries they use when writing a program and cannot easily change them at runtime. This paper intro… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 12 pages, 10 figures

  2. arXiv:2207.07688  [pdf, other

    cs.OS

    3PO: Programmed Far-Memory Prefetching for Oblivious Applications

    Authors: Christopher Branner-Augmon, Narek Galstyan, Sam Kumar, Emmanuel Amaro, Amy Ousterhout, Aurojit Panda, Sylvia Ratnasamy, Scott Shenker

    Abstract: Using memory located on remote machines, or far memory, as a swap space is a promising approach to meet the increasing memory demands of modern datacenter applications. Operating systems have long relied on prefetchers to mask the increased latency of fetching pages from swap space to main memory. Unfortunately, with traditional prefetching heuristics, performance still degrades when applications… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

    Comments: 14 pages

  3. arXiv:2205.07147  [pdf

    cs.DC

    The Sky Above The Clouds

    Authors: Sarah Chasins, Alvin Cheung, Natacha Crooks, Ali Ghodsi, Ken Goldberg, Joseph E. Gonzalez, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Michael W. Mahoney, Aditya Parameswaran, David Patterson, Raluca Ada Popa, Koushik Sen, Scott Shenker, Dawn Song, Ion Stoica

    Abstract: Technology ecosystems often undergo significant transformations as they mature. For example, telephony, the Internet, and PCs all started with a single provider, but in the United States each is now served by a competitive market that uses comprehensive and universal technology standards to provide compatibility. This white paper presents our view on how the cloud ecosystem, barely over fifteen ye… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

    Comments: 35 pages

  4. arXiv:2205.06911  [pdf, other

    cs.DB

    Blockaid: Data Access Policy Enforcement for Web Applications

    Authors: Wen Zhang, Eric Sheng, Michael Chang, Aurojit Panda, Mooly Sagiv, Scott Shenker

    Abstract: Modern web applications serve large amounts of sensitive user data, access to which is typically governed by data-access policies. Enforcing such policies is crucial to preventing improper data access, and prior work has proposed many enforcement mechanisms. However, these prior methods either alter application semantics or require adopting a new programming model; the former can result in unexpec… ▽ More

    Submitted 31 May, 2022; v1 submitted 13 May, 2022; originally announced May 2022.

    Comments: Extended technical report for OSDI 2022 paper

  5. arXiv:2106.10334  [pdf, other

    cs.PF cs.DC

    AutoTune: Improving End-to-end Performance and Resource Efficiency for Microservice Applications

    Authors: Michael Alan Chang, Aurojit Panda, Hantao Wang, Yuancheng Tsai, Rahul Balakrishnan, Scott Shenker

    Abstract: Most large web-scale applications are now built by composing collections (from a few up to 100s or 1000s) of microservices. Operators need to decide how many resources are allocated to each microservice, and these allocations can have a large impact on application performance. Manually determining allocations that are both cost-efficient and meet performance requirements is challenging, even for e… ▽ More

    Submitted 28 June, 2021; v1 submitted 18 June, 2021; originally announced June 2021.

  6. Some Complexity Results for Stateful Network Verification

    Authors: Kalev Alpernas, Aurojit Panda, Alexander Rabinovich, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner

    Abstract: In modern networks, forwarding of packets often depends on the history of previously transmitted traffic. Such networks contain stateful middleboxes, whose forwarding behaviour depends on a mutable internal state. Firewalls and load balancers are typical examples of stateful middleboxes. This work addresses the complexity of verifying safety properties, such as isolation, in networks with finite… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: This is a pre-print of an article published in Formal Methods in System Design. The final authenticated version is available online at: https://doi.org/10.1007/s10703-018-00330-9

    Journal ref: Formal Methods in System Design 54 (2019) 191-231

  7. arXiv:2004.10275  [pdf, other

    cs.NI cs.DC cs.LG

    How to Train your DNN: The Network Operator Edition

    Authors: Michael Alan Chang, Domenic Bottini, Lisa Jian, Pranay Kumar, Aurojit Panda, Scott Shenker

    Abstract: Deep Neural Nets have hit quite a crest, But physical networks are where they must rest, And here we put them all to the test, To see which network optimization is best.

    Submitted 21 April, 2020; originally announced April 2020.

  8. arXiv:1806.08159  [pdf, other

    cs.NI

    Revisiting Network Support for RDMA

    Authors: Radhika Mittal, Alexander Shpiner, Aurojit Panda, Eitan Zahavi, Arvind Krishnamurthy, Sylvia Ratnasamy, Scott Shenker

    Abstract: The advent of RoCE (RDMA over Converged Ethernet) has led to a significant increase in the use of RDMA in datacenter networks. To achieve good performance, RoCE requires a lossless network which is in turn achieved by enabling Priority Flow Control (PFC) within the network. However, PFC brings with it a host of problems such as head-of-the-line blocking, congestion spreading, and occasional deadlo… ▽ More

    Submitted 21 June, 2018; originally announced June 2018.

    Comments: Extended version of the paper appearing in ACM SIGCOMM 2018

  9. arXiv:1711.00618  [pdf, other

    cs.DC cs.PF

    ThrottleBot - Performance without Insight

    Authors: Michael Alan Chang, Aurojit Panda, Yuan-Cheng Tsai, Hantao Wang, Scott Shenker

    Abstract: Large scale applications are increasingly built by composing sets of microservices. In this model the functionality for a single application might be split across 100s or 1000s of microservices. Resource provisioning for these applications is complex, requiring administrators to understand both the functioning of each microservice, and dependencies between microservices in an application. In this… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

  10. arXiv:1708.05904  [pdf, other

    cs.PL

    Abstract Interpretation of Stateful Networks

    Authors: Kalev Alpernas, Roman Manevich, Aurojit Panda, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner

    Abstract: Modern networks achieve robustness and scalability by maintaining states on their nodes. These nodes are referred to as middleboxes and are essential for network functionality. However, the presence of middleboxes drastically complicates the task of network verification. Previous work showed that the problem is undecidable in general and EXPSPACE-complete when abstracting away the order of packet… ▽ More

    Submitted 4 July, 2018; v1 submitted 19 August, 2017; originally announced August 2017.

  11. arXiv:1607.00991  [pdf, other

    cs.NI

    Verifying Reachability in Networks with Mutable Datapaths

    Authors: Aurojit Panda, Ori Lahav, Katerina Argyraki, Mooly Sagiv, Scott Shenker

    Abstract: Recent work has made great progress in verifying the forwarding correctness of networks . However, these approaches cannot be used to verify networks containing middleboxes, such as caches and firewalls, whose forwarding behavior depends on previously observed traffic. We explore how to verify reachability properties for networks that include such "mutable datapath" elements. We want our verificat… ▽ More

    Submitted 4 July, 2016; originally announced July 2016.

  12. arXiv:1605.07734  [pdf, other

    cs.NI

    Recursive SDN for Carrier Networks

    Authors: James McCauley, Zhi Liu, Aurojit Panda, Teemu Koponen, Barath Raghavan, Jennifer Rexford, Scott Shenker

    Abstract: Control planes for global carrier networks should be programmable (so that new functionality can be easily introduced) and scalable (so they can handle the numerical scale and geographic scope of these networks). Neither traditional control planes nor new SDN-based control planes meet both of these goals. In this paper, we propose a framework for recursive routing computations that combines the be… ▽ More

    Submitted 25 May, 2016; originally announced May 2016.

  13. arXiv:1510.03551  [pdf, other

    cs.NI

    Universal Packet Scheduling

    Authors: Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker

    Abstract: In this paper we address a seemingly simple question: Is there a universal packet scheduling algorithm? More precisely, we analyze (both theoretically and empirically) whether there is a single packet scheduling algorithm that, at a network-wide level, can match the results of any given scheduling algorithm. We find that in general the answer is "no". However, we show theoretically that the classi… ▽ More

    Submitted 13 October, 2015; originally announced October 2015.

    Comments: This is the same as our ACM HotNets 2015 paper, extended to include proofs for our theoretical results

    ACM Class: C.2.1

  14. arXiv:1409.7687  [pdf, other

    cs.NI cs.LO

    Verifying Isolation Properties in the Presence of Middleboxes

    Authors: Aurojit Panda, Ori Lahav, Katerina Argyraki, Mooly Sagiv, Scott Shenker

    Abstract: Great progress has been made recently in verifying the correctness of router forwarding tables. However, these approaches do not work for networks containing middleboxes such as caches and firewalls whose forwarding behavior depends on previously observed traffic. We explore how to verify isolation properties in networks that include such "dynamic datapath" elements using model checking. Our work… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: Under submission to NSDI

  15. arXiv:1409.0034  [pdf, other

    cs.NI

    Exploring the Limits of Static Failover Routing

    Authors: Marco Chiesa, Andrei Gurtov, Aleksander Mądry, Slobodan Mitrović, Ilya Nikolaevkiy, Aurojit Panda, Michael Schapira, Scott Shenker

    Abstract: We present and study the Static-Routing-Resiliency problem, motivated by routing on the Internet: Given a graph $G$, a unique destination vertex $d$, and an integer constant $c>0$, does there exist a static and destination-based routing scheme such that the correct delivery of packets from any source $s$ to the destination $d$ is guaranteed so long as (1) no more than $c$ edges fail and (2) there… ▽ More

    Submitted 27 July, 2016; v1 submitted 29 August, 2014; originally announced September 2014.

    Comments: 30 pages

    ACM Class: C.2.2

  16. arXiv:1306.3707  [pdf, other

    cs.NI

    Low latency via redundancy

    Authors: Ashish Vulimiri, P. Brighten Godfrey, Radhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker

    Abstract: Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult. In this paper, we argue that the use of redundancy is an effective way to convert extra capacity into reduced latency. By initiating redundant operations across diverse resou… ▽ More

    Submitted 16 June, 2013; originally announced June 2013.

  17. arXiv:1306.3534  [pdf, other

    cs.NI cs.DC

    A cost-benefit analysis of low latency via added utilization

    Authors: Ashish Vulimiri, P. Brighten Godfrey, Sri Varsha Gorge, Zitian Liu, Scott Shenker

    Abstract: Several recently proposed techniques achieve latency reduction by trading it off for some amount of additional bandwidth usage. But how would one quantify whether the tradeoff is actually beneficial in a given system? We develop an economic cost vs. benefit analysis for answering this question. We use the analysis to derive a benchmark for wide-area client-server applications, and demonstrate how… ▽ More

    Submitted 4 December, 2014; v1 submitted 14 June, 2013; originally announced June 2013.

  18. arXiv:1211.6176  [pdf, other

    cs.DB

    Shark: SQL and Rich Analytics at Scale

    Authors: Reynold Xin, Josh Rosen, Matei Zaharia, Michael J. Franklin, Scott Shenker, Ion Stoica

    Abstract: Shark is a new data analysis system that marries query processing with complex analytics on large clusters. It leverages a novel distributed memory abstraction to provide a unified engine that can run SQL queries and sophisticated analytics functions (e.g., iterative machine learning) at scale, and efficiently recovers from failures mid-query. This allows Shark to run SQL queries up to 100x faster… ▽ More

    Submitted 26 November, 2012; originally announced November 2012.

    Report number: UCB/EECS-2012-214

  19. On the Resilience of Routing Tables

    Authors: Joan Feigenbaum, Brighten Godfrey, Aurojit Panda, Michael Schapira, Scott Shenker, Ankit Singla

    Abstract: Many modern network designs incorporate "failover" paths into routers' forwarding tables. We initiate the theoretical study of the conditions under which such resilient routing tables can guarantee delivery of packets.

    Submitted 3 August, 2012; v1 submitted 16 July, 2012; originally announced July 2012.

    Comments: Brief announcement, PODC 2012

  20. arXiv:1201.1661  [pdf, ps, other

    cs.NI

    Slick Packets

    Authors: Giang T. K. Nguyen, Rachit Agarwal, Junda Liu, Matthew Caesar, P. Brighten Godfrey, Scott Shenker

    Abstract: Source-controlled routing has been proposed as a way to improve flexibility of future network architectures, as well as simplifying the data plane. However, if a packet specifies its path, this precludes fast local re-routing within the network. We propose SlickPackets, a novel solution that allows packets to slip around failures by specifying alternate paths in their headers, in the form of compa… ▽ More

    Submitted 8 January, 2012; originally announced January 2012.

    Comments: This is the full version of a paper with the same title that appeared in ACM SIGMETRICS 2011, with the inclusion of the appendix. 16 pages

    ACM Class: C.2.1; C.2.2; C.2.6

  21. arXiv:1111.5572  [pdf, other

    cs.DS q-bio.GN

    Faster and More Accurate Sequence Alignment with SNAP

    Authors: Matei Zaharia, William J. Bolosky, Kristal Curtis, Armando Fox, David Patterson, Scott Shenker, Ion Stoica, Richard M. Karp, Taylor Sittler

    Abstract: We present the Scalable Nucleotide Alignment Program (SNAP), a new short and long read aligner that is both more accurate (i.e., aligns more reads with fewer errors) and 10-100x faster than state-of-the-art tools such as BWA. Unlike recent aligners based on the Burrows-Wheeler transform, SNAP uses a simple hash index of short seed sequences from the genome, similar to BLAST's. However, SNAP greatl… ▽ More

    Submitted 23 November, 2011; originally announced November 2011.