{"id":1296,"date":"2013-08-15T01:10:47","date_gmt":"2013-08-15T01:10:47","guid":{"rendered":"http:\/\/www.syslog.cl.cam.ac.uk\/?p=1296"},"modified":"2013-08-15T10:10:42","modified_gmt":"2013-08-15T10:10:42","slug":"liveblog-from-sigcomm13-day-3","status":"publish","type":"post","link":"https:\/\/www.syslog.cl.cam.ac.uk\/2013\/08\/15\/liveblog-from-sigcomm13-day-3\/","title":{"rendered":"Liveblog from SIGCOMM13 \u00e2\u20ac\u201c Day 3"},"content":{"rendered":"
I'm back again, liveblogging from SIGCOMM13. Yesterdays blog was in fact not clyoned out of existence, but a very successful poster session kept me busy until after busses had started leaving for banquet. As a result of the successful poster session I've been here since 7am....<\/p>\n
<\/p>\n
<\/p>\n
http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p279.pdf<\/p>\n
http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p291.pdf<\/p>\n
Questions:<\/strong><\/p>\n Q: Breaks some functionality, how would it work if people respected do not track; A: It would be ideal, but no guarantee, so this is more explicit for users to control.<\/p>\n Q: [ can't hear] PLEASE SPEAK UP!!!! A:<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p303.pdf<\/p>\n <\/p>\n Question:<\/strong><\/p>\n Q: Why use bittorrent over Tor? A: Tor is slow because of an incentives mismatched.<\/p>\n Q: You assume that messages are large: A:[Didn't understand]<\/p>\n Q: Expect aqua to have a lot of providers, how does it compare to DCent A: Uses broadcast so bandwidth \u00c2\u00a0usage is much higher.<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p315.pdf<\/p>\n Questions:<\/strong><\/p>\n Q: How much performance burden does each split add? A: Xor is very efficient. So it's doesn't cost that much.<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p327.pdf<\/p>\n Question<\/strong><\/p>\n Q: Why do these applications need to be able to control the network? A: We don't trust the VMs?<\/p>\n Q: Isn't it bad bad to mix data\/control planes. Security? A: We have a restricted API.<\/p>\n Q: Other resources? A: Latency? Latency is hard. Maybe we consider switch hops as a proxy for latency.<\/p>\n Q: Scaling? A: Relates to the number of rules.<\/p>\n Q: [Can't hear] SPEAK UP!!! How would we integrate something like Sinbad? A: Good question, extensions needed.<\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p339.pdf<\/p>\n <\/p>\n <\/p>\n Questions<\/strong><\/p>\n Q: Your evaluation has no error bars. How significant is it? A: We did multiple runs.<\/p>\n Q: But there are no error bars. A: um.....<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p351.pdf<\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p411.pdf<\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p423.pdf<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p435.pdf<\/p>\n <\/p>\n Question:<\/strong><\/p>\n Q: Doesn't consider topology. How sensitive are the results to packet spray. A: Near optimal.<\/p>\n Q: How do you define the priority? Esp for streaming. A: In a lot of applications you know the size. Some applications you don't. Need to to separate pfabric into a class of it's own.<\/p>\n Q: \u00c2\u00a0You priority mechanisms mean that you get very different performance at the beginning and the end. \u00c2\u00a0A: Yes that's hard.<\/p>\n Q: Can you do this hybrid, do you need new hardware A: Run something like this in \u00c2\u00a0each slice.<\/p>\n Q: With a large frames, you wont be able to take more than 2 priorities at a time. A: Our eval, only 1500, probably need more slack for jumbo frames. But not much.<\/p>\n Q: Do you care about fairness. A: no? Can make it more fair. Fairness is something we can get off.<\/p>\n Q: Do you deal with reordering A: This is the simple version.<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p447.pdf<\/p>\n <\/p>\n <\/p>\n I’m back again, liveblogging from SIGCOMM13. Yesterdays blog was in fact not clyoned out of existence, but a very successful poster session kept me busy until after busses had started leaving for banquet. As a result of the successful poster session I’ve been here since 7am….<\/p>\n","protected":false},"author":34,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,23],"tags":[79,86],"_links":{"self":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1296"}],"collection":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/comments?post=1296"}],"version-history":[{"count":16,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1296\/revisions"}],"predecessor-version":[{"id":1298,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1296\/revisions\/1298"}],"wp:attachment":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/media?parent=1296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/categories?post=1296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/tags?post=1296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Towards Ef\u00ef\u00ac\u0081cient Traf\u00ef\u00ac\u0081c-analysis Resistant\u00c2\u00a0Anonymity Networks<\/h2>\n
\n
\n
\n
\n
\n
\n
\n
SplitX: High-Performance Private Analytics<\/h2>\n
\n
\n
\n
\n
\n<\/b>Q: What is the long term business model? A: \u00c2\u00a0data analytics is important but so is privacy. So maybe the incentives are well aligned.<\/p>\nApplications and Resource Allocation<\/h1>\n
Participatory Networking<\/h2>\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Developing a Predictive Model of\u00c2\u00a0Quality of Experience for Internet Video<\/h2>\n
\n
\n
\n
\n
\n
\n
\n
ElasticSwitch: Practical Work-Conserving Bandwidth\u00c2\u00a0Guarantees for Cloud Computing<\/h2>\n
\n
\n
\n
Data Center Networks 2<\/h1>\n
zUpdate: Updating Data Center Networks with Zero Loss<\/h2>\n
\n
\u00c2\u00a0Got Loss? Get zOVN!<\/h2>\n
\n
\n
\n
\n
pFabric: Minimal Near-Optimal Datacenter Transport<\/h2>\n
\n
\n
\n
\n
\n
\n
Integrating Microsecond Circuit Switching\u00c2\u00a0into the Data Center<\/h1>\n
\n
\n
Closing Remarks<\/h1>\n
\n
\n
\n