{"id":1313,"date":"2013-08-16T00:54:24","date_gmt":"2013-08-16T00:54:24","guid":{"rendered":"http:\/\/www.syslog.cl.cam.ac.uk\/?p=1313"},"modified":"2013-08-16T08:57:47","modified_gmt":"2013-08-16T08:57:47","slug":"liveblog-from-sicomm13-hotsdn-workshop","status":"publish","type":"post","link":"https:\/\/www.syslog.cl.cam.ac.uk\/2013\/08\/16\/liveblog-from-sicomm13-hotsdn-workshop\/","title":{"rendered":"Liveblog from SICOMM13 – HotSDN Workshop"},"content":{"rendered":"
Once again collocated with SIGCOMM is the HotSDN conference. I'm here live blogging the proceedings, SDN controllers permitting....<\/p>\n
<\/p>\n
http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p13.pdf<\/a><\/p>\n <\/p>\n <\/p>\n Questions:<\/strong><\/p>\n Q: Why is it fast? A: Limited by programming languages, and I\/O interfaces.<\/p>\n Q: The metric you're using, what does it tell you about apps? A: It's the lowest bar. This is the overhead that your controller is running.<\/p>\n <\/p>\n http:\/\/www.syslog.cl.cam.ac.uk\/wp-admin\/post.php?post=1313&action=edit&message=6<\/a><\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p7.pdf<\/a><\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p139.pdf<\/a><\/p>\n <\/p>\n Questions<\/strong><\/p>\n Q: Do you end up with a mess in the end? Fragmentation A: We don't just drop from the top. The reduction operations help to defragment. No proof of optimality \u00c2\u00a0(yet).<\/p>\n Q: How do you detect failure? A: We don't.<\/p>\n Q: How do you detect host failure? A: \u00c2\u00a0We assume that you're running in a VM.<\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p37.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p43.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p31.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p61.pdf<\/a><\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p127.pdf<\/a><\/p>\n <\/p>\n Question: How do you handle diversity in the instruction sets. Vendors always add proprietary extensions!<\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p49.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p133.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p91.pdf<\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p1.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p109.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p73.pdf<\/a><\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p55.pdf<\/a><\/p>\n <\/p>\n Question<\/strong><\/p>\n Q: IOS already has attack vectors. Multi-chassis machines already have controlers. Where is the new attack vector: A: ??<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p79.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p97.pdf<\/a><\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p19.pdf<\/a><\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p25.pdf<\/a><\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/hotsdn\/p85.pdf<\/a><\/p>\n <\/p>\n\n
\n
\n
\n
Exploiting Locality in Distributed SDN Control<\/h2>\n
\n
\n
\n
\u00c2\u00a0Towards an Elastic Distributed SDN Controller<\/h2>\n
\n
\n
Cementing High Availability in OpenFlow with RuleBricks<\/h2>\n
\n
\n
\n
\n
Session 2 - Testing, Simulation, and Debugging<\/h1>\n
Leveraging SDN Layering to Systematically Troubleshoot Networks<\/h2>\n
\n
\n
\n
\n
<\/h2>\n
High-Fidelity Switch Models for\u00c2\u00a0Software-De\u00ef\u00ac\u0081ned Network Emulation<\/h2>\n
\n
<\/h2>\n
Fast, Accurate Simulation for SDN Prototyping<\/h2>\n
\n
EtherPIPE: an Ethernet character device for network\u00c2\u00a0scripting<\/h2>\n
\n
Session 3 - \u00c2\u00a0Improved Abstractions and State Management<\/h1>\n
Protocol-Oblivious Forwarding: Unleash the Power\u00c2\u00a0of SDN through a Future-Proof Forwarding Plane<\/h2>\n
\n
Incremental Consistent Updates<\/h2>\n
\n
HotSwap: Correct and Ef\u00ef\u00ac\u0081cient Controller\u00c2\u00a0Upgrades for Software-De\u00ef\u00ac\u0081ned Networks<\/h2>\n
\n
\n
\n
\n
\n
\n
\u00c2\u00a0CAP for Networks<\/h2>\n
\n
Session 4 - Theoretical Foundations<\/h1>\n
Software Transactional Networking:\u00c2\u00a0Concurrent and Consistent Policy Composition<\/h2>\n
\n
FatTire: Declarative Fault Tolerance\u00c2\u00a0for Software-De\u00ef\u00ac\u0081ned Networks<\/h2>\n
\n
Resource\/Accuracy Tradeoffs in Software-De\u00ef\u00ac\u0081ned\u00c2\u00a0Measurement<\/h2>\n
\n
\n
Towards Secure and Dependable Software-De\u00ef\u00ac\u0081ned\u00c2\u00a0Networks<\/h2>\n
\n
\n
A Balance of Power:\u00c2\u00a0Expressive, Analyzable Controller Programming<\/h2>\n
\n
\n
OF.CPP: Consistent Packet Processing for OpenFlow<\/h2>\n
\n
Session 5 -\u00c2\u00a0Dataplane and Wireless Techniques<\/h1>\n
FlowTags: Enforcing Network-Wide Policies in the\u00c2\u00a0Presence of Dynamic Middlebox Actions<\/h2>\n
\n
SoftRAN: Software De\u00ef\u00ac\u0081ned Radio Access Network<\/h2>\n
\n
\n
<\/h2>\n
The FlowAdapter: Enable Flexible Multi-Table Processing\u00c2\u00a0on Legacy Hardware<\/h2>\n
\n
Cheap Silicon: a Myth or Reality? \u00c2\u00a0Picking the Right Data Plane\u00c2\u00a0Hardware for Software Defined Networking<\/h2>\n