{"id":1253,"date":"2013-08-13T01:00:41","date_gmt":"2013-08-13T01:00:41","guid":{"rendered":"http:\/\/www.syslog.cl.cam.ac.uk\/?p=1253"},"modified":"2013-08-13T09:55:36","modified_gmt":"2013-08-13T09:55:36","slug":"liveblog-from-sigcomm13-day-1","status":"publish","type":"post","link":"https:\/\/www.syslog.cl.cam.ac.uk\/2013\/08\/13\/liveblog-from-sigcomm13-day-1\/","title":{"rendered":"Liveblog from SIGCOMM13 – Day 1"},"content":{"rendered":"
Greetings from SIGCOMM 2013, Hong Kong. I'll be live blogging as much of the event as I can, battery life permitting.<\/p>\n
<\/p>\n
Questions:<\/strong><\/p>\n Q: What about hardware? A: This model applies as well. Keep it simple, keep it fast and keep the interfaces static.<\/p>\n Q: PlanetLabs: Haven't we been doing OpenCloud all along: A: Network virtualisation is coming up to speed with server virtualisation.<\/p>\n Q: What about publishing: A: Operational experience should be a SIGCOMM category.<\/p>\n Q: What about incentives. Aren't there conflicting requirements encryption vs storage. A: Hard problem, don't have a good answer.<\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p3.pdf<\/p>\n <\/p>\n Questions:<\/p>\n Q: Why use legacy protocols, (IBGP etc) A: Backwards compat\/failure. But as we gain experience, less so<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p15.pdf<\/p>\n Questions: Q: Can you compare MSR approaches to congestion free updates A: different situations, inter-DC vs intra DC<\/p>\n Q: Is there a concern with how long the update takes. A: Update order is arbitrary.<\/p>\n Q: Why do you want to achieve high util: A: We want to be able to support more traffic. Saving money.<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p27.pdf<\/p>\n <\/p>\n Questions<\/strong><\/p>\n Q: Want to maintain legacy? A: Yes. We want to be backwards compatible.<\/p>\n Q:Why bother with middle boxes, just use SDN. A: We think there are significant barriers to modifying middle boxes.<\/p>\n Q:How do you do the tags A: We use \"spare bits\" in the IP header.<\/p>\n Q: Why are middleboxes special? A: Don;t understand the question.<\/p>\n Q: 95% accuracy. What happens in the 5% A: It is true. It's a problem.<\/p>\n <\/p>\n Questions:<\/strong><\/p>\n Q: How far can you scale A: Right now about 2.5 feet. Expect to be able to scale to 10mbps at 10 feet.<\/p>\n Q: Aerial are large. Can it be smaller. A: Yes, probably can shrink to the size of an RFID<\/p>\n Q: Have you looked at the the asymmetric case? A: \u00c2\u00a0Yes, maybe like an RFID without the broadcast mechanism.<\/p>\n Q: What about gigahertz. A: Power extraction is possible.<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p51.pdf<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p63.pdf<\/p>\n <\/p>\n <\/p>\n http:\/\/www.syslog.cl.cam.ac.uk\/2013\/08\/13\/liveblog-from-sigcomm13-day-1\/<\/p>\n <\/p>\n <\/p>\n http:\/\/www.sigcomm.org\/sites\/default\/files\/ccr\/papers\/2012\/October\/2378956-2378964.pdf<\/p>\n <\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p87.pdf<\/p>\n <\/p>\n Q: Modularity is a good thing. How can they interact? A: Maple is oblivious. If it had more insight it could be better.<\/p>\n Q: Hardware does not all support proprieties. How do you cope? A: Don't understand [ed: language barriers]. We assume that priorities work.<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p99.pdf<\/p>\n <\/p>\n Questions:<\/strong><\/p>\n Q: When can I buy one. A: It's a research product, can't comment on product releases.<\/p>\n Q: You're arguing for homogenous CPUS, most people are talking about heterogeneous cores. A: Very different architecture.<\/p>\n Q: What about the compiler? A: We haven't produced either the chip or the compiler.<\/p>\n <\/p>\n http:\/\/conferences.sigcomm.org\/sigcomm\/2013\/papers\/sigcomm\/p111.pdf<\/p>\n <\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" Greetings from SIGCOMM 2013, Hong Kong. I’ll be live blogging as much of the event as I can, battery life permitting.<\/p>\n","protected":false},"author":34,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1253"}],"collection":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/comments?post=1253"}],"version-history":[{"count":33,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1253\/revisions"}],"predecessor-version":[{"id":1255,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1253\/revisions\/1255"}],"wp:attachment":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/media?parent=1253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/categories?post=1253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/tags?post=1253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Session 1 - SDN<\/h1>\n
B4: Experience with a Globally-Deployed\u00c2\u00a0Software De\u00ef\u00ac\u0081ned WAN<\/h2>\n
\n
\n
\n
\n
\n
\n
Achieving High Utilization with Software-Driven Wan<\/h2>\n
\n
\n
\n
\n
\n
\n
\n<\/strong><\/p>\nSIMPLE-fying Middlebox Policy Enforcement Using SDN<\/h2>\n
\n
\n
\n
\n
Session 2 - Wireless<\/h1>\n
Ambient Backscatter: Wireless Communication Out of Thin Air (best paper)<\/h2>\n
\n
\n
Dude, Where\u00e2\u20ac\u2122s My Card? RFID Positioning That Works with\u00c2\u00a0Multipath and Non-Line of Sight<\/h2>\n
\n
\n
\n
Dhwani: Secure Peer-to-Peer Acoustic NFC<\/h2>\n
\n
\n
\n
\n
\n
\n
\n
\n
See Through Walls with Wi-Fi!<\/h2>\n
\n
Best of CCR 1<\/h1>\n
What We Talk About When We Talk About Cloud Network Performance<\/h3>\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Session 4: Fast and Scalable Network Design<\/h1>\n
Maple: Simplifying SDN Programming\u00c2\u00a0Using Algorithmic Policies<\/h2>\n
\n
\n
Forwarding Metamorphosis: Fast Programmable\u00c2\u00a0Match-Action Processing in Hardware for SDN<\/h2>\n
\n
\n
\n
\n
\n
Compressing IP Forwarding Tables:\u00c2\u00a0Towards Entropy Bounds and Beyond<\/h2>\n
\n