In a cloud computing environment, the response time of an application is
correlated to the computation node’s proximity to the data.
[more]
Popa et al (2010) CloudPolice: Taking Access Control out of the Network (HotNets)
In a virtualized cloud environment, instead of enforcing access control inside the network using middleboxes, this paper advocates to put the access control inside the physical servers.
[more]
Sun & Wang (2010) Enable Cache Effect on Forwarding Table in Metro-Ethernet (ACN)
Imagine a Metro-Ethernet, if ARP is allowed to broadcast, the broadcast storm would be tremendous. In this paper, it assumes that the consumer edge (CE) and provider edge (PE) switches have a cache for the forwarding table. The cache is to remember the IP-MAC address association it ever encountered (e.g....
[more]
Avin et al (2009) From Trees to DAGs: Improving the Performance of Bridged Ethernet Networks (GlobeCom)
This paper avocates an alternative to spanning tree protocol for Ethernet. Instead of building a tree (which is a undirected graph), it builds a directed acyclic graph (DAG) out of the network. The benefit of this is that, (1) have a better utilization of network links; (2) does not use...
[more]
Kim et al (2009) Revisiting Route Caching: The World Should Be Flat (PAM)
This paper measures the effectiveness of caching in routing in Tier-1 ISP.
[more]