Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2007
DOI: 10.1145/1282380.1282419
|View full text |Cite
|
Sign up to set email alerts
|

Cloud control with distributed rate limiting

Abstract: Today's cloud-based services integrate globally distributed resources into seamless computing platforms. Provisioning and accounting for the resource usage of these Internet-scale applications presents a challenging technical problem. This paper presents the design and implementation of distributed rate limiters, which work together to enforce a global rate limit across traffic aggregates at multiple sites, enabling the coordinated policing of a cloud-based service's network traffic. Our abstraction not only e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 125 publications
(53 citation statements)
references
References 32 publications
(13 reference statements)
0
52
0
Order By: Relevance
“…The number of virtual nodes in each VN request is randomly selected from 3 to 6 following uniform distribution. Each virtual node requires a random amount of resources between [3,5].…”
Section: Comparison With the Optimal Solutionmentioning
confidence: 99%
“…The number of virtual nodes in each VN request is randomly selected from 3 to 6 following uniform distribution. Each virtual node requires a random amount of resources between [3,5].…”
Section: Comparison With the Optimal Solutionmentioning
confidence: 99%
“…Distributed rate limiting (DRL) DRL [30,35] enforces global rate limits on aggregate traffic used by geographically distributed cloud services, through a set of collaborating rate limiters. XCo also explicitly limits traffic from nodes, although within a data center cluster.…”
Section: Related Workmentioning
confidence: 99%
“…A single entry point provides the advantage of simplified service access management. Furthermore, since point-to-point traffic shaping is a well-studied problem in the networking space, well-known solutions from packet/ATM networks can be applied [8], [9], [10]. Nevertheless, in two-tier EDC deployments, the problem is fundamentally different.…”
Section: B Off-the-shelf Son Appliancesmentioning
confidence: 99%