Shihabur Rahman Chowdhury

Shihabur Rahman Chowdhury
University of Waterloo | UWaterloo · David R. Cheriton School of Computer Science

PhD

About

57
Publications
24,441
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,085
Citations
Additional affiliations
February 2021 - June 2021
Huawei
Position
  • Researcher
June 2018 - August 2018
National Institute for Research in Computer Science and Control
Position
  • Research Intern
May 2014 - August 2014
Google Inc.
Position
  • Intern
Education
September 2013 - June 2021
University of Waterloo
Field of study
  • Computer Science
May 2012 - August 2013
University of Waterloo
Field of study
  • Computer Science
December 2004 - October 2009
Bangladesh University of Engineering and Technology
Field of study
  • Computer Science and Engineering

Publications

Publications (57)
Conference Paper
Full-text available
Software Defined Networking promises to simplify network management tasks by separating the control plane (a central controller) from the data plane (switches). OpenFlow has emerged as the de facto standard for communication between the controller and switches. Apart from providing flow control and communication interfaces, OpenFlow provides a flow...
Article
Full-text available
Network Functions Virtualization (NFV), considered a key enabler of Network "softwarization", promises to reduce the capital and operational expenditure for network operators by moving packet processing from purpose-built hardware to software running on commodity servers. However, the state-of-the-art in NFV is merely replacing monolithic hardware...
Article
Full-text available
Network Function Virtualization (NFV) promises to reduce the capital and operational expenditure for network operators by moving packet processing from purpose-built hardware to software running on commodity servers. However, the stateof- the-art in NFV is merely replacing monolithic hardware with monolithic Virtual Network Functions (VNFs), i.e.,...
Article
Full-text available
The simple programming model and very low-overhead I/O capabilities of emerging packet processing techniques leveraging kernel-bypass I/O and poll-mode processing is gaining significant popularity for building high performance software middleboxes (aka Virtual Network Functions (VNFs)). However, existing OS schedulers fall short in rightsizing CPU...
Conference Paper
Full-text available
In-band Network Telemetry (INT) has recently emerged as a means of achieving per-packet near real-time visibility into the network. INT capable network devices can directly embed device internal state such as packet processing time, queue occupancy and link utilization information in each passing packet. INT is enabling new network monitoring appli...
Article
Full-text available
Elastic Optical Networks (EONs) enable finer-grained resource allocation and tuning of transmission configurations for right-sized resource allocation. These features make EONs excellent choice for 5G transport networks supporting highly dynamic traffic with diverse Quality-of-Service (QoS) requirements. 5G network slices are expected to host appli...
Article
Full-text available
This paper proposes a new approach for detecting and mitigating the impact of misbehaving TCP end-hosts, specifically the Optimistic ACK attack, and Explicit Congestion Notification (ECN) abuse. In contrast to the state-of-the-art, we show that it is possible to mitigate such misbehavior leveraging emerging programmable data planes while not requir...
Conference Paper
Full-text available
In recent years, programmable data planes enabled by the protocol independent switch architecture (PISA) allowed the relocation of network functions closer to traffic flows and thereby the ability to react in real-time to network events. However, expressing complex and stateful network monitoring functions using state-of-the-art data plane programm...
Article
Full-text available
5G network slicing allows partitioning of network resources to meet stringent end-to-end service requirements across multiple network segments, from access to transport. These requirements are shaping technical evolution in each of these segments. In particular, the transport segment is currently evolving in the direction of elastic optical network...
Conference Paper
Full-text available
We present a novel re-adaptation approach to accommodate bandwidth increase of virtual links in elastic optical networks. Our approach can incorporate different objectives, as minimizing disruption, by choosing among a comprehensive set of re-adaptation actions.
Article
Full-text available
This paper addresses Connectivity-aware Virtual Network Embedding (CoViNE) problem, which consists in embedding a virtual network (VN) on a substrate network while ensuring VN connectivity (without any bandwidth guarantee) against multiple substrate link failures. CoViNE provides a weaker form of survivability incurring less resource overhead than...
Conference Paper
Full-text available
Existing shortest path-based routing in wide area networks or equal cost multi-path routing in data center networks do not consider the load on the links while taking routing decisions. As a consequence, an influx of network traffic stemming from events such as distributed link flooding attacks and data shuffle during large scale analytics can cong...
Conference Paper
Full-text available
Elastic Optical Network (EON) virtualization has recently emerged as an enabling technology for 5G network slicing. A fundamental problem in EON slicing (known as Virtual Network Embedding (VNE)) is how to efficiently map a virtual network (VN) on a substrate EON characterized by elastic transponders and flexible grid. Since a number of 5G services...
Article
Full-text available
The rapid development of technologies such as photo-intensive social networks, on-demand video streaming, online gaming, and the Internet of Things (IoT) is causing a tremendous growth of traffic volume. Such large-scale expansion is leading to higher energy consumption and carbon footprint for the telecommunication industry. Governments are trying...
Conference Paper
Full-text available
Network Function Virtualization (NFV) promises to reduce the capital and operational expenditure for network operators by moving packet processing from purpose-built hardware to software running on commodity servers. However, the state-of-the-art in NFV is merely replacing monolithic hardware with monolithic Virtual Network Functions (VNFs), i.e.,...
Preprint
Full-text available
In 5G networks, slicing allows partitioning of network resources to meet stringent end-to-end service requirements across multiple network segments, from access to transport. These requirements are shaping technical evolution in each of these segments. In particular, the transport segment is currently evolving in the direction of the so-called elas...
Preprint
Network Function Virtualization (NFV) promises to reduce the capital and operational expenditure for network operators by moving packet processing from purpose-built hardware to software running on commodity servers. However, the state-of-the-art in NFV is merely replacing monolithic hardware with monolithic Virtual Network Functions (VNFs), i.e.,...
Conference Paper
Full-text available
Network operators must continuously scale the capacity of their optical backbone networks to keep apace with the proliferation of bandwidth-intensive applications. Today’s optical networks are designed to carry large traffic aggregates with coarse-grained resource allocation, and are not adequate for maximizing utilization of the expensive optical...
Conference Paper
Full-text available
Network Function Virtualization (NFV) has gained a significant research interest in both academia and industry since its inception in the late 2012. One of the key research issues in NFV is the development of systems for building Virtual Network Functions (VNFs) capable of meeting the performance requirements of enterprise and telecommunication net...
Conference Paper
Full-text available
Network Function Virtualization (NFV) has recently emerged as a means to replace vendor specific, purpose built equipment with commodity hardware and leverage the open APIs and application orchestration for on demand deployment and scaling of network services. A well studied problem in NFV is the orchestration of Service Function Chains, (SFCs), i....
Article
Full-text available
Network Virtualization (NV), considered as a key enabler for overcoming the ossification of the Internet allows multiple heterogeneous virtual networks to co-exist over the same substrate network. Resource allocation problems in NV have been extensively studied for single layer substrates such as IP or Optical networks. However, little effort has b...
Article
Full-text available
A key challenge in network virtualization is to efficiently map a virtual network (VN) on a substrate network (SN), while accounting for possible substrate failures. This is known as the survivable virtual network embedding (SVNE) problem. The state-of-the-art literature has studied the SVNE problem from infrastructure providers’ (InPs’) perspectiv...
Conference Paper
Full-text available
Network Virtualization (NV), considered as a key enabler for overcoming the ossification of the Internet allows multiple heterogeneous virtual networks to co-exist over the same substrate network. Resource allocation problems in NV have been extensively studied for single layer substrates such as IP or Optical networks. However, little effort has b...
Patent
Full-text available
Embedding a virtual network onto a physical network may be done in such a manner to ensure that the embedded virtual network maintains connectivity in the event of failure of k links in the physical network . The embedding determines virtual links that must be embedded onto disjoint paths in the physical network and then embeds the virtual network...
Conference Paper
Full-text available
A key challenge in Network Virtualization is to efficiently map a virtual network (VN) on a substrate network (SN) while accounting for possible substrate failures. This is known as the Survivable Virtual Network Embedding (SVNE) problem. The state-of-the-art literature has studied the SVNE problem from infrastructure providers' (InPs) perspective,...
Conference Paper
Full-text available
Perceived as a key enabling technology for the future Internet, Network Virtualization (NV) allows an Infrastructure Provider (InP) to better utilize their Substrate Network (SN) by provisioning multiple Virtual Networks (VNs) from different Service Providers (SPs). A key challenge in NV is to efficiently map the VN requests from SPs on an SN, know...
Article
Full-text available
Network virtualization (NV) has evolved as a key enabling technology for offering the next generation network services. Recently, it is being rolled out in data center networks as a means to provide bandwidth guarantees to cloud applications. With increasing deployments of virtual networks (VNs) in commercial-grade networks with commodity hardware,...
Article
Full-text available
Network virtualization is enabling infrastructure providers (InPs) to offer new services to service providers (SPs). InPs are usually bound by Service Level Agreements (SLAs) to ensure various levels of resource availability for different SPs' virtual networks (VNs). They provision redundant backup resources while embedding an SP's VN request to co...
Conference Paper
Full-text available
Network virtualization (NV) has evolved as a key enabling technology for offering the next generation network services. Recently, it is being rolled out in data center networks as a means to provide bandwidth guarantees to cloud applications. With increasing deployments of virtual networks (VNs) in commercial-grade networks with commodity hardware,...
Conference Paper
Full-text available
In the last decade we have observed a tremendous adoption of distributed applications and a trend to host services in private or public clouds. However, service providers still need to own an infrastructure to test their applications or services. A similar problem is faced by network operators when they want to introduce a new service in their prod...
Conference Paper
Full-text available
Software-Defined Networking (SDN) provides a highly flexible flow management platform through a logically centralized controller that exposes network capabilities to the applications. However, most applications do not natively use SDN. An external entity is thus responsible for defining the corresponding flow management policies. Usually network op...
Conference Paper
Full-text available
The problem of ensuring virtual network (VN) connectivity in presence of multiple link failures in the substrate network (SN) is not well investigated in Network Virtualization (NV) literature. We name this problem as Connectivity-aware Virtual Network Embedding (CoViNE). Solving CoViNE will enable a VN operator to perform failure recovery without...
Article
Full-text available
Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capi...
Conference Paper
Full-text available
Network virtualization is enabling infrastructure providers (InPs) to offer new services to higher level service providers (SPs). InPs are usually bound by Service Level Agreements (SLAs) to ensure various levels of resource availability for different SPs' virtual networks (VNs). They provision redundant backup resources while embedding an SP's VN...
Article
Full-text available
One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content names brings the scalability issues to a whole new level, due to two reasons. First, name aggregation is not as tr...
Conference Paper
Full-text available
In recent years, Network Function Virtualization (NFV) has gained a lot of traction from both industry and academia. NFV promotes vendor-independence and rapid evolution through open source software, open standards, and open APIs. However, adopting these principles for virtual middleboxes or Virtual Network Functions (VNFs) is not enough. The VNF m...
Article
Full-text available
In recent years, Network Function Virtualization (NFV) has gained a lot of traction from both industry and academia. NFV promotes vendor-independence and rapid evolution through open source software, open standards, and open APIs. However, adopting these principles for virtual middleboxes or Virtual Network Functions (VNFs) is not enough. The VNF o...
Chapter
Full-text available
This chapter focuses on network configuration and flow scheduling for Big Data applications. It highlights how the performance of Big Data applications is tightly coupled with the performance of the network in supporting large data transfers. Deploying high-performance networks in data centers is thus vital but configuration and performance managem...
Article
Full-text available
Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capi...
Conference Paper
Full-text available
Centralized social networking and media sharing portals provide inadequate support for preserving user privacy, content ownership and control. These problems can be mitigated through distributed Web services as demonstrated by a number of academic projects and industrial deployments. In general, these distributed services do not assign globally rec...
Conference Paper
Full-text available
In this paper, we investigate the benefits of adding autonomic capabilities inside the operating system. We have developed and implemented a solution that focuses on three use cases (continuous file permission compliance, dynamic disk cleanup, and accidental removal protection) for the file system, and encapsulates all the respective file system mo...
Article
Full-text available
Despite their tremendous success, centrally controlled cloud-based Online Social Networks (OSNs) have inherent issues related to user privacy and control. These issues have motivated researchers to make a paradigm shift in the OSN architecture by proposing to replace centrally controlled OSNs with Decentralized OSNs (DOSNs) in a peer-to-peer settin...
Conference Paper
Full-text available
Network management is becoming increasingly challenging with the relentless growth in network size, traffic volume, and the diversity in QoS requirements. Traditionally, the concept of predefined Service Level Agreements (SLAs) has been utilized to establish QoS parameters. However, most state-of-the-art technologies in this area are both proprieta...
Conference Paper
Full-text available
Software Defined Networking (SDN) has emerged as a new paradigm that offers the programmability required to dynamically configure and control a network. A traditional SDN implementation relies on a logically centralized controller that runs the control plane. However, in a large-scale WAN deployment, this rudimentary centralized approach has several...
Conference Paper
Full-text available
Despite their tremendous success, centrally controlled cloud based solutions for social media networking have inherent issues related to privacy and user control. Alternatively, a decentralized approach can be used, but ensuring content availability will be the major challenge. In this work, we propose a time based user grouping and content replica...
Conference Paper
Full-text available
One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content names brings scalability issues to a whole new level, due to two reasons. First, name aggregation is not as trivia...
Article
Full-text available
The concept of information-centric networking (ICN) defines a new communication model that focuses on what is being exchanged rather than which network entities are exchanging information. From the ICN perspective, contents are first class network citizens instead of hosts. ICN's primary objective is to shift the current host-oriented communication...
Conference Paper
Full-text available
The longest common subsequence (LCS) problem is a classic and well-studied problem in computer science. Palindrome is a string, which reads the same forward as it does backward. The longest common palindromic subsequence (LCPS) problem is an interesting variant of the classic LCS problem which finds the longest common subsequence between two given...
Article
Full-text available
The {\em longest common subsequence (LCS)} problem is a classic and well-studied problem in computer science. Palindrome is a word which reads the same forward as it does backward. The {\em longest common palindromic subsequence (LCPS)} problem is an interesting variant of the classic LCS problem which finds the longest common subsequence between t...
Article
The {\em longest common subsequence (LCS)} problem is a classic and well-studied problem in computer science. LCS is a central problem in stringology and finds broad applications in text compression, error-detecting codes and biological sequence comparison. However, in numerous contexts, words represent cyclic sequences of symbols and LCS must be g...
Conference Paper
Full-text available
Vehicular Communication Networks and Systems (VCNS) and Intelligent Transportation Systems (ITS) are one of the most attractive and challenging topics in recent days since a well efficient protocol for vehicular communication can facilitate the reduction of traffic congestion and can provide us with many more promising applications. In this paper,...
Conference Paper
Full-text available
Vehicular Communication Networks and Systems (VCNS) and Intelligent Transportation Systems (ITS) are one of the most attractive and challenging topics in recent days since a well efficient protocol for vehicular communication can facilitate the reduction of traffic congestion and can provide us with many more promising applications. In this paper ,...

Network

Cited By

Projects

Projects (6)
Archived project
Project
In this project, we intend to devise efficient and scalable solutions to different practical problems related to embedding virtual networks on elastic optical networks. Advances in these research avenues in collaboration with a major industrial partner will have a lasting impact on the design principles and management paradigms of virtualization in elastic optical networks.