Tong Li

Tong Li
Renmin University of China | RUC · School of Information

PhD

About

44
Publications
5,455
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
438
Citations
Introduction
Additional affiliations
July 2017 - December 2021
Huawei Technologies
Position
  • Chief Engineer
Description
  • Team Leader Transport protocol measurement, design, and implementation in both wired and wireless networks
Education
August 2012 - June 2017
Tsinghua University
Field of study
  • Computer Network

Publications

Publications (44)
Article
Full-text available
The shared nature of the wireless medium induces contention between data transport and backward signaling, such as acknowledgment. The current way of TCP acknowledgment induces control overhead which is counter-productive for TCP performance especially in wireless local area network (WLAN) scenarios. In this paper, we present a new acknowledgment c...
Article
Full-text available
The dependence on frequent acknowledgments (ACKs) is an artifact of current transport protocol designs rather than a fundamental requirement. Frequent ACKs waste resources when the overhead of ACKs is nonnegligible. However, reducing the number of ACKs may hurt transport performance. “Tame ACK” is an on-demand ACK mechanism that seeks to minimize A...
Conference Paper
Full-text available
The shared nature of the wireless medium induces contention between data transport and backward signaling, such as acknowledgement. The current way of TCP acknowledgment induces control overhead which is counter-productive for TCP performance especially in wireless local area network (WLAN) scenarios. In this paper, we present a new acknowledgement...
Conference Paper
Full-text available
Recent advances in high speed rails (HSRs) are propelling the need for acceptable network service in high speed mobility environments. However, previous studies show that the performance of traditional single-path transmission degrades significantly during high speed mobility due to frequent handoff. Multi-path transmission with multiple carriers i...
Article
Full-text available
Converged Ethernet employs Priority-based Flow Control (PFC) to provide a lossless network. However, issues caused by PFC, including victim flow, congestion spreading, and deadlock, impede its large-scale deployment in production systems. The fine-grained experimental observations on switch buffer occupancy find that the root cause of these perform...
Article
ECN marking has been integrated into datacenter switches to enable high-throughput and low-latency transport. We observe that current marking schemes are coarse-grained: they blindly mark all flows when congestion occurs, causing large flows to occupy undeserved bandwidth and preventing newly arriving small flows from finishing quickly. In this pap...
Conference Paper
Device-to-device relative positioning has been widely applied in modern Web-based systems such as COVID-19 mobile contact tracing, seamless access systems, mobile interactive gaming, and mobile e-Commerce. The legacy absolute positioning technologies are not suitable for device-to-device positioning attributed to their mobility and heterogeneity of...
Article
Full-text available
As one of the most prominent parts of the Internet, World Wide Web (WWW) has achieved great success and penetrated every area of our lives. However, the current WWW still suffers from inefficiency, growing concerns about user privacy and data ownership, and poor Quality of Experience. Therefore, we propose a promising architecture for the next-gene...
Conference Paper
Full-text available
Recently, such industrial pioneers as Apple and Samsung have offered a new generation of offline finding network (OFN) that enables crowd search for missing devices without leaking private data. Specifically, OFN leverages nearby online finder devices to conduct neighbor discovery via Bluetooth Low Energy (BLE), so as to detect the presence of offl...
Conference Paper
Full-text available
In the widely used Bluetooth Low-Energy (BLE) neighbor discovery, the parameter configuration of neighbor discovery directly decides the results of the trade-off between discovery latency and power consumption. Therefore, it requires evaluating whether any given parameter configuration meets the demands. The existing solutions, however, are far fro...
Preprint
Full-text available
Device-to-device relative positioning systems such as COVID-19 contact tracing, seamless access systems, mobile interactive gaming, directional interaction, etc. have been promoted recently. The legacy absolute object positioning technologies are not suitable for device-to-device positioning because of the mobility and heterogeneity of devices. In...
Article
Full-text available
TCP incast has become a practical problem for high-bandwidth, low-latency transmissions, resulting in throughput degradation of up to 90% and delays of hundreds of milliseconds, severely impacting application performance. However, in virtualized multi-tenant data centers, host-based advancements in the TCP stack are hard to deploy from the operator...
Data
The recorded video for the presentation in SIGCOMM 2020. Paper: Tong Li, Kai Zheng, Ke Xu, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein, Kun Tan. "TACK: Improving Wireless Transport Performance by Taming Acknowledgments." Proceedings of the 2020 Conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM), pp. 15-30, 2020.
Preprint
Full-text available
Large-scale COVID-19 infections have occurred worldwide, which has caused tremendous impact on the economy and people's lives. The traditional method for tracing contagious virus, for example, determining the infection chain according to the memory of infected people, has many drawbacks. With the continuous spread of the pandemic, many countries or...
Article
Full-text available
Congestion control is always an active research field for guaranteeing the Quality of Services (QoS) of datacenter networks (DCNs). However, the current end-to-end TCP design enables both senders and receivers not to directly and precisely obtain the congestion information, incurring inaccurate or non-real-time adjustments. Moreover, switches that...
Article
The increasing data requirements of Internet applications have driven a dramatic surge in developing new programming paradigms and complex scheduling algorithms to handle data-intensive workloads. Due to the expanding volume and the variety of such flows, their raw data are often processed on Intermediate Processing Nodes (IPNs) before being sent t...
Article
Full-text available
Cloud radio access network (C-RAN) and mobile edge computing (MEC) have emerged as promising candidates for the next generation access network techniques. Unfortunately, although MEC tries to utilize the highly distributed computing resources in close proximity to user equipments (UE), C-RAN suggests to centralize the baseband processing units (BBU...
Article
Full-text available
Presents corrections to the paper, “Modeling, analysis, and implementation of universal acceleration platform across online video sharing sites,” (Xu, K. et al), IEEE Trans. Serv. Comput., vol. 11, no. 3, pp. 534–548, May/Jun. 2018.
Article
Full-text available
State-of-the-art microservices have been attracting more attention in recent years. A broad spectrum of online interactive applications are now programmed to service chains on the cloud, seeking better system scalability and lower operating costs. Different from the conventional batch jobs, most of these applications consist of multiple stand-alone...
Article
Full-text available
With the prevalence of broadband network and wireless mobile network accesses, distributed interactive applications (DIAs) such as online gaming have attracted a vast number of users over the Internet. The deployment of these systems, however, comes with peculiar hardware/software requirements on the user consoles. Recently, such industrial pioneer...
Conference Paper
Full-text available
Cloud radio access network (C-RAN) and mobile edge computing (MEC) have emerged as promising candidates for the next generation access network techniques. Unfortunately, although MEC tries to utilize the highly distributed computing resources in close proximity to user equipments equipments (UE), C-RAN suggests to centralize the baseband processing...
Data
Full-text available
Article
Full-text available
User-generated video sharing service has attracted a vast number of users over the Internet. The most successful sites, such as YouTube and Youku, now enjoy millions of videos being watched every day. Yet, given limited network and server resources, the user experience of existing video sharing sites (VSSes) is still far from being satisfactory. To...
Article
Full-text available
The open shortest path first (OSPF) protocol has been widely applied to intra-domain routing in today's Internet. Since a router running OSPF distributes traffic uniformly over equal-cost multi-path (ECMP), the OSPF-based optimal traffic engineering (TE) problem (i.e., deriving optimal link weights for a given traffic demand) is computationally int...
Conference Paper
Full-text available
With the popularity of information and content items that can be cached within ISP networks, developing high-quality and efficient content distribution approaches has become an important task in future internet architecture design. As one of the main techniques of content distribution, in-network caching mechanism has attracted attention from both...
Conference Paper
Full-text available
PKI-based trusted computing platform (TCP) requires platform users to apply for multiple Platform Identity Key (PIK) certificates to provide remote attestation, users must pay the fee of digital certificates, which increases users' economic burdens and leads there is hardly any TCP has really performed the core function of trusted computing, platfo...
Article
Full-text available
Although the wireless network is widely used in many fields, its characteristics such as high bit error rate and broadcast links may block its development. Network coding is an artistic way to exploit its intrinsic characteristics to increase the network reliability. Some people research network coding schemes for inter-flow or intra-flow, each typ...
Article
Full-text available
Current technology of trusted computing can not comply with the requirement of trusted behavior. One method for trusted computing dynamic attestation was proposed in this paper. This method uses the behavior model based on static analysis of binary code. One same source code may have several different binary versions, this paper proposed one method...

Network

Cited By