Tong Li

Tong Li
Huawei Technologies · Computer Network and Protocol Lab

PhD

About

24
Publications
3,033
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
220
Citations
Introduction
Tong Li, Ph.D. from Tsinghua University, Chief Engineer of Huawei. His current research interests include networking, distributed systems, and big data. Website: https://leetong.weebly.com/
Additional affiliations
January 2017 - January 2019
Huawei Technologies
Position
  • Senior Researcher
Education
August 2012 - July 2017
Tsinghua University
Field of study
  • Computer Network

Publications

Publications (24)
Article
Full-text available
The shared nature of the wireless medium induces contention between data transport and backward signaling, such as acknowledgment. The current way of TCP acknowledgment induces control overhead which is counter-productive for TCP performance especially in wireless local area network (WLAN) scenarios. In this paper, we present a new acknowledgment c...
Article
Full-text available
The dependence on frequent acknowledgments (ACKs) is an artifact of current transport protocol designs rather than a fundamental requirement. Frequent ACKs waste resources when the overhead of ACKs is nonnegligible. However, reducing the number of ACKs may hurt transport performance. “Tame ACK” is an on-demand ACK mechanism that seeks to minimize A...
Data
The recorded video for the presentation in SIGCOMM 2020. Paper: Tong Li, Kai Zheng, Ke Xu, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein, Kun Tan. "TACK: Improving Wireless Transport Performance by Taming Acknowledgments." Proceedings of the 2020 Conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM), pp. 15-30, 2020.
Preprint
Full-text available
Large-scale COVID-19 infections have occurred worldwide, which has caused tremendous impact on the economy and people's lives. The traditional method for tracing contagious virus, for example, determining the infection chain according to the memory of infected people, has many drawbacks. With the continuous spread of the pandemic, many countries or...
Conference Paper
Full-text available
The shared nature of the wireless medium induces contention between data transport and backward signaling, such as acknowledgement. The current way of TCP acknowledgment induces control overhead which is counter-productive for TCP performance especially in wireless local area network (WLAN) scenarios. In this paper, we present a new acknowledgement...
Article
Full-text available
Congestion control is always an active research field for guaranteeing the Quality of Services (QoS) of datacenter networks (DCNs). However, the current end-to-end TCP design enables both senders and receivers not to directly and precisely obtain the congestion information, incurring inaccurate or non-real-time adjustments. Moreover, switches that...
Article
The increasing data requirements of Internet applications have driven a dramatic surge in developing new programming paradigms and complex scheduling algorithms to handle data-intensive workloads. Due to the expanding volume and the variety of such flows, their raw data are often processed on Intermediate Processing Nodes (IPNs) before being sent t...
Article
Full-text available
Cloud radio access network (C-RAN) and mobile edge computing (MEC) have emerged as promising candidates for the next generation access network techniques. Unfortunately, although MEC tries to utilize the highly distributed computing resources in close proximity to user equipments (UE), C-RAN suggests to centralize the baseband processing units (BBU...
Conference Paper
Full-text available
Recent advances in high speed rails (HSRs) are propelling the need for acceptable network service in high speed mobility environments. However, previous studies show that the performance of traditional single-path transmission degrades significantly during high speed mobility due to frequent handoff. Multi-path transmission with multiple carriers i...
Article
Full-text available
Presents corrections to the paper, “Modeling, analysis, and implementation of universal acceleration platform across online video sharing sites,” (Xu, K. et al), IEEE Trans. Serv. Comput., vol. 11, no. 3, pp. 534–548, May/Jun. 2018.
Article
Full-text available
State-of-the-art microservices have been attracting more attention in recent years. A broad spectrum of online interactive applications are now programmed to service chains on the cloud, seeking better system scalability and lower operating costs. Different from the conventional batch jobs, most of these applications consist of multiple stand-alone...
Article
Full-text available
With the prevalence of broadband network and wireless mobile network accesses, distributed interactive applications (DIAs) such as online gaming have attracted a vast number of users over the Internet. The deployment of these systems, however, comes with peculiar hardware/software requirements on the user consoles. Recently, such industrial pioneer...
Conference Paper
Full-text available
Cloud radio access network (C-RAN) and mobile edge computing (MEC) have emerged as promising candidates for the next generation access network techniques. Unfortunately, although MEC tries to utilize the highly distributed computing resources in close proximity to user equipments equipments (UE), C-RAN suggests to centralize the baseband processing...
Data
Full-text available
Article
Full-text available
User-generated video sharing service has attracted a vast number of users over the Internet. The most successful sites, such as YouTube and Youku, now enjoy millions of videos being watched every day. Yet, given limited network and server resources, the user experience of existing video sharing sites (VSSes) is still far from being satisfactory. To...
Article
Full-text available
The open shortest path first (OSPF) protocol has been widely applied to intra-domain routing in today's Internet. Since a router running OSPF distributes traffic uniformly over equal-cost multi-path (ECMP), the OSPF-based optimal traffic engineering (TE) problem (i.e., deriving optimal link weights for a given traffic demand) is computationally int...
Conference Paper
Full-text available
With the popularity of information and content items that can be cached within ISP networks, developing high-quality and efficient content distribution approaches has become an important task in future internet architecture design. As one of the main techniques of content distribution, in-network caching mechanism has attracted attention from both...
Conference Paper
Full-text available
PKI-based trusted computing platform (TCP) requires platform users to apply for multiple Platform Identity Key (PIK) certificates to provide remote attestation, users must pay the fee of digital certificates, which increases users' economic burdens and leads there is hardly any TCP has really performed the core function of trusted computing, platfo...
Article
Full-text available
Although the wireless network is widely used in many fields, its characteristics such as high bit error rate and broadcast links may block its development. Network coding is an artistic way to exploit its intrinsic characteristics to increase the network reliability. Some people research network coding schemes for inter-flow or intra-flow, each typ...
Article
Full-text available
Current technology of trusted computing can not comply with the requirement of trusted behavior. One method for trusted computing dynamic attestation was proposed in this paper. This method uses the behavior model based on static analysis of binary code. One same source code may have several different binary versions, this paper proposed one method...

Network

Cited By