首页 > 最新文献

Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications最新文献

英文 中文
Humble beginnings, uncertain end: getting the internet to provide performance guarantees 卑微的开始,不确定的结局:让互联网提供性能保证
D. Ferrari
One of the pioneering efforts to obtain guaranteed performance from the Internet was born out of sheer curiosity. The question "Can it be done, and, if so, how?" came unexpectedly to the mind of a researcher who had never been active in the field of networking, and kept tormenting him until it became a personal challenge. Also due to many other researchers (with a lot more networking credentials), the topic was for several years quite a popular one in the community, and various protocols were designed, some even implemented, to incarnate some of the results of research. Will any of those protocols ever be deployed on the Internet? Only the future will tell.
从互联网获得有保证的性能的先驱努力之一是出于纯粹的好奇心。“这能做到吗?如果能做到,怎么做?”这个问题突然出现在一个从未活跃于网络领域的研究人员的脑海里,一直折磨着他,直到它成为一个个人挑战。由于许多其他研究人员(拥有更多的网络证书),该主题在社区中流行了好几年,并且设计了各种协议,甚至实现了一些协议,以体现一些研究结果。这些协议会被部署到互联网上吗?只有未来会告诉我们答案。
{"title":"Humble beginnings, uncertain end: getting the internet to provide performance guarantees","authors":"D. Ferrari","doi":"10.1145/1151659.1159914","DOIUrl":"https://doi.org/10.1145/1151659.1159914","url":null,"abstract":"One of the pioneering efforts to obtain guaranteed performance from the Internet was born out of sheer curiosity. The question \"Can it be done, and, if so, how?\" came unexpectedly to the mind of a researcher who had never been active in the field of networking, and kept tormenting him until it became a personal challenge. Also due to many other researchers (with a lot more networking credentials), the topic was for several years quite a popular one in the community, and various protocols were designed, some even implemented, to incarnate some of the results of research. Will any of those protocols ever be deployed on the Internet? Only the future will tell.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Policy-based routing with non-strict preferences 具有非严格首选项的基于策略的路由
Chi-Kin Chau
Traditional studies of routing problems often assumed strict preferences on paths, by eliminating ambiguity in path comparisons, or imposing a priori deterministic tie-breaking. Such an assumption is outpaced by today's common practice of non-deterministic,multi-path routing, which is crucial to traffic engineering, QoS routing, multicasting and virtual private networking. A pair of paths may be incomparable or equally preferred. In the presence of ambiguous preferences at pairs, or even multiple collections of paths, a challenge is to ensure robustness in the complex and sophisticated situations of policy-based routing where heterogeneous routing policies are allowed among routing systems. This paper presents an extensive study of policy-based routing with non-strict preferences, deriving sufficient conditions that ensure the existence, optimality and asynchronous convergence of stable routings.
传统的路由问题研究通常通过消除路径比较中的模糊性,或强加先验的确定性断线,来假设路径上的严格偏好。这种假设已经被当今非确定性多路径路由的普遍实践所超越,这对流量工程、QoS路由、多播和虚拟专用网络至关重要。一对路径可能是不可比较的,也可能是同等优先的。在路径对甚至多个路径集合中存在模糊的首选项时,一个挑战是确保基于策略的路由的复杂和复杂情况下的鲁棒性,在这种情况下,路由系统之间允许使用异构路由策略。本文对具有非严格偏好的策略路由进行了广泛的研究,给出了稳定路由存在性、最优性和异步收敛的充分条件。
{"title":"Policy-based routing with non-strict preferences","authors":"Chi-Kin Chau","doi":"10.1145/1159913.1159957","DOIUrl":"https://doi.org/10.1145/1159913.1159957","url":null,"abstract":"Traditional studies of routing problems often assumed strict preferences on paths, by eliminating ambiguity in path comparisons, or imposing a priori deterministic tie-breaking. Such an assumption is outpaced by today's common practice of non-deterministic,multi-path routing, which is crucial to traffic engineering, QoS routing, multicasting and virtual private networking. A pair of paths may be incomparable or equally preferred. In the presence of ambiguous preferences at pairs, or even multiple collections of paths, a challenge is to ensure robustness in the complex and sophisticated situations of policy-based routing where heterogeneous routing policies are allowed among routing systems. This paper presents an extensive study of policy-based routing with non-strict preferences, deriving sufficient conditions that ensure the existence, optimality and asynchronous convergence of stable routings.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Building an AS-topology model that captures route diversity 建立捕获路由分集的as拓扑模型
W. Mühlbauer, A. Feldmann, O. Maennel, M. Roughan, S. Uhlig
An understanding of the topological structure of the Internet is needed for quite a number of networking tasks, e. g., making decisions about peering relationships, choice of upstream providers, inter-domain traffic engineering. One essential component of these tasks is the ability to predict routes in the Internet. However, the Internet is composed of a large number of independent autonomous systems (ASes) resulting in complex interactions, and until now no model of the Internet has succeeded in producing predictions of acceptable accuracy.We demonstrate that there are two limitations of prior models: (i) they have all assumed that an Autonomous System (AS) is an atomic structure - it is not, and (ii) models have tended to oversimplify the relationships between ASes. Our approach uses multiple quasi-routers to capture route diversity within the ASes, and is deliberately agnostic regarding the types of relationships between ASes. The resulting model ensures that its routing is consistent with the observed routes. Exploiting a large number of observation points, we show that our model provides accurate predictions for unobserved routes, a first step towards developing structural mod-els of the Internet that enable real applications.
许多网络任务都需要了解互联网的拓扑结构,例如,制定对等关系的决策,选择上游提供商,域间流量工程。这些任务的一个重要组成部分是在互联网上预测路由的能力。然而,互联网是由大量独立的自治系统(as)组成的,导致了复杂的相互作用,到目前为止,没有一个互联网模型成功地产生了可接受的准确性的预测。我们证明了以前的模型有两个局限性:(i)它们都假设自治系统(AS)是一个原子结构——它不是;(ii)模型倾向于过度简化自治系统之间的关系。我们的方法使用多个准路由器来捕获as内的路由多样性,并且故意对as之间的关系类型不可知。生成的模型确保其路由与观察到的路由一致。利用大量的观察点,我们表明我们的模型为未观察到的路线提供了准确的预测,这是开发能够实现实际应用的互联网结构模型的第一步。
{"title":"Building an AS-topology model that captures route diversity","authors":"W. Mühlbauer, A. Feldmann, O. Maennel, M. Roughan, S. Uhlig","doi":"10.1145/1159913.1159937","DOIUrl":"https://doi.org/10.1145/1159913.1159937","url":null,"abstract":"An understanding of the topological structure of the Internet is needed for quite a number of networking tasks, e. g., making decisions about peering relationships, choice of upstream providers, inter-domain traffic engineering. One essential component of these tasks is the ability to predict routes in the Internet. However, the Internet is composed of a large number of independent autonomous systems (ASes) resulting in complex interactions, and until now no model of the Internet has succeeded in producing predictions of acceptable accuracy.We demonstrate that there are two limitations of prior models: (i) they have all assumed that an Autonomous System (AS) is an atomic structure - it is not, and (ii) models have tended to oversimplify the relationships between ASes. Our approach uses multiple quasi-routers to capture route diversity within the ASes, and is deliberately agnostic regarding the types of relationships between ASes. The resulting model ensures that its routing is consistent with the observed routes. Exploiting a large number of observation points, we show that our model provides accurate predictions for unobserved routes, a first step towards developing structural mod-els of the Internet that enable real applications.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 187
In VINI veritas: realistic and controlled network experimentation 在VINI veritas:现实和控制的网络实验
A. Bavier, N. Feamster, Mark Huang, L. Peterson, J. Rexford
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides a high degree of control over network conditions. VINI allows researchers to deploy and evaluate their ideas with real routing software, traffic loads, and network events. To provide researchers flexibility in designing their experiments, VINI supports simultaneous experiments with arbitrary network topologies on a shared physical infrastructure. This paper tackles the following important design question: What set of concepts and techniques facilitate flexible, realistic, and controlled experimentation (e.g., multiple topologies and the ability to tweak routing algorithms) on a fixed physical infrastructure? We first present VINI's high-level design and the challenges of virtualizing a single network. We then present PL-VINI, an implementation of VINI on PlanetLab, running the "Internet In a Slice". Our evaluation of PL-VINI shows that it provides a realistic and controlled environment for evaluating new protocols and services.
本文描述了虚拟网络基础设施VINI,它允许网络研究人员在现实环境中评估他们的协议和服务,该环境还提供了对网络条件的高度控制。VINI允许研究人员使用真实的路由软件、流量负载和网络事件来部署和评估他们的想法。为了给研究人员提供设计实验的灵活性,VINI支持在共享物理基础设施上使用任意网络拓扑进行同时实验。本文解决了以下重要的设计问题:在固定的物理基础设施上,哪些概念和技术可以促进灵活、现实和可控的实验(例如,多种拓扑和调整路由算法的能力)?我们首先介绍了VINI的高级设计和虚拟化单个网络的挑战。然后,我们介绍了pli -VINI,在PlanetLab上实现的VINI,运行“Internet In a Slice”。我们对PL-VINI的评估表明,它为评估新协议和服务提供了一个现实和可控的环境。
{"title":"In VINI veritas: realistic and controlled network experimentation","authors":"A. Bavier, N. Feamster, Mark Huang, L. Peterson, J. Rexford","doi":"10.1145/1159913.1159916","DOIUrl":"https://doi.org/10.1145/1159913.1159916","url":null,"abstract":"This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides a high degree of control over network conditions. VINI allows researchers to deploy and evaluate their ideas with real routing software, traffic loads, and network events. To provide researchers flexibility in designing their experiments, VINI supports simultaneous experiments with arbitrary network topologies on a shared physical infrastructure. This paper tackles the following important design question: What set of concepts and techniques facilitate flexible, realistic, and controlled experimentation (e.g., multiple topologies and the ability to tweak routing algorithms) on a fixed physical infrastructure? We first present VINI's high-level design and the challenges of virtualizing a single network. We then present PL-VINI, an implementation of VINI on PlanetLab, running the \"Internet In a Slice\". Our evaluation of PL-VINI shows that it provides a realistic and controlled environment for evaluating new protocols and services.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 549
Planet scale software updates 行星级软件更新
C. Gkantsidis, T. Karagiannis, P. Rodriguez, M. Vojnović
Fast and effective distribution of software updates (a.k.a. patches) to millions of Internet users has evolved into a critical task over the last years. In this paper, we characterize "Windows Update", one of the largest update services in the world, with the aim to draw general guidelines on how to best design and architect a fast and effective planet-scale patch dissemination system. To this end, we analyze an extensive set of data traces collected over the period of a year, consisting of billions of queries from over 300 million computers. Based on empirical observations and analytical results, we identify interesting properties of today's update traffic and user behavior.Building on this analysis, we consider alternative patch delivery strategies such as caching and peer-to-peer and evaluate their performance. We identify key factors that determine the effectiveness of these schemes in reducing the server workload and the network traffic, and in speeding-up the patch delivery. Most of our findings are invariant properties induced by either user behavior or architectural characteristics of today's Internet, and thus apply to the general problem of Internet-wide dissemination of software updates.
在过去几年中,向数百万互联网用户快速有效地分发软件更新(又称补丁)已演变为一项关键任务。在本文中,我们描述了“Windows Update”,世界上最大的更新服务之一,旨在为如何最好地设计和构建快速有效的行星尺度补丁传播系统提供一般指导。为此,我们分析了一年中收集的大量数据痕迹,包括来自3亿多台计算机的数十亿条查询。基于经验观察和分析结果,我们确定了当今更新流量和用户行为的有趣属性。在此分析的基础上,我们考虑了其他补丁交付策略,如缓存和点对点,并评估了它们的性能。我们确定了决定这些方案在减少服务器工作负载和网络流量以及加快补丁交付方面有效性的关键因素。我们的大多数发现都是由当今互联网的用户行为或架构特征引起的不变属性,因此适用于互联网范围内软件更新传播的一般问题。
{"title":"Planet scale software updates","authors":"C. Gkantsidis, T. Karagiannis, P. Rodriguez, M. Vojnović","doi":"10.1145/1159913.1159961","DOIUrl":"https://doi.org/10.1145/1159913.1159961","url":null,"abstract":"Fast and effective distribution of software updates (a.k.a. patches) to millions of Internet users has evolved into a critical task over the last years. In this paper, we characterize \"Windows Update\", one of the largest update services in the world, with the aim to draw general guidelines on how to best design and architect a fast and effective planet-scale patch dissemination system. To this end, we analyze an extensive set of data traces collected over the period of a year, consisting of billions of queries from over 300 million computers. Based on empirical observations and analytical results, we identify interesting properties of today's update traffic and user behavior.Building on this analysis, we consider alternative patch delivery strategies such as caching and peer-to-peer and evaluate their performance. We identify key factors that determine the effectiveness of these schemes in reducing the server workload and the network traffic, and in speeding-up the patch delivery. Most of our findings are invariant properties induced by either user behavior or architectural characteristics of today's Internet, and thus apply to the general problem of Internet-wide dissemination of software updates.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 142
Analyzing the MAC-level behavior of wireless networks in the wild 分析野外无线网络的mac级行为
Ratul Mahajan, Maya Rodrig, D. Wetherall, J. Zahorjan
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps to construct an enhanced trace of system activity. First, a robust merging procedure combines the necessarily incomplete views from multiple, independent monitors into a single, more complete trace of wireless activity. Next, a novel inference engine based on formal language methods reconstructs packets that were not captured by any monitor and determines whether each packet was received by its destination. Finally, Wit derives network performance measures from this enhanced trace; we show how to estimate the number of stations competing for the medium. We assess Wit with a mix of real traces and simulation tests. We find that merging and inference both significantly enhance the originally captured trace. We apply Wit to multi-monitor traces from a live network to show how it facilitates 802.11 MAC analyses that would otherwise be difficult or rely on less accurate heuristics.
我们介绍Wit,一个非侵入性工具,建立在被动监控的基础上,分析操作无线网络的详细mac级行为。Wit使用三个处理步骤来构建增强的系统活动跟踪。首先,一个健壮的合并过程将来自多个独立监视器的必要的不完整视图合并为一个更完整的无线活动跟踪。其次,基于形式语言方法的新型推理引擎重构了未被任何监视器捕获的数据包,并确定每个数据包是否被其目的地接收。最后,Wit从这个增强的跟踪中派生出网络性能度量;我们展示了如何估计争夺媒体的电台数量。我们通过真实痕迹和模拟测试的混合来评估Wit。我们发现合并和推理都显著地增强了原始捕获的轨迹。我们将Wit应用于来自实时网络的多监视器跟踪,以显示它如何促进802.11 MAC分析,否则将很难或依赖于不太准确的启发式。
{"title":"Analyzing the MAC-level behavior of wireless networks in the wild","authors":"Ratul Mahajan, Maya Rodrig, D. Wetherall, J. Zahorjan","doi":"10.1145/1159913.1159923","DOIUrl":"https://doi.org/10.1145/1159913.1159923","url":null,"abstract":"We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps to construct an enhanced trace of system activity. First, a robust merging procedure combines the necessarily incomplete views from multiple, independent monitors into a single, more complete trace of wireless activity. Next, a novel inference engine based on formal language methods reconstructs packets that were not captured by any monitor and determines whether each packet was received by its destination. Finally, Wit derives network performance measures from this enhanced trace; we show how to estimate the number of stations competing for the medium. We assess Wit with a mix of real traces and simulation tests. We find that merging and inference both significantly enhance the originally captured trace. We apply Wit to multi-monitor traces from a live network to show how it facilitates 802.11 MAC analyses that would otherwise be difficult or rely on less accurate heuristics.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 212
MIRO: multi-path interdomain routing MIRO:多路径域间路由
Wen Xu, J. Rexford
The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limits each router to using a single route for each destination prefix, which may not satisfy the diverse requirements of end users. Recent proposals for source routing offer an alternative where end hosts or edge routers select the end-to-end paths. However, source routing leaves transit domains with very little control and introduces difficult scalability and security challenges. In this paper, we present a multi-path inter-domain routing protocol called MIRO that offers substantial flexiility, while giving transit domains control over the flow of traffic through their infrastructure and avoiding state explosion in disseminating reachability information. In MIRO, routers learn default routes through the existing BGP protocol, and arbitrary pairs of domains can negotiate the use of additional paths (bound to tunnels in the data plane) tailored to their special needs. MIRO retains the simplicity of BGP for most traffic, and remains backwards compatible with BGP to allow for incremental deployability. Experiments with Internet topology and routing data illustrate that MIRO offers tremendous flexibility for path selection with reasonable overhead.
互联网由数千个独立的域名组成,这些域名有着不同的、有时甚至是相互竞争的商业利益。但是,目前的BGP (interdomain routing protocol)限制了每台路由器对每个目的前缀只能使用一条路由,这可能无法满足终端用户的多样化需求。最近的源路由建议提供了一种替代方案,即终端主机或边缘路由器选择端到端路径。然而,源路由给传输域留下了很少的控制,并引入了困难的可伸缩性和安全性挑战。在本文中,我们提出了一种称为MIRO的多路径域间路由协议,该协议提供了极大的灵活性,同时使传输域能够控制通过其基础设施的流量,并避免在传播可达性信息时发生状态爆炸。在MIRO中,路由器通过现有的BGP协议学习缺省路由,任意对域可以根据自己的特殊需要协商使用额外的路径(绑定到数据平面的隧道中)。对于大多数流量,MIRO保留了BGP的简单性,并与BGP保持向后兼容,以允许增量部署。对Internet拓扑和路由数据的实验表明,MIRO在合理的开销下为路径选择提供了极大的灵活性。
{"title":"MIRO: multi-path interdomain routing","authors":"Wen Xu, J. Rexford","doi":"10.1145/1159913.1159934","DOIUrl":"https://doi.org/10.1145/1159913.1159934","url":null,"abstract":"The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limits each router to using a single route for each destination prefix, which may not satisfy the diverse requirements of end users. Recent proposals for source routing offer an alternative where end hosts or edge routers select the end-to-end paths. However, source routing leaves transit domains with very little control and introduces difficult scalability and security challenges. In this paper, we present a multi-path inter-domain routing protocol called MIRO that offers substantial flexiility, while giving transit domains control over the flow of traffic through their infrastructure and avoiding state explosion in disseminating reachability information. In MIRO, routers learn default routes through the existing BGP protocol, and arbitrary pairs of domains can negotiate the use of additional paths (bound to tunnels in the data plane) tailored to their special needs. MIRO retains the simplicity of BGP for most traffic, and remains backwards compatible with BGP to allow for incremental deployability. Experiments with Internet topology and routing data illustrate that MIRO offers tremendous flexibility for path selection with reasonable overhead.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 344
Session details: Network 会话详细信息:
RexfordJ.
{"title":"Session details: Network","authors":"RexfordJ.","doi":"10.1145/3263447","DOIUrl":"https://doi.org/10.1145/3263447","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122620528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS defense by offense DDoS攻击防御
Michael Walfish, Mythili Vutukuru, H. Balakrishnan, David R Karger, S. Shenker
This paper presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources (e.g., CPU cycles, disk). With speak-up, a victimized server encourages all clients, resources permitting, to automatically send higher volumes of traffic. We suppose that attackers are already using most of their upload bandwidth so cannot react to the encouragement. Good clients, however, have spare upload bandwidth and will react to the encouragement with drastically higher volumes of traffic. The intended outcome of this traffic inflation is that the good clients crowd out the bad ones, thereby capturing a much larger fraction of the server's resources than before. We experiment under various conditions and find that speak-up causes the server to spend resources on a group of clients in rough proportion to their aggregate upload bandwidth. This result makes the defense viable and effective for a class of real attacks.
本文介绍了speakup的设计、实现、分析和实验评估,这是一种针对应用程序级分布式拒绝服务(DDoS)的防御,攻击者通过发送消耗计算资源(例如,CPU周期,磁盘)的合法请求来削弱服务器。使用语音提示,受害服务器鼓励所有客户端在资源允许的情况下自动发送更多流量。我们假设攻击者已经使用了大部分上传带宽,因此无法对鼓励做出反应。然而,好的客户端有空闲的上传带宽,并且会以急剧增加的流量对鼓励做出反应。这种流量膨胀的预期结果是,好的客户端排挤坏的客户端,从而获得比以前更多的服务器资源。我们在各种条件下进行了实验,发现自说自话会导致服务器在一组客户端上花费资源,其比例大致与它们的总上传带宽成比例。这个结果使得防御对于一类真实的攻击是可行和有效的。
{"title":"DDoS defense by offense","authors":"Michael Walfish, Mythili Vutukuru, H. Balakrishnan, David R Karger, S. Shenker","doi":"10.1145/1159913.1159948","DOIUrl":"https://doi.org/10.1145/1159913.1159948","url":null,"abstract":"This paper presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources (e.g., CPU cycles, disk). With speak-up, a victimized server encourages all clients, resources permitting, to automatically send higher volumes of traffic. We suppose that attackers are already using most of their upload bandwidth so cannot react to the encouragement. Good clients, however, have spare upload bandwidth and will react to the encouragement with drastically higher volumes of traffic. The intended outcome of this traffic inflation is that the good clients crowd out the bad ones, thereby capturing a much larger fraction of the server's resources than before. We experiment under various conditions and find that speak-up causes the server to spend resources on a group of clients in rough proportion to their aggregate upload bandwidth. This result makes the defense viable and effective for a class of real attacks.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 255
Quantifying Skype user satisfaction 量化Skype用户满意度
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, C. Lei
The success of Skype has inspired a generation of peer-to-peer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, such as whether VoIP services like Skype are good enough in terms of user satisfaction,have not been formally addressed. One of the major challenges lies in the lack of an easily accessible and objective index to quantify the degree of user satisfaction.In this work, we propose a model, geared to Skype, but generalizable to other VoIP services, to quantify VoIP user satisfaction based on a rigorous analysis of the call duration from actual Skype traces. The User Satisfaction Index (USI) derived from the model is unique in that 1) it is composed by objective source-and network-level metrics, such as the bit rate, bit rate jitter, and round-trip time, 2) unlike speech quality measures based on voice signals, such as the PESQ model standardized by ITU-T, the metrics are easily accessible and computable for real-time adaptation, and 3) the model development only requires network measurements, i.e., no user surveys or voice signals are necessary. Our model is validated by an independent set of metrics that quantifies the degree of user interaction from the actual traces.
Skype的成功激发了一代基于点对点的解决方案,在互联网上提供令人满意的实时多媒体服务。然而,一些基本的问题,比如像Skype这样的VoIP服务在用户满意度方面是否足够好,还没有得到正式的解决。主要的挑战之一是缺乏一个容易获得和客观的指标来量化用户满意度的程度。在这项工作中,我们提出了一个模型,适用于Skype,但可推广到其他VoIP服务,根据对实际Skype跟踪的通话持续时间的严格分析,量化VoIP用户满意度。从该模型中得出的用户满意度指数(USI)的独特之处在于:1)它由客观的源级和网络级指标组成,如比特率、比特率抖动和往返时间;2)不同于基于语音信号的语音质量指标,如ITU-T标准化的PESQ模型,这些指标易于获取和计算,以便实时适应;3)模型开发只需要网络测量,即不需要用户调查或语音信号。我们的模型是通过一组独立的度量来验证的,这些度量从实际的跟踪中量化了用户交互的程度。
{"title":"Quantifying Skype user satisfaction","authors":"Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, C. Lei","doi":"10.1145/1159913.1159959","DOIUrl":"https://doi.org/10.1145/1159913.1159959","url":null,"abstract":"The success of Skype has inspired a generation of peer-to-peer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, such as whether VoIP services like Skype are good enough in terms of user satisfaction,have not been formally addressed. One of the major challenges lies in the lack of an easily accessible and objective index to quantify the degree of user satisfaction.In this work, we propose a model, geared to Skype, but generalizable to other VoIP services, to quantify VoIP user satisfaction based on a rigorous analysis of the call duration from actual Skype traces. The User Satisfaction Index (USI) derived from the model is unique in that 1) it is composed by objective source-and network-level metrics, such as the bit rate, bit rate jitter, and round-trip time, 2) unlike speech quality measures based on voice signals, such as the PESQ model standardized by ITU-T, the metrics are easily accessible and computable for real-time adaptation, and 3) the model development only requires network measurements, i.e., no user surveys or voice signals are necessary. Our model is validated by an independent set of metrics that quantifies the degree of user interaction from the actual traces.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129983230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 292
期刊
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1