首页 > 最新文献

Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications最新文献

英文 中文
Detecting evasion attacks at high speeds without reassembly 在不重组的情况下高速侦测闪避攻击
G. Varghese, J. Fingerhut, F. Bonomi
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like FragRoute, and are institutionalized in IPS product tests. The classic defense is for the IPS to reassemble TCP and IP packets,and to consistently normalize the output stream. Current IPS standards require keeping state for 1 million connections. Both the state and processing requirements of reassembly and normalization are barriers to scalability for an IPS at speeds higher than 10 Gbps.In this paper, we suggest breaking with this paradigm using an approach we call Split-Detect. We focus on the simplest form of signature, an exact string match, and start by splitting the signature into pieces. By doing so the attacker is either forced to include at least one piece completely in a packet, or to display potentially abnormal behavior (e.g., several small TCP fragments or out-of-order packets) that cause the attacker's flow to be diverted to a slow path. We prove that under certain assumptions this scheme can detect all byte-string evasions. We also show using real traces that the processing and storage requirements of this scheme can be 10% of that required by a conventional IPS, allowing reasonable cost implementations at 20 Gbps. While the changes required by Split-Detect may be a barrier to adoption, this paper exposes the assumptions that must be changed to avoid normalization and reassembly in the fast path.
Ptacek和Newsham[14]展示了如何利用TCP和IP分片逃避入侵防御系统(IPS)的签名检测。这些攻击在FragRoute等工具中实现,并在IPS产品测试中制度化。典型的防御方式是IPS重新组装TCP和IP报文,并对输出流进行一致的规范化。目前的IPS标准要求保持100万个连接的状态。重组和归一化的状态和处理要求都是速度高于10gbps的IPS可扩展性的障碍。在本文中,我们建议使用一种我们称为Split-Detect的方法来打破这种范式。我们专注于签名的最简单形式,一个精确的字符串匹配,并开始将签名分成几个部分。通过这样做,攻击者要么被迫在数据包中至少包含一个完整的部分,要么显示潜在的异常行为(例如,几个小的TCP片段或乱序数据包),导致攻击者的流被转移到一个缓慢的路径。我们证明了在一定的假设下,该方案可以检测到所有的字节串回避。我们还使用实际跟踪显示,该方案的处理和存储需求可以是传统IPS所需的10%,允许在20 Gbps的合理成本实现。虽然Split-Detect所需的更改可能是采用的障碍,但本文揭示了必须更改的假设,以避免在快速路径中进行规范化和重新组装。
{"title":"Detecting evasion attacks at high speeds without reassembly","authors":"G. Varghese, J. Fingerhut, F. Bonomi","doi":"10.1145/1159913.1159951","DOIUrl":"https://doi.org/10.1145/1159913.1159951","url":null,"abstract":"Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like FragRoute, and are institutionalized in IPS product tests. The classic defense is for the IPS to reassemble TCP and IP packets,and to consistently normalize the output stream. Current IPS standards require keeping state for 1 million connections. Both the state and processing requirements of reassembly and normalization are barriers to scalability for an IPS at speeds higher than 10 Gbps.In this paper, we suggest breaking with this paradigm using an approach we call Split-Detect. We focus on the simplest form of signature, an exact string match, and start by splitting the signature into pieces. By doing so the attacker is either forced to include at least one piece completely in a packet, or to display potentially abnormal behavior (e.g., several small TCP fragments or out-of-order packets) that cause the attacker's flow to be diverted to a slow path. We prove that under certain assumptions this scheme can detect all byte-string evasions. We also show using real traces that the processing and storage requirements of this scheme can be 10% of that required by a conventional IPS, allowing reasonable cost implementations at 20 Gbps. While the changes required by Split-Detect may be a barrier to adoption, this paper exposes the assumptions that must be changed to avoid normalization and reassembly in the fast path.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116523467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Designing DCCP: congestion control without reliability 设计DCCP:无可靠性拥塞控制
E. Kohler, M. Handley, S. Floyd
Fast-growing Internet applications like streaming media and telephony prefer timeliness to reliability, making TCP a poor fit. Unfortunately, UDP, the natural alternative, lacks congestion control. High-bandwidth UDP applications must implement congestion control themselves-a difficult task-or risk rendering congested networks unusable. We set out to ease the safe deployment of these applications by designing a congestion-controlled unreliable transport protocol. The outcome, the Datagram Congestion Control Protocol or DCCP, adds to a UDP-like foundation the minimum mechanisms necessary to support congestion control. We thought those mechanisms would resemble TCP's, but without reliability and, especially, cumulative acknowledgements, we had to reconsider almost every aspect of TCP's design. The resulting protocol sheds light on how congestion control interacts with unreliable transport, how modern network constraints impact protocol design, and how TCP's reliable bytestream semantics intertwine with its other mechanisms, including congestion control.
快速增长的互联网应用程序,如流媒体和电话,更喜欢及时性而不是可靠性,这使得TCP不适合。不幸的是,UDP这个自然的替代协议缺乏拥塞控制。高带宽UDP应用程序必须自己实现拥塞控制——这是一项艰巨的任务——否则就有可能导致拥塞网络无法使用。我们开始通过设计一个拥塞控制的不可靠传输协议来简化这些应用程序的安全部署。其结果是数据报拥塞控制协议(DCCP),在类似udp的基础上增加了支持拥塞控制所需的最小机制。我们认为这些机制与TCP类似,但是没有可靠性,特别是累积确认,我们不得不重新考虑TCP设计的几乎每个方面。由此产生的协议揭示了拥塞控制如何与不可靠的传输交互,现代网络约束如何影响协议设计,以及TCP的可靠字节流语义如何与包括拥塞控制在内的其他机制交织在一起。
{"title":"Designing DCCP: congestion control without reliability","authors":"E. Kohler, M. Handley, S. Floyd","doi":"10.1145/1159913.1159918","DOIUrl":"https://doi.org/10.1145/1159913.1159918","url":null,"abstract":"Fast-growing Internet applications like streaming media and telephony prefer timeliness to reliability, making TCP a poor fit. Unfortunately, UDP, the natural alternative, lacks congestion control. High-bandwidth UDP applications must implement congestion control themselves-a difficult task-or risk rendering congested networks unusable. We set out to ease the safe deployment of these applications by designing a congestion-controlled unreliable transport protocol. The outcome, the Datagram Congestion Control Protocol or DCCP, adds to a UDP-like foundation the minimum mechanisms necessary to support congestion control. We thought those mechanisms would resemble TCP's, but without reliability and, especially, cumulative acknowledgements, we had to reconsider almost every aspect of TCP's design. The resulting protocol sheds light on how congestion control interacts with unreliable transport, how modern network constraints impact protocol design, and how TCP's reliable bytestream semantics intertwine with its other mechanisms, including congestion control.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 287
Source selectable path diversity via routing deflections 源可选择的路径多样性通过路由偏转
Xiaowei Yang, D. Wetherall
We present the design of a routing system in which end-systems set tags to select non-shortest path routes as an alternative to explicit source routes. Routers collectively generate these routes by using tags as hints to independently deflect packets to neighbors that lie off the shortest-path. We show how this can be done simply, by local extensions of the shortest path machinery, and safely, so that loops are provably not formed. The result is to provide end-systems with a high-level of path diversity that allows them to bypass unde-sirable locations within the network. Unlike explicit source routing, our scheme is inherently scalable and compatible with ISP policies because it derives from the deployed Internet routing. We also sug-gest an encoding that is compatible with common IP usage, making our scheme incrementally deployable at the granularity of individual routers.
我们提出了一个路由系统的设计,其中终端系统设置标签以选择非最短路径路由作为显式源路由的替代方案。路由器通过使用标签作为提示来共同生成这些路由,从而独立地将数据包转向位于最短路径之外的邻居。我们展示了如何通过对最短路径机制的局部扩展,简单而安全地做到这一点,从而证明不会形成环路。其结果是为终端系统提供高水平的路径多样性,使它们能够绕过网络中不受欢迎的位置。与显式源路由不同,我们的方案本质上是可伸缩的,并且与ISP策略兼容,因为它源自已部署的Internet路由。我们还建议使用与通用IP使用兼容的编码,使我们的方案可以在单个路由器的粒度上增量部署。
{"title":"Source selectable path diversity via routing deflections","authors":"Xiaowei Yang, D. Wetherall","doi":"10.1145/1159913.1159933","DOIUrl":"https://doi.org/10.1145/1159913.1159933","url":null,"abstract":"We present the design of a routing system in which end-systems set tags to select non-shortest path routes as an alternative to explicit source routes. Routers collectively generate these routes by using tags as hints to independently deflect packets to neighbors that lie off the shortest-path. We show how this can be done simply, by local extensions of the shortest path machinery, and safely, so that loops are provably not formed. The result is to provide end-systems with a high-level of path diversity that allows them to bypass unde-sirable locations within the network. Unlike explicit source routing, our scheme is inherently scalable and compatible with ISP policies because it derives from the deployed Internet routing. We also sug-gest an encoding that is compatible with common IP usage, making our scheme incrementally deployable at the granularity of individual routers.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123924646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 229
Growth codes: maximizing sensor network data persistence 增长代码:最大化传感器网络数据持久性
A. Kamra, V. Misra, Jon Feldman, D. Rubenstein
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangerous. However, such disaster scenarios pose an interesting design challenge since the sensor nodes used to collect and communicate data may themselves fail suddenly and unpredictably, resulting in the loss of valuable data. Furthermore, because these networks are often expected to be deployed in response to a disaster, or because of sudden configuration changes due to failure, these networks are often expected to operate in a "zero-configuration" paradigm, where data collection and transmission must be initiated immediately, before the nodes have a chance to assess the current network topology. In this paper, we design and analyze techniques to increase "persistence" of sensed data, so that data is more likely to reach a data sink, even as network nodes fail. This is done by replicating data compactly at neighboring nodes using novel "Growth Codes" that increase in efficiency as data accumulates at the sink. We show that Growth Codes preserve more data in the presence of node failures than previously proposed erasure resilient techniques.
传感器网络在洪水、火灾、恐怖袭击或地震等灾难性或紧急情况下特别有用,在这些情况下,人类参与可能太危险。然而,这种灾难场景提出了一个有趣的设计挑战,因为用于收集和通信数据的传感器节点本身可能会突然和不可预测地失效,导致有价值的数据丢失。此外,由于这些网络通常被部署以应对灾难,或者由于故障导致的突然配置更改,因此这些网络通常被期望以“零配置”范式运行,在节点有机会评估当前网络拓扑之前,必须立即启动数据收集和传输。在本文中,我们设计和分析了增加感知数据“持久性”的技术,这样即使网络节点出现故障,数据也更有可能到达数据接收器。这是通过使用新颖的“增长代码”在相邻节点上紧凑地复制数据来实现的,这种“增长代码”随着数据在汇聚节点上的积累而提高效率。我们表明,与以前提出的擦除弹性技术相比,生长代码在节点故障的情况下保留了更多的数据。
{"title":"Growth codes: maximizing sensor network data persistence","authors":"A. Kamra, V. Misra, Jon Feldman, D. Rubenstein","doi":"10.1145/1159913.1159943","DOIUrl":"https://doi.org/10.1145/1159913.1159943","url":null,"abstract":"Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangerous. However, such disaster scenarios pose an interesting design challenge since the sensor nodes used to collect and communicate data may themselves fail suddenly and unpredictably, resulting in the loss of valuable data. Furthermore, because these networks are often expected to be deployed in response to a disaster, or because of sudden configuration changes due to failure, these networks are often expected to operate in a \"zero-configuration\" paradigm, where data collection and transmission must be initiated immediately, before the nodes have a chance to assess the current network topology. In this paper, we design and analyze techniques to increase \"persistence\" of sensed data, so that data is more likely to reach a data sink, even as network nodes fail. This is done by replicating data compactly at neighboring nodes using novel \"Growth Codes\" that increase in efficiency as data accumulates at the sink. We show that Growth Codes preserve more data in the presence of node failures than previously proposed erasure resilient techniques.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 343
Measurement-based models of delivery and interference in static wireless networks 静态无线网络中基于测量的传输和干扰模型
Charles Reis, Ratul Mahajan, Maya Rodrig, D. Wetherall, J. Zahorjan
We present practical models for the physical layer behaviors of packet reception and carrier sense with interference in static wireless networks. These models use measurements of a real network rather than abstract RF propagation models as the basis for accuracy in complex environments. Seeding our models requires N trials in an N node network, in which each sender transmits in turn and receivers measure RSSI values and packet counts, both of which are easily obtainable. The models then predict packet delivery and throughput in the same network for different sets of transmitters with the same node placements. We evaluate our models for the base case of two senders that broadcast packets simultaneously. We find that they are effective at predicting when there will be significant interference effects. Across many predictions, we obtain an RMS error for 802.11a and 802.11b of a half and a third, respectively, of a measurement-based model that ignores interference.
提出了静态无线网络中具有干扰的分组接收和载波感知物理层行为的实用模型。这些模型使用真实网络的测量,而不是抽象的射频传播模型作为复杂环境中准确性的基础。播种我们的模型需要在N个节点的网络中进行N次试验,其中每个发送方依次传输,接收方测量RSSI值和数据包计数,这两个数据都很容易获得。然后,这些模型预测同一网络中具有相同节点位置的不同传输器组的数据包传递和吞吐量。我们在两个发送者同时广播数据包的基本情况下评估我们的模型。我们发现它们在预测何时会有明显的干扰效应方面是有效的。在许多预测中,我们得到802.11a和802.11b的均方根误差分别为忽略干扰的基于测量的模型的一半和三分之一。
{"title":"Measurement-based models of delivery and interference in static wireless networks","authors":"Charles Reis, Ratul Mahajan, Maya Rodrig, D. Wetherall, J. Zahorjan","doi":"10.1145/1159913.1159921","DOIUrl":"https://doi.org/10.1145/1159913.1159921","url":null,"abstract":"We present practical models for the physical layer behaviors of packet reception and carrier sense with interference in static wireless networks. These models use measurements of a real network rather than abstract RF propagation models as the basis for accuracy in complex environments. Seeding our models requires N trials in an N node network, in which each sender transmits in turn and receivers measure RSSI values and packet counts, both of which are easily obtainable. The models then predict packet delivery and throughput in the same network for different sets of transmitters with the same node placements. We evaluate our models for the base case of two senders that broadcast packets simultaneously. We find that they are effective at predicting when there will be significant interference effects. Across many predictions, we obtain an RMS error for 802.11a and 802.11b of a half and a third, respectively, of a measurement-based model that ignores interference.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 401
ROFL: routing on flat labels ROFL:在平面标签上布线
M. Caesar, Tyson Condie, Jayanthkumar Kannan, K. Lakshminarayanan, I. Stoica
It is accepted wisdom that the current Internet architecture conflates network locations and host identities, but there is no agreement on how a future architecture should distinguish the two. One could sidestep this quandary by routing directly on host identities themselves, and eliminating the need for network-layer protocols to include any mention of network location. The key to achieving this is the ability to route on flat labels. In this paper we take an initial stab at this challenge, proposing and analyzing our ROFL routing algorithm. While its scaling and efficiency properties are far from ideal, our results suggest that the idea of routing on flat labels cannot be immediately dismissed.
人们普遍认为,当前的Internet架构将网络位置和主机身份混为一谈,但对于未来的架构如何区分这两者,还没有达成一致意见。可以通过直接在主机标识本身上进行路由,并消除网络层协议对网络位置的任何提及的需求,从而避免这种困境。实现这一目标的关键是在平面标签上路由的能力。在本文中,我们对这一挑战进行了初步尝试,提出并分析了我们的ROFL路由算法。虽然它的缩放和效率属性远非理想,但我们的结果表明,在平面标签上路由的想法不能立即被驳回。
{"title":"ROFL: routing on flat labels","authors":"M. Caesar, Tyson Condie, Jayanthkumar Kannan, K. Lakshminarayanan, I. Stoica","doi":"10.1145/1159913.1159955","DOIUrl":"https://doi.org/10.1145/1159913.1159955","url":null,"abstract":"It is accepted wisdom that the current Internet architecture conflates network locations and host identities, but there is no agreement on how a future architecture should distinguish the two. One could sidestep this quandary by routing directly on host identities themselves, and eliminating the need for network-layer protocols to include any mention of network location. The key to achieving this is the ability to route on flat labels. In this paper we take an initial stab at this challenge, proposing and analyzing our ROFL routing algorithm. While its scaling and efficiency properties are far from ideal, our results suggest that the idea of routing on flat labels cannot be immediately dismissed.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 347
A measurement study on the impact of routing events on end-to-end internet path performance 路由事件对端到端互联网路径性能影响的测量研究
Feng Wang, Z. Morley Mao, Jia Wang, Lixin Gao, R. Bush
Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation between routing dynamics and such performance degradation is poorly understood. In particular, how do routing changes result in degraded end-to-end path performance in the first place? How do factors such as topological properties, routing policies, and iBGP configurations affect the extent to which such routing events can cause performance degradation? Answers to these questions are critical for improving network performance.In this paper, we conduct extensive measurement that involves both controlled routing updates through two tier-1 ISPs and active probes of a diverse set of end-to-end paths on the Internet. We find that routing changes contribute to end-to-end packet loss significantly. Specifically, we study failover events in which a link failure leads to a routing change and recovery events in which a link repair causes a routing change. In both cases, it is possible to experience data plane performance degradation in terms of increased long loss burst as well as forwarding loops. Furthermore, we find that common routing policies and iBGP configurations of ISPs can directly affect the end-to-end path performance during routing changes. Our work provides new insights into potential measures that network operators can undertake to enhance network performance.
广泛的测量研究表明,端到端互联网路径性能下降与路由动态相关。然而,路由动态和这种性能下降之间的相关性的根本原因还不太清楚。特别是,路由更改首先是如何导致端到端路径性能下降的?拓扑属性、路由策略和iBGP配置等因素如何影响路由事件导致性能下降的程度?这些问题的答案对于提高网络性能至关重要。在本文中,我们进行了广泛的测量,包括通过两个第1层isp的受控路由更新和互联网上各种端到端路径的主动探测。我们发现路由变化对端到端数据包丢失的影响很大。具体来说,我们研究了链路故障导致路由变化的故障转移事件和链路修复导致路由变化的恢复事件。在这两种情况下,都有可能经历数据平面性能下降,因为长丢失突发和转发循环增加。此外,我们还发现,在路由变化过程中,isp的通用路由策略和iBGP配置会直接影响端到端路径的性能。我们的工作为网络运营商可以采取的提高网络性能的潜在措施提供了新的见解。
{"title":"A measurement study on the impact of routing events on end-to-end internet path performance","authors":"Feng Wang, Z. Morley Mao, Jia Wang, Lixin Gao, R. Bush","doi":"10.1145/1159913.1159956","DOIUrl":"https://doi.org/10.1145/1159913.1159956","url":null,"abstract":"Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation between routing dynamics and such performance degradation is poorly understood. In particular, how do routing changes result in degraded end-to-end path performance in the first place? How do factors such as topological properties, routing policies, and iBGP configurations affect the extent to which such routing events can cause performance degradation? Answers to these questions are critical for improving network performance.In this paper, we conduct extensive measurement that involves both controlled routing updates through two tier-1 ISPs and active probes of a diverse set of end-to-end paths on the Internet. We find that routing changes contribute to end-to-end packet loss significantly. Specifically, we study failover events in which a link failure leads to a routing change and recovery events in which a link repair causes a routing change. In both cases, it is possible to experience data plane performance degradation in terms of increased long loss burst as well as forwarding loops. Furthermore, we find that common routing policies and iBGP configurations of ISPs can directly affect the end-to-end path performance during routing changes. Our work provides new insights into potential measures that network operators can undertake to enhance network performance.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 205
Capacity overprovisioning for networks with resilience requirements 对于有弹性需求的网络,容量过剩
M. Menth, Rüdiger Martin, J. Charzinski
This work focuses on capacity overprovisioning (CO) as an alternative to admission control (AC) to implement quality of service (QoS) in packet-switched communication networks. CO prevents potential overload while AC protects the QoS of the traffic during overload situations. Overload may be caused, e. g., by uctuations of the traffic rate on a link due to its normal stochastic behavior (a), by traffic shifts within the network due to popular contents (b), or by redirected traffic due to network failures (c). Capacity dimensioning methods for CO need to take into account all potential sources of overload while AC can block excess traffic caused by (a) and (b) if the capacity does not suffice. The contributions of this paper are (1) the presentation of a capacity dimensioning method for networks with resilience requirements and changing traffic matrices, (2) the investigation of the impact of the mentioned sources of overload (a-c) on the required capacity for CO in networks with and without resilience requirements, and (3) a comparison of this equired capacity with the one for AC. Our results show that in the presence of strong traffic shifts CO requires more capacity than AC. However, if resilience against network failures is required, both CO and AC need additional backup capacity for the redirected traffic. In this case, CO can use the backup capacity to absorb other types of overload. As a consequence, CO and AC have similar bandwidth requirements. These findings are robust against the network size.
本研究的重点是将容量过度配置(CO)作为接纳控制(AC)的替代方案,在分组交换通信网络中实现服务质量(QoS)。CO防止潜在的过载,而AC在过载情况下保护流量的QoS。过载可能会引起,例如,由于链路的正常随机行为而导致链路上的流量率波动(a),由于流行内容而导致网络内的流量变化(b),或者由于网络故障而导致的流量重定向(c)。CO的容量量纲方法需要考虑所有潜在的过载来源,而AC可以在容量不足的情况下阻止(a)和(b)引起的多余流量。本文的贡献是:(1)提出了具有弹性要求和流量矩阵变化的网络的容量量纲方法,(2)调查了上述过载源(a-c)对具有和不具有弹性要求的网络中CO所需容量的影响。(3)将此所需容量与AC所需容量进行比较。我们的结果表明,在存在强流量转移的情况下,CO比AC需要更多的容量。然而,如果需要针对网络故障的弹性,CO和AC都需要额外的备份容量来处理重定向的流量。在这种情况下,CO可以使用备份容量来吸收其他类型的过载。因此,CO和AC具有相似的带宽需求。这些发现与网络规模无关。
{"title":"Capacity overprovisioning for networks with resilience requirements","authors":"M. Menth, Rüdiger Martin, J. Charzinski","doi":"10.1145/1159913.1159925","DOIUrl":"https://doi.org/10.1145/1159913.1159925","url":null,"abstract":"This work focuses on capacity overprovisioning (CO) as an alternative to admission control (AC) to implement quality of service (QoS) in packet-switched communication networks. CO prevents potential overload while AC protects the QoS of the traffic during overload situations. Overload may be caused, e. g., by uctuations of the traffic rate on a link due to its normal stochastic behavior (a), by traffic shifts within the network due to popular contents (b), or by redirected traffic due to network failures (c). Capacity dimensioning methods for CO need to take into account all potential sources of overload while AC can block excess traffic caused by (a) and (b) if the capacity does not suffice. The contributions of this paper are (1) the presentation of a capacity dimensioning method for networks with resilience requirements and changing traffic matrices, (2) the investigation of the impact of the mentioned sources of overload (a-c) on the required capacity for CO in networks with and without resilience requirements, and (3) a comparison of this equired capacity with the one for AC. Our results show that in the presence of strong traffic shifts CO requires more capacity than AC. However, if resilience against network failures is required, both CO and AC need additional backup capacity for the redirected traffic. In this case, CO can use the backup capacity to absorb other types of overload. As a consequence, CO and AC have similar bandwidth requirements. These findings are robust against the network size.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Interference-aware fair rate control in wireless sensor networks 无线传感器网络中干扰感知的公平速率控制
Sumit Rangwala, R. Gummadi, R. Govindan, K. Psounis
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dynamically allocate fair and efficient transmission rates to each node? Our interferenceaware fair rate control (IFRC) detects incipient congestion at a node by monitoring the average queue length, communicates congestion state to exactly the set of potential interferers using a novel low-overhead congestion sharing mechanism, and converges to a fair and efficient rate using an AIMD control law. We evaluate IFRC extensively on a 40-node wireless sensor network testbed. IFRC achieves a fair and efficient rate allocation that is within 20-40% of the optimal fair rate allocation on some network topologies. Its rate adaptation mechanism is highly effective: we did not observe a single instance of queue overflow in our many experiments. Finally, IFRC can be extended easily to support situations where only a subset of the nodes transmit, where the network has multiple base stations, or where nodes are assigned different transmission weights.
在一个有N个节点的无线传感器网络中,将数据传输到单个基站,可能会通过多个跳,为了动态地为每个节点分配公平有效的传输速率,应该实现什么样的分布式机制?我们的干扰感知公平速率控制(IFRC)通过监测平均队列长度来检测节点上的早期拥塞,使用一种新颖的低开销拥塞共享机制将拥塞状态准确地传递给潜在的干扰者,并使用AIMD控制律收敛到公平有效的速率。我们在一个40节点无线传感器网络测试平台上对IFRC进行了广泛的评估。IFRC实现了公平有效的速率分配,在某些网络拓扑结构中,该分配在最优公平速率分配的20-40%以内。它的速率自适应机制非常有效,在我们的多次实验中没有观察到一个队列溢出的实例。最后,IFRC可以很容易地扩展,以支持只有一部分节点传输、网络有多个基站或节点被分配不同传输权重的情况。
{"title":"Interference-aware fair rate control in wireless sensor networks","authors":"Sumit Rangwala, R. Gummadi, R. Govindan, K. Psounis","doi":"10.1145/1159913.1159922","DOIUrl":"https://doi.org/10.1145/1159913.1159922","url":null,"abstract":"In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dynamically allocate fair and efficient transmission rates to each node? Our interferenceaware fair rate control (IFRC) detects incipient congestion at a node by monitoring the average queue length, communicates congestion state to exactly the set of potential interferers using a novel low-overhead congestion sharing mechanism, and converges to a fair and efficient rate using an AIMD control law. We evaluate IFRC extensively on a 40-node wireless sensor network testbed. IFRC achieves a fair and efficient rate allocation that is within 20-40% of the optimal fair rate allocation on some network topologies. Its rate adaptation mechanism is highly effective: we did not observe a single instance of queue overflow in our many experiments. Finally, IFRC can be extended easily to support situations where only a subset of the nodes transmit, where the network has multiple base stations, or where nodes are assigned different transmission weights.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122041031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 331
The impact and implications of the growth in residential user-to-user traffic 住宅用户对用户流量增长的影响和影响
Kenjiro Cho, K. Fukuda, H. Esaki, A. Kato
It has been reported worldwide that peer-to-peer traffic is taking up a significant portion of backbone networks. In particular, it is prominent in Japan because of the high penetration rate of fiber-based broadband access. In this paper, we first report aggregated traffic measurements collected over 21 months from seven ISPs covering 42% of the Japanese backbone traffic. The backbone is dominated by symmetric residential traffic which increased 37%in 2005. We further investigate residential per-customer trafficc in one of the ISPs by comparing DSL and fiber users, heavy-hitters and normal users, and geographic traffic matrices. The results reveal that a small segment of users dictate the overall behavior; 4% of heavy-hitters account for 75% of the inbound volume, and the fiber users account for 86%of the inbound volume. About 63%of the total residential volume is user-to-user traffic. The dominant applications exhibit poor locality and communicate with a wide range and number of peers. The distribution of heavy-hitters is heavy-tailed without a clear boundary between heavy-hitters and normal users, which suggests that users start playing with peer-to-peer applications, become heavy-hitters, and eventually shift from DSL to fiber. We provide conclusive empirical evidence from a large and diverse set of commercial backbone data that the emergence of new attractive applications has drastically affected traffic usage and capacity engineering requirements.
据报道,在世界范围内,点对点流量正在占据骨干网络的很大一部分。特别是,由于基于光纤的宽带接入的高普及率,它在日本尤为突出。在本文中,我们首先报告了从七个isp收集的21个月内的汇总流量测量,覆盖了42%的日本骨干流量。主干网以对称住宅流量为主,2005年增长了37%。通过比较DSL用户和光纤用户、重量级用户和普通用户以及地理流量矩阵,我们进一步调查了其中一个isp的住宅每客户流量。结果表明,一小部分用户决定了整体行为;4%的重量级用户占入站量的75%,光纤用户占入站量的86%。大约63%的住宅流量是用户对用户的流量。占主导地位的应用程序表现出较差的局部性,并且与范围广泛且数量众多的对等体进行通信。重量级用户的分布是重尾的,在重量级用户和普通用户之间没有明确的界限,这表明用户开始玩点对点应用程序,成为重量级用户,最终从DSL转向光纤。我们从大量不同的商业主干数据中提供了确凿的经验证据,表明新的有吸引力的应用程序的出现极大地影响了流量使用和容量工程需求。
{"title":"The impact and implications of the growth in residential user-to-user traffic","authors":"Kenjiro Cho, K. Fukuda, H. Esaki, A. Kato","doi":"10.1145/1159913.1159938","DOIUrl":"https://doi.org/10.1145/1159913.1159938","url":null,"abstract":"It has been reported worldwide that peer-to-peer traffic is taking up a significant portion of backbone networks. In particular, it is prominent in Japan because of the high penetration rate of fiber-based broadband access. In this paper, we first report aggregated traffic measurements collected over 21 months from seven ISPs covering 42% of the Japanese backbone traffic. The backbone is dominated by symmetric residential traffic which increased 37%in 2005. We further investigate residential per-customer trafficc in one of the ISPs by comparing DSL and fiber users, heavy-hitters and normal users, and geographic traffic matrices. The results reveal that a small segment of users dictate the overall behavior; 4% of heavy-hitters account for 75% of the inbound volume, and the fiber users account for 86%of the inbound volume. About 63%of the total residential volume is user-to-user traffic. The dominant applications exhibit poor locality and communicate with a wide range and number of peers. The distribution of heavy-hitters is heavy-tailed without a clear boundary between heavy-hitters and normal users, which suggests that users start playing with peer-to-peer applications, become heavy-hitters, and eventually shift from DSL to fiber. We provide conclusive empirical evidence from a large and diverse set of commercial backbone data that the emergence of new attractive applications has drastically affected traffic usage and capacity engineering requirements.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 224
期刊
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1