首页 > 最新文献

2012 IEEE 20th International Workshop on Quality of Service最新文献

英文 中文
Video quality estimator for wireless mesh networks 无线网状网络视频质量估计器
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245980
Elisangela Aguiar, Andre Riker, A. Abelém, E. Cerqueira, Mu Mu
As Wireless Mesh Networks (WMNs) have been increasingly deployed, where users can share, create and access videos with different characteristics, the need for new quality estimator mechanisms has become important because operators want to control the quality of video delivery and optimize their network resources, while increasing the user satisfaction. However, the development of in-service Quality of Experience (QoE) estimation schemes for Internet videos (e.g., real-time streaming and gaming) with different complexities, motions, Group of Picture (GoP) sizes and contents remains a significant challenge and is crucial for the success of wireless multimedia systems. To address this challenge, we propose a real-time quality estimator approach, HyQoE, for real-time multimedia applications. The performance evaluation in a WMN scenario demonstrates the high accuracy of HyQoE in estimating the Mean Opinion Score (MOS). Moreover, the results highlight the lack of performance of the well-known objective methods and the Pseudo-Subjective Quality Assessment (PSQA) approach.
随着无线网状网络(WMNs)的日益普及,用户可以共享、创建和访问具有不同特征的视频,运营商希望在提高用户满意度的同时控制视频传输的质量并优化其网络资源,因此对新的质量评估机制的需求变得非常重要。然而,对于具有不同复杂性、运动、图像组(GoP)大小和内容的互联网视频(例如实时流媒体和游戏),开发在线体验质量(QoE)估计方案仍然是一个重大挑战,对无线多媒体系统的成功至关重要。为了应对这一挑战,我们提出了一种实时质量评估方法,HyQoE,用于实时多媒体应用。在WMN场景下的性能评估表明,HyQoE在估计平均意见得分(Mean Opinion Score, MOS)方面具有较高的准确性。此外,结果还突出了众所周知的客观方法和伪主观质量评估(PSQA)方法的性能不足。
{"title":"Video quality estimator for wireless mesh networks","authors":"Elisangela Aguiar, Andre Riker, A. Abelém, E. Cerqueira, Mu Mu","doi":"10.1109/IWQoS.2012.6245980","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245980","url":null,"abstract":"As Wireless Mesh Networks (WMNs) have been increasingly deployed, where users can share, create and access videos with different characteristics, the need for new quality estimator mechanisms has become important because operators want to control the quality of video delivery and optimize their network resources, while increasing the user satisfaction. However, the development of in-service Quality of Experience (QoE) estimation schemes for Internet videos (e.g., real-time streaming and gaming) with different complexities, motions, Group of Picture (GoP) sizes and contents remains a significant challenge and is crucial for the success of wireless multimedia systems. To address this challenge, we propose a real-time quality estimator approach, HyQoE, for real-time multimedia applications. The performance evaluation in a WMN scenario demonstrates the high accuracy of HyQoE in estimating the Mean Opinion Score (MOS). Moreover, the results highlight the lack of performance of the well-known objective methods and the Pseudo-Subjective Quality Assessment (PSQA) approach.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123692017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Elite: Differentiating the playback lag for peer-assisted live video streaming 精英:区分同行辅助直播视频流的播放延迟
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245971
Shiping Li, Jin Zhao, Xin Wang
Small playback lag in live streaming is important for time-critical and interactive applications such as live stock, market updates, sports and remote education. In this paper, we present Elite addresses the playback lag problem in peer-assisted live streaming systems. Instead of deploying a large initial offset to all the users, Elite seeks the possibility of initializing users with layered proportional initial scheduling point, thus achieving differentiated playback lag service for the system. For saving server bandwidth and reducing lag time, Elite employs a novel strategy which arranges peers into a virtual tree structure and quantifies playback lag of each layer that finally converges to a constant value. This way, Elite can help users to achieve much shorter average playback lag and prioritized service within the same channel. As illustrated in our design, analysis, and simulation studies, Elite is able to fully exploit limited pool of server bandwidth to support peer-assisted live streaming with prioritized playback lag, and achieves shorter average playback lag compared with synchronized strategy, such as R2.
实时流媒体中的小播放延迟对于实时股票、市场更新、体育和远程教育等时间关键和交互式应用程序非常重要。在本文中,我们提出的Elite解决了对等辅助直播系统中的播放延迟问题。Elite寻求用分层比例初始调度点初始化用户的可能性,而不是为所有用户部署大的初始偏移量,从而实现系统差异化的播放延迟服务。为了节省服务器带宽和减少延迟时间,Elite采用了一种新颖的策略,将对等节点排列成虚拟树结构,并量化每层的播放延迟,最终收敛到一个恒定值。这样,Elite可以帮助用户在同一频道内实现更短的平均播放延迟和优先级服务。正如我们的设计、分析和仿真研究中所示,Elite能够充分利用有限的服务器带宽池来支持具有优先播放延迟的对等辅助直播,并且与同步策略(如R2)相比,实现更短的平均播放延迟。
{"title":"Elite: Differentiating the playback lag for peer-assisted live video streaming","authors":"Shiping Li, Jin Zhao, Xin Wang","doi":"10.1109/IWQoS.2012.6245971","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245971","url":null,"abstract":"Small playback lag in live streaming is important for time-critical and interactive applications such as live stock, market updates, sports and remote education. In this paper, we present Elite addresses the playback lag problem in peer-assisted live streaming systems. Instead of deploying a large initial offset to all the users, Elite seeks the possibility of initializing users with layered proportional initial scheduling point, thus achieving differentiated playback lag service for the system. For saving server bandwidth and reducing lag time, Elite employs a novel strategy which arranges peers into a virtual tree structure and quantifies playback lag of each layer that finally converges to a constant value. This way, Elite can help users to achieve much shorter average playback lag and prioritized service within the same channel. As illustrated in our design, analysis, and simulation studies, Elite is able to fully exploit limited pool of server bandwidth to support peer-assisted live streaming with prioritized playback lag, and achieves shorter average playback lag compared with synchronized strategy, such as R2.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127741818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fast cloned-tag identification protocols for large-scale RFID systems 大规模RFID系统的快速克隆标签识别协议
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245962
Kai Bu, Xuan Liu, Bin Xiao
Tag cloning attacks threaten a variety of Radio Frequency Identification (RFID) applications but are hard to prevent. To secure RFID applications that confine tagged objects in the same RFID system, this paper studies the cloned-tag identification problem. Although limited existing work has shed some light on the problem, designing fast cloned-tag identification protocols for applications in large-scale RFID systems is yet not thoroughly investigated. To this end, we propose leveraging broadcast and collisions to identify cloned tags. This approach relieves us from resorting to complex cryptography techniques and time-consuming transmission of tag IDs. Based on this approach, we derive a time lower bound on cloned-tag identification and propose a suite of time-efficient protocols toward approaching the time lower bound. The execution time of our protocol is only 1.4 times the value of the time lower bound, being up to 91% less than that of the existing protocol. The proposed protocols may benefit also RFID applications that distribute tagged objects across multiple places.
标签克隆攻击威胁着射频识别(RFID)的各种应用,但难以预防。为了保证RFID应用中有标签对象在同一RFID系统中的安全性,本文研究了克隆标签识别问题。虽然有限的现有工作已经揭示了一些问题,设计快速克隆标签识别协议应用于大规模RFID系统还没有彻底的研究。为此,我们建议利用广播和冲突来识别克隆标签。这种方法使我们从复杂的加密技术和耗时的标签id传输中解脱出来。基于这种方法,我们推导出克隆标签识别的时间下界,并提出了一套接近时间下界的时间效率协议。我们的协议的执行时间仅为时间下界值的1.4倍,比现有协议的执行时间缩短了91%。所提出的协议也可能使RFID应用程序在多个地方分发带标签的对象受益。
{"title":"Fast cloned-tag identification protocols for large-scale RFID systems","authors":"Kai Bu, Xuan Liu, Bin Xiao","doi":"10.1109/IWQoS.2012.6245962","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245962","url":null,"abstract":"Tag cloning attacks threaten a variety of Radio Frequency Identification (RFID) applications but are hard to prevent. To secure RFID applications that confine tagged objects in the same RFID system, this paper studies the cloned-tag identification problem. Although limited existing work has shed some light on the problem, designing fast cloned-tag identification protocols for applications in large-scale RFID systems is yet not thoroughly investigated. To this end, we propose leveraging broadcast and collisions to identify cloned tags. This approach relieves us from resorting to complex cryptography techniques and time-consuming transmission of tag IDs. Based on this approach, we derive a time lower bound on cloned-tag identification and propose a suite of time-efficient protocols toward approaching the time lower bound. The execution time of our protocol is only 1.4 times the value of the time lower bound, being up to 91% less than that of the existing protocol. The proposed protocols may benefit also RFID applications that distribute tagged objects across multiple places.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117103673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Mining frequent partial periodic patterns in spectrum usage data 频谱使用数据中频繁部分周期模式的挖掘
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245969
Pei Huang, Chin-Jung Liu, Li Xiao, Jin Chen
Cognitive radio appears as a promising technology to allocate wireless spectrum between licensed and unlicensed users. Predictive methods for inferring the availability of spectrum holes can help to reduce collision and improve spectrum extraction. This paper introduces a Partial Periodic Pattern Mining (PPPM) algorithm to identify frequent spectrum occupancy patterns that are hidden in the spectrum usage of a channel. The mined frequent patterns are then used to predict future channel states (i.e., busy or idle). PPPM outperforms traditional Frequent Pattern Mining (FPM) by considering real patterns that do not repeat perfectly. Using real life network activities, we show a significant reduction on miss rate in channel state prediction.
认知无线电是一种很有前途的技术,可以在授权用户和未授权用户之间分配无线频谱。利用预测方法推断频谱空穴的可用性有助于减少碰撞,提高频谱提取效率。提出了一种局部周期模式挖掘算法,用于识别隐藏在信道频谱使用中的频繁频谱占用模式。然后使用挖掘的频繁模式来预测未来的通道状态(即繁忙或空闲)。PPPM通过考虑不能完美重复的真实模式而优于传统的频繁模式挖掘(FPM)。使用现实生活中的网络活动,我们显示了在信道状态预测中缺失率的显著降低。
{"title":"Mining frequent partial periodic patterns in spectrum usage data","authors":"Pei Huang, Chin-Jung Liu, Li Xiao, Jin Chen","doi":"10.1109/IWQoS.2012.6245969","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245969","url":null,"abstract":"Cognitive radio appears as a promising technology to allocate wireless spectrum between licensed and unlicensed users. Predictive methods for inferring the availability of spectrum holes can help to reduce collision and improve spectrum extraction. This paper introduces a Partial Periodic Pattern Mining (PPPM) algorithm to identify frequent spectrum occupancy patterns that are hidden in the spectrum usage of a channel. The mined frequent patterns are then used to predict future channel states (i.e., busy or idle). PPPM outperforms traditional Frequent Pattern Mining (FPM) by considering real patterns that do not repeat perfectly. Using real life network activities, we show a significant reduction on miss rate in channel state prediction.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulating CSMA/CA behavior for performance evaluation of multi-hop wireless networks 模拟CSMA/CA行为用于多跳无线网络的性能评估
Pub Date : 2012-06-04 DOI: 10.1109/IWQOS.2012.6245968
Akihito Hiromori, H. Yamaguchi, T. Higashino
In this paper, we design an efficient method of simulating wireless networks that use CSMA/CA-based protocols in the MAC layer. In the method, a stochastic model to estimate the CSMA/CA frame transmission delay is naturally incorporated into the conventional fully event-based model. The stochastic model can simplify the interactions between a frame transmitter and its surrounding nodes, which alleviates the event scheduling overhead in simulation. The important feature is that the stochastic model can be applied in “per-node” and “time” basis, i.e. we may simulate the behavior of some intended nodes precisely while the others are simplified by the stochastic mode to save computational resources. To the best of our knowledge, this is the first approach to coexistence of the stochastic and event-based models in wireless multi-hop network simulation. We have implemented this scheme in a commercial network simulator and conducted several experiments. From the results, it is confirmed that the proposed method could perform simulation of frame transmission much faster than the fully event-based simulation achieving the same accuracy as the conventional model.
在本文中,我们设计了一种在MAC层使用基于CSMA/ ca协议的无线网络的有效模拟方法。该方法在传统的完全基于事件的CSMA/CA帧传输延迟估计模型中自然地加入了一个随机模型。随机模型可以简化帧发送器与其周围节点之间的交互,从而减轻仿真中的事件调度开销。重要的特点是随机模型可以在“每节点”和“时间”的基础上应用,即我们可以精确地模拟一些预期节点的行为,而其他节点则通过随机模式简化以节省计算资源。据我们所知,这是无线多跳网络仿真中随机模型和基于事件模型共存的第一个方法。我们已经在商用网络模拟器上实现了该方案,并进行了多次实验。实验结果表明,该方法可以比完全基于事件的仿真更快地进行帧传输仿真,并达到与传统模型相同的精度。
{"title":"Simulating CSMA/CA behavior for performance evaluation of multi-hop wireless networks","authors":"Akihito Hiromori, H. Yamaguchi, T. Higashino","doi":"10.1109/IWQOS.2012.6245968","DOIUrl":"https://doi.org/10.1109/IWQOS.2012.6245968","url":null,"abstract":"In this paper, we design an efficient method of simulating wireless networks that use CSMA/CA-based protocols in the MAC layer. In the method, a stochastic model to estimate the CSMA/CA frame transmission delay is naturally incorporated into the conventional fully event-based model. The stochastic model can simplify the interactions between a frame transmitter and its surrounding nodes, which alleviates the event scheduling overhead in simulation. The important feature is that the stochastic model can be applied in “per-node” and “time” basis, i.e. we may simulate the behavior of some intended nodes precisely while the others are simplified by the stochastic mode to save computational resources. To the best of our knowledge, this is the first approach to coexistence of the stochastic and event-based models in wireless multi-hop network simulation. We have implemented this scheme in a commercial network simulator and conducted several experiments. From the results, it is confirmed that the proposed method could perform simulation of frame transmission much faster than the fully event-based simulation achieving the same accuracy as the conventional model.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"229 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131544204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive dynamic priority scheduling for virtual desktop infrastructures 虚拟桌面基础架构的自适应动态优先级调度
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245988
Jinho Hwang, Timothy Wood
Virtual Desktop Infrastructures (VDIs) are gaining popularity in cloud computing by allowing companies to deploy their office environments in a virtualized setting instead of relying on physical desktop machines. Consolidating many users into a VDI environment can significantly lower IT management expenses and enables new features such as “available-anywhere” desktops. However, barriers to broad adoption include the slow performance of virtualized I/O, CPU scheduling interference problems, and shared-cache contention. In this paper, we propose a new soft real-time scheduling algorithm that employs flexible priority designations (via utility functions) and automated scheduler class detection (via hypervisor monitoring of user behavior) to provide a higher quality user experience. We have implemented our scheduler within the Xen virtualization platform, and demonstrate that the overheads incurred from co-locating large numbers of virtual machines can be reduced from 66% with existing schedulers to under 2% in our system. We evaluate the benefits and overheads of using a smaller scheduling time quantum in a VDI setting, and show that the average overhead time per scheduler call is on the same order as the existing SEDF and Credit schedulers.
虚拟桌面基础设施(Virtual Desktop infrastructure, vdi)在云计算领域越来越受欢迎,因为它允许公司在虚拟环境中部署办公环境,而不是依赖于物理桌面机器。将许多用户整合到一个VDI环境中可以显著降低IT管理费用,并支持诸如“随处可用”的桌面等新功能。然而,广泛采用的障碍包括虚拟I/O的缓慢性能、CPU调度干扰问题和共享缓存争用。在本文中,我们提出了一种新的软实时调度算法,该算法采用灵活的优先级指定(通过实用程序函数)和自动调度程序类检测(通过管理程序监控用户行为)来提供更高质量的用户体验。我们已经在Xen虚拟化平台中实现了我们的调度器,并演示了在现有的调度器中,共定位大量虚拟机所产生的开销可以从66%降低到我们系统中的2%以下。我们评估了在VDI设置中使用较小的调度时间量的好处和开销,并表明每个调度程序调用的平均开销时间与现有的SEDF和Credit调度程序的顺序相同。
{"title":"Adaptive dynamic priority scheduling for virtual desktop infrastructures","authors":"Jinho Hwang, Timothy Wood","doi":"10.1109/IWQoS.2012.6245988","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245988","url":null,"abstract":"Virtual Desktop Infrastructures (VDIs) are gaining popularity in cloud computing by allowing companies to deploy their office environments in a virtualized setting instead of relying on physical desktop machines. Consolidating many users into a VDI environment can significantly lower IT management expenses and enables new features such as “available-anywhere” desktops. However, barriers to broad adoption include the slow performance of virtualized I/O, CPU scheduling interference problems, and shared-cache contention. In this paper, we propose a new soft real-time scheduling algorithm that employs flexible priority designations (via utility functions) and automated scheduler class detection (via hypervisor monitoring of user behavior) to provide a higher quality user experience. We have implemented our scheduler within the Xen virtualization platform, and demonstrate that the overheads incurred from co-locating large numbers of virtual machines can be reduced from 66% with existing schedulers to under 2% in our system. We evaluate the benefits and overheads of using a smaller scheduling time quantum in a VDI setting, and show that the average overhead time per scheduler call is on the same order as the existing SEDF and Credit schedulers.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"39 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123522959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Network Calculus and mixed-integer LP applied to a switched aircraft cabin network 网络演算和混合整数LP在交换飞机机舱网络中的应用
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245986
Emanuel Heidinger, Nils Kammenhuber, A. Klein, G. Carle
This work addresses the applicability of a switched queuing network as the sole communication network in an aircraft cabin, and proposes an algorithm based on a mixed-integer program to determine hard bounds for the end-to-end delay. These hard bounds guarantee mandatory performance bounds for safety-relevant functions in the aircraft cabin, such as audio announcements or smoke detection. Techniques from the field of deterministic Network Calculus are used to benchmark the results from our novel approach. The results show that our solution allows improved mapping of non-preemptive queuing networks, compared to relevant state-of-the-art approaches.
本文讨论了交换排队网络作为飞机客舱唯一通信网络的适用性,并提出了一种基于混合整数程序的算法来确定端到端延迟的硬边界。这些硬边界保证了飞机机舱内与安全相关功能的强制性性能边界,例如音频广播或烟雾探测。来自确定性网络演算领域的技术被用来对我们的新方法的结果进行基准测试。结果表明,与相关的最先进的方法相比,我们的解决方案允许改进非抢占排队网络的映射。
{"title":"Network Calculus and mixed-integer LP applied to a switched aircraft cabin network","authors":"Emanuel Heidinger, Nils Kammenhuber, A. Klein, G. Carle","doi":"10.1109/IWQoS.2012.6245986","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245986","url":null,"abstract":"This work addresses the applicability of a switched queuing network as the sole communication network in an aircraft cabin, and proposes an algorithm based on a mixed-integer program to determine hard bounds for the end-to-end delay. These hard bounds guarantee mandatory performance bounds for safety-relevant functions in the aircraft cabin, such as audio announcements or smoke detection. Techniques from the field of deterministic Network Calculus are used to benchmark the results from our novel approach. The results show that our solution allows improved mapping of non-preemptive queuing networks, compared to relevant state-of-the-art approaches.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Next hop of strict partial order for NSFIB construction & aggregation NSFIB构建和聚合的严格偏序下一跳
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245992
Qing Li, Mingwei Xu, Meng Chen
The Internet is facing severe routing scalability problem. The Internet Service Providers cannot afford to upgrade their routers at the pace of routing table growth. Therefore, FIB aggregation has been proposed. However, current single-nexthop FIB aggregation solutions cannot provide a satisfactory performance. In this paper, we first propose the next hop of strict partial order (SPO next hop) to construct the Nexthop-Selectable FIB (NSFIB). The approach guarantees that NSFIB-based aggregation performs better than single-nexthop FIB aggregation, especially in larger and denser backbone networks. We then provide the NSFIB-based aggregation algorithms. According to our simulation, our algorithms can shrink the FIB to 5% and the aggregation performance does not degrade when the network density increases, both of which are a great improvement overhead single-nexthop FIB aggregation.
Internet正面临着严重的路由可伸缩性问题。随着路由表的增长,互联网服务提供商无法承担升级路由器的费用。因此,提出了FIB聚合。然而,目前的单下一跳FIB聚合方案不能提供令人满意的性能。本文首先提出严格偏序下一跳(SPO下一跳)来构造下一跳可选择FIB (NSFIB)。这种方法保证了基于nsfib的聚合优于单下一跳FIB聚合,特别是在更大、更密集的骨干网中。然后,我们提供了基于nsfib的聚合算法。根据我们的模拟,我们的算法可以将FIB压缩到5%,并且当网络密度增加时聚合性能不会下降,这两者都是单下一跳FIB聚合的很大改进。
{"title":"Next hop of strict partial order for NSFIB construction & aggregation","authors":"Qing Li, Mingwei Xu, Meng Chen","doi":"10.1109/IWQoS.2012.6245992","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245992","url":null,"abstract":"The Internet is facing severe routing scalability problem. The Internet Service Providers cannot afford to upgrade their routers at the pace of routing table growth. Therefore, FIB aggregation has been proposed. However, current single-nexthop FIB aggregation solutions cannot provide a satisfactory performance. In this paper, we first propose the next hop of strict partial order (SPO next hop) to construct the Nexthop-Selectable FIB (NSFIB). The approach guarantees that NSFIB-based aggregation performs better than single-nexthop FIB aggregation, especially in larger and denser backbone networks. We then provide the NSFIB-based aggregation algorithms. According to our simulation, our algorithms can shrink the FIB to 5% and the aggregation performance does not degrade when the network density increases, both of which are a great improvement overhead single-nexthop FIB aggregation.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the impact of Denial of Service attacks on Virtual Machines 了解拒绝服务攻击对虚拟机的影响
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245975
R. Shea, Jiangchuan Liu
Virtualization, which allows multiple Virtual Machines (VMs) to reside on a single physical machine, has become an indispensable technology for today's IT infrastructure. It is known that the overhead for virtualization affects system performance; yet it remains largely unknown whether VMs are more vulnerable to networked Denial of Service (DoS) attacks than conventional physical machines. A clear understanding here is obviously critical to such networked virtualization system as cloud computing platforms. In this paper, we present an initial study on the performance of modern virtualization solutions under DoS attacks. We experiment with the full spectrum of modern virtualization techniques, from paravirtualization, hardware virtualization, to container virtualization, with a comprehensive set of benchmarks. Our results reveal severe vulnerability of modern virtualization: even with relatively light attacks, the file system and memory access performance of VMs degrades at a much higher rate than their non-virtualized counterparts, and this is particularly true for hypervisor-based solutions. We further examine the root causes, with the goal of enhancing the robustness and security of these virtualization systems. Inspired by the findings, we implement a practical modification to the VirtIO drivers in the Linux KVM package, which effectively mitigates the overhead of a DoS attack by up to 40%.
虚拟化允许多个虚拟机(vm)驻留在单个物理机上,它已成为当今IT基础设施不可或缺的技术。众所周知,虚拟化的开销会影响系统性能;然而,虚拟机是否比传统的物理机器更容易受到网络拒绝服务(DoS)攻击,这在很大程度上仍然是未知的。对于云计算平台这样的网络虚拟化系统来说,清楚地理解这一点显然是至关重要的。在本文中,我们对现代虚拟化解决方案在DoS攻击下的性能进行了初步研究。我们用一组全面的基准测试测试了各种现代虚拟化技术,从半虚拟化、硬件虚拟化到容器虚拟化。我们的研究结果揭示了现代虚拟化的严重漏洞:即使受到相对较轻的攻击,虚拟机的文件系统和内存访问性能也会以比非虚拟化的对手高得多的速度下降,对于基于管理程序的解决方案尤其如此。我们将进一步研究其根本原因,目标是增强这些虚拟化系统的健壮性和安全性。受这些发现的启发,我们对Linux KVM包中的VirtIO驱动程序进行了实际修改,从而有效地将DoS攻击的开销降低了40%。
{"title":"Understanding the impact of Denial of Service attacks on Virtual Machines","authors":"R. Shea, Jiangchuan Liu","doi":"10.1109/IWQoS.2012.6245975","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245975","url":null,"abstract":"Virtualization, which allows multiple Virtual Machines (VMs) to reside on a single physical machine, has become an indispensable technology for today's IT infrastructure. It is known that the overhead for virtualization affects system performance; yet it remains largely unknown whether VMs are more vulnerable to networked Denial of Service (DoS) attacks than conventional physical machines. A clear understanding here is obviously critical to such networked virtualization system as cloud computing platforms. In this paper, we present an initial study on the performance of modern virtualization solutions under DoS attacks. We experiment with the full spectrum of modern virtualization techniques, from paravirtualization, hardware virtualization, to container virtualization, with a comprehensive set of benchmarks. Our results reveal severe vulnerability of modern virtualization: even with relatively light attacks, the file system and memory access performance of VMs degrades at a much higher rate than their non-virtualized counterparts, and this is particularly true for hypervisor-based solutions. We further examine the root causes, with the goal of enhancing the robustness and security of these virtualization systems. Inspired by the findings, we implement a practical modification to the VirtIO drivers in the Linux KVM package, which effectively mitigates the overhead of a DoS attack by up to 40%.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121978160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Improving the throughput and delay performance of network processors by applying push model 应用推送模型提高网络处理器的吞吐量和延迟性能
Pub Date : 2012-06-04 DOI: 10.1109/IWQoS.2012.6245973
B. Liu, Bo Yuan, Huichen Dai, Hongbo Zhao, Jia Yu, L. Bhuyan
Traditional network processors (NPs) adopt pull model, where NP cores pull packet data from external memory to local memory, triggered by cache miss or fetch instructions. Due to the long latency of data fetching, hardware multithreading is typically used to reduce the waiting time. Multithreading incurs context switch overhead, leading to inefficiency in payload processing applications. We propose a push model for future NP's architectural design to increase throughput and decrease processing delay. A hardware push unit helps to move the segments of a packet to a core's local memory to reduce hardware thread switching. Theoretical analyses are given to compare the pull and push model's performance. Further, we selected our FPGA based THNPU NP platform for verification. Experimental results indicate that the push model not only improves the system throughput, but also reduces the delay, with only a fraction of logic gate increase.
传统的网络处理器(network processor, NPs)采用pull模型,NP核通过cache miss或fetch指令触发,将数据包数据从外部存储器拉到本地存储器。由于数据获取的延迟很长,通常使用硬件多线程来减少等待时间。多线程会导致上下文切换开销,导致有效负载处理应用程序效率低下。我们为未来的NP架构设计提出了一个推模型,以提高吞吐量和减少处理延迟。硬件推送单元有助于将数据包的段移动到核心的本地内存中,以减少硬件线程切换。对推拉模型的性能进行了理论分析比较。此外,我们选择了基于FPGA的THNPU NP平台进行验证。实验结果表明,该推模型不仅提高了系统吞吐量,而且降低了延迟,仅增加了一小部分逻辑门。
{"title":"Improving the throughput and delay performance of network processors by applying push model","authors":"B. Liu, Bo Yuan, Huichen Dai, Hongbo Zhao, Jia Yu, L. Bhuyan","doi":"10.1109/IWQoS.2012.6245973","DOIUrl":"https://doi.org/10.1109/IWQoS.2012.6245973","url":null,"abstract":"Traditional network processors (NPs) adopt pull model, where NP cores pull packet data from external memory to local memory, triggered by cache miss or fetch instructions. Due to the long latency of data fetching, hardware multithreading is typically used to reduce the waiting time. Multithreading incurs context switch overhead, leading to inefficiency in payload processing applications. We propose a push model for future NP's architectural design to increase throughput and decrease processing delay. A hardware push unit helps to move the segments of a packet to a core's local memory to reduce hardware thread switching. Theoretical analyses are given to compare the pull and push model's performance. Further, we selected our FPGA based THNPU NP platform for verification. Experimental results indicate that the push model not only improves the system throughput, but also reduces the delay, with only a fraction of logic gate increase.","PeriodicalId":178333,"journal":{"name":"2012 IEEE 20th International Workshop on Quality of Service","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 IEEE 20th International Workshop on Quality of Service
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1