首页 > 最新文献

11th IEEE International Conference on Network Protocols, 2003. Proceedings.最新文献

英文 中文
Non-uniform information dissemination for sensor networks 传感器网络的非均匀信息传播
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249779
S. Tilak, A. Murphy, W. Heinzelman, N. Abu-Ghazaleh
Future smart environments are characterized by multiple nodes that sense, collect, and disseminate information about environmental phenomena through a wireless network. In this paper, we define a set of applications that require a new form of distributed knowledge about the environment, referred to as non-uniform information granularity. By non-uniform information granularity we mean that the required accuracy or precision of information is proportional to the distance between a source node (information producer) and current sink node (information consumer). That is, as the distance between the source node and sink node increases, loss in information precision is acceptable. Applications that can benefit from this type of knowledge range from battlefield scenarios to rescue operations. The main objectives of this paper are two-fold: first, we precisely define non-uniform information granularity, and second we describe the different protocols that achieve non-uniform information dissemination and analyze these protocols based on complexity, energy consumption, and accuracy of information.
未来智能环境的特点是多个节点通过无线网络感知、收集和传播有关环境现象的信息。在本文中,我们定义了一组应用程序,这些应用程序需要一种关于环境的分布式知识的新形式,称为非统一信息粒度。通过非统一的信息粒度,我们的意思是信息所需的准确性或精度与源节点(信息生产者)和当前汇聚节点(信息消费者)之间的距离成正比。即随着源节点和汇聚节点之间距离的增加,信息精度的损失是可以接受的。从战场场景到救援行动,都可以从这种类型的知识中受益。本文的主要目标有两个:一是精确定义非统一信息粒度;二是描述实现非统一信息传播的不同协议,并从信息的复杂性、能耗和准确性三个方面对这些协议进行分析。
{"title":"Non-uniform information dissemination for sensor networks","authors":"S. Tilak, A. Murphy, W. Heinzelman, N. Abu-Ghazaleh","doi":"10.1109/ICNP.2003.1249779","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249779","url":null,"abstract":"Future smart environments are characterized by multiple nodes that sense, collect, and disseminate information about environmental phenomena through a wireless network. In this paper, we define a set of applications that require a new form of distributed knowledge about the environment, referred to as non-uniform information granularity. By non-uniform information granularity we mean that the required accuracy or precision of information is proportional to the distance between a source node (information producer) and current sink node (information consumer). That is, as the distance between the source node and sink node increases, loss in information precision is acceptable. Applications that can benefit from this type of knowledge range from battlefield scenarios to rescue operations. The main objectives of this paper are two-fold: first, we precisely define non-uniform information granularity, and second we describe the different protocols that achieve non-uniform information dissemination and analyze these protocols based on complexity, energy consumption, and accuracy of information.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
On the cost-quality tradeoff in topology-aware overlay path probing 拓扑感知覆盖路径探测的成本-质量权衡
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249777
Chiping Tang, P. McKinley
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n/sup 2/), which is prohibitive in large-scale overlay networks. Several methods have been proposed to reduce probing overhead, although at a cost in terms of probing completeness. In this paper, an orthogonal solution is proposed that trades probing overhead for estimation accuracy in sparse networks such as the Internet. The proposed solution uses network-level path composition information (for example, as provided by a topology server) to infer path quality without full-scale probing. The inference metrics include latency, loss rate and available bandwidth. This approach is used to design several probing algorithms, which are evaluated through analysis and simulation. The results show that the proposed method can significantly reduce probing overhead while providing hounded quality estimations for all n /spl times/ (n - 1) overlay paths. The solution is well suited to medium-scale overlay networks in the Internet. In other environments, it can be combined with extant probing algorithms to further improve performance.
路径探测对于维持有效的覆盖网络拓扑结构至关重要。然而,全尺寸探测的成本高达O(n/sup 2/),这在大规模覆盖网络中是令人望而却步的。已经提出了几种方法来减少探测开销,尽管这是以探测完整性为代价的。本文提出了一种在稀疏网络(如Internet)中以探测开销换取估计精度的正交解。提出的解决方案使用网络级路径组成信息(例如,由拓扑服务器提供的信息)来推断路径质量,而无需进行全面探测。推理指标包括延迟、损失率和可用带宽。利用该方法设计了几种探测算法,并通过分析和仿真对算法进行了评价。结果表明,该方法可以显著降低探测开销,同时为所有n /spl次/ (n - 1)覆盖路径提供跟踪质量估计。该解决方案非常适合于Internet中中等规模的覆盖网络。在其他环境中,它可以与现有的探测算法相结合,以进一步提高性能。
{"title":"On the cost-quality tradeoff in topology-aware overlay path probing","authors":"Chiping Tang, P. McKinley","doi":"10.1109/ICNP.2003.1249777","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249777","url":null,"abstract":"Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n/sup 2/), which is prohibitive in large-scale overlay networks. Several methods have been proposed to reduce probing overhead, although at a cost in terms of probing completeness. In this paper, an orthogonal solution is proposed that trades probing overhead for estimation accuracy in sparse networks such as the Internet. The proposed solution uses network-level path composition information (for example, as provided by a topology server) to infer path quality without full-scale probing. The inference metrics include latency, loss rate and available bandwidth. This approach is used to design several probing algorithms, which are evaluated through analysis and simulation. The results show that the proposed method can significantly reduce probing overhead while providing hounded quality estimations for all n /spl times/ (n - 1) overlay paths. The solution is well suited to medium-scale overlay networks in the Internet. In other environments, it can be combined with extant probing algorithms to further improve performance.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Resilient peer-to-peer streaming 弹性点对点流
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249753
V. Padmanabhan, Helen J. Wang, P. Chou
We consider the problem of distributing "live" streaming media content to a potentially large and highly dynamic population of hosts. Peer-to-peer content distribution is attractive in this setting because the bandwidth available to serve content scales with demand. A key challenge, however, is making content distribution robust to peer transience. Our approach to providing robustness is to introduce redundance; both in network paths and in data. We use multiple, diverse distribution trees to provide redundancy in network paths and multiple description coding (MDC) to provide redundancy in data. We present a simple tree management algorithm that provides the necessary path diversity and describe an adaptation framework for MDC based on scalable receiver feedback. We evaluate these using MDC applied to real video data coupled with real usage traces from a major news site that experienced a large flash crowd for live streaming content. Our results show very significant benefits in using multiple distribution trees and MDC, with a 22 dB improvement in PSNR in some cases.
我们考虑将“直播”流媒体内容分发给潜在的庞大且高度动态的主机人口的问题。在这种情况下,点对点内容分发很有吸引力,因为可用于服务内容的带宽随需求而变化。然而,一个关键的挑战是如何使内容分发对对等的暂态具有鲁棒性。我们提供健壮性的方法是引入冗余;包括网络路径和数据。我们使用多个不同的分布树来提供网络路径的冗余,使用多个描述编码(MDC)来提供数据的冗余。我们提出了一个简单的树管理算法,该算法提供了必要的路径多样性,并描述了一个基于可扩展接收器反馈的MDC自适应框架。我们将MDC应用于真实视频数据,并结合来自一个主要新闻网站的真实使用痕迹来评估这些问题,该网站经历了大量的直播流媒体内容。我们的结果显示,使用多个分布树和MDC有非常显著的好处,在某些情况下,PSNR提高了22 dB。
{"title":"Resilient peer-to-peer streaming","authors":"V. Padmanabhan, Helen J. Wang, P. Chou","doi":"10.1109/ICNP.2003.1249753","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249753","url":null,"abstract":"We consider the problem of distributing \"live\" streaming media content to a potentially large and highly dynamic population of hosts. Peer-to-peer content distribution is attractive in this setting because the bandwidth available to serve content scales with demand. A key challenge, however, is making content distribution robust to peer transience. Our approach to providing robustness is to introduce redundance; both in network paths and in data. We use multiple, diverse distribution trees to provide redundancy in network paths and multiple description coding (MDC) to provide redundancy in data. We present a simple tree management algorithm that provides the necessary path diversity and describe an adaptation framework for MDC based on scalable receiver feedback. We evaluate these using MDC applied to real video data coupled with real usage traces from a major news site that experienced a large flash crowd for live streaming content. Our results show very significant benefits in using multiple distribution trees and MDC, with a 22 dB improvement in PSNR in some cases.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 508
Mobile distributed information retrieval for highly-partitioned networks 面向高分区网络的移动分布式信息检索
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249755
K. M. Hanna, B. Levine, R. Manmatha
We propose and evaluate a mobile, peer-to-peer information retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large collections of medical literature. In our system, documents in a collection are replicated in an overlapping manner at mobile peers. This provides resilience in the face of node failures, malicious attacks, and network partitions. We show that our design manages the randomness of node mobility. Although nodes contact only direct neighbors (who change frequently) and do not use any ad hoc routing, the system maintains good IR performance. This makes our design applicable to mobility situations where routing partitions are common. Our evaluation shows that our scheme provides significant savings in network costs, and increased access to information over ad-hoc routing-based approaches; nodes in our system require only a modest amount of additional storage on average.
我们提出并评估了一个移动的、点对点的信息检索系统。例如,这样一个系统可以通过允许访问大量医学文献来支持灾难中的医疗保健。在我们的系统中,集合中的文档在移动对等点以重叠的方式复制。这提供了面对节点故障、恶意攻击和网络分区时的弹性。我们表明,我们的设计管理节点移动的随机性。虽然节点只与直接邻居(频繁变化)联系,不使用任何自组织路由,但系统保持了良好的IR性能。这使得我们的设计适用于路由分区常见的移动性情况。我们的评估表明,我们的方案大大节省了网络成本,并且比基于ad-hoc路由的方法增加了对信息的访问;我们系统中的节点平均只需要少量的额外存储空间。
{"title":"Mobile distributed information retrieval for highly-partitioned networks","authors":"K. M. Hanna, B. Levine, R. Manmatha","doi":"10.1109/ICNP.2003.1249755","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249755","url":null,"abstract":"We propose and evaluate a mobile, peer-to-peer information retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large collections of medical literature. In our system, documents in a collection are replicated in an overlapping manner at mobile peers. This provides resilience in the face of node failures, malicious attacks, and network partitions. We show that our design manages the randomness of node mobility. Although nodes contact only direct neighbors (who change frequently) and do not use any ad hoc routing, the system maintains good IR performance. This makes our design applicable to mobility situations where routing partitions are common. Our evaluation shows that our scheme provides significant savings in network costs, and increased access to information over ad-hoc routing-based approaches; nodes in our system require only a modest amount of additional storage on average.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133169399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A file-centric model for peer-to-peer file sharing systems 点对点文件共享系统的以文件为中心的模型
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249754
L. Zou, M. Ammar
Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative to a specific file and develop a simple theoretical file-centric model for the subsystem. We begin with a detailed model that tracks the complete system state. To deal with the large system state space, we investigate a decomposed model, which not only greatly reduces the complexity of solving the system, hut also provides a flexible framework for modeling multiple classes of peers and new system features. Using the model, we can study performance measures of a system, such as throughput, success probability of a file search, and number of file replicas in the system. Our model can also be used to understand the impact of user behavior and new system features. As examples, we investigate the effect of freeloaders, holding-enabled downloading and decoys in the paper.
点对点系统已经迅速成为一种流行的文件共享和分发方式。在本文中,我们重点研究了由对等体组成的子系统及其对特定文件的操作,并为该子系统建立了一个简单的以文件为中心的理论模型。我们从跟踪整个系统状态的详细模型开始。为了处理大的系统状态空间,我们研究了一种分解模型,不仅大大降低了求解系统的复杂性,而且为多类对等体和新系统特征的建模提供了一个灵活的框架。使用该模型,我们可以研究系统的性能度量,例如吞吐量、文件搜索的成功概率和系统中的文件副本数量。我们的模型也可以用来理解用户行为和新系统特性的影响。作为例子,我们研究了免费下载、持有下载和诱饵的影响。
{"title":"A file-centric model for peer-to-peer file sharing systems","authors":"L. Zou, M. Ammar","doi":"10.1109/ICNP.2003.1249754","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249754","url":null,"abstract":"Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative to a specific file and develop a simple theoretical file-centric model for the subsystem. We begin with a detailed model that tracks the complete system state. To deal with the large system state space, we investigate a decomposed model, which not only greatly reduces the complexity of solving the system, hut also provides a flexible framework for modeling multiple classes of peers and new system features. Using the model, we can study performance measures of a system, such as throughput, success probability of a file search, and number of file replicas in the system. Our model can also be used to understand the impact of user behavior and new system features. As examples, we investigate the effect of freeloaders, holding-enabled downloading and decoys in the paper.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Network time synchronization using clock offset optimization 使用时钟偏移优化的网络时间同步
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249772
Omer Gurewitz, I. Cidon, M. Sidi
Time synchronization is critical in distributed environments. A variety of network protocols, middleware and business applications rely on proper time synchronization across the computational infrastructure and depend on the clock accuracy. The ''network time protocol" (NTP) is the current widely accepted standard for synchronizing clocks over the Internet. NTP uses a hierarchical scheme in order to synchronize the clocks in the network. In this paper we present a novel non-hierarchical peer-to-peer approach for tune synchronization termed CTP - classless time protocol. This approach exploits convex optimization theory in order to evaluate the impact of each clock offset on the overall objective function. We define the clock offset problem as an optimization problem and derive its optimal solution. Based on the solution we develop a distributed protocol that can be implemented over a communication network and prove its convergence to the optimal clock offsets. For compatibility, the CTP may use the exact format and number of messages used by NTP. We also present methodology and numerical results for evaluating and comparing the accuracy of time synchronization schemes. We show that the CTP substantially outperforms hierarchical schemes such as NTP in the sense of clock accuracy with respect to a universal clock, without increasing complexity.
时间同步在分布式环境中是至关重要的。各种网络协议、中间件和业务应用程序依赖于跨计算基础设施的适当时间同步,并依赖于时钟精度。“网络时间协议”(NTP)是目前被广泛接受的通过Internet同步时钟的标准。NTP使用分层方案来同步网络中的时钟。本文提出了一种新的非分层点对点调谐同步方法,称为CTP -无类时间协议。该方法利用凸优化理论来评估每个时钟偏移对总体目标函数的影响。我们将时钟偏移问题定义为一个优化问题,并推导出其最优解。在此基础上,我们开发了一种可以在通信网络上实现的分布式协议,并证明了其收敛到最优时钟偏移。为了兼容性,CTP可以使用NTP使用的确切格式和消息数量。我们还提出了评估和比较时间同步方案精度的方法和数值结果。我们表明,CTP在相对于通用时钟的时钟精度方面大大优于NTP等分层方案,而不会增加复杂性。
{"title":"Network time synchronization using clock offset optimization","authors":"Omer Gurewitz, I. Cidon, M. Sidi","doi":"10.1109/ICNP.2003.1249772","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249772","url":null,"abstract":"Time synchronization is critical in distributed environments. A variety of network protocols, middleware and business applications rely on proper time synchronization across the computational infrastructure and depend on the clock accuracy. The ''network time protocol\" (NTP) is the current widely accepted standard for synchronizing clocks over the Internet. NTP uses a hierarchical scheme in order to synchronize the clocks in the network. In this paper we present a novel non-hierarchical peer-to-peer approach for tune synchronization termed CTP - classless time protocol. This approach exploits convex optimization theory in order to evaluate the impact of each clock offset on the overall objective function. We define the clock offset problem as an optimization problem and derive its optimal solution. Based on the solution we develop a distributed protocol that can be implemented over a communication network and prove its convergence to the optimal clock offsets. For compatibility, the CTP may use the exact format and number of messages used by NTP. We also present methodology and numerical results for evaluating and comparing the accuracy of time synchronization schemes. We show that the CTP substantially outperforms hierarchical schemes such as NTP in the sense of clock accuracy with respect to a universal clock, without increasing complexity.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130155525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
RR-TCP: a reordering-robust TCP with DSACK RR-TCP:一种支持DSACK的重排序鲁棒TCP
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249760
Ming Zhang, B. Karp, S. Floyd, L. Peterson
TCP performs poorly on paths that reorder packets significantly, where it misinterprets out-of-order delivery as packet loss. The sender responds with a fast retransmit though no actual loss has occurred. These repeated false fast retransmits keep the sender's window small, and severely degrade the throughput it attains. Requiring nearly in-order delivery needlessly restricts and complicates Internet routing systems and routers. Such beneficial systems as multi-path routing and parallel packet switches are difficult to deploy in a way that preserves ordering. Toward a more reordering-tolerant Internet architecture, we present enhancements to TCP that improve the protocol's robustness to reordered and delayed packets. We extend the sender to detect and recover from false fast retransmits using DSACK information, and to avoid false fast retransmits proactively, by adaptively varying dupthresh. Our algorithm is the first that adaptively balances increasing dupthresh, to avoid false fast retransmits, and limiting the growth of dupthresh, to avoid unnecessary timeouts. Finally, we demonstrate that TCP's RTO estimator tolerates delayed packets poorly, and present enhancements to it that ensure it is sufficiently conservative, without using timestamps or additional TCP header hits. Our simulations show that these enhancements significantly improve TCP's performance over paths that reorder or delay packets.
TCP在对数据包进行重排序的路径上表现不佳,因为它会将无序传递错误地解释为数据包丢失。发送方响应一个快速重传,尽管没有发生实际的丢失。这些重复的虚假快速重传使发送方的窗口很小,并严重降低了它所达到的吞吐量。要求几乎按顺序交付不必要地限制和复杂化了互联网路由系统和路由器。像多路径路由和并行分组交换机这样有益的系统很难以保持有序的方式部署。为了实现更能容忍重排序的互联网架构,我们提出了对TCP的增强,以提高协议对重排序和延迟数据包的鲁棒性。我们扩展了发送方使用DSACK信息检测和恢复虚假快速重传的能力,并通过自适应改变重发值来主动避免虚假快速重传。我们的算法是第一个自适应平衡增加重刷刷,以避免虚假的快速重传,并限制重刷刷的增长,以避免不必要的超时。最后,我们证明了TCP的RTO估计器对延迟数据包的容忍度很差,并对其进行了增强,以确保它足够保守,而不使用时间戳或额外的TCP头点击。我们的模拟表明,这些增强在重新排序或延迟数据包的路径上显着提高了TCP的性能。
{"title":"RR-TCP: a reordering-robust TCP with DSACK","authors":"Ming Zhang, B. Karp, S. Floyd, L. Peterson","doi":"10.1109/ICNP.2003.1249760","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249760","url":null,"abstract":"TCP performs poorly on paths that reorder packets significantly, where it misinterprets out-of-order delivery as packet loss. The sender responds with a fast retransmit though no actual loss has occurred. These repeated false fast retransmits keep the sender's window small, and severely degrade the throughput it attains. Requiring nearly in-order delivery needlessly restricts and complicates Internet routing systems and routers. Such beneficial systems as multi-path routing and parallel packet switches are difficult to deploy in a way that preserves ordering. Toward a more reordering-tolerant Internet architecture, we present enhancements to TCP that improve the protocol's robustness to reordered and delayed packets. We extend the sender to detect and recover from false fast retransmits using DSACK information, and to avoid false fast retransmits proactively, by adaptively varying dupthresh. Our algorithm is the first that adaptively balances increasing dupthresh, to avoid false fast retransmits, and limiting the growth of dupthresh, to avoid unnecessary timeouts. Finally, we demonstrate that TCP's RTO estimator tolerates delayed packets poorly, and present enhancements to it that ensure it is sufficiently conservative, without using timestamps or additional TCP header hits. Our simulations show that these enhancements significantly improve TCP's performance over paths that reorder or delay packets.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134004924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 235
The impact of false sharing on shared congestion management 虚假共享对共享拥塞管理的影响
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249759
Aditya Akella, S. Seshan, H. Balakrishnan
Several recent proposals for sharing congestion information across concurrent flows between end-systems overlook an important problem: two or more flows sharing congestion state may in fact not share the same bottleneck. In this paper, we categorize the origins of this false sharing into two distinct cases: (i) networks with QoS enhancements such as differentiated services, where a flow classifier segregates flows into different queues, and (ii) networks with path diversity where different flows to the same destination address are routed differently. We evaluate the impact of false sharing on flow performance and investigate how false sharing can be detected by a sender. We discuss how a sender must respond upon detecting false sharing. Our results show that persistent overload can be avoided with window-based congestion control even for extreme false sharing, but higher bandwidth flows run at a slower rate. We find that delay and reordering statistics can be used to develop robust detectors of false sharing and are superior to those based on loss patterns. We also find that it is markedly easier to detect and react to false sharing than it is to start by isolating flows and merge their congestion state afterward.
最近关于在终端系统之间的并发流之间共享拥塞信息的几个建议忽略了一个重要的问题:两个或多个共享拥塞状态的流实际上可能不共享相同的瓶颈。在本文中,我们将这种虚假共享的起源分为两种不同的情况:(i)具有QoS增强的网络,如差异化服务,其中流分类器将流隔离到不同的队列中,以及(ii)具有路径多样性的网络,其中通往相同目的地地址的不同流以不同的方式路由。我们评估了虚假共享对流量性能的影响,并研究了发送方如何检测虚假共享。我们讨论了发送方在检测到虚假共享时必须如何响应。我们的结果表明,即使在极端错误共享的情况下,基于窗口的拥塞控制也可以避免持续过载,但更高带宽的流运行速度较慢。我们发现延迟和重排序统计可以用于开发鲁棒的虚假共享检测器,并且优于基于损失模式的检测器。我们还发现,与隔离流并随后合并它们的拥塞状态相比,检测和响应虚假共享明显更容易。
{"title":"The impact of false sharing on shared congestion management","authors":"Aditya Akella, S. Seshan, H. Balakrishnan","doi":"10.1109/ICNP.2003.1249759","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249759","url":null,"abstract":"Several recent proposals for sharing congestion information across concurrent flows between end-systems overlook an important problem: two or more flows sharing congestion state may in fact not share the same bottleneck. In this paper, we categorize the origins of this false sharing into two distinct cases: (i) networks with QoS enhancements such as differentiated services, where a flow classifier segregates flows into different queues, and (ii) networks with path diversity where different flows to the same destination address are routed differently. We evaluate the impact of false sharing on flow performance and investigate how false sharing can be detected by a sender. We discuss how a sender must respond upon detecting false sharing. Our results show that persistent overload can be avoided with window-based congestion control even for extreme false sharing, but higher bandwidth flows run at a slower rate. We find that delay and reordering statistics can be used to develop robust detectors of false sharing and are superior to those based on loss patterns. We also find that it is markedly easier to detect and react to false sharing than it is to start by isolating flows and merge their congestion state afterward.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130466577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
The temporal and topological characteristics of BGP path changes BGP路径的时间和拓扑特征发生变化
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249770
Di-Fa Chang, R. Govindan, J. Heidemann
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates seen in BGP operation are collected by RIPE RlS and University of Oregon RouteViews, previous work examines this data set as individual routing updates. This paper describes methods that group routing updates into events. Since one event (a policy change or peering failure) results in many update messages, we cluster updates both temporally and topologically (based on the path vector information). We propose a new approach to analyzing the update traces, classifying the topological impact of muting events, and approximating the distance to the autonomous system originating the event. Our analysis provides some insight into routing behavior: First, at least 45% path changes are caused by events on transit peerings. Second, a significant number (23-37%) of path changes are transient, in that routing updates indicate temporary path changes, but they ultimately converge on a path that is identical from the previously stable path. These observations suggest that a content provider cannot guarantee end-to-end routing stability based solely on its relationship with its immediate ISP, and that better detection of transient changes may improve routing stability.
BGP已经在互联网上部署了十多年。但是,引起BGP拓扑变化的事件还不是很清楚。尽管RIPE RlS和University of Oregon RouteViews收集了BGP操作中看到的大量路由更新痕迹,但之前的工作将这些数据集作为单独的路由更新进行检查。本文描述了将路由更新分组到事件中的方法。由于一个事件(策略更改或对等失败)会导致许多更新消息,因此我们在时间上和拓扑上(基于路径向量信息)对更新进行聚类。我们提出了一种新的方法来分析更新轨迹,对静音事件的拓扑影响进行分类,并逼近到发起事件的自治系统的距离。我们的分析提供了一些关于路由行为的见解:首先,至少45%的路径变化是由过境节点上的事件引起的。其次,大量(23-37%)的路径变化是短暂的,因为路由更新表明临时路径变化,但它们最终收敛到与先前稳定路径相同的路径上。这些观察结果表明,内容提供者不能仅仅基于与其直接ISP的关系来保证端到端路由的稳定性,更好地检测瞬态变化可能会提高路由的稳定性。
{"title":"The temporal and topological characteristics of BGP path changes","authors":"Di-Fa Chang, R. Govindan, J. Heidemann","doi":"10.1109/ICNP.2003.1249770","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249770","url":null,"abstract":"BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates seen in BGP operation are collected by RIPE RlS and University of Oregon RouteViews, previous work examines this data set as individual routing updates. This paper describes methods that group routing updates into events. Since one event (a policy change or peering failure) results in many update messages, we cluster updates both temporally and topologically (based on the path vector information). We propose a new approach to analyzing the update traces, classifying the topological impact of muting events, and approximating the distance to the autonomous system originating the event. Our analysis provides some insight into routing behavior: First, at least 45% path changes are caused by events on transit peerings. Second, a significant number (23-37%) of path changes are transient, in that routing updates indicate temporary path changes, but they ultimately converge on a path that is identical from the previously stable path. These observations suggest that a content provider cannot guarantee end-to-end routing stability based solely on its relationship with its immediate ISP, and that better detection of transient changes may improve routing stability.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Characterizing overlay multicast networks 覆盖组播网络的特征
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249757
S. Fahmy, Minseok Kwon
Overlay networks among cooperating hosts have recently emerged as a viable solution to several challenging problems, including multicasting, routing, content distribution, and peer-to-peer services. Application-level overlays, however, incur a performance penalty over router level solutions. This paper characterizes this performance penalty for overlay multicast trees via experimental data, simulations, and theoretical models. Experimental data and simulations illustrate that (i) the average delay and the number of hops between parent and child hosts in overlay trees generally decrease, and (ii) the degree of hosts generally decreases, as the level of the host in the overlay tree increases. Overlay multicast routing strategies, together with power-law and small-world Internet topology characteristics, are causes of the observed phenomena. We compare three overlay multicast protocols with respect to latency, bandwidth, router degrees, and host degrees. We also quantify the overlay tree cost. Results reveal that L(n)/U(n) /spl prop/ n/sub 0.9/ for small n, where L(n) is the total number of hops in all overlay links, U(n) is the average number of hops on the source to receiver unicast paths, and n is the number of members in the overlay multicast session.
协作主机之间的覆盖网络最近作为几个具有挑战性问题的可行解决方案出现,包括多播、路由、内容分发和点对点服务。但是,与路由器级解决方案相比,应用程序级覆盖会导致性能损失。本文通过实验数据、仿真和理论模型对覆盖组播树的性能损失进行了表征。实验数据和仿真表明:(1)随着覆盖树中主机级别的增加,覆盖树中父主机和子主机之间的平均延迟和跳数普遍减少,(2)主机程度普遍降低。叠加组播路由策略与幂律和小世界互联网拓扑特性是造成上述现象的原因。我们比较了三种覆盖组播协议在延迟、带宽、路由器度和主机度方面的差异。我们还量化了覆盖树的成本。结果表明,对于小n, L(n)/U(n) /spl prop/ n/sub 0.9/,其中L(n)为所有覆盖链路的总跳数,U(n)为源端到接收端单播路径的平均跳数,n为覆盖组播会话的成员数。
{"title":"Characterizing overlay multicast networks","authors":"S. Fahmy, Minseok Kwon","doi":"10.1109/ICNP.2003.1249757","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249757","url":null,"abstract":"Overlay networks among cooperating hosts have recently emerged as a viable solution to several challenging problems, including multicasting, routing, content distribution, and peer-to-peer services. Application-level overlays, however, incur a performance penalty over router level solutions. This paper characterizes this performance penalty for overlay multicast trees via experimental data, simulations, and theoretical models. Experimental data and simulations illustrate that (i) the average delay and the number of hops between parent and child hosts in overlay trees generally decrease, and (ii) the degree of hosts generally decreases, as the level of the host in the overlay tree increases. Overlay multicast routing strategies, together with power-law and small-world Internet topology characteristics, are causes of the observed phenomena. We compare three overlay multicast protocols with respect to latency, bandwidth, router degrees, and host degrees. We also quantify the overlay tree cost. Results reveal that L(n)/U(n) /spl prop/ n/sub 0.9/ for small n, where L(n) is the total number of hops in all overlay links, U(n) is the average number of hops on the source to receiver unicast paths, and n is the number of members in the overlay multicast session.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132558706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
11th IEEE International Conference on Network Protocols, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1