首页 > 最新文献

Fourth International Conference on Networking and Services (icns 2008)最新文献

英文 中文
An XML Firewall on Embedded Network Processor 嵌入式网络处理器上的XML防火墙
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.15
Wei Wang, Jun Li
XML-based services with flexible and intelligent structures for data expression and exchange are quickly gaining popularity. Enterprises are deploying XML-based services as a central component of the application integration. As the application data are crucial to the enterprises, the XML messages must be secured to ensure the reliability of these services. This paper presents the design of an embedded XML firewall with XML identification, XML validation, XML encryption and decryption, XML signature and signature verification, which is implemented on Intel IXP425, an embedded network processor for small and medium enterprise solutions. Suitable for enterprises to deploy XML security for their IT infrastructure, the XML firewall provides confidentiality, integrity and authenticity for XML-based services. Improvements are introduced and evaluated, including schema preprocessing and hardware acceleration for security processing. Ideas about future work of XML firewall based on this platform are also proposed.
具有灵活和智能的数据表达和交换结构的基于xml的服务正在迅速普及。企业正在将基于xml的服务部署为应用程序集成的中心组件。由于应用程序数据对企业至关重要,因此必须对XML消息进行保护,以确保这些服务的可靠性。本文设计了一种具有XML识别、XML验证、XML加解密、XML签名和签名验证功能的嵌入式XML防火墙,并在Intel IXP425嵌入式网络处理器上实现。XML防火墙适用于为其IT基础设施部署XML安全性的企业,它为基于XML的服务提供机密性、完整性和真实性。介绍并评估了改进,包括模式预处理和用于安全处理的硬件加速。最后对基于该平台的XML防火墙的未来工作提出了设想。
{"title":"An XML Firewall on Embedded Network Processor","authors":"Wei Wang, Jun Li","doi":"10.1109/ICNS.2008.15","DOIUrl":"https://doi.org/10.1109/ICNS.2008.15","url":null,"abstract":"XML-based services with flexible and intelligent structures for data expression and exchange are quickly gaining popularity. Enterprises are deploying XML-based services as a central component of the application integration. As the application data are crucial to the enterprises, the XML messages must be secured to ensure the reliability of these services. This paper presents the design of an embedded XML firewall with XML identification, XML validation, XML encryption and decryption, XML signature and signature verification, which is implemented on Intel IXP425, an embedded network processor for small and medium enterprise solutions. Suitable for enterprises to deploy XML security for their IT infrastructure, the XML firewall provides confidentiality, integrity and authenticity for XML-based services. Improvements are introduced and evaluated, including schema preprocessing and hardware acceleration for security processing. Ideas about future work of XML firewall based on this platform are also proposed.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115285761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effairness: Dealing with Time in Congestion Control Evaluation 公平性:拥塞控制评估中的时间处理
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.45
Sergey Gorinsky, H. Vin
Congestion control algorithms are traditionally evaluated in contrast to ideal capacity allocations that specify instantaneous efficient fair rates for application sessions but ignore time. While the latter is tenable for local networks and networks where all application sessions last long, instantaneous ideal allocations are inadequate standards for congestion control evaluation in dynamic wide-area networks. In this paper, we propose an alternative ideal of an effair allocation that explicitly accounts for unavoidable propagation delay. We develop an algorithm for computing the effair allocation and present a metric of effairness that quantifies how close the actual network services are to the effair allocation on the receiver, session, and network levels.
传统上,拥塞控制算法的评估与理想容量分配相比,理想容量分配为应用程序会话指定了瞬时有效的公平速率,但忽略了时间。虽然后者适用于局域网和所有应用程序会话持续时间较长的网络,但即时理想分配不足以满足动态广域网中拥塞控制评估的标准。在本文中,我们提出了另一种理想的事务分配,它明确地考虑了不可避免的传播延迟。我们开发了一种用于计算事务分配的算法,并给出了一个公平度量,该度量量化了实际网络服务与接收者、会话和网络级别上的事务分配的接近程度。
{"title":"Effairness: Dealing with Time in Congestion Control Evaluation","authors":"Sergey Gorinsky, H. Vin","doi":"10.1109/ICNS.2008.45","DOIUrl":"https://doi.org/10.1109/ICNS.2008.45","url":null,"abstract":"Congestion control algorithms are traditionally evaluated in contrast to ideal capacity allocations that specify instantaneous efficient fair rates for application sessions but ignore time. While the latter is tenable for local networks and networks where all application sessions last long, instantaneous ideal allocations are inadequate standards for congestion control evaluation in dynamic wide-area networks. In this paper, we propose an alternative ideal of an effair allocation that explicitly accounts for unavoidable propagation delay. We develop an algorithm for computing the effair allocation and present a metric of effairness that quantifies how close the actual network services are to the effair allocation on the receiver, session, and network levels.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recursive Evaluation of Fault Tolerance Mechanisms for SLA Management SLA管理容错机制的递归评估
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.22
K. Voß
Service level agreements (SLAs) have been introduced into the grid in order to build a basis for its commercial uptake. The challenge for Grid providers in agreeing and operating SLA-bound jobs is to ensure their fulfillment even in the case of failures. Hence, fault-tolerance mechanisms are an essential means of the provider's SLA management. The high utilization of commercial operated clusters leads to scenarios in which typically a job migration effects other jobs scheduled. The effects result from the unavailability of enough free resources which would be needed to catch all resource outages. Consequently before initiating a migration, its effects for other jobs have to be compared and the initiation of fault- tolerance (FT-) mechanisms have to be evaluated recursively. This paper presents a measurement for the benefit of initiating a FT-mechanism, the recursive evaluation, and termination condition. Performing such an impact evaluation of an initiated chain of FT-mechanisms is often more profitable than performing a single FT-mechanism and accordingly this is important for the Grid commercialization.
服务水平协议(sla)已经被引入到网格中,以便为其商业应用建立基础。网格提供者在同意和操作sla绑定作业时面临的挑战是,即使在出现故障的情况下,也要确保它们的实现。因此,容错机制是提供商SLA管理的基本手段。商业操作集群的高利用率通常会导致作业迁移影响调度的其他作业的情况。这种影响是由于没有足够的空闲资源来捕获所有资源中断。因此,在开始迁移之前,必须比较其对其他作业的影响,并且必须递归地评估容错(FT-)机制的启动。本文提出了启动傅里叶变换机制的效益测量、递归评估和终止条件。对启动的ft机制链进行这样的影响评估通常比执行单个ft机制更有利可图,因此这对网格商业化很重要。
{"title":"Recursive Evaluation of Fault Tolerance Mechanisms for SLA Management","authors":"K. Voß","doi":"10.1109/ICNS.2008.22","DOIUrl":"https://doi.org/10.1109/ICNS.2008.22","url":null,"abstract":"Service level agreements (SLAs) have been introduced into the grid in order to build a basis for its commercial uptake. The challenge for Grid providers in agreeing and operating SLA-bound jobs is to ensure their fulfillment even in the case of failures. Hence, fault-tolerance mechanisms are an essential means of the provider's SLA management. The high utilization of commercial operated clusters leads to scenarios in which typically a job migration effects other jobs scheduled. The effects result from the unavailability of enough free resources which would be needed to catch all resource outages. Consequently before initiating a migration, its effects for other jobs have to be compared and the initiation of fault- tolerance (FT-) mechanisms have to be evaluated recursively. This paper presents a measurement for the benefit of initiating a FT-mechanism, the recursive evaluation, and termination condition. Performing such an impact evaluation of an initiated chain of FT-mechanisms is often more profitable than performing a single FT-mechanism and accordingly this is important for the Grid commercialization.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121458287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Jitter-Buffer Management for VoIP over Wireless LAN in a Limited Resource Device 有限资源设备下无线局域网VoIP的抖动缓冲管理
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.17
Mohsen Baratvand, M. Tabandeh, A. Behboodi, A. Fotowat-Ahmady
VoIP over WLAN is a promising technology as a powerful replacement for current local wireless telephony systems. Packet timing Jitter is a constant issue in QoS of IEEE802.11 networks and exploiting an optimum jitter handling algorithm is an essential part of any VoIP over WLAN (VoWiFi) devices especially for the low cost devices with limited resources. In this paper two common algorithms using buffer as a method for Jitter handling are analyzed with relation to different traffic patterns. The effect of different buffer sizes on the quality of voice will be assessed for these patterns. Various traffic patterns were generated using OPNET and Quality of output voice was evaluated based on ITU PESQ method. It was shown that an optimum voice quality can be attained using a circular buffer with a size of around twice that of a voice packet.
基于WLAN的VoIP是一种很有前途的技术,可以有力地替代当前的本地无线电话系统。分组定时抖动是IEEE802.11网络QoS中一个持续存在的问题,开发最佳抖动处理算法是任何VoIP over WLAN (VoWiFi)设备的重要组成部分,特别是对于资源有限的低成本设备。本文分析了两种常用的利用缓冲区处理抖动的算法,并结合不同的通信模式进行了分析。对于这些模式,将评估不同缓冲大小对语音质量的影响。使用OPNET生成各种流量模式,并基于ITU PESQ方法对输出语音质量进行评估。结果表明,使用大小约为语音包的两倍的圆形缓冲区可以获得最佳的语音质量。
{"title":"Jitter-Buffer Management for VoIP over Wireless LAN in a Limited Resource Device","authors":"Mohsen Baratvand, M. Tabandeh, A. Behboodi, A. Fotowat-Ahmady","doi":"10.1109/ICNS.2008.17","DOIUrl":"https://doi.org/10.1109/ICNS.2008.17","url":null,"abstract":"VoIP over WLAN is a promising technology as a powerful replacement for current local wireless telephony systems. Packet timing Jitter is a constant issue in QoS of IEEE802.11 networks and exploiting an optimum jitter handling algorithm is an essential part of any VoIP over WLAN (VoWiFi) devices especially for the low cost devices with limited resources. In this paper two common algorithms using buffer as a method for Jitter handling are analyzed with relation to different traffic patterns. The effect of different buffer sizes on the quality of voice will be assessed for these patterns. Various traffic patterns were generated using OPNET and Quality of output voice was evaluated based on ITU PESQ method. It was shown that an optimum voice quality can be attained using a circular buffer with a size of around twice that of a voice packet.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115956925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Challenges of MPI over IPv6 MPI在IPv6上的挑战
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.27
Adrian Knoth, Christian Kauhaus, D. Fey, L. Schneidenbach, Bettina Schnor
The message passing interface (MPI) [17] is the most widely used message passing library for parallel applications on compute clusters. Here, we present our experiences in developing an IPv6 enabled MPI version for both most popular implementations, the MPICH2 and the Open MPI implementations. Further, we discuss how these IPv6 enabled MPI implementations can be used within multi-cluster and grid topologies.
消息传递接口(message passing interface, MPI)[17]是计算集群上并行应用中使用最广泛的消息传递库。在这里,我们将介绍我们在开发支持IPv6的MPI版本方面的经验,这些版本适用于最流行的实现,MPICH2和Open MPI实现。此外,我们还讨论了如何在多集群和网格拓扑中使用这些支持IPv6的MPI实现。
{"title":"Challenges of MPI over IPv6","authors":"Adrian Knoth, Christian Kauhaus, D. Fey, L. Schneidenbach, Bettina Schnor","doi":"10.1109/ICNS.2008.27","DOIUrl":"https://doi.org/10.1109/ICNS.2008.27","url":null,"abstract":"The message passing interface (MPI) [17] is the most widely used message passing library for parallel applications on compute clusters. Here, we present our experiences in developing an IPv6 enabled MPI version for both most popular implementations, the MPICH2 and the Open MPI implementations. Further, we discuss how these IPv6 enabled MPI implementations can be used within multi-cluster and grid topologies.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133167223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Adaptive Transmission Scheduling in Packet Radio Networks 分组无线网中一种新的自适应传输调度方法
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.49
S. Madhavi
The topology of the packet radio network changes dynamically. The initial slot assignments may cause interferences among the nodes while transmitting. In this paper, the author propose a new adaptive transmission scheduling to packet radio networks that computes the transmission assignments according to the changes in the topology. The node gathers information from its local neighborhood. In addition, this information is useful to reconstruct the slot assignments. The NATS consists of two stages. During the first stage, it obtained a minimal TDMA frame length and the corresponding transmission assignments. In the second stage, the NATS finds the maximum node transmissions. Results show that this method improves the guaranteed throughput and outperforms a 10% improvement over [Vhong and Huynh] .It is also shown that NATS outperforms TTR .
分组无线网络的拓扑结构是动态变化的。初始的槽位分配可能会在传输过程中引起节点间的干扰。本文提出了一种新的分组无线网络自适应传输调度方法,根据拓扑结构的变化计算传输分配。节点从它的本地邻居收集信息。此外,这些信息对于重构槽分配是有用的。考试分为两个阶段。在第一阶段,它获得最小的TDMA帧长度和相应的传输分配。在第二阶段,NATS找到最大的节点传输。结果表明,该方法提高了保证吞吐量,并且比[Vhong和Huynh]提高了10%,还表明NATS优于TTR。
{"title":"A New Adaptive Transmission Scheduling in Packet Radio Networks","authors":"S. Madhavi","doi":"10.1109/ICNS.2008.49","DOIUrl":"https://doi.org/10.1109/ICNS.2008.49","url":null,"abstract":"The topology of the packet radio network changes dynamically. The initial slot assignments may cause interferences among the nodes while transmitting. In this paper, the author propose a new adaptive transmission scheduling to packet radio networks that computes the transmission assignments according to the changes in the topology. The node gathers information from its local neighborhood. In addition, this information is useful to reconstruct the slot assignments. The NATS consists of two stages. During the first stage, it obtained a minimal TDMA frame length and the corresponding transmission assignments. In the second stage, the NATS finds the maximum node transmissions. Results show that this method improves the guaranteed throughput and outperforms a 10% improvement over [Vhong and Huynh] .It is also shown that NATS outperforms TTR .","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Traffic Distribution Forecasting in Packet-Switching Networks 分组交换网络中的流量分布预测
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.16
F. Zandi
This paper presents a traffic distribution forecasting model in packet-switching networks with mapping these networks into multi-commodity networks. Firstly, the radial basis function (RBF) networks is applied to monitor and learn the real traffic distribution at present time. Then, a quadratic model is used to calibrate these functions for precise traffic distribution forecasting. The implementation of the proposed model is demonstrated through the use of a numerical example.
本文提出了一种分组交换网络流量分布预测模型,并将分组交换网络映射到多商品网络中。首先,利用径向基函数(RBF)网络对当前的真实流量分布进行监测和学习;然后,利用二次元模型对这些函数进行校正,实现流量分布的精确预测。通过一个数值算例说明了所提模型的实现。
{"title":"Traffic Distribution Forecasting in Packet-Switching Networks","authors":"F. Zandi","doi":"10.1109/ICNS.2008.16","DOIUrl":"https://doi.org/10.1109/ICNS.2008.16","url":null,"abstract":"This paper presents a traffic distribution forecasting model in packet-switching networks with mapping these networks into multi-commodity networks. Firstly, the radial basis function (RBF) networks is applied to monitor and learn the real traffic distribution at present time. Then, a quadratic model is used to calibrate these functions for precise traffic distribution forecasting. The implementation of the proposed model is demonstrated through the use of a numerical example.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125628909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VPN Analysis and New Perspective for Securing Voice over VPN Networks VPN分析与VPN网络语音安全新视角
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.8
W. B. Diab, S. Tohmé, C. Bassil
Security and privacy become mandatory requirements for VoIP communications that needs security services such as confidentiality, integrity, authentication, non-replay and non- repudiation. The available solutions are generic and do not respect voice specificities and constraints. Thus, QoS of the voice is affected by delay, jitter, and packet loss. New security solutions must take into account the real-time constraint of voice service and their mechanisms should address possible attacks and overhead associated with it. Nowadays, VPNs (Virtual Private Networks) is considered the strongest security solutions for communications over IP networks. Most VPN solutions are implemented to tunnel data traffic while the trend toward a converged data and voice network, however, places new demands on VPNs to support real time traffic. In this paper we compare the VPN security protocols presenting their advantage and drawbacks. Then we present our new solution to secure voice over IPSec VPNs while guaranteeing the performance and quality of services, without reducing the effective bandwidth. We use the AVISPA model to analyze the security vulnerabilities of exchange messages to initiate session and establish VPN.
安全性和私密性成为VoIP通信的强制性要求,需要保密性、完整性、身份验证、不重播和不可否认等安全服务。可用的解决方案是通用的,不尊重语音的特殊性和约束。因此,语音的QoS会受到延迟、抖动、丢包等影响。新的安全解决方案必须考虑语音服务的实时约束,其机制应该解决可能的攻击和与之相关的开销。如今,vpn(虚拟专用网络)被认为是IP网络通信的最强安全解决方案。大多数VPN解决方案都实现了隧道数据流量,但是数据和语音网络融合的趋势对VPN提出了新的要求,以支持实时流量。本文对VPN安全协议进行了比较,介绍了它们的优缺点。在此基础上,提出了在保证业务性能和质量的前提下,在不降低有效带宽的情况下实现IPSec vpn语音安全的新方案。利用AVISPA模型分析了交换消息发起会话和建立VPN的安全漏洞。
{"title":"VPN Analysis and New Perspective for Securing Voice over VPN Networks","authors":"W. B. Diab, S. Tohmé, C. Bassil","doi":"10.1109/ICNS.2008.8","DOIUrl":"https://doi.org/10.1109/ICNS.2008.8","url":null,"abstract":"Security and privacy become mandatory requirements for VoIP communications that needs security services such as confidentiality, integrity, authentication, non-replay and non- repudiation. The available solutions are generic and do not respect voice specificities and constraints. Thus, QoS of the voice is affected by delay, jitter, and packet loss. New security solutions must take into account the real-time constraint of voice service and their mechanisms should address possible attacks and overhead associated with it. Nowadays, VPNs (Virtual Private Networks) is considered the strongest security solutions for communications over IP networks. Most VPN solutions are implemented to tunnel data traffic while the trend toward a converged data and voice network, however, places new demands on VPNs to support real time traffic. In this paper we compare the VPN security protocols presenting their advantage and drawbacks. Then we present our new solution to secure voice over IPSec VPNs while guaranteeing the performance and quality of services, without reducing the effective bandwidth. We use the AVISPA model to analyze the security vulnerabilities of exchange messages to initiate session and establish VPN.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Towards QoS Improvements of TCP-Based Media Delivery 基于tcp的媒体传输QoS改进研究
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.10
M. Prangl, Ingo Kofler, H. Hellwagner
The amount of audiovisual data available on the Internet and thus of multimedia communication over today's networks is increasing at a rapid pace. Despite the availability of specific media transport protocols like RTP, most content providers make use of the well-established and reliable TCP protocol to deliver audiovisual content over the Internet. The reason is that TCP-based data delivery in general is much less complicated for the clients to be served and over today's networks traversed (including proxies and firewalls), than making use of UDP-based RTP connections. However, in case of network bandwidth fluctuations and packet losses, TCP-based media delivery may lead to annoying jerky playback at the client side, due to retransmissions and late arrival of media data. This papers deals with TCP-based perceptual QoS improvement mechanisms for increasing the media experience for the consumer under unstable network conditions. Our approach is based on media content adaptation (transcoding) to fit the actual network bandwidth continuously monitored by the sender. The proposed mechanisms are applied at the application level at the server side, leaving the existing TCP implementation untouched and therefore enabling transparent use of existing media players. An evaluation of a realistic use case is presented which underlines the efficacy of our approach.
互联网上可用的视听数据的数量,以及当今网络上的多媒体通信的数量正在迅速增加。尽管像RTP这样的特定媒体传输协议是可用的,但大多数内容提供者都使用公认可靠的TCP协议在Internet上传递视听内容。原因是,与使用基于udp的RTP连接相比,基于tcp的数据传递对于要服务的客户机和通过当今网络(包括代理和防火墙)的客户机来说通常要简单得多。但是,在网络带宽波动和丢包的情况下,基于tcp的媒体传输可能会导致客户端播放不稳定,这是由于媒体数据的重传和延迟到达造成的。本文研究了基于tcp的感知QoS改进机制,以提高消费者在不稳定网络条件下的媒体体验。我们的方法是基于媒体内容适应(转码),以适应由发送方持续监控的实际网络带宽。提议的机制在服务器端的应用程序级别上应用,不影响现有的TCP实现,因此可以透明地使用现有的媒体播放器。给出了一个实际用例的评估,它强调了我们方法的有效性。
{"title":"Towards QoS Improvements of TCP-Based Media Delivery","authors":"M. Prangl, Ingo Kofler, H. Hellwagner","doi":"10.1109/ICNS.2008.10","DOIUrl":"https://doi.org/10.1109/ICNS.2008.10","url":null,"abstract":"The amount of audiovisual data available on the Internet and thus of multimedia communication over today's networks is increasing at a rapid pace. Despite the availability of specific media transport protocols like RTP, most content providers make use of the well-established and reliable TCP protocol to deliver audiovisual content over the Internet. The reason is that TCP-based data delivery in general is much less complicated for the clients to be served and over today's networks traversed (including proxies and firewalls), than making use of UDP-based RTP connections. However, in case of network bandwidth fluctuations and packet losses, TCP-based media delivery may lead to annoying jerky playback at the client side, due to retransmissions and late arrival of media data. This papers deals with TCP-based perceptual QoS improvement mechanisms for increasing the media experience for the consumer under unstable network conditions. Our approach is based on media content adaptation (transcoding) to fit the actual network bandwidth continuously monitored by the sender. The proposed mechanisms are applied at the application level at the server side, leaving the existing TCP implementation untouched and therefore enabling transparent use of existing media players. An evaluation of a realistic use case is presented which underlines the efficacy of our approach.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131760095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Definition and Evaluation of Penalty Functions in SLA Management Framework SLA管理框架中惩罚功能的定义与评价
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.32
J. Kosinski, D. Radziszowski, K. Zielinski, Sławomir Zieliński, Grzegorz Przybylski, Pawel Niedziela
The paper presents an analysis of the possibilities of defining penalty functions to be used in SLA management frameworks. As a basis for the analysis, a brief survey of metrics used in SLA contracts is presented. Next, several definitions of penalty functions are proposed. The definitions are then analyzed in context of embedding them in a working SLA management framework.
本文分析了在SLA管理框架中定义惩罚函数的可能性。作为分析的基础,本文简要介绍了SLA契约中使用的度量标准。其次,给出了惩罚函数的几种定义。然后在将定义嵌入到工作SLA管理框架的上下文中对其进行分析。
{"title":"Definition and Evaluation of Penalty Functions in SLA Management Framework","authors":"J. Kosinski, D. Radziszowski, K. Zielinski, Sławomir Zieliński, Grzegorz Przybylski, Pawel Niedziela","doi":"10.1109/ICNS.2008.32","DOIUrl":"https://doi.org/10.1109/ICNS.2008.32","url":null,"abstract":"The paper presents an analysis of the possibilities of defining penalty functions to be used in SLA management frameworks. As a basis for the analysis, a brief survey of metrics used in SLA contracts is presented. Next, several definitions of penalty functions are proposed. The definitions are then analyzed in context of embedding them in a working SLA management framework.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133319491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
Fourth International Conference on Networking and Services (icns 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1