首页 > 最新文献

2011 19th IEEE International Conference on Network Protocols最新文献

英文 中文
Scalable data center multicast using multi-class Bloom Filter 可扩展的数据中心多播使用多类布隆过滤器
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089061
Dan Li, Henggang Cui, Yan Hu, Yong Xia, Xin Wang
Multicast benefits data center group communications in saving network bandwidth and increasing application throughput. However, it is challenging to scale Multicast to support tens of thousands of concurrent group communications due to limited forwarding table memory space in the switches, particularly the low-end ones commonly used in modern data centers. Bloom Filter is an efficient tool to compress the Multicast forwarding table, but significant traffic leakage may occur when group membership testing is false positive. To reduce the Multicast traffic leakage, in this paper we bring forward a novel multi-class Bloom Filter (MBF), which extends the standard Bloom Filter by embracing element uncertainty. Specifically, MBF sets the number of hash functions in a per-element level, based on the probability for each Multicast group to be inserted into the Bloom Filter. We design a simple yet effective algorithm to calculate the number of hash functions for each Multicast group. We have prototyped a software based MBF forwarding engine on the Linux platform. Simulation and prototype evaluation results demonstrate that MBF can significantly reduce Multicast traffic leakage compared to the standard Bloom Filter, while causing little system overhead.
组播有利于数据中心群通信节省网络带宽,提高应用吞吐量。然而,由于交换机中转发表内存空间有限,特别是现代数据中心中常用的低端交换机,扩展多播以支持数万并发组通信是一项挑战。布隆过滤器是一种有效的压缩组播转发表的工具,但当组成员测试为假阳性时,可能会造成严重的流量泄漏。为了减少组播流量的泄漏,本文提出了一种新的多类布隆滤波器(MBF),它通过包含元素不确定性对标准布隆滤波器进行了扩展。具体来说,MBF根据每个多播组插入布隆过滤器的概率,在每个元素级别设置哈希函数的数量。我们设计了一个简单而有效的算法来计算每个组播组的哈希函数数量。我们在Linux平台上开发了一个基于MBF转发引擎的软件原型。仿真和原型评估结果表明,与标准布隆滤波器相比,MBF可以显著减少组播流量泄漏,且系统开销很小。
{"title":"Scalable data center multicast using multi-class Bloom Filter","authors":"Dan Li, Henggang Cui, Yan Hu, Yong Xia, Xin Wang","doi":"10.1109/ICNP.2011.6089061","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089061","url":null,"abstract":"Multicast benefits data center group communications in saving network bandwidth and increasing application throughput. However, it is challenging to scale Multicast to support tens of thousands of concurrent group communications due to limited forwarding table memory space in the switches, particularly the low-end ones commonly used in modern data centers. Bloom Filter is an efficient tool to compress the Multicast forwarding table, but significant traffic leakage may occur when group membership testing is false positive. To reduce the Multicast traffic leakage, in this paper we bring forward a novel multi-class Bloom Filter (MBF), which extends the standard Bloom Filter by embracing element uncertainty. Specifically, MBF sets the number of hash functions in a per-element level, based on the probability for each Multicast group to be inserted into the Bloom Filter. We design a simple yet effective algorithm to calculate the number of hash functions for each Multicast group. We have prototyped a software based MBF forwarding engine on the Linux platform. Simulation and prototype evaluation results demonstrate that MBF can significantly reduce Multicast traffic leakage compared to the standard Bloom Filter, while causing little system overhead.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Privacy-preserving cross-domain network reachability quantification 保护隐私的跨域网络可达性量化
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089047
Fei Chen, Bruhadeshwar Bezawada, A. Liu
Network reachability is one of the key factors for capturing end-to-end network behavior and detecting the violation of security policies. While quantifying network reachability within one administrative domain is already difficult, quantifying network reachability across multiple administrative domains is more difficult because the privacy of security policies becomes a serious concern and needs to be protected through this process. In this paper, we propose the first cross-domain privacy-preserving protocol for quantifying network reachability. Our protocol constructs equivalent representations of the Access Control List (ACL) rules and determines network reachability while preserving the privacy of the individual ACLs. This protocol can accurately determine the network reachability along a network path through different administrative domains. We have implemented and evaluated our protocol on both real and synthetic ACLs. The experimental results show that the online processing time of an ACL with thousands of rules is less than 25 seconds, the comparison time of two ACLs is less than 6 seconds, and the communication cost between two ACLs with thousands of rules is less than 2100 KB.
网络可达性是捕获端到端网络行为和检测违反安全策略的关键因素之一。虽然量化一个管理域中的网络可达性已经很困难,但量化跨多个管理域的网络可达性更加困难,因为安全策略的隐私性成为一个严重问题,需要通过此过程加以保护。本文提出了第一个用于量化网络可达性的跨域隐私保护协议。我们的协议构建了访问控制列表(ACL)规则的等价表示,并确定了网络可达性,同时保留了各个ACL的隐私。该协议可以通过不同的管理域准确地确定网络路径上的网络可达性。我们已经在真实的和合成的acl上实施并评估了我们的协议。实验结果表明,一条千规则ACL的在线处理时间小于25秒,两条千规则ACL的比较时间小于6秒,两条千规则ACL之间的通信开销小于2100 KB。
{"title":"Privacy-preserving cross-domain network reachability quantification","authors":"Fei Chen, Bruhadeshwar Bezawada, A. Liu","doi":"10.1109/ICNP.2011.6089047","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089047","url":null,"abstract":"Network reachability is one of the key factors for capturing end-to-end network behavior and detecting the violation of security policies. While quantifying network reachability within one administrative domain is already difficult, quantifying network reachability across multiple administrative domains is more difficult because the privacy of security policies becomes a serious concern and needs to be protected through this process. In this paper, we propose the first cross-domain privacy-preserving protocol for quantifying network reachability. Our protocol constructs equivalent representations of the Access Control List (ACL) rules and determines network reachability while preserving the privacy of the individual ACLs. This protocol can accurately determine the network reachability along a network path through different administrative domains. We have implemented and evaluated our protocol on both real and synthetic ACLs. The experimental results show that the online processing time of an ACL with thousands of rules is less than 25 seconds, the comparison time of two ACLs is less than 6 seconds, and the communication cost between two ACLs with thousands of rules is less than 2100 KB.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
What is wrong/right with IEEE 802.11n Spatial Multiplexing Power Save feature? IEEE 802.11n空间复用省电功能有什么错/对?
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089050
Ioannis Pefkianakis, Chi-Yu Li, Songwu Lu
The IEEE 802.11n standard has proposed a new Spatial Multiplexing Power Save (SMPS) feature, which allows for a station to retain one active receive chain, to mitigate MIMO circuitry power consumption. But does it work in all cases? Our experiments reveal that SMPS may not always save power compared with multiple active chains at the receiver. Even when it does, it may be proven more energy hungry. In this work, we seek to uncover the “good”, the “bad” and the “ugly” of SMPS using real experiments. We further devise a MIMO Receiver Energy Save (MRES) algorithm, which seeks to identify and set the most energy-efficient receive chain setting, by using a novel, low-overhead sampling scheme. Our prototype experiments show that, MRES outperforms SMPS with energy savings up to 37%.
IEEE 802.11n标准提出了一种新的空间复用省电(SMPS)功能,该功能允许站点保留一个活动接收链,以降低MIMO电路的功耗。但它在所有情况下都有效吗?我们的实验表明,与接收器上的多个有源链相比,SMPS可能并不总是节省功率。即使是这样,它也可能被证明是更加耗能的。在这项工作中,我们试图通过真实的实验来揭示SMPS的“好”、“坏”和“丑”。我们进一步设计了一种MIMO接收器节能(MRES)算法,该算法旨在通过使用一种新颖的低开销采样方案来识别和设置最节能的接收链设置。我们的原型实验表明,MRES比SMPS节能37%。
{"title":"What is wrong/right with IEEE 802.11n Spatial Multiplexing Power Save feature?","authors":"Ioannis Pefkianakis, Chi-Yu Li, Songwu Lu","doi":"10.1109/ICNP.2011.6089050","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089050","url":null,"abstract":"The IEEE 802.11n standard has proposed a new Spatial Multiplexing Power Save (SMPS) feature, which allows for a station to retain one active receive chain, to mitigate MIMO circuitry power consumption. But does it work in all cases? Our experiments reveal that SMPS may not always save power compared with multiple active chains at the receiver. Even when it does, it may be proven more energy hungry. In this work, we seek to uncover the “good”, the “bad” and the “ugly” of SMPS using real experiments. We further devise a MIMO Receiver Energy Save (MRES) algorithm, which seeks to identify and set the most energy-efficient receive chain setting, by using a novel, low-overhead sampling scheme. Our prototype experiments show that, MRES outperforms SMPS with energy savings up to 37%.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114837879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
EasyTrace: An easily-deployable light-weight IP traceback on an AS-level overlay network EasyTrace:在as级覆盖网络上易于部署的轻量级IP回溯
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089038
Hongcheng Tian, J. Bi, Wei Zhang, Xiaoke Jiang
IP traceback can be used to find the origins and paths of attacking traffic. However, so far, no Internet-level IP traceback system has ever been deployed because of deployment difficulties. In this paper, we present an easily-deployable light-weight IP traceback based on flow (EasyTrace). In EasyTrace, it is not necessary to deploy any dedicated traceback software and hardware at routers, and an AS-level overlay network is built for incremental deployment. We theoretically analyze the quantitative relation among the probability that a flow is successfully traced back various AS-level hop number, independently sampling probability, and the number of packets that the flow comprises.
IP回溯可以用来查找攻击流量的来源和路径。但是,由于部署困难,目前还没有部署互联网级的IP溯源系统。在本文中,我们提出了一种基于流的易于部署的轻量级IP回溯(EasyTrace)。在EasyTrace中,不需要在路由器上部署任何专用的回溯软件和硬件,并且为增量部署构建了as级覆盖网络。从理论上分析了流成功追踪到各个as级跳数的概率、独立采样概率与流所包含的数据包数之间的定量关系。
{"title":"EasyTrace: An easily-deployable light-weight IP traceback on an AS-level overlay network","authors":"Hongcheng Tian, J. Bi, Wei Zhang, Xiaoke Jiang","doi":"10.1109/ICNP.2011.6089038","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089038","url":null,"abstract":"IP traceback can be used to find the origins and paths of attacking traffic. However, so far, no Internet-level IP traceback system has ever been deployed because of deployment difficulties. In this paper, we present an easily-deployable light-weight IP traceback based on flow (EasyTrace). In EasyTrace, it is not necessary to deploy any dedicated traceback software and hardware at routers, and an AS-level overlay network is built for incremental deployment. We theoretically analyze the quantitative relation among the probability that a flow is successfully traced back various AS-level hop number, independently sampling probability, and the number of packets that the flow comprises.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129344592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Video-Aware Rate Adaptation for MIMO WLANs MIMO无线局域网的视频感知速率自适应
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089071
An Chan, Henrik Lundgren, T. Salonidis
The IEEE 802.11n standard supports very high physical layer data rates using Multiple Input Multiple Output (MIMO) antenna technologies. Despite such high rates, High Definition (HD) video streaming is still challenging in WLAN deployments. In this paper, we show that the wireless channel probing overhead of existing 802.11n data rate adaptation mechanisms can be detrimental to HD video performance. We propose VARA, a Video-Aware Rate Adaptation protocol that addresses this problem by adapting the frequency and timing of wireless probing to both video encoding rate variations and wireless channel variations. In addition, VARA employs novel strategies that multiplex several Variable Bit Rate (VBR) HD video streams by minimizing their aggregate peak rate requirement. Our experimental evaluations for static and mobile scenarios in a MIMO 802.11n wireless testbed demonstrate the practical benefits of VARA over state-of-the-art 802.11n rate adaptation protocols.
IEEE 802.11n标准使用多输入多输出(MIMO)天线技术支持非常高的物理层数据速率。尽管速率如此之高,但高清视频流在WLAN部署中仍然具有挑战性。在本文中,我们证明了现有802.11n数据速率自适应机制的无线信道探测开销可能会损害高清视频性能。我们提出了VARA,一种视频感知速率自适应协议,它通过调整无线探测的频率和时间来适应视频编码速率变化和无线信道变化来解决这个问题。此外,VARA采用新颖的策略,通过最小化其总峰值速率要求来复用多个可变比特率(VBR)高清视频流。我们在MIMO 802.11n无线测试平台上对静态和移动场景进行的实验评估证明了VARA相对于最先进的802.11n速率自适应协议的实际优势。
{"title":"Video-Aware Rate Adaptation for MIMO WLANs","authors":"An Chan, Henrik Lundgren, T. Salonidis","doi":"10.1109/ICNP.2011.6089071","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089071","url":null,"abstract":"The IEEE 802.11n standard supports very high physical layer data rates using Multiple Input Multiple Output (MIMO) antenna technologies. Despite such high rates, High Definition (HD) video streaming is still challenging in WLAN deployments. In this paper, we show that the wireless channel probing overhead of existing 802.11n data rate adaptation mechanisms can be detrimental to HD video performance. We propose VARA, a Video-Aware Rate Adaptation protocol that addresses this problem by adapting the frequency and timing of wireless probing to both video encoding rate variations and wireless channel variations. In addition, VARA employs novel strategies that multiplex several Variable Bit Rate (VBR) HD video streams by minimizing their aggregate peak rate requirement. Our experimental evaluations for static and mobile scenarios in a MIMO 802.11n wireless testbed demonstrate the practical benefits of VARA over state-of-the-art 802.11n rate adaptation protocols.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131279616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Correlated flooding in low-duty-cycle wireless sensor networks 低占空比无线传感器网络中的相关泛洪
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089078
Shuo Guo, S. Kim, Ting Zhu, Yu Gu, T. He
Flooding in low-duty-cycle wireless sensor networks is very costly due to asynchronous schedules of sensor nodes. To adapt existing flooding-tree-based designs for low-duty-cycle networks, we shall schedule nodes of common parents wake up simultaneously. Traditionally, energy optimality in a designated flooding-tree is achieved by selecting parents with the highest link quality. In this work, we demonstrate that surprisingly more energy can be saved by considering link correlation. Specifically, this work first experimentally verifies the existence of link correlation and mathematically proves that the energy consumption of broadcasting can be reduced by letting nodes with higher correlation receive packets simultaneously. A novel flooding scheme, named Correlated Flooding, is then designed so that nodes with high correlation are assigned to a common sender and their receptions of a broadcasting packet are only acknowledged by a single ACK. This unique feature effectively ameliorates the ACK implosion problem, saving energy on both data packets and ACKs. We evaluate Correlated Flooding with extensive simulations and a testbed implementation with 20 MICAz nodes. We show that Correlated Flooding saves more than 66% energy on ACKs and 15%–50% energy on data packets for most network settings, while having similar performance on flooding delay and reliability.
在低占空比无线传感器网络中,由于传感器节点的调度是异步的,因此泛洪的成本非常高。为了适应现有的基于泛洪树的低占空比网络设计,我们将同时调度共同父节点的唤醒。传统上,在指定的泛洪树中,能量最优是通过选择链路质量最高的父节点来实现的。在这项工作中,我们证明了通过考虑链路相关性可以节省更多的能量。具体来说,本工作首先通过实验验证了链路相关性的存在性,并从数学上证明了让相关性较高的节点同时接收数据包可以降低广播的能耗。然后设计了一种新的泛洪方案,称为相关泛洪,以便将高相关性的节点分配给一个共同的发送者,并且它们对广播数据包的接收仅由单个ACK确认。这种独特的特性有效地改善了ACK内爆问题,节省了数据包和ACK的能量。我们通过大量的模拟和20个MICAz节点的测试平台实现来评估相关洪水。我们表明,在大多数网络设置中,相关泛洪在ack上节省66%以上的能量,在数据包上节省15%-50%的能量,同时在泛洪延迟和可靠性方面具有相似的性能。
{"title":"Correlated flooding in low-duty-cycle wireless sensor networks","authors":"Shuo Guo, S. Kim, Ting Zhu, Yu Gu, T. He","doi":"10.1109/ICNP.2011.6089078","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089078","url":null,"abstract":"Flooding in low-duty-cycle wireless sensor networks is very costly due to asynchronous schedules of sensor nodes. To adapt existing flooding-tree-based designs for low-duty-cycle networks, we shall schedule nodes of common parents wake up simultaneously. Traditionally, energy optimality in a designated flooding-tree is achieved by selecting parents with the highest link quality. In this work, we demonstrate that surprisingly more energy can be saved by considering link correlation. Specifically, this work first experimentally verifies the existence of link correlation and mathematically proves that the energy consumption of broadcasting can be reduced by letting nodes with higher correlation receive packets simultaneously. A novel flooding scheme, named Correlated Flooding, is then designed so that nodes with high correlation are assigned to a common sender and their receptions of a broadcasting packet are only acknowledged by a single ACK. This unique feature effectively ameliorates the ACK implosion problem, saving energy on both data packets and ACKs. We evaluate Correlated Flooding with extensive simulations and a testbed implementation with 20 MICAz nodes. We show that Correlated Flooding saves more than 66% energy on ACKs and 15%–50% energy on data packets for most network settings, while having similar performance on flooding delay and reliability.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"55 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132892841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
Inferring a network congestion map with zero traffic overhead 推断零流量开销的网络拥塞图
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089083
Florin Dinu, T. Ng
This paper proposes a purely passive method for inferring a congestion map of a network. The congestion map is computed using the congestion markings carried in existing traffic, and is continuously updated as traffic is received. Consequently, congestion changes can be tracked in a real-time fashion with zero traffic overhead. Unlike active congestion reporting methods, our novel passive method is more robust during periods of congestion because there are no congestion report messages that could be lost and existing congestion is never aggravated. Our solution has several applications ranging from informing IP fast re-route algorithms and traffic engineering schemes to assisting in inter-domain path selection.
提出了一种推断网络拥塞图的纯被动方法。拥塞图是使用现有交通中携带的拥塞标记计算的,并随着接收到的交通不断更新。因此,可以在零交通开销的情况下实时跟踪拥塞变化。与主动拥塞报告方法不同,我们的新被动方法在拥塞期间更加健壮,因为没有可能丢失的拥塞报告消息,并且不会加剧现有的拥塞。我们的解决方案有几个应用范围,从通知IP快速重路由算法和流量工程方案到协助域间路径选择。
{"title":"Inferring a network congestion map with zero traffic overhead","authors":"Florin Dinu, T. Ng","doi":"10.1109/ICNP.2011.6089083","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089083","url":null,"abstract":"This paper proposes a purely passive method for inferring a congestion map of a network. The congestion map is computed using the congestion markings carried in existing traffic, and is continuously updated as traffic is received. Consequently, congestion changes can be tracked in a real-time fashion with zero traffic overhead. Unlike active congestion reporting methods, our novel passive method is more robust during periods of congestion because there are no congestion report messages that could be lost and existing congestion is never aggravated. Our solution has several applications ranging from informing IP fast re-route algorithms and traffic engineering schemes to assisting in inter-domain path selection.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"36 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120904599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sidekick: AP aggregation over partially overlapping channels 助手:在部分重叠的通道上聚合AP
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089068
Eugene Chai, K. Shin
The uncoordinated deployment of many high-bandwidth 802.11a/g/n access points (APs) in urban areas offers the potential for WLANs to be a strong complement to cellular networks in providing ubiquitous connectivity. However, given that the bandwidth of the backhaul links connected to these APs is often an order-of-magnitude lower than that of the WLAN channel, aggregating the throughput from multiple APs is often necessary in order for the client to achieve an acceptable level of network performance. In this paper, we present Sidekick — a simple and novel AP aggregation protocol that exploits effective communication between 802.11a/g/n nodes on partially overlapping channels to attain high aggregate throughput in the face of dynamic WLAN and backhaul link conditions. Sidekick is built upon Aileron, which provides an extremely reliable and low-overhead control channel over which the APs and clients can coordinate the aggregation process. The use of such a control channel over partially overlapping channels enables Sidekick to quickly respond to varying bandwidth availability and probe for new transmission opportunities with little overhead. Our evaluation results indicate that Sidekick can make more than 30% improvement in throughput over FatVAP in a variety of situations.
许多高带宽802.11a/g/n接入点(ap)在城市地区的不协调部署,为wlan在提供无处不在的连接方面成为蜂窝网络的有力补充提供了潜力。然而,考虑到连接到这些ap的回程链路的带宽通常比WLAN通道的带宽低一个数量级,为了使客户端达到可接受的网络性能水平,通常需要聚合来自多个ap的吞吐量。在本文中,我们提出了Sidekick -一种简单而新颖的AP聚合协议,它利用802.11a/g/n节点之间在部分重叠信道上的有效通信,以在面对动态WLAN和回程链路条件时获得高聚合吞吐量。Sidekick建立在副翼的基础上,副翼提供了一个非常可靠和低开销的控制通道,ap和客户端可以通过它来协调聚合过程。在部分重叠的通道上使用这种控制通道,使Sidekick能够快速响应不同的带宽可用性,并以很小的开销探测新的传输机会。我们的评估结果表明,在各种情况下,Sidekick可以比FatVAP提高30%以上的吞吐量。
{"title":"Sidekick: AP aggregation over partially overlapping channels","authors":"Eugene Chai, K. Shin","doi":"10.1109/ICNP.2011.6089068","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089068","url":null,"abstract":"The uncoordinated deployment of many high-bandwidth 802.11a/g/n access points (APs) in urban areas offers the potential for WLANs to be a strong complement to cellular networks in providing ubiquitous connectivity. However, given that the bandwidth of the backhaul links connected to these APs is often an order-of-magnitude lower than that of the WLAN channel, aggregating the throughput from multiple APs is often necessary in order for the client to achieve an acceptable level of network performance. In this paper, we present Sidekick — a simple and novel AP aggregation protocol that exploits effective communication between 802.11a/g/n nodes on partially overlapping channels to attain high aggregate throughput in the face of dynamic WLAN and backhaul link conditions. Sidekick is built upon Aileron, which provides an extremely reliable and low-overhead control channel over which the APs and clients can coordinate the aggregation process. The use of such a control channel over partially overlapping channels enables Sidekick to quickly respond to varying bandwidth availability and probe for new transmission opportunities with little overhead. Our evaluation results indicate that Sidekick can make more than 30% improvement in throughput over FatVAP in a variety of situations.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115177952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Understanding and mitigating TCP starvation in 802.11 wireless mesh networks 理解和减轻802.11无线网状网络中的TCP饥饿
Pub Date : 2011-10-01 DOI: 10.1109/ICNP.2011.6089034
Wei Wang, B. Leong, Wei Tsang Ooi
It is well known that the pervasive IEEE 802.11 MAC is intrinsically unfair [1, 3]. In particular, in the topology shown in Fig. 1(a), when links AB and CD both carry backlogged transmissions, the packets from sender A experience persistent collisions at node B while sender C enjoys collision-free transmission to D. Node A can transmit successfully only if it is able to “insert” its packets into the small inter-packet gaps of C's packets. Thus, we refer to the topology in Fig. 1(a) as the unfair topology and to C and A as the superior and inferior nodes respectively.
众所周知,普遍的IEEE 802.11 MAC本质上是不公平的[1,3]。特别是,在图1(a)所示的拓扑中,当链路AB和链路CD都进行了积压传输时,发送方a的数据包在节点B经历了持续的碰撞,而发送方C向d的传输则没有碰撞。节点a只有能够将自己的数据包“插入”到C数据包的小包间间隙中,才能成功传输。因此,我们将图1(a)中的拓扑称为不公平拓扑,将C和a分别称为优节点和劣节点。
{"title":"Understanding and mitigating TCP starvation in 802.11 wireless mesh networks","authors":"Wei Wang, B. Leong, Wei Tsang Ooi","doi":"10.1109/ICNP.2011.6089034","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089034","url":null,"abstract":"It is well known that the pervasive IEEE 802.11 MAC is intrinsically unfair [1, 3]. In particular, in the topology shown in Fig. 1(a), when links AB and CD both carry backlogged transmissions, the packets from sender A experience persistent collisions at node B while sender C enjoys collision-free transmission to D. Node A can transmit successfully only if it is able to “insert” its packets into the small inter-packet gaps of C's packets. Thus, we refer to the topology in Fig. 1(a) as the unfair topology and to C and A as the superior and inferior nodes respectively.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A deployable approach for inter-AS anti-spoofing 一种可部署的跨自治系统反欺骗方法
Pub Date : 2011-10-01 DOI: 10.1109/ICNP.2011.6089052
Bingyang Liu, J. Bi, Y. Zhu
Filtering IP packets with spoofed source addresses not only improves network security, but also helps with network diagnosis and management. Compared with filtering spoofing packets at the edge of network which involves high deployment and maintenance cost, filtering at autonomous system (AS) borders is more cost-effective. Inter-AS anti-spoofing, as its name suggests, is implemented on AS border routers to filter spoofing packets before their entering or leaving an AS. Existing inter-AS anti-spoofing approaches focus on filtering efficiency, but lacks of deployability. In this paper we first introduce three properties of a deployable inter-AS anti-spoofing approach, incremental deployability, high deployment incentives and low deployment cost. Then we propose DIA, the first inter-AS anti-spoofing approach meeting the three properties. We present the design of DIA and evaluate its deployability with real Internet data. The evaluation results show that DIA provides high deployment incentives for Internet Service Providers by significantly mitigating spoofing based denial of service attacks. Our implementation proves that DIA can be easily implemented in commodity routers and minimize the deployment cost.
对源地址欺骗的IP报文进行过滤,不仅可以提高网络的安全性,还可以帮助进行网络诊断和管理。相对于在网络边缘过滤欺骗报文需要较高的部署和维护成本,在自治系统边界过滤具有更高的成本效益。as间防欺骗,顾名思义,是在as边界路由器上实现的,在欺骗报文进入或离开as之前对其进行过滤。现有的as间防欺骗方法注重过滤效率,但缺乏可部署性。在本文中,我们首先介绍了可部署的as间反欺骗方法的三个特性:增量可部署性、高部署激励和低部署成本。然后我们提出了DIA,这是第一个满足这三个特性的as间防欺骗方法。提出了DIA的设计方案,并利用真实的互联网数据对其可部署性进行了评估。评估结果表明,DIA通过显著减轻基于欺骗的拒绝服务攻击,为互联网服务提供商提供了很高的部署激励。我们的实践证明,DIA可以很容易地在商用路由器中实现,并最大限度地降低部署成本。
{"title":"A deployable approach for inter-AS anti-spoofing","authors":"Bingyang Liu, J. Bi, Y. Zhu","doi":"10.1109/ICNP.2011.6089052","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089052","url":null,"abstract":"Filtering IP packets with spoofed source addresses not only improves network security, but also helps with network diagnosis and management. Compared with filtering spoofing packets at the edge of network which involves high deployment and maintenance cost, filtering at autonomous system (AS) borders is more cost-effective. Inter-AS anti-spoofing, as its name suggests, is implemented on AS border routers to filter spoofing packets before their entering or leaving an AS. Existing inter-AS anti-spoofing approaches focus on filtering efficiency, but lacks of deployability. In this paper we first introduce three properties of a deployable inter-AS anti-spoofing approach, incremental deployability, high deployment incentives and low deployment cost. Then we propose DIA, the first inter-AS anti-spoofing approach meeting the three properties. We present the design of DIA and evaluate its deployability with real Internet data. The evaluation results show that DIA provides high deployment incentives for Internet Service Providers by significantly mitigating spoofing based denial of service attacks. Our implementation proves that DIA can be easily implemented in commodity routers and minimize the deployment cost.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2011 19th IEEE International Conference on Network Protocols
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1