首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Optimal utility based multi-user throughput allocation subject to throughput constraints 受吞吐量约束的基于最优效用的多用户吞吐量分配
M. Andrews, Lijun Qian, A. Stolyar
We consider the problem of scheduling multiple users sharing a time-varying wireless channel. (As an example, this is a model of scheduling in 3G wireless technologies, such as CDMA2000 3G1xEV-DO downlink scheduling.) We introduce an algorithm which seeks to optimize a concave utility function /spl Sigma//sub i/H/sub i/(R/sub i/) of the user throughputs R/sub i/, subject to certain lower and upper throughput bounds: R/sub i//sup min//spl les/R/sub i//spl les/R/sub i//sup max/. The algorithm, which we call the gradient algorithm with minimum/maximum rate constraints (GMR) uses a token counter mechanism, which modifies an algorithm solving the corresponding unconstrained problem, to produce the algorithm solving the problem with throughput constraints. Two important special cases of the utility functions are /spl Sigma//sub i/log R/sub i/ and /spl Sigma//sub i/R/sub i/, corresponding to the common proportional fairness and throughput maximization objectives. We study the dynamics of user throughputs under GMR algorithm, and show that GMR is asymptotically optimal in the following sense. If, under an appropriate scaling, the throughput vector R(t) converges to a fixed vector R/sup +/ as time t/spl rarr//spl infin/ then R/sup +/ is an optimal solution to the optimization problem described above. We also present simulation results showing the algorithm performance.
研究了多用户共享时变无线信道的调度问题。(例如,这是3G无线技术中的调度模型,例如CDMA2000 3G1xEV-DO下行链路调度。)我们介绍了一种算法,该算法旨在优化用户吞吐量R/sub i/的凹效用函数/spl Sigma//sub i/H/sub i/(R/sub i/),受制于一定的上下吞吐量界限:R/sub i//sup min//spl les/R/sub i//spl les/R/sub i//sup max/。该算法称为带最小/最大速率约束的梯度算法(GMR),该算法使用令牌计数器机制,该机制修改了解决相应无约束问题的算法,从而产生了解决带吞吐量约束问题的算法。效用函数的两个重要特例是/spl Sigma//下标i/log R/下标i/和/spl Sigma//下标i/R/下标i/,对应于常见的比例公平和吞吐量最大化目标。我们研究了GMR算法下用户吞吐量的动态变化,并证明了GMR算法在以下意义上是渐近最优的。如果在适当的缩放下,吞吐量向量R(t)在时间t/spl rarr//spl infin/时收敛于固定向量R/sup +/,则R/sup +/是上述优化问题的最优解。仿真结果显示了该算法的性能。
{"title":"Optimal utility based multi-user throughput allocation subject to throughput constraints","authors":"M. Andrews, Lijun Qian, A. Stolyar","doi":"10.1109/INFCOM.2005.1498527","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498527","url":null,"abstract":"We consider the problem of scheduling multiple users sharing a time-varying wireless channel. (As an example, this is a model of scheduling in 3G wireless technologies, such as CDMA2000 3G1xEV-DO downlink scheduling.) We introduce an algorithm which seeks to optimize a concave utility function /spl Sigma//sub i/H/sub i/(R/sub i/) of the user throughputs R/sub i/, subject to certain lower and upper throughput bounds: R/sub i//sup min//spl les/R/sub i//spl les/R/sub i//sup max/. The algorithm, which we call the gradient algorithm with minimum/maximum rate constraints (GMR) uses a token counter mechanism, which modifies an algorithm solving the corresponding unconstrained problem, to produce the algorithm solving the problem with throughput constraints. Two important special cases of the utility functions are /spl Sigma//sub i/log R/sub i/ and /spl Sigma//sub i/R/sub i/, corresponding to the common proportional fairness and throughput maximization objectives. We study the dynamics of user throughputs under GMR algorithm, and show that GMR is asymptotically optimal in the following sense. If, under an appropriate scaling, the throughput vector R(t) converges to a fixed vector R/sup +/ as time t/spl rarr//spl infin/ then R/sup +/ is an optimal solution to the optimization problem described above. We also present simulation results showing the algorithm performance.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"229 1","pages":"2415-2424 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73936280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 193
The effect of network topology on the spread of epidemics 网络拓扑结构对传染病传播的影响
A. Ganesh, L. Massoulié, D. Towsley
Many network phenomena are well modeled as spreads of epidemics through a network. Prominent examples include the spread of worms and email viruses, and, more generally, faults. Many types of information dissemination can also be modeled as spreads of epidemics. In this paper we address the question of what makes an epidemic either weak or potent. More precisely, we identify topological properties of the graph that determine the persistence of epidemics. In particular, we show that if the ratio of cure to infection rates is larger than the spectral radius of the graph, then the mean epidemic lifetime is of order log n, where n is the number of nodes. Conversely, if this ratio is smaller than a generalization of the isoperimetric constant of the graph, then the mean epidemic lifetime is of order e/sup na/, for a positive constant a. We apply these results to several network topologies including the hypercube, which is a representative connectivity graph for a distributed hash table, the complete graph, which is an important connectivity graph for BGP, and the power law graph, of which the AS-level Internet graph is a prime example. We also study the star topology and the Erdos-Renyi graph as their epidemic spreading behaviors determine the spreading behavior of power law graphs.
许多网络现象可以很好地模拟为流行病通过网络的传播。突出的例子包括蠕虫和电子邮件病毒的传播,以及更普遍的故障。许多类型的信息传播也可以模拟为流行病的传播。在本文中,我们讨论是什么使流行病变弱或变强的问题。更准确地说,我们确定了决定流行病持久性的图的拓扑性质。特别地,我们证明了如果治愈率与感染率之比大于图的谱半径,则平均流行病寿命为log n阶,其中n为节点数。相反,如果这个比率小于泛化等周常数的图,顺序的流行一生是e / na /一同晚餐,积极的常数。我们将这些结果应用到几种网络拓扑包括超立方体,这是一个代表分布式哈希表连接图,完全图,这是一个重要的连接图边界网关协议,和幂律图,等级的网络图是一个典型的例子。我们还研究了星型拓扑和Erdos-Renyi图,因为它们的流行传播行为决定了幂律图的传播行为。
{"title":"The effect of network topology on the spread of epidemics","authors":"A. Ganesh, L. Massoulié, D. Towsley","doi":"10.1109/INFCOM.2005.1498374","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498374","url":null,"abstract":"Many network phenomena are well modeled as spreads of epidemics through a network. Prominent examples include the spread of worms and email viruses, and, more generally, faults. Many types of information dissemination can also be modeled as spreads of epidemics. In this paper we address the question of what makes an epidemic either weak or potent. More precisely, we identify topological properties of the graph that determine the persistence of epidemics. In particular, we show that if the ratio of cure to infection rates is larger than the spectral radius of the graph, then the mean epidemic lifetime is of order log n, where n is the number of nodes. Conversely, if this ratio is smaller than a generalization of the isoperimetric constant of the graph, then the mean epidemic lifetime is of order e/sup na/, for a positive constant a. We apply these results to several network topologies including the hypercube, which is a representative connectivity graph for a distributed hash table, the complete graph, which is an important connectivity graph for BGP, and the power law graph, of which the AS-level Internet graph is a prime example. We also study the star topology and the Erdos-Renyi graph as their epidemic spreading behaviors determine the spreading behavior of power law graphs.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"6 1","pages":"1455-1466 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74715687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 805
Bayesian packet loss detection for TCP TCP的贝叶斯丢包检测
N. Fonseca, M. Crovella
One of TCP's critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implementations use two mechanisms: timeout, and fast retransmit. Detection via timeout is necessarily a time-consuming operation; fast retransmit, while much quicker, is only effective for a small fraction of packet losses. In this paper we consider the problem of packet loss detection in TCP more generally. We concentrate on the fact that TCP's control actions are necessarily triggered by inference of packet loss, rather than conclusive knowledge. This suggests that one might analyze TCP's packet loss detection in a standard inferencing framework based on probability of detection and probability of false alarm. This paper makes two contributions to that end: first, we study an example of more general packet loss inference, namely optimal Bayesian packet loss detection based on round trip time. We show that for long-lived flows, it is frequently possible to achieve high detection probability and low false alarm probability based on measured round trip time. Second, we construct an analytic performance model that incorporates general packet loss inference into TCP. We show that for realistic detection and false alarm probabilities (as are achievable via our Bayesian detector) and for moderate packet loss rates, the use of more general packet loss inference in TCP can improve throughput by as much as 25%.
TCP的关键任务之一是确定哪些数据包在网络中丢失,作为控制动作(流量控制和数据包重传)的基础。现代TCP实现使用两种机制:超时和快速重传。通过超时检测必然是一个耗时的操作;快速重传虽然快得多,但只对一小部分包丢失有效。在本文中,我们更广泛地考虑了TCP中的丢包检测问题。我们关注的事实是TCP的控制动作是由丢包的推断触发的,而不是结论性的知识。这表明可以在基于检测概率和虚警概率的标准推理框架中分析TCP的丢包检测。本文为此做了两个贡献:首先,我们研究了一个更一般的丢包推理的例子,即基于往返时间的最优贝叶斯丢包检测。我们表明,对于长寿命流,基于测量的往返时间,通常可以实现高检测概率和低虚警概率。其次,我们构建了一个分析性能模型,该模型将一般丢包推理纳入TCP。我们表明,对于真实的检测和假警报概率(通过我们的贝叶斯检测器可以实现)以及适度的丢包率,在TCP中使用更通用的丢包推理可以将吞吐量提高多达25%。
{"title":"Bayesian packet loss detection for TCP","authors":"N. Fonseca, M. Crovella","doi":"10.1109/INFCOM.2005.1498462","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498462","url":null,"abstract":"One of TCP's critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implementations use two mechanisms: timeout, and fast retransmit. Detection via timeout is necessarily a time-consuming operation; fast retransmit, while much quicker, is only effective for a small fraction of packet losses. In this paper we consider the problem of packet loss detection in TCP more generally. We concentrate on the fact that TCP's control actions are necessarily triggered by inference of packet loss, rather than conclusive knowledge. This suggests that one might analyze TCP's packet loss detection in a standard inferencing framework based on probability of detection and probability of false alarm. This paper makes two contributions to that end: first, we study an example of more general packet loss inference, namely optimal Bayesian packet loss detection based on round trip time. We show that for long-lived flows, it is frequently possible to achieve high detection probability and low false alarm probability based on measured round trip time. Second, we construct an analytic performance model that incorporates general packet loss inference into TCP. We show that for realistic detection and false alarm probabilities (as are achievable via our Bayesian detector) and for moderate packet loss rates, the use of more general packet loss inference in TCP can improve throughput by as much as 25%.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"8 1","pages":"1826-1837 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73572651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Throughput-storage tradeoff in ad hoc networks 自组织网络中的吞吐量-存储权衡
J. Herdtner, E. Chong
Gupta and Kumar (2000) showed that the throughput capacity of static ad hoc networks with n randomly positioned nodes is /spl Theta/(/spl radic/(n/log n)). Grossglauser and Tse showed that node mobility increases the capacity to /spl Theta/(n), a substantial improvement. Achieving maximum capacity requires nodes to relay transmissions through other nodes. Each node must have a relay buffer for temporarily storing packets before forwarding them to their destination. We establish that if relay buffer sizes are bounded above by a constant, then mobility does not substantially increase the throughput capacity of mobile ad hoc networks. In particular, we show that the capacity of mobile networks with finite buffers is at most /spl Theta/(/spl radic/n). Finally we establish a scaling law relationship that characterizes the fundamental tradeoff between throughput capacity and relay buffer size. In particular, we show that the throughput capacity is at most /spl Theta/(/spl radic/(nb/sub n/)), where b/sub n/ is the size of the relay buffers.
Gupta和Kumar(2000)表明,具有n个随机定位节点的静态自组织网络的吞吐量为/spl Theta/(/spl radial /(n/log n))。Grossglauser和Tse表明,节点移动性将容量提高到/spl Theta/(n),这是一个实质性的改进。实现最大容量需要节点通过其他节点中继传输。每个节点必须有一个中继缓冲区,用于在将数据包转发到目的地之前临时存储数据包。我们确定,如果中继缓冲区大小被一个常数所限制,那么移动性不会显著增加移动自组织网络的吞吐量。特别地,我们证明了具有有限缓冲区的移动网络的容量最多为/spl Theta/(/spl radial /n)。最后,我们建立了一个比例律关系,表征吞吐量和中继缓冲区大小之间的基本权衡。特别是,我们表明吞吐量最多为/spl Theta/(/spl radial /(nb/sub n/)),其中b/sub n/是继电器缓冲区的大小。
{"title":"Throughput-storage tradeoff in ad hoc networks","authors":"J. Herdtner, E. Chong","doi":"10.1109/INFCOM.2005.1498538","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498538","url":null,"abstract":"Gupta and Kumar (2000) showed that the throughput capacity of static ad hoc networks with n randomly positioned nodes is /spl Theta/(/spl radic/(n/log n)). Grossglauser and Tse showed that node mobility increases the capacity to /spl Theta/(n), a substantial improvement. Achieving maximum capacity requires nodes to relay transmissions through other nodes. Each node must have a relay buffer for temporarily storing packets before forwarding them to their destination. We establish that if relay buffer sizes are bounded above by a constant, then mobility does not substantially increase the throughput capacity of mobile ad hoc networks. In particular, we show that the capacity of mobile networks with finite buffers is at most /spl Theta/(/spl radic/n). Finally we establish a scaling law relationship that characterizes the fundamental tradeoff between throughput capacity and relay buffer size. In particular, we show that the throughput capacity is at most /spl Theta/(/spl radic/(nb/sub n/)), where b/sub n/ is the size of the relay buffers.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"8 1","pages":"2536-2542 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75449509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
The effect of DNS delays on worm propagation in an IPv6 Internet DNS延迟对IPv6网络中蠕虫传播的影响
A. Kamra, Hanhua Feng, V. Misra, A. Keromytis
It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can exploit the directory and naming services necessary for the functioning of any network, and we model the behavior of such a worm in this paper. We explore via analysis and simulation the spread of such worms in an IPv6 Internet. Our results indicate that such a worm can exhibit propagation speeds comparable to an IPv4 random-scanning worm. We develop a detailed analytical model that reveals the relationship between network parameters and the spreading rate of the worm in an IPv6 world. We also develop a simulator based on our analytical model. Simulation results based on parameters chosen from real measurements and the current Internet indicate that an intelligent worm can spread surprising fast in an IPv6 world by using simple strategies. The performance of the worm depends heavily on these strategies, which in turn depend on how secure the directory and naming services of a network are. As a result, additional work is needed in developing detection and defense mechanisms against future worms, and our work identifies directory and naming services as the natural place to do it.
人们普遍认为,由于地址空间非常稀疏,IPv6提供了更高的安全性,可以抵御随机扫描蠕虫。我们证明了智能蠕虫可以利用任何网络功能所必需的目录和命名服务,并在本文中对这种蠕虫的行为进行了建模。我们通过分析和模拟来探索这种蠕虫在IPv6互联网中的传播。我们的研究结果表明,这种蠕虫可以表现出与IPv4随机扫描蠕虫相当的传播速度。我们开发了一个详细的分析模型,揭示了网络参数和蠕虫在IPv6世界中的传播速度之间的关系。我们还基于我们的分析模型开发了一个模拟器。仿真结果表明,在IPv6环境下,智能蠕虫通过简单的策略就能以惊人的速度传播。蠕虫的性能在很大程度上取决于这些策略,而这些策略又取决于网络的目录和命名服务的安全性。因此,在开发针对未来蠕虫的检测和防御机制方面需要进行额外的工作,我们的工作将目录和命名服务确定为进行此工作的自然场所。
{"title":"The effect of DNS delays on worm propagation in an IPv6 Internet","authors":"A. Kamra, Hanhua Feng, V. Misra, A. Keromytis","doi":"10.1109/INFCOM.2005.1498526","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498526","url":null,"abstract":"It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can exploit the directory and naming services necessary for the functioning of any network, and we model the behavior of such a worm in this paper. We explore via analysis and simulation the spread of such worms in an IPv6 Internet. Our results indicate that such a worm can exhibit propagation speeds comparable to an IPv4 random-scanning worm. We develop a detailed analytical model that reveals the relationship between network parameters and the spreading rate of the worm in an IPv6 world. We also develop a simulator based on our analytical model. Simulation results based on parameters chosen from real measurements and the current Internet indicate that an intelligent worm can spread surprising fast in an IPv6 world by using simple strategies. The performance of the worm depends heavily on these strategies, which in turn depend on how secure the directory and naming services of a network are. As a result, additional work is needed in developing detection and defense mechanisms against future worms, and our work identifies directory and naming services as the natural place to do it.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"2405-2414 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77287400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Optimal load-balancing 最佳的负载平衡
I. Keslassy, Cheng-Shang Chang, N. McKeown, D. Lee
This paper is about load-balancing packets across multiple paths inside a switch, or across a network. It is motivated by the recent interest in load-balanced switches. Load-balanced switches provide an appealing alternative to crossbars with centralized schedulers. A load-balanced switch has no scheduler, is particularly amenable to optics, and - most relevant here -guarantees 100% throughput. A uniform mesh is used to load-balance packets uniformly across all 2-hop paths in the switch. In this paper we explore whether this particular method of load-balancing is optimal in the sense that it achieves the highest throughput for a given capacity of interconnect. The method we use allows the load-balanced switch to be compared with ring, torus and hypercube interconnects, too. We prove that for a given interconnect capacity, the load-balancing mesh has the maximum throughput. Perhaps surprisingly, we find that the best mesh is slightly non-uniform, or biased, and has a throughput of N/(2N - 1), where N is the number of nodes.
本文讨论的是交换机内部或网络中跨多条路径的负载均衡数据包。它的动机是最近对负载均衡交换机的兴趣。负载平衡交换机提供了一种具有集中式调度器的替代方案。负载均衡交换机没有调度器,特别适合光学,并且(这里最相关的)保证100%的吞吐量。均匀网格用于在交换机的所有2跳路径上均匀地负载均衡数据包。在本文中,我们探讨了这种特定的负载平衡方法是否是最佳的,因为它在给定的互连容量下实现了最高的吞吐量。我们使用的方法也允许将负载均衡交换机与环形、环面和超立方体互连进行比较。证明了在给定的互连容量下,负载均衡网具有最大的吞吐量。也许令人惊讶的是,我们发现最好的网格稍微不均匀,或者有偏差,并且吞吐量为N/(2N - 1),其中N是节点数。
{"title":"Optimal load-balancing","authors":"I. Keslassy, Cheng-Shang Chang, N. McKeown, D. Lee","doi":"10.1109/INFCOM.2005.1498452","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498452","url":null,"abstract":"This paper is about load-balancing packets across multiple paths inside a switch, or across a network. It is motivated by the recent interest in load-balanced switches. Load-balanced switches provide an appealing alternative to crossbars with centralized schedulers. A load-balanced switch has no scheduler, is particularly amenable to optics, and - most relevant here -guarantees 100% throughput. A uniform mesh is used to load-balance packets uniformly across all 2-hop paths in the switch. In this paper we explore whether this particular method of load-balancing is optimal in the sense that it achieves the highest throughput for a given capacity of interconnect. The method we use allows the load-balanced switch to be compared with ring, torus and hypercube interconnects, too. We prove that for a given interconnect capacity, the load-balancing mesh has the maximum throughput. Perhaps surprisingly, we find that the best mesh is slightly non-uniform, or biased, and has a throughput of N/(2N - 1), where N is the number of nodes.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"113 1","pages":"1712-1722 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84930791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on long-lived TCP flows TCP vs. TCP:短期TCP流对长期TCP流不利影响的系统研究
Shirin Ebrahimi-Taghizadeh, A. Helmy, S. Gupta
This paper describes systematical development of TCP adversarial scenarios where we use short-lived TCP flows to adversely influence long-lived TCP flows. Our scenarios are interesting since, (a) they point out the increased vulnerabilities of recently proposed scheduling, AQM and routing techniques that further favor short-lived TCP flows and (b) they are more difficult to detect when intentionally found to target long-lived TCP flows. We systematically exploit the ability of TCP flows in slow-start to rapidly capture greater proportion of bandwidth compared to long-lived TCP flows in congestion avoidance phase, to a point where they drive long-lived TCP flows into timeout. We use simulations, analysis and experiments to systematically study the dependence of the severity of impact on long-lived TCP flows on key parameters of short-lived TCP flows-including their locations, durations and numbers, as well as the intervals between consecutive flows. We derive characteristics of pattern of short-lived flows that exhibit extreme adverse impact on long-lived TCP flows. Counter to common beliefs, we show that targeting bottleneck links does not always cause maximal performance degradation for the long-lived flows. In particular, our approach illustrates the interactions between TCP flows and multiple bottleneck links and their sensitivities to correlated losses in the absence of 'non-TCP friendly' flows and paves the way for a systematic synthesis of worst-case congestion scenarios. While randomly generated sequences of short-lived TCP flows may provide some reductions (up to 10%) in the throughput of the long-lived flows, the scenarios we generate cause much greater reductions (>85%) for several TCP variants and for different packet drop policies (DropTail, RED).
本文描述了TCP对抗性场景的系统开发,其中我们使用短期TCP流对长期TCP流产生不利影响。我们的场景很有趣,因为(a)它们指出了最近提出的调度、AQM和路由技术的漏洞增加,这些技术进一步支持短期TCP流;(b)当有意发现它们针对长期TCP流时,它们更难以检测。我们系统地利用TCP流在慢启动阶段的能力,与在拥塞避免阶段的长寿命TCP流相比,快速捕获更大比例的带宽,达到它们将长寿命TCP流驱动到超时的程度。我们使用模拟、分析和实验来系统地研究对长寿命TCP流的影响严重程度对短寿命TCP流的关键参数的依赖关系,包括它们的位置、持续时间和数量,以及连续流之间的间隔。我们得出了短期流模式的特征,这些特征对长期TCP流表现出极端的不利影响。与通常的看法相反,我们表明,针对瓶颈链接并不总是导致长寿命流的最大性能下降。特别是,我们的方法说明了TCP流和多个瓶颈链接之间的相互作用,以及它们在缺乏“非TCP友好”流的情况下对相关损失的敏感性,并为系统地综合最坏情况拥堵场景铺平了道路。虽然随机生成的短时间TCP流序列可能会在长时间流的吞吐量中提供一些减少(高达10%),但我们生成的场景对于几个TCP变体和不同的数据包丢弃策略(DropTail, RED)会导致更大的减少(>85%)。
{"title":"TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on long-lived TCP flows","authors":"Shirin Ebrahimi-Taghizadeh, A. Helmy, S. Gupta","doi":"10.1109/INFCOM.2005.1498322","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498322","url":null,"abstract":"This paper describes systematical development of TCP adversarial scenarios where we use short-lived TCP flows to adversely influence long-lived TCP flows. Our scenarios are interesting since, (a) they point out the increased vulnerabilities of recently proposed scheduling, AQM and routing techniques that further favor short-lived TCP flows and (b) they are more difficult to detect when intentionally found to target long-lived TCP flows. We systematically exploit the ability of TCP flows in slow-start to rapidly capture greater proportion of bandwidth compared to long-lived TCP flows in congestion avoidance phase, to a point where they drive long-lived TCP flows into timeout. We use simulations, analysis and experiments to systematically study the dependence of the severity of impact on long-lived TCP flows on key parameters of short-lived TCP flows-including their locations, durations and numbers, as well as the intervals between consecutive flows. We derive characteristics of pattern of short-lived flows that exhibit extreme adverse impact on long-lived TCP flows. Counter to common beliefs, we show that targeting bottleneck links does not always cause maximal performance degradation for the long-lived flows. In particular, our approach illustrates the interactions between TCP flows and multiple bottleneck links and their sensitivities to correlated losses in the absence of 'non-TCP friendly' flows and paves the way for a systematic synthesis of worst-case congestion scenarios. While randomly generated sequences of short-lived TCP flows may provide some reductions (up to 10%) in the throughput of the long-lived flows, the scenarios we generate cause much greater reductions (>85%) for several TCP variants and for different packet drop policies (DropTail, RED).","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"7 1","pages":"926-937 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85587052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
A measurement study of Internet bottlenecks 互联网瓶颈的测量研究
Ningning Hu, Erran L. Li, Z. Morley Mao, P. Steenkiste, Jia Wang
Recent advances in Internet measurement tools have made it possible to locate bottleneck links that constrain the available bandwidth of Internet paths. In this paper, we provide a detailed study of Internet path bottlenecks. We focus on the following four aspects: the persistence of bottleneck location, the sharing of bottlenecks among destination clusters, the packet loss and queueing delay of bottleneck links, and the relationship with router and link properties, including router CPU load, router memory load, link traffic load, and link capacity. We find that 20% - 30% of the source-destination pairs in our measurement have a persistent bottleneck; fewer than 10% of the destinations in a prefix cluster share a bottleneck more than half of the time; 60% of the bottlenecks on lossy paths can be correlated with a loss point no more than 2 hops away; and bottlenecks can be clearly correlated with link load, while presenting no strong relationship with link capacity, router CPU and memory load.
互联网测量工具的最新进展使得定位限制互联网路径可用带宽的瓶颈链路成为可能。在本文中,我们提供了一个详细的研究互联网路径瓶颈。我们重点研究了以下四个方面:瓶颈位置的持久性、目标集群之间的瓶颈共享、瓶颈链路的丢包和排队延迟,以及与路由器和链路属性(包括路由器CPU负载、路由器内存负载、链路流量负载和链路容量)的关系。我们发现,在我们的测量中,20% - 30%的源-目的对存在持续的瓶颈;前缀集群中不到10%的目的地在超过一半的时间内共享瓶颈;损耗路径上60%的瓶颈可以与不超过2跳的损耗点相关联;瓶颈与链路负载有明显的相关性,而与链路容量、路由器CPU和内存负载没有很强的相关性。
{"title":"A measurement study of Internet bottlenecks","authors":"Ningning Hu, Erran L. Li, Z. Morley Mao, P. Steenkiste, Jia Wang","doi":"10.1109/INFCOM.2005.1498450","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498450","url":null,"abstract":"Recent advances in Internet measurement tools have made it possible to locate bottleneck links that constrain the available bandwidth of Internet paths. In this paper, we provide a detailed study of Internet path bottlenecks. We focus on the following four aspects: the persistence of bottleneck location, the sharing of bottlenecks among destination clusters, the packet loss and queueing delay of bottleneck links, and the relationship with router and link properties, including router CPU load, router memory load, link traffic load, and link capacity. We find that 20% - 30% of the source-destination pairs in our measurement have a persistent bottleneck; fewer than 10% of the destinations in a prefix cluster share a bottleneck more than half of the time; 60% of the bottlenecks on lossy paths can be correlated with a loss point no more than 2 hops away; and bottlenecks can be clearly correlated with link load, while presenting no strong relationship with link capacity, router CPU and memory load.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"36 1","pages":"1689-1700 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85863405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Differential delay aware routing for Ethernet over SONET/SDH 基于SONET/SDH的差分延迟感知以太网路由
A. Srivastava, S. Acharya, M. Alicherry, B. Gupta, P. Risbood
The virtual concatenation protocol in SONET/SDH has ushered in a novel routing paradigm that enables a circuit to be "split" and routed over multiple paths. However, this diverse routing causes differential delay among the paths which can impact service if not accounted for in the routing. In this paper, we introduce the differential delay aware routing problem and show that it is not only NP-complete but is also provably hard to approximate within a constant factor. However, by transforming it into a flow routing formulation, we can derive effective, practical solutions. We present various algorithms and use extensive simulations to show that they are a good match to an "ideal" integer linear programming formulation. We also highlight how the differential delay data allows individual link delays to be reverse-engineered. We propose three algorithms to derive link delays including one that leverages the flexibility in the virtual concatenation protocol bits. Given the rise of next-generation applications such as online games where latency information is key, this knowledge of link delays, heretofore only loosely approximated, enables the telecom infrastructure to be more effective in supporting these applications.
SONET/SDH中的虚拟连接协议开创了一种新的路由模式,使电路能够“分裂”并在多条路径上路由。然而,这种不同的路由会导致路径之间的延迟差异,如果在路由中没有考虑到这一点,可能会影响服务。本文介绍了差分延迟感知路由问题,并证明了它不仅是np完全的,而且在一个常数因子内难以近似。然而,通过将其转化为流动路径公式,我们可以得出有效、实用的解决方案。我们提出了各种算法,并使用广泛的模拟来证明它们与“理想”整数线性规划公式很好地匹配。我们还强调了差分延迟数据如何允许对单个链路延迟进行反向工程。我们提出了三种算法来推导链路延迟,其中一种算法利用了虚拟连接协议位的灵活性。考虑到下一代应用程序的兴起,例如延迟信息是关键的在线游戏,这种对链路延迟的了解,迄今为止只是粗略的近似,使电信基础设施能够更有效地支持这些应用程序。
{"title":"Differential delay aware routing for Ethernet over SONET/SDH","authors":"A. Srivastava, S. Acharya, M. Alicherry, B. Gupta, P. Risbood","doi":"10.1109/INFCOM.2005.1498339","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498339","url":null,"abstract":"The virtual concatenation protocol in SONET/SDH has ushered in a novel routing paradigm that enables a circuit to be \"split\" and routed over multiple paths. However, this diverse routing causes differential delay among the paths which can impact service if not accounted for in the routing. In this paper, we introduce the differential delay aware routing problem and show that it is not only NP-complete but is also provably hard to approximate within a constant factor. However, by transforming it into a flow routing formulation, we can derive effective, practical solutions. We present various algorithms and use extensive simulations to show that they are a good match to an \"ideal\" integer linear programming formulation. We also highlight how the differential delay data allows individual link delays to be reverse-engineered. We propose three algorithms to derive link delays including one that leverages the flexibility in the virtual concatenation protocol bits. Given the rise of next-generation applications such as online games where latency information is key, this knowledge of link delays, heretofore only loosely approximated, enables the telecom infrastructure to be more effective in supporting these applications.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"08 1","pages":"1117-1127 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85980564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
MiNT: a miniaturized network testbed for mobile wireless research MiNT:用于移动无线研究的小型网络测试平台
Pradipta De, Ashish Raniwala, Srikant Sharma, T. Chiueh
Most mobile wireless networking research today relies on simulations. However, fidelity of simulation results has always been a concern, especially when the protocols being studied are affected by the propagation and interference characteristics of the radio channels. Inherent difficulty in faithfully modeling the wireless channel characteristics has encouraged several researchers to build wireless network testbeds. A full-fledged wireless testbed is spread over a large physical space because of the wide coverage area of radio signals. This makes a large-scale testbed difficult and expensive to set up, configure, and manage. This paper describes a miniaturized 802.11b-based, multi-hop wireless network testbed called MiNT. MiNT occupies a significantly small space, and dramatically reduces the efforts required in setting up a multi-hop wireless network used for wireless application/protocol testing and evaluation. MiNT is also a hybrid simulation platform that can execute ns-2 simulation scripts with the link, MAC and physical layer in the simulator replaced by real hardware. We demonstrate the fidelity of MiNT by comparing experimental results on it with similar experiments conducted on a non-miniaturized testbed. We also compare the results of experiments conducted using hybrid simulation on MiNT with those obtained using pure simulation. Finally, using a case study we show the usefulness of MiNT in wireless application testing and evaluation.
目前,大多数移动无线网络研究都依赖于模拟。然而,仿真结果的保真度一直是一个值得关注的问题,特别是当所研究的协议受到无线电信道的传播和干扰特性的影响时。忠实地模拟无线信道特性的固有困难促使一些研究人员建立无线网络试验台。由于无线电信号的覆盖范围广,一个成熟的无线试验台要分布在一个很大的物理空间上。这使得大型测试平台的设置、配置和管理变得困难且昂贵。本文介绍了一种小型化的基于802.11b的多跳无线网络测试平台MiNT。MiNT占用的空间非常小,并且大大减少了设置用于无线应用程序/协议测试和评估的多跳无线网络所需的工作量。MiNT也是一个混合仿真平台,可以执行ns-2仿真脚本,将模拟器中的链路、MAC和物理层替换为真实硬件。通过与非小型化试验台的实验结果进行比较,证明了MiNT的保真度。我们还比较了混合模拟和纯模拟的实验结果。最后,通过一个案例研究,我们展示了MiNT在无线应用程序测试和评估中的有用性。
{"title":"MiNT: a miniaturized network testbed for mobile wireless research","authors":"Pradipta De, Ashish Raniwala, Srikant Sharma, T. Chiueh","doi":"10.1109/INFCOM.2005.1498556","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498556","url":null,"abstract":"Most mobile wireless networking research today relies on simulations. However, fidelity of simulation results has always been a concern, especially when the protocols being studied are affected by the propagation and interference characteristics of the radio channels. Inherent difficulty in faithfully modeling the wireless channel characteristics has encouraged several researchers to build wireless network testbeds. A full-fledged wireless testbed is spread over a large physical space because of the wide coverage area of radio signals. This makes a large-scale testbed difficult and expensive to set up, configure, and manage. This paper describes a miniaturized 802.11b-based, multi-hop wireless network testbed called MiNT. MiNT occupies a significantly small space, and dramatically reduces the efforts required in setting up a multi-hop wireless network used for wireless application/protocol testing and evaluation. MiNT is also a hybrid simulation platform that can execute ns-2 simulation scripts with the link, MAC and physical layer in the simulator replaced by real hardware. We demonstrate the fidelity of MiNT by comparing experimental results on it with similar experiments conducted on a non-miniaturized testbed. We also compare the results of experiments conducted using hybrid simulation on MiNT with those obtained using pure simulation. Finally, using a case study we show the usefulness of MiNT in wireless application testing and evaluation.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"30 6 1","pages":"2731-2742 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83001234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1