首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
A novel analytical model for electronic and optical switches with shared buffer 一种新的共享缓冲器电子光开关解析模型
Zhenghao Zhang, Yuanyuan Yang
Switches with shared buffer have lower packet loss probabilities than other types of switches when the sizes of the buffers are the same. In the past, the performance analysis for electronic shared buffer switches has been carried out extensively. However, due to the strong dependencies of the output queues in the buffer, it is very difficult to find a good analytical model. Existing models are either accurate but have exponential complexities or not very accurate. In this paper, we propose a novel analytical model called the aggregation model for switches with shared buffer. This model can be used for analyzing both electronic and optical switches, and has perfect accuracies under all tested conditions and has polynomial time complexity. It is based on the idea of induction: first find the behavior of 2 queues, then aggregate them into one block; then find the behavior of 3 queues while regarding 2 of the queues as one block, then aggregate the 3 queues into one block; then aggregate 4 queues and so on. When a sufficient number of queues have been aggregated, the behavior of the entire switch is found. We believe that the new model represents the best analytical model for shared buffer switches so far.
在缓冲区大小相同的情况下,具有共享缓冲区的交换机比其他类型的交换机丢包概率更低。过去,对电子共享缓冲开关的性能分析进行了大量的研究。然而,由于缓冲区中输出队列的强依赖性,很难找到一个好的分析模型。现有的模型要么是准确的,但具有指数复杂性,要么不是很准确。本文提出了一种新的具有共享缓冲器的交换器的聚合分析模型。该模型可用于分析电子和光开关,在所有测试条件下都具有良好的精度和多项式时间复杂度。它基于归纳的思想:首先找到2个队列的行为,然后将它们聚合成一个块;然后找出3个队列的行为,其中2个队列作为一个块,然后将3个队列聚合成一个块;然后聚合4个队列,以此类推。当聚合了足够数量的队列时,就可以找到整个交换机的行为。我们相信新模型代表了迄今为止共享缓冲开关的最佳分析模型。
{"title":"A novel analytical model for electronic and optical switches with shared buffer","authors":"Zhenghao Zhang, Yuanyuan Yang","doi":"10.1109/INFCOM.2005.1497911","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497911","url":null,"abstract":"Switches with shared buffer have lower packet loss probabilities than other types of switches when the sizes of the buffers are the same. In the past, the performance analysis for electronic shared buffer switches has been carried out extensively. However, due to the strong dependencies of the output queues in the buffer, it is very difficult to find a good analytical model. Existing models are either accurate but have exponential complexities or not very accurate. In this paper, we propose a novel analytical model called the aggregation model for switches with shared buffer. This model can be used for analyzing both electronic and optical switches, and has perfect accuracies under all tested conditions and has polynomial time complexity. It is based on the idea of induction: first find the behavior of 2 queues, then aggregate them into one block; then find the behavior of 3 queues while regarding 2 of the queues as one block, then aggregate the 3 queues into one block; then aggregate 4 queues and so on. When a sufficient number of queues have been aggregated, the behavior of the entire switch is found. We believe that the new model represents the best analytical model for shared buffer switches so far.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"128 1","pages":"420-431 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88344306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On optimal partitioning of realtime traffic over multiple paths 多路径实时流量的最优划分
S. Mao, S. Panwar, Yiwei Thomas Hou
Multipath transport provides higher usable bandwidth for a session. It has also been shown to provide load balancing and error resilience for end-to-end multimedia sessions. Two key issues in the use of multiple paths are (1) how to minimize the end-to-end delay, which now includes the delay along the paths and the resequencing delay at the receiver, and (2) how to select paths. In this paper, we present an analytical framework for the optimal partitioning of realtime multimedia traffic that minimizes the total end-to-end delay. Specifically, we formulate optimal traffic partitioning as a constrained optimization problem using deterministic network calculus, and derive its closed form solution. Compared with previous work, our scheme is simpler to implement and enforce. This analysis also greatly simplifies the solution to the path selection problem as compared to previous efforts. Analytical results show that for a given flow and a set of paths, we can choose a minimal subset to achieve the minimum end-to-end delay with O(N) time, where N is the number of available paths. The selected path set is optimal in the sense that adding any rejected path to the set will only increase the end-to-end delay.
多路径传输为会话提供了更高的可用带宽。它还被证明可以为端到端多媒体会话提供负载平衡和错误恢复能力。使用多路径的两个关键问题是(1)如何最小化端到端延迟,现在包括沿路径的延迟和接收器的重排序延迟,以及(2)如何选择路径。在本文中,我们提出了一个分析框架,用于实时多媒体流量的最佳划分,以最小化端到端总延迟。具体来说,我们利用确定性网络演算将最优流量划分问题表述为一个约束优化问题,并推导出其封闭形式解。与以往的工作相比,我们的方案更容易实现和执行。与之前的工作相比,这种分析也大大简化了路径选择问题的解决方案。分析结果表明,对于给定的流和一组路径,我们可以选择一个最小子集,在O(N)时间内实现最小的端到端延迟,其中N为可用路径的数量。所选路径集是最优的,因为将任何被拒绝的路径添加到该集只会增加端到端延迟。
{"title":"On optimal partitioning of realtime traffic over multiple paths","authors":"S. Mao, S. Panwar, Yiwei Thomas Hou","doi":"10.1109/INFCOM.2005.1498519","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498519","url":null,"abstract":"Multipath transport provides higher usable bandwidth for a session. It has also been shown to provide load balancing and error resilience for end-to-end multimedia sessions. Two key issues in the use of multiple paths are (1) how to minimize the end-to-end delay, which now includes the delay along the paths and the resequencing delay at the receiver, and (2) how to select paths. In this paper, we present an analytical framework for the optimal partitioning of realtime multimedia traffic that minimizes the total end-to-end delay. Specifically, we formulate optimal traffic partitioning as a constrained optimization problem using deterministic network calculus, and derive its closed form solution. Compared with previous work, our scheme is simpler to implement and enforce. This analysis also greatly simplifies the solution to the path selection problem as compared to previous efforts. Analytical results show that for a given flow and a set of paths, we can choose a minimal subset to achieve the minimum end-to-end delay with O(N) time, where N is the number of available paths. The selected path set is optimal in the sense that adding any rejected path to the set will only increase the end-to-end delay.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"75 1","pages":"2325-2336 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85987770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Compact neighbor discovery: a bandwidth defense through bandwidth optimization 紧凑邻居发现:通过带宽优化实现带宽防御
Pars Mutaf, C. Castelluccia
We present a stateless defense against the neighbor discovery denial-of-service (ND-DoS) attack in IPv6. The ND-DoS attack consists of remotely flooding a target subnet with bogus packets destined for random interface identifiers; a different one for each malicious packet. The 128-bit IPv6 address reserves its 64 low-order bits for the interface ID. Consequently, the malicious packets are very likely to fall on previously unresolved addresses and the target access router (or leaf router) is obligated to resolve these addresses by sending neighbor solicitation packets. Neighbor solicitation packets are link layer multicast (or broadcast), and hence also forwarded by bridges. As a consequence, the attack may consume important bandwidth in subnets with wireless bridges, or access points. This problem is particularly important in the presence of mobile IPv6 devices that expect incoming sessions from the Internet. In this case, address resolution is crucial for the access router to reliably deliver incoming sessions to idle mobile devices with unknown MAC addresses. We propose a novel neighbor solicitation technique using Bloom filters. Multiple IPv6 addresses (bogus or real) that are waiting in the access router's address resolution queue are compactly represented using a Bloom filter. By broadcasting a single neighbor solicitation message that carries the Bloom filter, multiple IPv6 addresses are concurrently solicited. Legitimate neighbor solicitation triggering packets are not denied service. An on-link host can detect its address in the received Bloom filter and return its MAC address to the access router. A bandwidth gain around 40 can be achieved in all cells of the target subnet. This approach that we call compact neighbor discovery (CND) is the first bandwidth DoS defense that we are aware of to employ a bandwidth optimization.
我们提出了一种针对IPv6邻居发现拒绝服务(ND-DoS)攻击的无状态防御。ND-DoS攻击包括远程淹没目标子网,向随机接口标识发送虚假数据包;每个恶意数据包使用不同的一个。128位IPv6地址为接口ID保留64位低阶位。因此,恶意数据包很可能落在以前未解析的地址上,目标访问路由器(或叶子路由器)有义务通过发送邻居请求数据包来解析这些地址。邻居请求报文是链路层组播(或广播),因此也通过网桥转发。因此,攻击可能会消耗具有无线网桥或接入点的子网中的重要带宽。在移动IPv6设备的存在下,这个问题尤其重要,因为这些设备期望从Internet传入会话。在这种情况下,地址解析对于接入路由器可靠地将传入会话发送到MAC地址未知的空闲移动设备至关重要。我们提出了一种新的邻居请求技术,使用布隆过滤器。在访问路由器的地址解析队列中等待的多个IPv6地址(虚假或真实)使用Bloom过滤器紧凑地表示。通过广播携带Bloom过滤器的单个邻居请求消息,可以同时请求多个IPv6地址。合法邻居请求触发报文不被拒绝服务。链路上的主机可以在收到的Bloom过滤器中检测到它的地址,并将它的MAC地址返回给访问路由器。在目标子网的所有单元中可以实现40左右的带宽增益。我们称之为紧凑邻居发现(CND)的这种方法是我们所知道的第一个带宽DoS防御,采用带宽优化。
{"title":"Compact neighbor discovery: a bandwidth defense through bandwidth optimization","authors":"Pars Mutaf, C. Castelluccia","doi":"10.1109/INFCOM.2005.1498554","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498554","url":null,"abstract":"We present a stateless defense against the neighbor discovery denial-of-service (ND-DoS) attack in IPv6. The ND-DoS attack consists of remotely flooding a target subnet with bogus packets destined for random interface identifiers; a different one for each malicious packet. The 128-bit IPv6 address reserves its 64 low-order bits for the interface ID. Consequently, the malicious packets are very likely to fall on previously unresolved addresses and the target access router (or leaf router) is obligated to resolve these addresses by sending neighbor solicitation packets. Neighbor solicitation packets are link layer multicast (or broadcast), and hence also forwarded by bridges. As a consequence, the attack may consume important bandwidth in subnets with wireless bridges, or access points. This problem is particularly important in the presence of mobile IPv6 devices that expect incoming sessions from the Internet. In this case, address resolution is crucial for the access router to reliably deliver incoming sessions to idle mobile devices with unknown MAC addresses. We propose a novel neighbor solicitation technique using Bloom filters. Multiple IPv6 addresses (bogus or real) that are waiting in the access router's address resolution queue are compactly represented using a Bloom filter. By broadcasting a single neighbor solicitation message that carries the Bloom filter, multiple IPv6 addresses are concurrently solicited. Legitimate neighbor solicitation triggering packets are not denied service. An on-link host can detect its address in the received Bloom filter and return its MAC address to the access router. A bandwidth gain around 40 can be achieved in all cells of the target subnet. This approach that we call compact neighbor discovery (CND) is the first bandwidth DoS defense that we are aware of to employ a bandwidth optimization.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"24 1","pages":"2711-2719 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86687343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Multipath routing for multiple description video in wireless ad hoc networks 无线自组织网络中多描述视频的多路径路由
S. Mao, Yiwei Thomas Hou, Xiaolin Cheng, H. Sherali, S. Midkiff
As developments in wireless ad hoc networks continue, there is an increasing expectation with regard to supporting content-rich multimedia communications (e.g., video) in such networks, in addition to simple data communications. The recent advances in multiple description (MD) video coding have made it highly suitable for multimedia applications in such networks. In this paper, we study the important problem of multipath routing for MD video in wireless ad hoc networks. We follow an application-centric cross-layer approach and formulate an optimal routing problem that minimizes the application layer video distortion. We show that the optimization problem has a highly complex objective function and an exact analytic solution is not obtainable. However, we find that a meta-heuristic approach such as genetic algorithms (GAs) is eminently effective in addressing this type of complex cross-layer optimization problems. We provide a detailed solution procedure for the GA-based approach, as well as a tight lower bound for video distortion. We use numerical results to demonstrate the superior performance of the GA-based approach and compare it to several other approaches. Our efforts in this work provide an important methodology for addressing complex cross-layer optimization problems, particularly those involving application and network layers.
随着无线特设网络的继续发展,除了简单的数据通信外,人们越来越期望在这种网络中支持内容丰富的多媒体通信(例如视频)。多描述(MD)视频编码技术的最新进展使其非常适合此类网络中的多媒体应用。本文研究了无线自组织网络中MD视频的多径路由问题。我们遵循以应用为中心的跨层方法,并制定了一个最佳路由问题,以最大限度地减少应用层视频失真。结果表明,该优化问题具有高度复杂的目标函数,无法得到精确的解析解。然而,我们发现诸如遗传算法(GAs)之类的元启发式方法在解决这类复杂的跨层优化问题方面非常有效。我们提供了基于遗传算法的方法的详细解决程序,以及视频失真的严格下界。我们使用数值结果来证明基于遗传算法的方法的优越性能,并将其与其他几种方法进行比较。我们在这项工作中的努力为解决复杂的跨层优化问题提供了一个重要的方法,特别是那些涉及应用程序和网络层的问题。
{"title":"Multipath routing for multiple description video in wireless ad hoc networks","authors":"S. Mao, Yiwei Thomas Hou, Xiaolin Cheng, H. Sherali, S. Midkiff","doi":"10.1109/INFCOM.2005.1497939","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497939","url":null,"abstract":"As developments in wireless ad hoc networks continue, there is an increasing expectation with regard to supporting content-rich multimedia communications (e.g., video) in such networks, in addition to simple data communications. The recent advances in multiple description (MD) video coding have made it highly suitable for multimedia applications in such networks. In this paper, we study the important problem of multipath routing for MD video in wireless ad hoc networks. We follow an application-centric cross-layer approach and formulate an optimal routing problem that minimizes the application layer video distortion. We show that the optimization problem has a highly complex objective function and an exact analytic solution is not obtainable. However, we find that a meta-heuristic approach such as genetic algorithms (GAs) is eminently effective in addressing this type of complex cross-layer optimization problems. We provide a detailed solution procedure for the GA-based approach, as well as a tight lower bound for video distortion. We use numerical results to demonstrate the superior performance of the GA-based approach and compare it to several other approaches. Our efforts in this work provide an important methodology for addressing complex cross-layer optimization problems, particularly those involving application and network layers.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"18 1","pages":"740-750 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81328243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Minimum energy accumulative routing in wireless networks 无线网络中的最小能量累积路由
Jiangzhuo Chen, L. Jia, Xin Liu, G. Noubir, Ravi Sundaram
In this paper, we propose to address the energy efficient routing problem in multi-hop wireless networks with accumulative relay. In the accumulative relay model, partially overheard signals of previous transmissions for the same packet are used to decode it using a maximal ratio combiner technique [J.G. Proakis, 2001]. Therefore, additional energy saving can be achieved over traditional energy efficient routing. The idea of accumulative relay originates from the study of relay channel in information theory with a main focus on network capacity. It has been independently applied to minimum-energy broadcasting in L.G. Manish Agrawal et al. (2004), I. Maric and R. Yates (2002). We formulate the minimum energy accumulative routing problem (MEAR) and study it. We obtain hardness of approximation results counterbalanced with good heuristic solutions which we validate using simulations. Without energy accumulation, the classic shortest path (SP) algorithm finds the minimum energy path for a source-destination pair. However, we show that with energy accumulation, the SP can be arbitrarily bad. We turn our attention to heuristics and show that any optimal solution of MEAR can be converted to a canonical form - wave path. Armed with this insight, we develop a polynomial time heuristic to efficiently search over the space of all wavepaths. Simulation results show that our heuristic can provide more than 30% energy saving over minimum energy routing without accumulative relay. We also discuss the implementation issues of such a scheme.
本文提出了一种基于累积中继的多跳无线网络节能路由问题。在累积中继模型中,使用最大比组合技术对同一数据包的先前传输的部分偷听信号进行解码[j]Proakis, 2001]。因此,可以在传统的节能路由上实现额外的节能。累加中继的思想起源于信息论中对中继信道的研究,主要关注网络容量。L.G. Manish Agrawal等人(2004)、I. Maric和R. Yates(2002)分别将其独立应用于最小能量广播。提出了最小能量累积路由问题,并对其进行了研究。我们得到了与良好的启发式解相平衡的近似结果的硬度,我们用模拟验证了这一点。经典的最短路径(SP)算法在没有能量积累的情况下,寻找源-目标对的最小能量路径。然而,我们表明,随着能量的积累,SP可以任意坏。我们将注意力转向启发式方法,并证明了MEAR的任何最优解都可以转换为规范形式-波路径。有了这个见解,我们开发了一个多项式时间启发式来有效地搜索所有波路径的空间。仿真结果表明,该算法比无累积继电器的最小能量路由节能30%以上。我们还讨论了该方案的实施问题。
{"title":"Minimum energy accumulative routing in wireless networks","authors":"Jiangzhuo Chen, L. Jia, Xin Liu, G. Noubir, Ravi Sundaram","doi":"10.1109/INFCOM.2005.1498466","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498466","url":null,"abstract":"In this paper, we propose to address the energy efficient routing problem in multi-hop wireless networks with accumulative relay. In the accumulative relay model, partially overheard signals of previous transmissions for the same packet are used to decode it using a maximal ratio combiner technique [J.G. Proakis, 2001]. Therefore, additional energy saving can be achieved over traditional energy efficient routing. The idea of accumulative relay originates from the study of relay channel in information theory with a main focus on network capacity. It has been independently applied to minimum-energy broadcasting in L.G. Manish Agrawal et al. (2004), I. Maric and R. Yates (2002). We formulate the minimum energy accumulative routing problem (MEAR) and study it. We obtain hardness of approximation results counterbalanced with good heuristic solutions which we validate using simulations. Without energy accumulation, the classic shortest path (SP) algorithm finds the minimum energy path for a source-destination pair. However, we show that with energy accumulation, the SP can be arbitrarily bad. We turn our attention to heuristics and show that any optimal solution of MEAR can be converted to a canonical form - wave path. Armed with this insight, we develop a polynomial time heuristic to efficiently search over the space of all wavepaths. Simulation results show that our heuristic can provide more than 30% energy saving over minimum energy routing without accumulative relay. We also discuss the implementation issues of such a scheme.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"24 1","pages":"1875-1886 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84364941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Capacity allocation and routing of locally restorable bandwidth guaranteed connections 本地可恢复带宽保证连接的容量分配和路由
R. Bhatia, M. Kodialam, T. V. Lakshman, S. Sengupta
An important feature of MPLS networks is local restoration where detour paths are set-up a priori. The detour is such that failed links or nodes can be bypassed locally from the first node that is upstream from the failures. This local bypass activation from the first detection point for failures permits much faster recovery than end-to-end path based mechanisms that require failure information to propagate to the network edges. However, local restoration of bandwidth guaranteed connections can be expensive in the additional network capacity needed. Hence, it is important to minimize and share restoration capacity. The problem of routing with local restoration requirements has been studied previously in a dynamic on-line setting. However, there are no satisfactory algorithms for the problem of pre-provisioning fast restorable connections when the aggregate traffic demands are known (as would be the case when a set of routers are to be interconnected over an optical network or for pre-provisioned ATM over MPLS overlays). The contribution of this paper is a fast combinatorial approximation algorithm for maximizing throughput when the routed traffic is required to be locally restorable. To the best of our knowledge, this is the first combinatorial algorithm for the problem with a performance guarantee. Our algorithm is a fully polynomial time approximation scheme (FPTAS), i.e., for any given /spl epsi/>0, it guarantees (1+/spl epsi/)-factor closeness to the optimal solution, and runs in time polynomial in the network size and 1//spl epsi/. We compare the throughput of locally restorable routing with that of unprotected routing and 1+1-dedicated path protection on representative ISP topologies.
MPLS网络的一个重要特点是局部恢复,即预先设置迂回路径。通过绕道,可以从故障上游的第一个节点在本地绕过失败的链路或节点。与需要将故障信息传播到网络边缘的基于端到端路径的机制相比,这种从第一个故障检测点开始的本地旁路激活允许更快的恢复。但是,在需要额外的网络容量的情况下,带宽保证连接的本地恢复可能是昂贵的。因此,最小化和共享恢复能力是非常重要的。在动态在线环境下,具有局部恢复要求的路由问题已经被研究过。然而,当总流量需求已知时,对于预先配置快速可恢复连接的问题,目前还没有令人满意的算法(例如,当一组路由器要通过光网络互连时,或者在MPLS覆盖上预先配置ATM时)。本文的贡献是一种快速组合近似算法,用于在路由流量需要局部可恢复时最大化吞吐量。据我们所知,这是该问题的第一个具有性能保证的组合算法。我们的算法是一个完全多项式时间逼近方案(FPTAS),即对于任何给定的/spl epsi/>0,它保证(1+/spl epsi/)因子接近最优解,并且在网络大小和1//spl epsi/下以时间多项式运行。在代表性的ISP拓扑上,比较了本地可恢复路由与不受保护路由和1+1专用路径保护的吞吐量。
{"title":"Capacity allocation and routing of locally restorable bandwidth guaranteed connections","authors":"R. Bhatia, M. Kodialam, T. V. Lakshman, S. Sengupta","doi":"10.1109/INFCOM.2005.1498552","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498552","url":null,"abstract":"An important feature of MPLS networks is local restoration where detour paths are set-up a priori. The detour is such that failed links or nodes can be bypassed locally from the first node that is upstream from the failures. This local bypass activation from the first detection point for failures permits much faster recovery than end-to-end path based mechanisms that require failure information to propagate to the network edges. However, local restoration of bandwidth guaranteed connections can be expensive in the additional network capacity needed. Hence, it is important to minimize and share restoration capacity. The problem of routing with local restoration requirements has been studied previously in a dynamic on-line setting. However, there are no satisfactory algorithms for the problem of pre-provisioning fast restorable connections when the aggregate traffic demands are known (as would be the case when a set of routers are to be interconnected over an optical network or for pre-provisioned ATM over MPLS overlays). The contribution of this paper is a fast combinatorial approximation algorithm for maximizing throughput when the routed traffic is required to be locally restorable. To the best of our knowledge, this is the first combinatorial algorithm for the problem with a performance guarantee. Our algorithm is a fully polynomial time approximation scheme (FPTAS), i.e., for any given /spl epsi/>0, it guarantees (1+/spl epsi/)-factor closeness to the optimal solution, and runs in time polynomial in the network size and 1//spl epsi/. We compare the throughput of locally restorable routing with that of unprotected routing and 1+1-dedicated path protection on representative ISP topologies.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"152 1","pages":"2691-2701 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84803057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Designing wireless radio access networks for third generation cellular networks 第三代蜂窝网络无线接入网络设计
T. Bu, M. Chan, R. Ramjee
In third generation (3G) cellular networks, base stations are connected to base station controllers by point-to-point (usually T1/E1) links. However, today's T1/E1 based buck haul network is not a good match for next generation wireless networks because symmetric T1s is not an efficient way to carry bursty and asymmetric data traffic. In this paper, we propose designing an IEEE 802.16-based wireless radio access network to carry the traffic from the base station to the radio network controller. 802.16 has several characteristics that make it a better match for 3G radio access networks including its support for time division duplex mode that supports asymmetry efficiently. In this paper, we tackle the following question; given a layout of base stations and base station controllers, how do we design the topology of the 802.16 radio access network connecting the base stations to the base station controller that minimizes the number of 802.16 links used while meeting the expected demands of traffic from/to the base stations? We make three contributions: we first show that finding the optimal solution to the problem is NP-hard. We then provide heuristics that perform close to the optimal solution. Finally, we address the reliability issue of failure of 802.16 links or nodes by designing algorithms to create topologies that can handle single failures effectively.
在第三代(3G)蜂窝网络中,基站通过点对点(通常是T1/E1)链路连接到基站控制器。然而,今天基于T1/E1的buck haul网络并不适合下一代无线网络,因为对称的T1并不是承载突发和非对称数据流量的有效方式。在本文中,我们提出设计一个基于IEEE 802.16的无线接入网来承载从基站到无线网络控制器的流量。802.16有几个特点,使它更好地匹配3G无线接入网络,包括它支持时分双工模式,有效地支持不对称。在本文中,我们解决以下问题;给定基站和基站控制器的布局,我们如何设计连接基站和基站控制器的802.16无线接入网络的拓扑结构,以尽量减少使用的802.16链路数量,同时满足进出基站的预期流量需求?我们做出了三个贡献:我们首先证明了找到问题的最优解是np困难的。然后我们提供执行接近最优解决方案的启发式方法。最后,我们通过设计算法来创建可以有效处理单个故障的拓扑,从而解决802.16链路或节点故障的可靠性问题。
{"title":"Designing wireless radio access networks for third generation cellular networks","authors":"T. Bu, M. Chan, R. Ramjee","doi":"10.1109/INFCOM.2005.1497880","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497880","url":null,"abstract":"In third generation (3G) cellular networks, base stations are connected to base station controllers by point-to-point (usually T1/E1) links. However, today's T1/E1 based buck haul network is not a good match for next generation wireless networks because symmetric T1s is not an efficient way to carry bursty and asymmetric data traffic. In this paper, we propose designing an IEEE 802.16-based wireless radio access network to carry the traffic from the base station to the radio network controller. 802.16 has several characteristics that make it a better match for 3G radio access networks including its support for time division duplex mode that supports asymmetry efficiently. In this paper, we tackle the following question; given a layout of base stations and base station controllers, how do we design the topology of the 802.16 radio access network connecting the base stations to the base station controller that minimizes the number of 802.16 links used while meeting the expected demands of traffic from/to the base stations? We make three contributions: we first show that finding the optimal solution to the problem is NP-hard. We then provide heuristics that perform close to the optimal solution. Finally, we address the reliability issue of failure of 802.16 links or nodes by designing algorithms to create topologies that can handle single failures effectively.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"27 1","pages":"68-78 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79297521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Network overlay construction under limited end-to-end reachability 有限端到端可达性下的网络覆盖结构
Wenjie Wang, Cheng Jin, S. Jamin
Network-overlay construction today assumes two-way communication capability - each host can initiate outgoing connections as well as accepting incoming connections. This is often not true on the current Internet due to several reasons, for example, the use of network address translation (NAT) and firewalls. Our experiments with eDonkey and Gnutella file-sharing systems reveal that as many as 36% of the hosts may be guarded - not accepting incoming connections. This presents a challenge to overlay construction because not all hosts are capable of receiving and forwarding requests. We propose an overlay optimization called e* to help existing overlay protocols overcome the reachability problem. Furthermore, e* builds very efficient overlay networks in terms of latency. Under realistic scenarios involving guarded hosts, e* can reduce the average overlay latency by 28-61% compared with existing protocols.
今天的网络覆盖结构假定具有双向通信能力——每个主机可以发起传出连接,也可以接受传入连接。由于一些原因,例如网络地址转换(NAT)和防火墙的使用,在当前的Internet上通常不是这样的。我们对eDonkey和Gnutella文件共享系统的实验表明,多达36%的主机可能受到保护-不接受传入的连接。这对覆盖结构提出了挑战,因为并非所有主机都能够接收和转发请求。我们提出了一种称为e*的覆盖优化来帮助现有的覆盖协议克服可达性问题。此外,e*在延迟方面构建了非常有效的覆盖网络。在涉及受保护主机的现实场景下,与现有协议相比,e*可以将平均覆盖延迟降低28-61%。
{"title":"Network overlay construction under limited end-to-end reachability","authors":"Wenjie Wang, Cheng Jin, S. Jamin","doi":"10.1109/INFCOM.2005.1498488","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498488","url":null,"abstract":"Network-overlay construction today assumes two-way communication capability - each host can initiate outgoing connections as well as accepting incoming connections. This is often not true on the current Internet due to several reasons, for example, the use of network address translation (NAT) and firewalls. Our experiments with eDonkey and Gnutella file-sharing systems reveal that as many as 36% of the hosts may be guarded - not accepting incoming connections. This presents a challenge to overlay construction because not all hosts are capable of receiving and forwarding requests. We propose an overlay optimization called e* to help existing overlay protocols overcome the reachability problem. Furthermore, e* builds very efficient overlay networks in terms of latency. Under realistic scenarios involving guarded hosts, e* can reduce the average overlay latency by 28-61% compared with existing protocols.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"11 1","pages":"2124-2134 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78249078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Strategyproof mechanisms for dynamic tree formation in overlay networks 覆盖网络中动态树形成的防策略机制
S. Yuen, Baochun Li
In overlay multicast, every end host forwards multicast data to other end hosts in order to disseminate data. However, this cooperative behavior cannot be taken for granted, since each overlay node is now a strategic end host. Ideally, a strategyproof mechanism should be provided to motivate cooperations among overlay nodes so that a mutually beneficial multicast tree topology results. In this paper, we apply mechanism design to the overlay multicast problem. We model the overlay network using the two scenarios of variable and single rate sessions, and further design distributed algorithms that motivate each node towards a better multicast tree. Since network parameters and constraints change dynamically in reality, our protocol dynamically adapts to form a better multicast tree. The correctness and performance of each distributed algorithm are verified by extensive implementation results on PlanetLab.
在覆盖组播中,每个终端主机将组播数据转发给其他终端主机以传播数据。然而,这种合作行为不能被认为是理所当然的,因为每个覆盖节点现在都是一个战略终端主机。理想情况下,应该提供一种策略证明机制来激励覆盖节点之间的合作,从而产生互利的组播树拓扑。本文将机制设计应用于覆盖组播问题。我们使用可变速率和单速率会话两种场景对覆盖网络进行建模,并进一步设计分布式算法,以激励每个节点向更好的组播树方向发展。由于现实中网络参数和约束是动态变化的,我们的协议可以动态适应,形成更好的组播树。在PlanetLab上大量的实现结果验证了每个分布式算法的正确性和性能。
{"title":"Strategyproof mechanisms for dynamic tree formation in overlay networks","authors":"S. Yuen, Baochun Li","doi":"10.1109/INFCOM.2005.1498489","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498489","url":null,"abstract":"In overlay multicast, every end host forwards multicast data to other end hosts in order to disseminate data. However, this cooperative behavior cannot be taken for granted, since each overlay node is now a strategic end host. Ideally, a strategyproof mechanism should be provided to motivate cooperations among overlay nodes so that a mutually beneficial multicast tree topology results. In this paper, we apply mechanism design to the overlay multicast problem. We model the overlay network using the two scenarios of variable and single rate sessions, and further design distributed algorithms that motivate each node towards a better multicast tree. Since network parameters and constraints change dynamically in reality, our protocol dynamically adapts to form a better multicast tree. The correctness and performance of each distributed algorithm are verified by extensive implementation results on PlanetLab.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"2135-2146 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83229484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems dPAM:用于P2P系统中可扩展异步多播的分布式预取协议
Abhishek Sharma, Azer Bestavros, I. Matta
We leverage the buffering capabilities of end-systems to achieve scalable, asynchronous delivery of streams in a peer-to-peer environment. Unlike existing cache-and-relay schemes, we propose a distributed prefetching protocol where peers prefetch and store portions of the streaming media ahead of their playout time, thus not only turning themselves to possible sources for other peers but their prefetched data can allow them to overcome the departure of their source-peer. This stands in sharp contrast to existing cache-and-relay schemes where the departure of the source-peer forces its peer children to go the original server, thus disrupting their service and increasing server and network load. Through mathematical analysis and simulations, we show the effectiveness of maintaining such asynchronous multicasts from several source-peers to other children peers, and the efficacy of prefetching in the face of peer departures. We confirm the scalability of our dPAM protocol as it is shown to significantly reduce server load.
我们利用终端系统的缓冲功能,在点对点环境中实现可扩展的、异步的流交付。与现有的缓存和中继方案不同,我们提出了一种分布式预取协议,其中对等体在播放时间之前预取和存储流媒体的部分内容,从而不仅将自己变成其他对等体的可能源,而且它们预取的数据可以允许它们克服源对等体的离开。这与现有的缓存和中继方案形成鲜明对比,在现有的方案中,源对等节点的离开会迫使其对等子节点转到原始服务器,从而中断它们的服务并增加服务器和网络负载。通过数学分析和仿真,我们证明了保持从多个源对等点到其他子对等点的异步组播的有效性,以及面对对等点离开时预取的有效性。我们确认了dPAM协议的可伸缩性,因为它可以显着降低服务器负载。
{"title":"dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems","authors":"Abhishek Sharma, Azer Bestavros, I. Matta","doi":"10.1109/INFCOM.2005.1498341","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498341","url":null,"abstract":"We leverage the buffering capabilities of end-systems to achieve scalable, asynchronous delivery of streams in a peer-to-peer environment. Unlike existing cache-and-relay schemes, we propose a distributed prefetching protocol where peers prefetch and store portions of the streaming media ahead of their playout time, thus not only turning themselves to possible sources for other peers but their prefetched data can allow them to overcome the departure of their source-peer. This stands in sharp contrast to existing cache-and-relay schemes where the departure of the source-peer forces its peer children to go the original server, thus disrupting their service and increasing server and network load. Through mathematical analysis and simulations, we show the effectiveness of maintaining such asynchronous multicasts from several source-peers to other children peers, and the efficacy of prefetching in the face of peer departures. We confirm the scalability of our dPAM protocol as it is shown to significantly reduce server load.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"56 1","pages":"1139-1150 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72798880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1