首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Strategyproof mechanisms for dynamic tree formation in overlay networks 覆盖网络中动态树形成的防策略机制
S. Yuen, Baochun Li
In overlay multicast, every end host forwards multicast data to other end hosts in order to disseminate data. However, this cooperative behavior cannot be taken for granted, since each overlay node is now a strategic end host. Ideally, a strategyproof mechanism should be provided to motivate cooperations among overlay nodes so that a mutually beneficial multicast tree topology results. In this paper, we apply mechanism design to the overlay multicast problem. We model the overlay network using the two scenarios of variable and single rate sessions, and further design distributed algorithms that motivate each node towards a better multicast tree. Since network parameters and constraints change dynamically in reality, our protocol dynamically adapts to form a better multicast tree. The correctness and performance of each distributed algorithm are verified by extensive implementation results on PlanetLab.
在覆盖组播中,每个终端主机将组播数据转发给其他终端主机以传播数据。然而,这种合作行为不能被认为是理所当然的,因为每个覆盖节点现在都是一个战略终端主机。理想情况下,应该提供一种策略证明机制来激励覆盖节点之间的合作,从而产生互利的组播树拓扑。本文将机制设计应用于覆盖组播问题。我们使用可变速率和单速率会话两种场景对覆盖网络进行建模,并进一步设计分布式算法,以激励每个节点向更好的组播树方向发展。由于现实中网络参数和约束是动态变化的,我们的协议可以动态适应,形成更好的组播树。在PlanetLab上大量的实现结果验证了每个分布式算法的正确性和性能。
{"title":"Strategyproof mechanisms for dynamic tree formation in overlay networks","authors":"S. Yuen, Baochun Li","doi":"10.1109/INFCOM.2005.1498489","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498489","url":null,"abstract":"In overlay multicast, every end host forwards multicast data to other end hosts in order to disseminate data. However, this cooperative behavior cannot be taken for granted, since each overlay node is now a strategic end host. Ideally, a strategyproof mechanism should be provided to motivate cooperations among overlay nodes so that a mutually beneficial multicast tree topology results. In this paper, we apply mechanism design to the overlay multicast problem. We model the overlay network using the two scenarios of variable and single rate sessions, and further design distributed algorithms that motivate each node towards a better multicast tree. Since network parameters and constraints change dynamically in reality, our protocol dynamically adapts to form a better multicast tree. The correctness and performance of each distributed algorithm are verified by extensive implementation results on PlanetLab.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"2135-2146 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83229484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Cooperation and decision-making in a wireless multi-provider setting 无线多提供商环境下的合作与决策
A. Zemlianov, G. Veciana
In this paper we investigate network design for a wireless service provider using two orthogonal technologies: a WAN technology with uniform spatial coverage and set of LAN access points each with limited coverage. We assume that the system is designed so that users (or their agents) independently and greedily select among the two options based on maximizing a specified utility function which may be a function of the quality of the wireless link, distance to the access points, and/or congestion on system resources. We focus on two complementary aspects of this problem. On the one hand we study system performance under such decision-making strategies. We show convergence of decision-making process to an equilibrium, and that a congestion-sensitive utility can provide substantial (300%) performance improvements over natural proximity-based criterion. On the other hand, we consider various problems associated with dimensioning typically expensive backhaul links, for the WAN and set of LAN hotspots. Our results show how to best jointly exploit technologies with different coverage scales so as to statistically multiplex spatial load fluctuations in order to reduce backhaul costs.
在本文中,我们研究了无线服务提供商使用两种正交技术的网络设计:具有统一空间覆盖的广域网技术和具有有限覆盖的局域网接入点集。我们假设该系统被设计成使用户(或其代理)基于最大化指定效用函数独立且贪婪地在两个选项中进行选择,该效用函数可能是无线链路质量、到接入点的距离和/或系统资源拥塞的函数。我们关注这个问题的两个互补方面。一方面,我们研究了在这种决策策略下的系统性能。我们展示了决策过程收敛到均衡状态,并且与基于自然接近度的标准相比,拥塞敏感效用可以提供实质性(300%)的性能改进。另一方面,我们考虑与广域网和局域网热点集的通常昂贵的回程链路的尺寸相关的各种问题。我们的研究结果表明,如何最好地联合利用不同覆盖尺度的技术,在统计上复用空间负载波动,以降低回程成本。
{"title":"Cooperation and decision-making in a wireless multi-provider setting","authors":"A. Zemlianov, G. Veciana","doi":"10.1109/INFCOM.2005.1497908","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497908","url":null,"abstract":"In this paper we investigate network design for a wireless service provider using two orthogonal technologies: a WAN technology with uniform spatial coverage and set of LAN access points each with limited coverage. We assume that the system is designed so that users (or their agents) independently and greedily select among the two options based on maximizing a specified utility function which may be a function of the quality of the wireless link, distance to the access points, and/or congestion on system resources. We focus on two complementary aspects of this problem. On the one hand we study system performance under such decision-making strategies. We show convergence of decision-making process to an equilibrium, and that a congestion-sensitive utility can provide substantial (300%) performance improvements over natural proximity-based criterion. On the other hand, we consider various problems associated with dimensioning typically expensive backhaul links, for the WAN and set of LAN hotspots. Our results show how to best jointly exploit technologies with different coverage scales so as to statistically multiplex spatial load fluctuations in order to reduce backhaul costs.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"6 1","pages":"386-397 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72938866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Impact of power control on the performance of ad hoc wireless networks 功率控制对自组织无线网络性能的影响
A. Behzad, I. Rubin
An ad hoc wireless network with n nodes and m source-destination pairs, using a scheduling based medium access control (MAC) protocol such as time division multiple access (TDMA), and a routing mechanism that may be unicast or multicast based, is considered. Under a given nodal transmit power vector, we define the source-destination throughput vector to be achievable if there exists an associated temporal (based on the channel sharing MAC protocol) and spatial (based on the underlying routing mechanism) joint scheduling-routing scheme that yields the throughput vector. In this paper, we analyze and investigate the effect of nodal transmit power vector on the maximum (or supreme) level of a general (real-valued) function of the source-destination throughput levels. We represent the latter supreme level attained under power vector. We also derive a linear programming (LP) formulation for obtaining the exact solution to the optimization problem that yields the throughput capacity of finite ad hoc wireless networks. Our LP based performance evaluation results identify the magnitude of capacity upgrade that can be realized for networks with random topologies and traffic patterns.
考虑了一个具有n个节点和m个源-目的对的自组织无线网络,该网络使用基于调度的介质访问控制(MAC)协议,如时分多址(TDMA),以及基于单播或多播的路由机制。在给定的节点传输功率矢量下,如果存在产生吞吐量矢量的相关时间(基于信道共享MAC协议)和空间(基于底层路由机制)联合调度路由方案,则可以实现源-目的地吞吐量矢量。在本文中,我们分析和研究了节点传输功率矢量对源-目的吞吐量水平的一般(实值)函数的最大(或最高)水平的影响。我们代表在功率矢量下达到的后一种最高水平。我们还导出了一个线性规划(LP)公式,用于获得产生有限自组织无线网络吞吐量的优化问题的精确解。我们基于LP的性能评估结果确定了具有随机拓扑和流量模式的网络可以实现的容量升级幅度。
{"title":"Impact of power control on the performance of ad hoc wireless networks","authors":"A. Behzad, I. Rubin","doi":"10.1109/INFCOM.2005.1497883","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497883","url":null,"abstract":"An ad hoc wireless network with n nodes and m source-destination pairs, using a scheduling based medium access control (MAC) protocol such as time division multiple access (TDMA), and a routing mechanism that may be unicast or multicast based, is considered. Under a given nodal transmit power vector, we define the source-destination throughput vector to be achievable if there exists an associated temporal (based on the channel sharing MAC protocol) and spatial (based on the underlying routing mechanism) joint scheduling-routing scheme that yields the throughput vector. In this paper, we analyze and investigate the effect of nodal transmit power vector on the maximum (or supreme) level of a general (real-valued) function of the source-destination throughput levels. We represent the latter supreme level attained under power vector. We also derive a linear programming (LP) formulation for obtaining the exact solution to the optimization problem that yields the throughput capacity of finite ad hoc wireless networks. Our LP based performance evaluation results identify the magnitude of capacity upgrade that can be realized for networks with random topologies and traffic patterns.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"409 1","pages":"102-113 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77125963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
On neighbor discovery in wireless networks with directional antennas 定向天线无线网络中的邻居发现
Sudarshan Vasudevan, J. Kurose, D. Towsley
We consider the problem of neighbor discovery in static wireless ad hoc networks with directional antennas. We propose several probabilistic algorithms in which nodes perform random, independent transmissions to discover their one-hop neighbors. Our neighbor discovery algorithms are classified into two groups, viz. Direct-Discovery Algorithms in which nodes discover their neighbors only upon receiving a transmission from their neighbors and Gossip-based algorithms in which nodes gossip about their neighbors' location information to enable faster discovery. We first consider the operation of these algorithms in a slotted, synchronous system and mathematically derive their optimal parameter settings. We show how to extend these algorithms for an asynchronous system and describe their optimal design. Analysis and simulation of the algorithms show that nodes discover their neighbors much faster using gossip-based algorithms than using direct-discovery algorithms. Furthermore, the performance of gossip-based algorithms is insensitive to an increase in node density. The efficiency of a neighbor discovery algorithm also depends on the choice of antenna beamwidth. We discuss in detail how the choice of beamwidth impacts the performance of the discovery process and provide insights into how nodes can configure their beamwidths.
研究了带有定向天线的静态无线自组织网络中的邻居发现问题。我们提出了几种概率算法,其中节点执行随机、独立的传输来发现它们的一跳邻居。我们的邻居发现算法分为两类,即直接发现算法(Direct-Discovery algorithms)和基于八卦的算法(gossip -based algorithms),前者是节点只有在接收到邻居发送的信息后才会发现邻居,后者是节点八卦邻居的位置信息,以便更快地发现邻居。我们首先考虑这些算法在开槽同步系统中的操作,并从数学上推导出它们的最优参数设置。我们展示了如何将这些算法扩展到异步系统,并描述了它们的最佳设计。算法的分析和仿真表明,使用基于八卦的算法比使用直接发现算法更快地发现节点。此外,基于八卦的算法的性能对节点密度的增加不敏感。邻居发现算法的效率还取决于天线波束宽度的选择。我们详细讨论了波束宽度的选择如何影响发现过程的性能,并提供了节点如何配置其波束宽度的见解。
{"title":"On neighbor discovery in wireless networks with directional antennas","authors":"Sudarshan Vasudevan, J. Kurose, D. Towsley","doi":"10.1109/INFCOM.2005.1498535","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498535","url":null,"abstract":"We consider the problem of neighbor discovery in static wireless ad hoc networks with directional antennas. We propose several probabilistic algorithms in which nodes perform random, independent transmissions to discover their one-hop neighbors. Our neighbor discovery algorithms are classified into two groups, viz. Direct-Discovery Algorithms in which nodes discover their neighbors only upon receiving a transmission from their neighbors and Gossip-based algorithms in which nodes gossip about their neighbors' location information to enable faster discovery. We first consider the operation of these algorithms in a slotted, synchronous system and mathematically derive their optimal parameter settings. We show how to extend these algorithms for an asynchronous system and describe their optimal design. Analysis and simulation of the algorithms show that nodes discover their neighbors much faster using gossip-based algorithms than using direct-discovery algorithms. Furthermore, the performance of gossip-based algorithms is insensitive to an increase in node density. The efficiency of a neighbor discovery algorithm also depends on the choice of antenna beamwidth. We discuss in detail how the choice of beamwidth impacts the performance of the discovery process and provide insights into how nodes can configure their beamwidths.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"16 1","pages":"2502-2512 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85440349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 338
On optimal routing with multiple traffic matrices 多流量矩阵下的最优路由问题
Chun Zhang, Yong Liu, W. Gong, J. Kurose, R. Moll, D. Towsley
Routing optimization is used to find a set of routes that minimizes cost (delay, utilization). Previous work has addressed this problem for the case of a known, static end-to-end traffic matrix. In the Internet, it is difficult to accurately estimate a traffic matrix, and the constantly changing nature of Internet traffic makes it costly to maintain optimal routing by responding to traffic changes. Thus, it is of interest to maintain a set of routes that are "good" for a number of different possible traffic scenarios. In this paper, we explore ways to find an optimal set of routes with multiple traffic matrices to minimize expected cost. We focus on two general approaches, source-destination routing and destination routing. In the case of source-destination routing, we extend existing methods with a single traffic matrix to solve the optimization problem with multiple traffic matrices: we extend the convex optimization solution methods for a single traffic matrix to the multiple traffic matrix case; we also extend the gradient-based solution methods for a single traffic matrix to the multiple traffic matrix case. However, the multiple traffic matrix case requires many more control variables. In the case of destination routing, we encounter many more differences from the single traffic matrix case. The loop-free property, which is valid for the single traffic matrix case, is no longer valid for the multiple traffic matrix case, and it is difficult to extend existing methods for a single traffic matrix to solve the optimization problem with multiple traffic matrices. We show that it is NP-complete even to determine the feasibility of multiple traffic matrices. We thus propose and evaluate a heuristic algorithm for this case.
路由优化用于找到一组使成本(延迟、利用率)最小化的路由。以前的工作已经针对已知的静态端到端流量矩阵解决了这个问题。在互联网中,很难准确地估计流量矩阵,并且互联网流量的不断变化的性质使得通过响应流量变化来保持最优路由的成本很高。因此,维护一组对许多不同可能的交通场景都“好”的路线是很有意义的。在这篇文章中,我们探索了如何找到一个包含多个交通矩阵的最优路线集,以最小化期望成本。我们主要关注两种通用的方法,源-目的路由和目的路由。在源-目的路由情况下,将现有的单流量矩阵优化方法扩展到求解多流量矩阵的优化问题:将单流量矩阵的凸优化求解方法扩展到多流量矩阵情况;我们还将基于梯度的单流量矩阵求解方法推广到多流量矩阵的情况。然而,多重流量矩阵情况需要更多的控制变量。在目的地路由的情况下,我们遇到了与单一流量矩阵情况更多的差异。单流量矩阵情况下有效的无环路特性不再适用于多流量矩阵情况,并且难以将现有的单流量矩阵方法扩展到求解多流量矩阵的优化问题。我们证明了确定多个流量矩阵的可行性是np完全的。因此,我们提出并评估了这种情况下的启发式算法。
{"title":"On optimal routing with multiple traffic matrices","authors":"Chun Zhang, Yong Liu, W. Gong, J. Kurose, R. Moll, D. Towsley","doi":"10.1109/INFCOM.2005.1497927","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497927","url":null,"abstract":"Routing optimization is used to find a set of routes that minimizes cost (delay, utilization). Previous work has addressed this problem for the case of a known, static end-to-end traffic matrix. In the Internet, it is difficult to accurately estimate a traffic matrix, and the constantly changing nature of Internet traffic makes it costly to maintain optimal routing by responding to traffic changes. Thus, it is of interest to maintain a set of routes that are \"good\" for a number of different possible traffic scenarios. In this paper, we explore ways to find an optimal set of routes with multiple traffic matrices to minimize expected cost. We focus on two general approaches, source-destination routing and destination routing. In the case of source-destination routing, we extend existing methods with a single traffic matrix to solve the optimization problem with multiple traffic matrices: we extend the convex optimization solution methods for a single traffic matrix to the multiple traffic matrix case; we also extend the gradient-based solution methods for a single traffic matrix to the multiple traffic matrix case. However, the multiple traffic matrix case requires many more control variables. In the case of destination routing, we encounter many more differences from the single traffic matrix case. The loop-free property, which is valid for the single traffic matrix case, is no longer valid for the multiple traffic matrix case, and it is difficult to extend existing methods for a single traffic matrix to solve the optimization problem with multiple traffic matrices. We show that it is NP-complete even to determine the feasibility of multiple traffic matrices. We thus propose and evaluate a heuristic algorithm for this case.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"60 1","pages":"607-618 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84842870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
The 802.11 MAC protocol leads to inefficient equilibria 802.11 MAC协议导致了低效率均衡
Godfrey Tan, J. Guttag
Wireless local area networks (WLANs) based on the family of 802.11 technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at a lower data rate (by using a more resilient modulation scheme) increases the frame transmission time but reduces the hit error rate. In non-cooperative environments such as public hot-spots or WLANs operated by different enterprises that are physically close to each other, individual nodes attempt to maximize their achieved throughput by adjusting the data rate or frame size used, irrespective of the impact of this on overall system performance. In this paper, we show both analytically using a game theoretic model and through simulation that the existing 802.11 distributed MAC protocol, DCF (for distributed coordination function), as well as its enhanced version, which is being standardized at part of 802.11e, can lead non-cooperative nodes to undesirable Nash equilibriums, in which the wireless channel is inefficiently used. We show that by establishing independence between the allocation of the shared channel resource and the transmission strategies used by individual nodes, an ideal MAC protocol can lead rational nodes to arrive at equilibriums in which all competing nodes achieve higher throughputs tan with DCF.
基于802.11系列技术的无线局域网(wlan)正变得无处不在。这些技术支持多种数据传输速率。以较低的数据速率传输(通过使用更有弹性的调制方案)增加了帧传输时间,但降低了命中错误率。在非合作环境中,如公共热点或由不同企业运营的wlan,它们在物理上彼此靠近,单个节点试图通过调整所使用的数据速率或帧大小来最大化其实现的吞吐量,而不考虑这对整体系统性能的影响。在本文中,我们使用博弈论模型和仿真分析表明,现有的802.11分布式MAC协议DCF(用于分布式协调函数)及其增强版本,正在802.11e部分标准化,可能导致非合作节点出现不希望的纳什均衡,其中无线信道利用率低下。我们表明,通过在共享信道资源的分配和单个节点使用的传输策略之间建立独立性,理想的MAC协议可以使合理节点达到均衡,其中所有竞争节点获得比DCF更高的吞吐量。
{"title":"The 802.11 MAC protocol leads to inefficient equilibria","authors":"Godfrey Tan, J. Guttag","doi":"10.1109/INFCOM.2005.1497873","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497873","url":null,"abstract":"Wireless local area networks (WLANs) based on the family of 802.11 technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at a lower data rate (by using a more resilient modulation scheme) increases the frame transmission time but reduces the hit error rate. In non-cooperative environments such as public hot-spots or WLANs operated by different enterprises that are physically close to each other, individual nodes attempt to maximize their achieved throughput by adjusting the data rate or frame size used, irrespective of the impact of this on overall system performance. In this paper, we show both analytically using a game theoretic model and through simulation that the existing 802.11 distributed MAC protocol, DCF (for distributed coordination function), as well as its enhanced version, which is being standardized at part of 802.11e, can lead non-cooperative nodes to undesirable Nash equilibriums, in which the wireless channel is inefficiently used. We show that by establishing independence between the allocation of the shared channel resource and the transmission strategies used by individual nodes, an ideal MAC protocol can lead rational nodes to arrive at equilibriums in which all competing nodes achieve higher throughputs tan with DCF.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"41 1","pages":"1-11 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85122790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
The one-to-many TCP overlay: a scalable and reliable multicast architecture 一对多的TCP覆盖:一个可扩展和可靠的多播架构
F. Baccelli, A. Chaintreau, Zhen Liu, A. Riabov
We consider reliable multicast in overlay networks where nodes have finite-size buffers and are subject to failures. We address issues of end-to-end reliability and throughput scalability in this framework. We propose a simple architecture which consists of using distinct point-to-point TCP connections between adjacent pairs of end-systems, together with a back-pressure control mechanism regulating the transfers of adjacent TCP connections, as well as a back-up buffering system handling node failures. This architecture, that we call the one-to-many TCP overlay, is a natural extension of TCP to the one-to-many case, in that it adapts the rate of the group communication to local congestion in a decentralized way via the window back-pressure mechanism. Using theoretical investigations, experimentations in the Internet, and large network simulations, we show that this architecture provides end-to-end reliability and can tolerate multiple simultaneous node failures, provided the backup buffers are sized appropriately. We also show that under random perturbations caused by cross traffic described in the paper, the throughput of this reliable group communication is always larger than a positive constant, that does not depend on the group size. This scalability result contrasts with known results about the non-scalability of IP-supported multicast for reliable group communication.
我们考虑在覆盖网络中可靠的组播,其中节点具有有限大小的缓冲区并且容易发生故障。我们在这个框架中解决了端到端可靠性和吞吐量可扩展性的问题。我们提出了一个简单的架构,它包括在相邻的端系统对之间使用不同的点对点TCP连接,以及调节相邻TCP连接传输的背压控制机制,以及处理节点故障的备份缓冲系统。这种架构,我们称之为一对多TCP覆盖,是TCP对一对多情况的自然扩展,因为它通过窗口反压机制以分散的方式调整组通信速率以适应局部拥塞。通过理论研究、Internet实验和大型网络模拟,我们证明了这种体系结构提供了端到端可靠性,并且可以容忍多个节点同时故障,前提是备份缓冲区的大小适当。我们还证明了在本文所描述的由交叉流量引起的随机扰动下,该可靠群通信的吞吐量总是大于一个正常数,该正常数与群的大小无关。这一可扩展性结果与已知的基于ip支持的组播不可扩展性结果形成了对比。
{"title":"The one-to-many TCP overlay: a scalable and reliable multicast architecture","authors":"F. Baccelli, A. Chaintreau, Zhen Liu, A. Riabov","doi":"10.1109/INFCOM.2005.1498445","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498445","url":null,"abstract":"We consider reliable multicast in overlay networks where nodes have finite-size buffers and are subject to failures. We address issues of end-to-end reliability and throughput scalability in this framework. We propose a simple architecture which consists of using distinct point-to-point TCP connections between adjacent pairs of end-systems, together with a back-pressure control mechanism regulating the transfers of adjacent TCP connections, as well as a back-up buffering system handling node failures. This architecture, that we call the one-to-many TCP overlay, is a natural extension of TCP to the one-to-many case, in that it adapts the rate of the group communication to local congestion in a decentralized way via the window back-pressure mechanism. Using theoretical investigations, experimentations in the Internet, and large network simulations, we show that this architecture provides end-to-end reliability and can tolerate multiple simultaneous node failures, provided the backup buffers are sized appropriately. We also show that under random perturbations caused by cross traffic described in the paper, the throughput of this reliable group communication is always larger than a positive constant, that does not depend on the group size. This scalability result contrasts with known results about the non-scalability of IP-supported multicast for reliable group communication.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"39 1","pages":"1629-1640 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85364816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Limiting path exploration in BGP BGP限制路径探索
J. Chandrashekar, Z. Duan, Zhi-Li Zhang, Jeffrey Krasky
Slow convergence in the Internet can be directly attributed to the "path exploration" phenomenon, inherent in all path vector protocols. The root cause for path exploration is the dependency among paths propagated through the network. Addressing this problem in BGP is particularly difficult as the AS paths exchanged between BGP routers are highly summarized. In this paper, we describe why path exploration cannot be countered effectively within the existing BGP framework, and propose a simple, novel mechanism - forward edge sequence numbers - to annotate the AS paths with additional "path dependency" information. We then develop an enhanced path vector algorithm, EPIC, shown to limit path exploration and lead to faster convergence. In contrast to other solutions, ours is shown to be correct on a very general model of Internet topology and BGP operation. Using theoretical analysis and simulations, we demonstrate that EPIC can achieve a dramatic improvement in routing convergence, compared to BGP and other existing solutions.
互联网的缓慢收敛可以直接归因于所有路径矢量协议固有的“路径探索”现象。路径探索的根本原因是通过网络传播的路径之间的依赖关系。在BGP中解决这个问题尤其困难,因为BGP路由器之间交换的as路径是高度汇总的。在本文中,我们描述了为什么在现有的BGP框架中不能有效地对抗路径探索,并提出了一种简单的新机制——前向边缘序列号——用额外的“路径依赖”信息来注释AS路径。然后,我们开发了一种增强的路径向量算法EPIC,该算法可以限制路径探索并导致更快的收敛。与其他解决方案相比,我们的解决方案在Internet拓扑和BGP操作的非常一般的模型上是正确的。通过理论分析和仿真,我们证明了与BGP和其他现有解决方案相比,EPIC可以显著提高路由收敛性。
{"title":"Limiting path exploration in BGP","authors":"J. Chandrashekar, Z. Duan, Zhi-Li Zhang, Jeffrey Krasky","doi":"10.1109/INFCOM.2005.1498520","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498520","url":null,"abstract":"Slow convergence in the Internet can be directly attributed to the \"path exploration\" phenomenon, inherent in all path vector protocols. The root cause for path exploration is the dependency among paths propagated through the network. Addressing this problem in BGP is particularly difficult as the AS paths exchanged between BGP routers are highly summarized. In this paper, we describe why path exploration cannot be countered effectively within the existing BGP framework, and propose a simple, novel mechanism - forward edge sequence numbers - to annotate the AS paths with additional \"path dependency\" information. We then develop an enhanced path vector algorithm, EPIC, shown to limit path exploration and lead to faster convergence. In contrast to other solutions, ours is shown to be correct on a very general model of Internet topology and BGP operation. Using theoretical analysis and simulations, we demonstrate that EPIC can achieve a dramatic improvement in routing convergence, compared to BGP and other existing solutions.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"12 1","pages":"2337-2348 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84436825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Non-uniform random membership management in peer-to-peer networks 点对点网络中的非均匀随机成员管理
Ming Zhong, Kai Shen, J. Seiferas
Existing random membership management algorithms provide each node with a small, uniformly random subset of global participants. However, many applications would benefit more from non-uniform random member subsets. For instance, non-uniform gossip algorithms can provide distance-based propagation bounds and thus information can reach nearby nodes sooner. In another example, Kleinberg shows that networks with random long-links following distance-based non-uniform distributions exhibit better routing performance than those with uniformly randomized topologies. In this paper, we propose a scalable non-uniform random membership management algorithm, which provides each node with a random membership subset with application-specified probability e.g., with probability inversely proportional to distances. Our algorithm is the first non-uniform random membership management algorithm with proved convergence and bounded convergence time. Moreover, our algorithm does not put specific restrictions on the network topologies and thus has wide applicability.
现有的随机成员管理算法为每个节点提供全局参与者的一个小而均匀的随机子集。然而,许多应用程序从非均匀随机成员子集中获益更多。例如,非均匀八卦算法可以提供基于距离的传播边界,因此信息可以更快地到达附近的节点。在另一个例子中,Kleinberg表明,具有随机长链路的网络遵循基于距离的非均匀分布,比具有均匀随机拓扑的网络表现出更好的路由性能。本文提出了一种可扩展的非均匀随机隶属度管理算法,该算法为每个节点提供一个具有应用指定概率(例如,概率与距离成反比)的随机隶属度子集。该算法是第一个收敛性和收敛时间有界的非一致随机隶属度管理算法。此外,我们的算法对网络拓扑结构没有特定的限制,因此具有广泛的适用性。
{"title":"Non-uniform random membership management in peer-to-peer networks","authors":"Ming Zhong, Kai Shen, J. Seiferas","doi":"10.1109/INFCOM.2005.1498342","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498342","url":null,"abstract":"Existing random membership management algorithms provide each node with a small, uniformly random subset of global participants. However, many applications would benefit more from non-uniform random member subsets. For instance, non-uniform gossip algorithms can provide distance-based propagation bounds and thus information can reach nearby nodes sooner. In another example, Kleinberg shows that networks with random long-links following distance-based non-uniform distributions exhibit better routing performance than those with uniformly randomized topologies. In this paper, we propose a scalable non-uniform random membership management algorithm, which provides each node with a random membership subset with application-specified probability e.g., with probability inversely proportional to distances. Our algorithm is the first non-uniform random membership management algorithm with proved convergence and bounded convergence time. Moreover, our algorithm does not put specific restrictions on the network topologies and thus has wide applicability.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"18 1","pages":"1151-1161 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88337590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
The BEST challenge for next-generation Ethernet services 下一代以太网服务面临的最佳挑战
P. Risbood, S. Acharya, B. Gupta
Service providers are starting to offer next-generation E-Line (point-to-point) and E-LAN (multipoint-to-multipoint) Ethernet services over their existing SONET/SDH networks. While Ethernet typically is "best-effort", these emerging services are expected to be "carrier-class" with strict bandwidth guarantees. Consequently, spanning tree creation, critical to any Ethernet network is fundamentally changed; each tree hop now needs to have sufficient capacity to meet the requisite bandwidth demands. In this paper, we introduce the bandwidth-endowed spanning tree (BEST) problem. Unlike the polynomial complexity of standard spanning tree algorithms, BEST is NP-complete, raising questions about the scalability of these services. We propose offline and online algorithms and study their performance using extensive simulations. We show that leveraging the Virtual Concatenation protocol (ITU-T G.707) is key to practical algorithms that are both effective and efficient. Inspite of the theoretical hardness, the online algorithms we propose are a good match to "optimal", offline integer programming benchmarks, demonstrating the viability of next-generation Ethernet services.
服务提供商开始在现有的SONET/SDH网络上提供下一代E-Line(点对点)和E-LAN(多点对多点)以太网服务。虽然以太网通常是“尽力而为”的,但这些新兴服务有望成为具有严格带宽保证的“运营商级”服务。因此,对任何以太网网络都至关重要的生成树创建从根本上改变了;每个树跳现在需要有足够的容量来满足必要的带宽需求。本文介绍了赋带宽生成树(BEST)问题。与标准生成树算法的多项式复杂度不同,BEST是np完全的,这就提出了有关这些服务的可伸缩性的问题。我们提出了离线和在线算法,并通过广泛的模拟研究了它们的性能。我们表明,利用虚拟连接协议(ITU-T G.707)是有效和高效的实用算法的关键。尽管理论上存在困难,但我们提出的在线算法与“最优”离线整数规划基准很好地匹配,证明了下一代以太网服务的可行性。
{"title":"The BEST challenge for next-generation Ethernet services","authors":"P. Risbood, S. Acharya, B. Gupta","doi":"10.1109/INFCOM.2005.1498333","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498333","url":null,"abstract":"Service providers are starting to offer next-generation E-Line (point-to-point) and E-LAN (multipoint-to-multipoint) Ethernet services over their existing SONET/SDH networks. While Ethernet typically is \"best-effort\", these emerging services are expected to be \"carrier-class\" with strict bandwidth guarantees. Consequently, spanning tree creation, critical to any Ethernet network is fundamentally changed; each tree hop now needs to have sufficient capacity to meet the requisite bandwidth demands. In this paper, we introduce the bandwidth-endowed spanning tree (BEST) problem. Unlike the polynomial complexity of standard spanning tree algorithms, BEST is NP-complete, raising questions about the scalability of these services. We propose offline and online algorithms and study their performance using extensive simulations. We show that leveraging the Virtual Concatenation protocol (ITU-T G.707) is key to practical algorithms that are both effective and efficient. Inspite of the theoretical hardness, the online algorithms we propose are a good match to \"optimal\", offline integer programming benchmarks, demonstrating the viability of next-generation Ethernet services.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"27 1","pages":"1049-1059 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89368332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1