首页 > 最新文献

200614th IEEE International Workshop on Quality of Service最新文献

英文 中文
Improving Performance of Internet Services Through Reward-Driven Request Prioritization 通过奖励驱动的请求优先级改进互联网服务的性能
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250452
Alexander Totok, V. Karamcheti
Meeting client QoS expectations proves to be a difficult task for the providers of modern Internet services, especially when Web servers experience overload conditions (steady or transient), which cause increased response times and request rejections, leading to user frustration, lowered usage of the service and reduced revenues. In this paper, we propose a server-side request scheduling mechanism that addresses these problems. Our reward-driven request prioritization (RDRP) algorithm gives higher execution priority to client Web sessions that are likely to bring more service profit (or any other application-specific reward). The method works by predicting future session structure by comparing its requests seen so far with aggregated information about recent client behavior, and using these predictions to preferentially allocate Web server resources. Our experiments using the TPC-W benchmark application and CBMG-based Web workloads, with an implementation of the RDRP techniques in the JBoss application server, show that RDRP can significantly boost reward attained by the service, while providing better QoS to clients that bring more reward
对于现代Internet服务的提供者来说,满足客户机QoS期望是一项困难的任务,特别是当Web服务器经历过载条件(稳定或短暂)时,这会导致响应时间增加和请求拒绝,从而导致用户受挫、服务使用率降低和收入减少。在本文中,我们提出了一个服务器端请求调度机制来解决这些问题。我们的奖励驱动请求优先级(RDRP)算法为可能带来更多服务利润(或任何其他特定于应用程序的奖励)的客户端Web会话提供了更高的执行优先级。该方法的工作原理是,通过将迄今为止看到的请求与有关最近客户机行为的聚合信息进行比较,预测未来的会话结构,并使用这些预测优先分配Web服务器资源。我们使用TPC-W基准应用程序和基于cbmg的Web工作负载,并在JBoss应用服务器上实现了RDRP技术,实验表明RDRP可以显著提高服务获得的奖励,同时为客户端提供更好的QoS,从而带来更多的奖励
{"title":"Improving Performance of Internet Services Through Reward-Driven Request Prioritization","authors":"Alexander Totok, V. Karamcheti","doi":"10.1109/IWQOS.2006.250452","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250452","url":null,"abstract":"Meeting client QoS expectations proves to be a difficult task for the providers of modern Internet services, especially when Web servers experience overload conditions (steady or transient), which cause increased response times and request rejections, leading to user frustration, lowered usage of the service and reduced revenues. In this paper, we propose a server-side request scheduling mechanism that addresses these problems. Our reward-driven request prioritization (RDRP) algorithm gives higher execution priority to client Web sessions that are likely to bring more service profit (or any other application-specific reward). The method works by predicting future session structure by comparing its requests seen so far with aggregated information about recent client behavior, and using these predictions to preferentially allocate Web server resources. Our experiments using the TPC-W benchmark application and CBMG-based Web workloads, with an implementation of the RDRP techniques in the JBoss application server, show that RDRP can significantly boost reward attained by the service, while providing better QoS to clients that bring more reward","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure 基于代理的高效网络媒体分发控制与隐私保护基础设施
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250470
Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, S. Jajodia
Massive Internet media distribution demands pro longed continuous consumption of networking and disk band widths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without protection on the Internet, content providers are hesitant to use existing fast distribution techniques. Second, little has been done to protect client privacy during client accesses. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this paper, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms for cooperative proxies where our proposed scheme works practically. Simulation results show that our proposed strategy is efficient
海量的互联网媒体分发需要长期持续地消耗大容量的网络和磁盘带宽。许多基于代理的互联网媒体分发算法和系统已经被提出、实现和评估,以解决可伸缩性问题。但是,其中很少在实践中使用,因为两个重要问题没有得到令人满意的解决。首先,现有的基于代理的媒体分发体系结构缺乏有效的媒体分发控制机制。没有互联网的保护,内容提供商对使用现有的快速分发技术犹豫不决。其次,在客户端访问期间保护客户端隐私方面做得很少。单独解决这两个问题的直接解决方案会导致冲突。例如,为了实施分发控制,应该只向合法用户授予访问权限。但是,这通常会披露除客户端身份之外的更多信息(例如客户端正在访问哪个对象),这与客户端希望保护隐私的愿望相冲突。在本文中,我们提出了一个统一的基于代理的媒体分发协议来有效地同时解决这两个问题。我们进一步设计了一组新的协作代理算法,使我们提出的方案在实际中起作用。仿真结果表明,该策略是有效的
{"title":"Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure","authors":"Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, S. Jajodia","doi":"10.1109/IWQOS.2006.250470","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250470","url":null,"abstract":"Massive Internet media distribution demands pro longed continuous consumption of networking and disk band widths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without protection on the Internet, content providers are hesitant to use existing fast distribution techniques. Second, little has been done to protect client privacy during client accesses. Straightforward solutions to address these two issues independently lead to conflicts. For example, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this paper, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms for cooperative proxies where our proposed scheme works practically. Simulation results show that our proposed strategy is efficient","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128910202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling the Peering and Routing Tussle between ISPs and P2P Applications isp和P2P应用程序之间的对等和路由争用建模
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250451
Hui Wang, D. Chiu, John C.S. Lui
The connectivity between millions of nodes on the Internet is provided by the interconnection of many ISPs' networks. These ISPs, in their decisions to peer with each other, define a set of transit relationships. These transit relationships are the primary factors that dictate how traffic flows through the Internet. BGP-based inter-domain routing that implements these transit relationships can be considered economically efficient. The advent of peer-to-peer (P2P) applications and overlay networks, however, changes the rules by providing traffic routing favoring the applications' needs. This can lead to reduced economic efficiency and upset the ISPs' business model. In this paper, we propose simple models to represent P2P traffic demand, peering and routing in a market place of two competing ISPs to illustrate this tussle of the Internet. Based on these models, we also propose and investigate alternative peering and provisioning strategies available to the ISPs and analyze their effectiveness
互联网上数百万个节点之间的连接是由许多isp网络的互连提供的。这些isp在决定彼此对等时,定义了一组传输关系。这些传输关系是决定互联网上的流量如何流动的主要因素。实现这些传输关系的基于bgp的域间路由可以被认为是经济有效的。然而,点对点(P2P)应用程序和覆盖网络的出现,通过提供有利于应用程序需求的流量路由,改变了规则。这可能导致经济效率降低,扰乱互联网服务提供商的商业模式。在本文中,我们提出了简单的模型来表示P2P流量需求,对等和路由在两个竞争的互联网服务提供商的市场上,以说明这种争斗的互联网。基于这些模型,我们还提出并研究了isp可用的替代对等和供应策略,并分析了它们的有效性
{"title":"Modeling the Peering and Routing Tussle between ISPs and P2P Applications","authors":"Hui Wang, D. Chiu, John C.S. Lui","doi":"10.1109/IWQOS.2006.250451","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250451","url":null,"abstract":"The connectivity between millions of nodes on the Internet is provided by the interconnection of many ISPs' networks. These ISPs, in their decisions to peer with each other, define a set of transit relationships. These transit relationships are the primary factors that dictate how traffic flows through the Internet. BGP-based inter-domain routing that implements these transit relationships can be considered economically efficient. The advent of peer-to-peer (P2P) applications and overlay networks, however, changes the rules by providing traffic routing favoring the applications' needs. This can lead to reduced economic efficiency and upset the ISPs' business model. In this paper, we propose simple models to represent P2P traffic demand, peering and routing in a market place of two competing ISPs to illustrate this tussle of the Internet. Based on these models, we also propose and investigate alternative peering and provisioning strategies available to the ISPs and analyze their effectiveness","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Case for TCP-Friendly Admission Control 一个tcp友好的允许控制案例
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250473
A. Tam, D. Chiu, John C.S. Lui, Y. Tay
Admission control has been shown to be a preferred alternative to TCP-friendly congestion control for inelastic flows in heterogeneous networks shared by elastic and inelastic traffic. However, it is possible for an inelastic flow to adopt different level of aggressiveness in implementing the admission control. How these different levels of aggressiveness affect the system performance remains an open issue. In this paper, we evaluate a full spectrum of (abstract) admission control algorithms in terms of their aggressiveness towards elastic flows. A totally aggressive version would admit an inelastic flow even if this means elastic flows' fair bandwidth share is reduced to close to zero. In the other extreme, a TCP-friendly version would only admit an inelastic flow if its desired rate is no higher than what the elastic flows will receive after its arrival. We show that the performance of inelastic flows is asymptotically insensitive to their aggressiveness without strong assumptions about flow file size or holding time distributions. This makes a strong case for adopting a less aggressive, yet TCP-friendly admission control in a heterogeneous network. Extensive simulations are carried out to validate the performance, stability and asymptotic behavior the the proposed TCP-friendly admission control policy
对于弹性和非弹性流量共享的异构网络中的非弹性流,接纳控制已被证明是tcp友好拥塞控制的首选替代方案。然而,非弹性流在实施接纳控制时可能采用不同程度的侵略性。这些不同级别的侵略性如何影响系统性能仍然是一个开放的问题。在本文中,我们根据其对弹性流的侵略性来评估(抽象)接纳控制算法的全谱。一个完全激进的版本将承认非弹性流,即使这意味着弹性流的公平带宽份额减少到接近于零。在另一种极端情况下,tcp友好版本只允许非弹性流,如果其期望速率不高于弹性流到达后将接收的速率。我们证明了非弹性流的性能对它们的侵袭性是渐近不敏感的,没有关于流文件大小或保持时间分布的强假设。这为在异构网络中采用一种不那么激进但对tcp友好的准入控制提供了强有力的理由。通过大量的仿真验证了所提出的tcp友好接纳控制策略的性能、稳定性和渐近行为
{"title":"A Case for TCP-Friendly Admission Control","authors":"A. Tam, D. Chiu, John C.S. Lui, Y. Tay","doi":"10.1109/IWQOS.2006.250473","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250473","url":null,"abstract":"Admission control has been shown to be a preferred alternative to TCP-friendly congestion control for inelastic flows in heterogeneous networks shared by elastic and inelastic traffic. However, it is possible for an inelastic flow to adopt different level of aggressiveness in implementing the admission control. How these different levels of aggressiveness affect the system performance remains an open issue. In this paper, we evaluate a full spectrum of (abstract) admission control algorithms in terms of their aggressiveness towards elastic flows. A totally aggressive version would admit an inelastic flow even if this means elastic flows' fair bandwidth share is reduced to close to zero. In the other extreme, a TCP-friendly version would only admit an inelastic flow if its desired rate is no higher than what the elastic flows will receive after its arrival. We show that the performance of inelastic flows is asymptotically insensitive to their aggressiveness without strong assumptions about flow file size or holding time distributions. This makes a strong case for adopting a less aggressive, yet TCP-friendly admission control in a heterogeneous network. Extensive simulations are carried out to validate the performance, stability and asymptotic behavior the the proposed TCP-friendly admission control policy","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122488860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Host-Based Service Differentiation with Congestion Feedback 基于主机的服务区分与拥塞反馈
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250472
H. Lundqvist, G. Karlsson
This paper investigates the possibility to differentiate services by using endpoint traffic controls, while sharing a single best-effort network The starting point is a scheme based on a combination of probe-based admission control in the end-systems for streaming traffic and error correction to isolate different flows. There are inherent limitations in pure host-based control mechanisms and we therefore investigate the improvement that can be achieved when explicit congestion notification is used in routers. In particular we investigate the sensitivity to different active queue management mechanisms and parameter settings. Simulations show that a high ECN marking rate helps to differentiate between flows, but it is important to make sure that the chosen AQM works well for the chosen parameters. This study also shows that a main benefit of ECN is to enable the extension of the scheme to wireless environments
本文研究了在共享一个最佳努力网络的情况下,通过使用端点流量控制来区分服务的可能性。本文的出发点是一种方案,该方案基于端系统中基于探测的流流量准入控制和错误校正的组合,以隔离不同的流。纯基于主机的控制机制存在固有的局限性,因此我们研究了当路由器中使用显式拥塞通知时可以实现的改进。我们特别研究了对不同活动队列管理机制和参数设置的敏感性。仿真表明,较高的ECN标记率有助于区分不同的流,但重要的是要确保所选的AQM对所选参数有效。该研究还表明,ECN的一个主要优点是能够将该方案扩展到无线环境
{"title":"Host-Based Service Differentiation with Congestion Feedback","authors":"H. Lundqvist, G. Karlsson","doi":"10.1109/IWQOS.2006.250472","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250472","url":null,"abstract":"This paper investigates the possibility to differentiate services by using endpoint traffic controls, while sharing a single best-effort network The starting point is a scheme based on a combination of probe-based admission control in the end-systems for streaming traffic and error correction to isolate different flows. There are inherent limitations in pure host-based control mechanisms and we therefore investigate the improvement that can be achieved when explicit congestion notification is used in routers. In particular we investigate the sensitivity to different active queue management mechanisms and parameter settings. Simulations show that a high ECN marking rate helps to differentiate between flows, but it is important to make sure that the chosen AQM works well for the chosen parameters. This study also shows that a main benefit of ECN is to enable the extension of the scheme to wireless environments","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121261247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Service Provider's Approach for Improving Performance of Aggregate Voice-over-IP Traffic 一种服务提供商改进聚合ip话音流量性能的方法
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250465
Camelia Al-Najjar, A. Reddy
The emerging popularity and interest in voice-over-IP (VoIP) has been accompanied by customer concerns about voice quality over these networks. The lack of an appropriate real-time capable infrastructure in packet networks along with the threats of denial-of service (DoS) attacks can deteriorate the service that these voice calls receive. Traditionally, each voice call employs its own end-to-end forward-error-correction (FEC) mechanisms. In this paper, we show that when VoIP calls are aggregated over a network link or path, the provider can employ a suitable linear-time encoding for the aggregated voice traffic, resulting in considerable quality improvement with little redundancy. We show that it is possible to achieve rates closer to link capacity as more calls are combined with very small output loss rates even in the presence of significant packet loss rates in the network. The advantages of the proposed scheme exceed similar or other techniques applied to individual voice calls
随着对ip语音(VoIP)的日益流行和兴趣,客户对这些网络上的语音质量也越来越关注。在分组网络中缺乏适当的实时功能基础设施以及拒绝服务(DoS)攻击的威胁会使这些语音呼叫接收到的服务恶化。传统上,每个语音呼叫都使用自己的端到端前向纠错(FEC)机制。在本文中,我们表明,当VoIP呼叫通过网络链路或路径聚合时,提供商可以为聚合的语音流量采用合适的线性时间编码,从而在几乎没有冗余的情况下显著提高质量。我们表明,即使在网络中存在显着的丢包率的情况下,当更多的呼叫与非常小的输出损失率相结合时,也有可能实现更接近链路容量的速率。所提出的方案的优点超过了应用于个人语音呼叫的类似或其他技术
{"title":"A Service Provider's Approach for Improving Performance of Aggregate Voice-over-IP Traffic","authors":"Camelia Al-Najjar, A. Reddy","doi":"10.1109/IWQOS.2006.250465","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250465","url":null,"abstract":"The emerging popularity and interest in voice-over-IP (VoIP) has been accompanied by customer concerns about voice quality over these networks. The lack of an appropriate real-time capable infrastructure in packet networks along with the threats of denial-of service (DoS) attacks can deteriorate the service that these voice calls receive. Traditionally, each voice call employs its own end-to-end forward-error-correction (FEC) mechanisms. In this paper, we show that when VoIP calls are aggregated over a network link or path, the provider can employ a suitable linear-time encoding for the aggregated voice traffic, resulting in considerable quality improvement with little redundancy. We show that it is possible to achieve rates closer to link capacity as more calls are combined with very small output loss rates even in the presence of significant packet loss rates in the network. The advantages of the proposed scheme exceed similar or other techniques applied to individual voice calls","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133418835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How Practical is Network Coding? 网络编码有多实用?
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250480
Mea Wang, Baochun Li
With network coding, intermediate nodes between the source and the receivers of an end-to-end communication session are not only capable of relaying and replicating data messages, but also of coding incoming messages to produce coded outgoing ones. Recent studies have shown that network coding is beneficial for peer-to-peer content distribution, since if eliminates the need for content reconciliation, and is highly resilient to peer failures. In this paper, we present our recent experiences with a highly optimized and high-performance C++ implementation of randomized network coding at the application layer. We present our observations based on an extensive series of experiments, draw conclusions from a wide range of scenarios, and are more cautious and less optimistic as compared to previous studies
使用网络编码,端到端通信会话的源端和接收端之间的中间节点不仅能够中继和复制数据消息,而且还能够对传入消息进行编码以产生编码的传出消息。最近的研究表明,网络编码有利于对等内容分发,因为它消除了内容协调的需要,并且对对等失败具有高度的弹性。在本文中,我们介绍了我们最近在应用层高度优化和高性能的随机网络编码的c++实现的经验。我们的观察是基于一系列广泛的实验,从广泛的场景中得出结论,与以前的研究相比,我们更加谨慎,也不那么乐观
{"title":"How Practical is Network Coding?","authors":"Mea Wang, Baochun Li","doi":"10.1109/IWQOS.2006.250480","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250480","url":null,"abstract":"With network coding, intermediate nodes between the source and the receivers of an end-to-end communication session are not only capable of relaying and replicating data messages, but also of coding incoming messages to produce coded outgoing ones. Recent studies have shown that network coding is beneficial for peer-to-peer content distribution, since if eliminates the need for content reconciliation, and is highly resilient to peer failures. In this paper, we present our recent experiences with a highly optimized and high-performance C++ implementation of randomized network coding at the application layer. We present our observations based on an extensive series of experiments, draw conclusions from a wide range of scenarios, and are more cautious and less optimistic as compared to previous studies","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1267
Echelon: Peer-to-Peer Network Diagnosis with Network Coding 梯队:点对点网络诊断与网络编码
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250447
Chuan Wu, Baochun Li
It is critical to monitor the performance and "health" of large-scale peer-to-peer applications. As an example, operators of peer-to-peer live streaming applications may be interested in observing performance bottlenecks, peer failures, and network topologies. In most cases, such observations are used to diagnose potential problems in the protocol design, to troubleshoot network outage, or to improve the Quality of Service of the peer-to-peer network in general. They are not time sensitive in nature, as delayed observations up to minutes or even hours are still valuable. However, such historical and delay-tolerant observations should include measurements of peers that have already failed or departed, as peer dynamics significantly affect the health of peer-to-peer applications. Such a delay-tolerant observation of peer-to-peer applications over a historical period of time is referred to as a diagnosis. In this paper, we present Echelon, a time-insensitive way to construct the diagnosis of a large-scale peer-to-peer application. Replacing the traditional wisdom of logging servers, we leverage the power of network coding to collect application-specific measurements on each peer, and disseminate them to other peers in a coded form. Over time, measurements of departed peers can still be recovered, simply by probing a small subset of peers in the network. Simulation studies have shown that Echelon is highly configurable, bandwidth efficient, and extremely tolerant of peer dynamics, thanks to the advantages of randomized network coding
监视大规模点对点应用程序的性能和“运行状况”至关重要。例如,点对点直播应用程序的运营商可能对观察性能瓶颈、点对点故障和网络拓扑感兴趣。在大多数情况下,这些观察结果用于诊断协议设计中的潜在问题,排除网络中断的故障,或者总体上提高对等网络的服务质量。它们对时间不敏感,因为延迟几分钟甚至几小时的观测仍然是有价值的。然而,这种历史和延迟容忍观察应该包括已经失败或离开的对等的测量,因为对等动态会显著影响对等应用程序的健康。这种对点对点应用程序在一段历史时间内的延迟容忍观察被称为诊断。在本文中,我们提出了一种构建大规模点对点应用诊断的时间不敏感方法Echelon。我们利用网络编码的力量来收集每个节点上特定于应用程序的测量值,并以编码的形式将它们分发给其他节点,从而取代了传统的日志服务器智慧。随着时间的推移,仍然可以通过探测网络中的一小部分对等体来恢复离开对等体的测量值。仿真研究表明,由于随机网络编码的优势,Echelon具有高度可配置性、带宽效率和对对等动态的极大容忍度
{"title":"Echelon: Peer-to-Peer Network Diagnosis with Network Coding","authors":"Chuan Wu, Baochun Li","doi":"10.1109/IWQOS.2006.250447","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250447","url":null,"abstract":"It is critical to monitor the performance and \"health\" of large-scale peer-to-peer applications. As an example, operators of peer-to-peer live streaming applications may be interested in observing performance bottlenecks, peer failures, and network topologies. In most cases, such observations are used to diagnose potential problems in the protocol design, to troubleshoot network outage, or to improve the Quality of Service of the peer-to-peer network in general. They are not time sensitive in nature, as delayed observations up to minutes or even hours are still valuable. However, such historical and delay-tolerant observations should include measurements of peers that have already failed or departed, as peer dynamics significantly affect the health of peer-to-peer applications. Such a delay-tolerant observation of peer-to-peer applications over a historical period of time is referred to as a diagnosis. In this paper, we present Echelon, a time-insensitive way to construct the diagnosis of a large-scale peer-to-peer application. Replacing the traditional wisdom of logging servers, we leverage the power of network coding to collect application-specific measurements on each peer, and disseminate them to other peers in a coded form. Over time, measurements of departed peers can still be recovered, simply by probing a small subset of peers in the network. Simulation studies have shown that Echelon is highly configurable, bandwidth efficient, and extremely tolerant of peer dynamics, thanks to the advantages of randomized network coding","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126700133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Supporting Loss Guarantees in Buffer-Limited Networks 缓冲有限网络中的支持损失保证
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250474
Mahmoud Elhaddad, R. Melhem, T. Znati
We consider the problem of packet scheduling in a network with small router buffers. The objective is to provide a statistical bound on the worst-case packet loss rate for a traffic aggregate (connection) routed along any network path, given maximum permissible link utilization (load). This problem is argued to be of interest in networks providing statistical loss-rate guarantees to ingress-egress connections with fixed bandwidth demands. We introduce a scheduling algorithm for networks using per packet transmission reservation. Reservations allow loss guarantees at the aggregate level to hold for individual flows within the aggregate. The algorithm employs randomization and traffic regulation at the ingress, and batch local scheduling at the links. It ensures that a large fraction of packets from each connection are consistently subject to small loss probability at every link. These packets are therefore likely to survive long paths. To obtain the desired loss-rate bound, we analyze the performance of the algorithm under global routing and bandwidth allocation scenarios that maximize the loss rate of a connection routed along an arbitrary network path. We compare the bound to that obtained using the scheduling algorithm that combines the FCFS service discipline and the drop-tail policy. We find that the proposed algorithm significantly improves the constraints on link utilization and path length necessary to achieve strong loss-rate guarantees
研究了一个具有小路由器缓冲区的网络中的数据包调度问题。目标是在给定最大允许链路利用率(负载)的情况下,为沿任何网络路径路由的流量聚合(连接)提供最坏情况下丢包率的统计界限。这个问题被认为是对具有固定带宽需求的入口-出口连接提供统计损失率保证的网络感兴趣的。提出了一种基于每包传输预留的网络调度算法。保留允许在总体水平上对总体中的单个流量保持损失保证。该算法在入口采用随机化和流量调节,在链路采用批量本地调度。它保证了来自每个连接的大部分数据包在每个链路上始终处于较小的丢失概率。因此,这些数据包很可能在很长的路径中存活下来。为了得到期望的丢失率界限,我们分析了该算法在全局路由和带宽分配场景下的性能,使沿任意网络路径路由的连接丢失率最大化。并与结合FCFS服务原则和落尾策略的调度算法得到的约束进行了比较。我们发现所提出的算法显著改善了对链路利用率和路径长度的约束,这些约束是实现强损失率保证所必需的
{"title":"Supporting Loss Guarantees in Buffer-Limited Networks","authors":"Mahmoud Elhaddad, R. Melhem, T. Znati","doi":"10.1109/IWQOS.2006.250474","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250474","url":null,"abstract":"We consider the problem of packet scheduling in a network with small router buffers. The objective is to provide a statistical bound on the worst-case packet loss rate for a traffic aggregate (connection) routed along any network path, given maximum permissible link utilization (load). This problem is argued to be of interest in networks providing statistical loss-rate guarantees to ingress-egress connections with fixed bandwidth demands. We introduce a scheduling algorithm for networks using per packet transmission reservation. Reservations allow loss guarantees at the aggregate level to hold for individual flows within the aggregate. The algorithm employs randomization and traffic regulation at the ingress, and batch local scheduling at the links. It ensures that a large fraction of packets from each connection are consistently subject to small loss probability at every link. These packets are therefore likely to survive long paths. To obtain the desired loss-rate bound, we analyze the performance of the algorithm under global routing and bandwidth allocation scenarios that maximize the loss rate of a connection routed along an arbitrary network path. We compare the bound to that obtained using the scheduling algorithm that combines the FCFS service discipline and the drop-tail policy. We find that the proposed algorithm significantly improves the constraints on link utilization and path length necessary to achieve strong loss-rate guarantees","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Overload Protection for IEEE 802.11 Cells IEEE 802.11 cell的过载保护
Pub Date : 2006-11-30 DOI: 10.1109/IWQOS.2006.250462
H. Munoz, Ignacio Más Ivars, G. Karlsson
This paper presents a distributed admission control for the distributed coordination function of IEEE 802.11 wireless LANs that limits the risk of congestion collapse due to a high arrival rate of flows. This control scheme requires no modification to the current distributed coordination function; it works by performing a short, non-disturbing probe that estimates the MAC service time. The flow is admitted if the estimate is below a threshold. We show how the threshold may be adjusted dynamically to maintain an average packet loss rate below a configurable limit. We show via extensive simulations that the admission control avoids congestion due to flow arrivals and that it maintains the loss probability below the given threshold regardless of the offered load or number of stations. Our simulations also analyze the main drawback of our scheme: a reduction in the link utilization. The admission control efficiently protects cells from overload and it may offer soft QoS guarantees to multimedia flows without the need for scheduling or polling mechanisms in IEEE 802.11
针对IEEE 802.11无线局域网的分布式协调功能,提出了一种分布式接纳控制方法,以限制由于流量到达率高而导致拥塞崩溃的风险。该控制方案不需要修改现有的分布式协调函数;它的工作原理是执行一个简短的、不受干扰的探测来估计MAC服务时间。如果估计低于阈值,则允许流。我们展示了如何动态调整阈值以保持平均丢包率低于可配置限制。我们通过大量的模拟表明,接纳控制避免了由于流到达造成的拥塞,并且无论提供的负载或站点数量如何,它都将损失概率保持在给定阈值以下。我们的模拟还分析了该方案的主要缺点:链路利用率降低。允许控制有效地保护单元免受过载,它可以为多媒体流提供软QoS保证,而不需要IEEE 802.11中的调度或轮询机制
{"title":"Overload Protection for IEEE 802.11 Cells","authors":"H. Munoz, Ignacio Más Ivars, G. Karlsson","doi":"10.1109/IWQOS.2006.250462","DOIUrl":"https://doi.org/10.1109/IWQOS.2006.250462","url":null,"abstract":"This paper presents a distributed admission control for the distributed coordination function of IEEE 802.11 wireless LANs that limits the risk of congestion collapse due to a high arrival rate of flows. This control scheme requires no modification to the current distributed coordination function; it works by performing a short, non-disturbing probe that estimates the MAC service time. The flow is admitted if the estimate is below a threshold. We show how the threshold may be adjusted dynamically to maintain an average packet loss rate below a configurable limit. We show via extensive simulations that the admission control avoids congestion due to flow arrivals and that it maintains the loss probability below the given threshold regardless of the offered load or number of stations. Our simulations also analyze the main drawback of our scheme: a reduction in the link utilization. The admission control efficiently protects cells from overload and it may offer soft QoS guarantees to multimedia flows without the need for scheduling or polling mechanisms in IEEE 802.11","PeriodicalId":248938,"journal":{"name":"200614th IEEE International Workshop on Quality of Service","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121114711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
200614th IEEE International Workshop on Quality of Service
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1