首页 > 最新文献

10th IEEE Symposium on Computers and Communications (ISCC'05)最新文献

英文 中文
Comparing and evaluating lightweight solutions for replica dissemination and retrieval in dense MANETs 比较和评估稠密manet中副本传播和检索的轻量级解决方案
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.42
P. Bellavista, Antonio Corradi, Eugenio Magistretti
There is an emerging market interest in service provisioning over dense mobile ad-hoc networks (MANETs), i.e., limited spatial regions, such as shopping malls, airports, and university campuses, where a high number of mobile wireless peers can autonomously cooperate without exploiting statically deployed network infrastructures. We claim that it is possible to exploit the high node population of dense MANETs to simplify the replication of common interest resources, in order to increase availability notwithstanding unpredictable node exits from dense regions. To this purpose, we have developed the REDMAN middleware that supports the lightweight and dense MANET-specific management, dissemination and retrieval of replicas of data/service components. In particular, the paper focuses on the presentation of different solutions for replica retrieval and for dissemination of replica placement information. We have compared and quantitatively evaluated the presented solutions by considering their ability to retrieve available replicas and their communication overhead. The original SID solution has demonstrated to outperform the others in dense MANETs and has been integrated in the REDMAN prototype.
在密集的移动自组织网络(manet)上提供服务是一个新兴的市场兴趣,例如,有限的空间区域,如购物中心、机场和大学校园,在那里大量的移动无线对等体可以自主合作,而无需利用静态部署的网络基础设施。我们声称可以利用密集manet的高节点人口来简化共同兴趣资源的复制,以便在密集区域无法预测节点退出的情况下提高可用性。为此,我们开发了REDMAN中间件,它支持轻量级和密集的特定于manet的数据/服务组件副本的管理、传播和检索。特别是,本文着重介绍了副本检索和副本放置信息传播的不同解决方案。我们通过考虑它们检索可用副本的能力和它们的通信开销,对所提供的解决方案进行了比较和定量评估。原始的SID解决方案已被证明在密集manet中优于其他解决方案,并已集成在REDMAN原型中。
{"title":"Comparing and evaluating lightweight solutions for replica dissemination and retrieval in dense MANETs","authors":"P. Bellavista, Antonio Corradi, Eugenio Magistretti","doi":"10.1109/ISCC.2005.42","DOIUrl":"https://doi.org/10.1109/ISCC.2005.42","url":null,"abstract":"There is an emerging market interest in service provisioning over dense mobile ad-hoc networks (MANETs), i.e., limited spatial regions, such as shopping malls, airports, and university campuses, where a high number of mobile wireless peers can autonomously cooperate without exploiting statically deployed network infrastructures. We claim that it is possible to exploit the high node population of dense MANETs to simplify the replication of common interest resources, in order to increase availability notwithstanding unpredictable node exits from dense regions. To this purpose, we have developed the REDMAN middleware that supports the lightweight and dense MANET-specific management, dissemination and retrieval of replicas of data/service components. In particular, the paper focuses on the presentation of different solutions for replica retrieval and for dissemination of replica placement information. We have compared and quantitatively evaluated the presented solutions by considering their ability to retrieve available replicas and their communication overhead. The original SID solution has demonstrated to outperform the others in dense MANETs and has been integrated in the REDMAN prototype.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129177298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A reputation-based trust mechanism for ad hoc networks 基于声誉的自组织网络信任机制
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.17
Y. Rebahi, Kaiserin Augusta Allee
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities for this emerging networking paradigm. Usually, security in ad hoc networks is handled through authentication and encryption. This can be considered as a first line of defense, however, this remain inefficient against some other kind of attacks such as malicious packet dropping. The purpose of this work is to provide a mechanism for detecting malicious incorrect packet forwarding attacks. To this end, a trust model extending routing protocols and based on the reputation concept is developed. Our model provides two main functionalities: monitoring the behavior of the neighboring nodes in the network and computing their reputations based on the information provided by the monitoring. This paper also discusses how the reputation information is gathered, stored and exchanged between the nodes, and computed according to the different scenarios. Our mechanism is also validated with some simulation work showing its feasibility, performance and benefits.
ad hoc网络的主要特点是缺乏预定义的基础结构和动态拓扑结构。这些特征为这种新兴的网络范例带来了一些新的安全漏洞。通常,自组织网络中的安全性是通过身份验证和加密来处理的。这可以被视为第一道防线,但是,对于其他类型的攻击(如恶意数据包丢弃),这仍然是低效的。这项工作的目的是提供一种检测恶意错误数据包转发攻击的机制。为此,提出了一种基于信誉概念的扩展路由协议的信任模型。我们的模型提供了两个主要功能:监控网络中相邻节点的行为,并根据监控提供的信息计算它们的声誉。本文还讨论了信誉信息如何在节点之间收集、存储和交换,以及如何根据不同的场景进行计算。通过一些仿真工作验证了该机制的可行性、性能和效益。
{"title":"A reputation-based trust mechanism for ad hoc networks","authors":"Y. Rebahi, Kaiserin Augusta Allee","doi":"10.1109/ISCC.2005.17","DOIUrl":"https://doi.org/10.1109/ISCC.2005.17","url":null,"abstract":"The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities for this emerging networking paradigm. Usually, security in ad hoc networks is handled through authentication and encryption. This can be considered as a first line of defense, however, this remain inefficient against some other kind of attacks such as malicious packet dropping. The purpose of this work is to provide a mechanism for detecting malicious incorrect packet forwarding attacks. To this end, a trust model extending routing protocols and based on the reputation concept is developed. Our model provides two main functionalities: monitoring the behavior of the neighboring nodes in the network and computing their reputations based on the information provided by the monitoring. This paper also discusses how the reputation information is gathered, stored and exchanged between the nodes, and computed according to the different scenarios. Our mechanism is also validated with some simulation work showing its feasibility, performance and benefits.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
A framework for supporting distributed access control policies 支持分布式访问控制策略的框架
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.10
Wei Zhou, C. Meinel, V. Raja
In this paper we describe a mechanism for managing authorisation policies in distributed environments. This mechanism is based on public key infrastructure (PKI) and privilege management infrastructure (PMI). In our approach each domain comprises a root policy and some subordinate authorisation policies. The root policy specifies how to use the subordinate policies. The subordinate policies describe the access control rules that are used for making access control decisions. The subordinate policies can be defined and managed independently and dynamically loaded into the access control system at runtime. All these policies are stored in X.509 attribute certificates (ACs), thus guaranteeing their integrity. The AC that holds root policy is co-located with access control system; the ACs that holds subordinate policies can be distributed. In the root policy we use policy schemes, policy sub-schemes and policy hierarchies to manage the subordinate policies; because they make the policy management flexible and easy.
在本文中,我们描述了一种在分布式环境中管理授权策略的机制。该机制基于公钥基础设施(PKI)和特权管理基础设施(PMI)。在我们的方法中,每个域包含一个根策略和一些从属授权策略。根策略指定如何使用下级策略。下级策略描述用于做出访问控制决策的访问控制规则。下级策略可以独立定义和管理,并在运行时动态加载到访问控制系统中。所有这些策略都存储在X.509属性证书(ac)中,从而保证了它们的完整性。持有根策略的AC与访问控制系统位于同一位置;拥有从属策略的ac可以被分发。在根策略中,我们使用策略方案、策略子方案和策略层次来管理下级策略;因为它们使策略管理变得灵活和容易。
{"title":"A framework for supporting distributed access control policies","authors":"Wei Zhou, C. Meinel, V. Raja","doi":"10.1109/ISCC.2005.10","DOIUrl":"https://doi.org/10.1109/ISCC.2005.10","url":null,"abstract":"In this paper we describe a mechanism for managing authorisation policies in distributed environments. This mechanism is based on public key infrastructure (PKI) and privilege management infrastructure (PMI). In our approach each domain comprises a root policy and some subordinate authorisation policies. The root policy specifies how to use the subordinate policies. The subordinate policies describe the access control rules that are used for making access control decisions. The subordinate policies can be defined and managed independently and dynamically loaded into the access control system at runtime. All these policies are stored in X.509 attribute certificates (ACs), thus guaranteeing their integrity. The AC that holds root policy is co-located with access control system; the ACs that holds subordinate policies can be distributed. In the root policy we use policy schemes, policy sub-schemes and policy hierarchies to manage the subordinate policies; because they make the policy management flexible and easy.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123848373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A game theoretic analysis of protocols based on fountain codes 基于喷泉码协议的博弈论分析
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.11
Luis López, Antonio Fernández, V. Cholvi
In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP (fountain based protocol), consists on using a digital fountain encoding which guarantees that duplicate packets are not possible. Using game theory, we analyze the behavior of TCP and FBP in the presence of congestion. We show that hosts using TCP have an incentive to switch to an FBP approach obtaining a higher throughput. Furthermore, we also show that a Nash equilibrium takes place when all hosts use FBP. At this equilibrium, the performance of the network is similar to the performance obtained when all hosts comply with TCP.
本文分析了一种新的可靠通信模式,它不基于传统的TCP超时重传机制。我们的方法,我们称之为FBP(基于喷泉的协议),包括使用数字喷泉编码,保证重复的数据包是不可能的。利用博弈论分析了TCP和FBP在拥塞情况下的行为。我们表明,使用TCP的主机有动机切换到FBP方法以获得更高的吞吐量。此外,我们还表明,当所有主机都使用FBP时,会出现纳什均衡。在这种平衡状态下,网络的性能与所有主机都遵守TCP协议时获得的性能相似。
{"title":"A game theoretic analysis of protocols based on fountain codes","authors":"Luis López, Antonio Fernández, V. Cholvi","doi":"10.1109/ISCC.2005.11","DOIUrl":"https://doi.org/10.1109/ISCC.2005.11","url":null,"abstract":"In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP (fountain based protocol), consists on using a digital fountain encoding which guarantees that duplicate packets are not possible. Using game theory, we analyze the behavior of TCP and FBP in the presence of congestion. We show that hosts using TCP have an incentive to switch to an FBP approach obtaining a higher throughput. Furthermore, we also show that a Nash equilibrium takes place when all hosts use FBP. At this equilibrium, the performance of the network is similar to the performance obtained when all hosts comply with TCP.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Packet classification using two-dimensional multibit tries 使用二维多比特尝试的数据包分类
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.118
Wencheng Lu, S. Sahni
We develop fast algorithms to construct space-optimal constrained two-dimensional multibit tries for Internet packet classifier applications. Experimental evidence suggests that using the same memory budget, space-optimal two-dimensional multibit tries require 1/4 to 1/3 the memory accesses required by two-dimensional one-bit tries for table lookup.
我们开发了快速算法来构造空间最优约束的二维多比特尝试,用于互联网分组分类器应用。实验证据表明,使用相同的内存预算,空间最优的二维多位尝试所需的内存访问是二维一位尝试查找所需的内存访问的1/4到1/3。
{"title":"Packet classification using two-dimensional multibit tries","authors":"Wencheng Lu, S. Sahni","doi":"10.1109/ISCC.2005.118","DOIUrl":"https://doi.org/10.1109/ISCC.2005.118","url":null,"abstract":"We develop fast algorithms to construct space-optimal constrained two-dimensional multibit tries for Internet packet classifier applications. Experimental evidence suggests that using the same memory budget, space-optimal two-dimensional multibit tries require 1/4 to 1/3 the memory accesses required by two-dimensional one-bit tries for table lookup.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121193719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A task-based adaptive TTL approach for Web server load balancing 用于Web服务器负载平衡的基于任务的自适应TTL方法
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.19
Devarshi Chatterjee, Z. Tari, Albert Y. Zomaya
Web sites attracting a high client-traffic cannot simply rely on either mirrored servers or a single server to balance the client-request generated load. DNS load balancing techniques have shown their advantages in dealing with heavy Web traffic. These techniques use the time-to-live (TTL) value associated with a name-to-address translation. Unfortunately name-to-address translations are cached in intermediate name servers for a period defined by the TTL This results in all requests reaching the same Web server for this TTL period. The proposed adaptive-TTL approach (called DLB-TS - dynamic load balancing based on task size) takes into account the time taken to fetch a document while choosing the least loaded server. To alleviate the problems of client-side caching and non-cooperative intermediate name servers, a server-side redirection is proposed and implemented. Though the algorithm caused degraded performance because of server-side load balancing under a light load, it reduced the client perceived latency by at least 16% when compared to existing size-based algorithms.
吸引高客户机流量的Web站点不能简单地依赖镜像服务器或单个服务器来平衡客户机请求生成的负载。DNS负载平衡技术在处理繁重的Web流量方面已经显示出其优势。这些技术使用与名称到地址转换相关的生存时间(TTL)值。不幸的是,名称到地址的转换将在TTL定义的一段时间内缓存在中间名称服务器中,这导致所有请求在该TTL期间内到达同一Web服务器。提出的自适应ttl方法(称为DLB-TS -基于任务大小的动态负载平衡)在选择负载最少的服务器时考虑了获取文档所需的时间。为了缓解客户端缓存和中间名称服务器不合作的问题,提出并实现了服务器端重定向。尽管该算法在轻负载下由于服务器端负载平衡而导致性能下降,但与现有的基于大小的算法相比,它将客户端感知到的延迟减少了至少16%。
{"title":"A task-based adaptive TTL approach for Web server load balancing","authors":"Devarshi Chatterjee, Z. Tari, Albert Y. Zomaya","doi":"10.1109/ISCC.2005.19","DOIUrl":"https://doi.org/10.1109/ISCC.2005.19","url":null,"abstract":"Web sites attracting a high client-traffic cannot simply rely on either mirrored servers or a single server to balance the client-request generated load. DNS load balancing techniques have shown their advantages in dealing with heavy Web traffic. These techniques use the time-to-live (TTL) value associated with a name-to-address translation. Unfortunately name-to-address translations are cached in intermediate name servers for a period defined by the TTL This results in all requests reaching the same Web server for this TTL period. The proposed adaptive-TTL approach (called DLB-TS - dynamic load balancing based on task size) takes into account the time taken to fetch a document while choosing the least loaded server. To alleviate the problems of client-side caching and non-cooperative intermediate name servers, a server-side redirection is proposed and implemented. Though the algorithm caused degraded performance because of server-side load balancing under a light load, it reduced the client perceived latency by at least 16% when compared to existing size-based algorithms.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Proportional bandwidth distribution in IP networks implementing the assured forwarding PHB 在IP网络中按比例分配带宽,实现保证转发PHB
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.128
M. Cano, F. Cerdán
Recent demands for new applications are giving rise to an increasing need of quality of service (QoS). Nowadays, most IP-based networks tend to use the DiffServ architecture to provide end-to-end QoS. Traffic conditioners are a key element in the deployment of DiffServ. In this paper, we introduce a new approach for traffic conditioning based on feedback signaling among boundary nodes and traffic conditioners. This new approach is intended to provide a proportional distribution of excess bandwidth to end-users. We evaluate through extensive simulations the performance of our proposal in terms of final throughput, considering contracted target rates and distribution of spare bandwidth. Results show a high level of fairness in the excess bandwidth allocation among TCP sources under different network conditions.
最近对新应用程序的需求增加了对服务质量(QoS)的需求。现在,大多数基于ip的网络倾向于使用DiffServ架构来提供端到端的QoS。流量调节是DiffServ部署的关键组件。本文提出了一种基于边界节点间反馈信令和交通调节器的交通调节新方法。这种新方法旨在为最终用户提供按比例分配的多余带宽。我们通过广泛的模拟来评估我们的建议在最终吞吐量方面的性能,考虑到合同目标速率和备用带宽的分配。结果表明,在不同的网络条件下,TCP源之间的超额带宽分配具有很高的公平性。
{"title":"Proportional bandwidth distribution in IP networks implementing the assured forwarding PHB","authors":"M. Cano, F. Cerdán","doi":"10.1109/ISCC.2005.128","DOIUrl":"https://doi.org/10.1109/ISCC.2005.128","url":null,"abstract":"Recent demands for new applications are giving rise to an increasing need of quality of service (QoS). Nowadays, most IP-based networks tend to use the DiffServ architecture to provide end-to-end QoS. Traffic conditioners are a key element in the deployment of DiffServ. In this paper, we introduce a new approach for traffic conditioning based on feedback signaling among boundary nodes and traffic conditioners. This new approach is intended to provide a proportional distribution of excess bandwidth to end-users. We evaluate through extensive simulations the performance of our proposal in terms of final throughput, considering contracted target rates and distribution of spare bandwidth. Results show a high level of fairness in the excess bandwidth allocation among TCP sources under different network conditions.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling scalable inter-AS signaling: a load reduction approach 支持可伸缩的as间信令:一种减少负载的方法
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.64
Rute C. Sofia, R. Guérin, P. Veiga
In order to achieve better scalability, inter-domain signaling protocols rely on aggregation to reduce the amount of state information that routers are required to maintain. Nonetheless, they do not address another scalability key factor, the signaling load associated with establishing and maintaining reservations. Such load can be reduced if bandwidth is over-reserved. Over-reservation allows accommodating reservations without exchanging signaling messages, but may result in additional blocking. In this paper, we carry out a systematic investigation of the impact of over-reservation in different aggregation approaches, evaluating such impact in terms of the achieved signaling reduction, and blocking.
为了获得更好的可扩展性,域间信令协议依赖于聚合来减少路由器需要维护的状态信息的数量。尽管如此,它们没有解决另一个可伸缩性关键因素,即与建立和维护保留相关的信令负载。如果带宽过度预留,则可以减少这种负载。超额预订允许在不交换信令消息的情况下容纳预订,但可能导致额外的阻塞。在本文中,我们对不同聚合方法中过度保留的影响进行了系统的研究,从实现的信号减少和阻塞方面评估了这种影响。
{"title":"Enabling scalable inter-AS signaling: a load reduction approach","authors":"Rute C. Sofia, R. Guérin, P. Veiga","doi":"10.1109/ISCC.2005.64","DOIUrl":"https://doi.org/10.1109/ISCC.2005.64","url":null,"abstract":"In order to achieve better scalability, inter-domain signaling protocols rely on aggregation to reduce the amount of state information that routers are required to maintain. Nonetheless, they do not address another scalability key factor, the signaling load associated with establishing and maintaining reservations. Such load can be reduced if bandwidth is over-reserved. Over-reservation allows accommodating reservations without exchanging signaling messages, but may result in additional blocking. In this paper, we carry out a systematic investigation of the impact of over-reservation in different aggregation approaches, evaluating such impact in terms of the achieved signaling reduction, and blocking.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing the reliable distribution of large files within CDNs 优化cdn内大文件的可靠分发
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.116
L. Cherkasova
Content delivery networks (CDNs) provide an efficient support for serving http and streaming media content white minimizing the network impact of content delivery as well as overcoming the server overload problem. For serving the large documents and media files, there is an additional problem of the original content distribution across the CDN edge servers. We propose an algorithm, called ALM-fastreplica, for optimizing replication of large files across the edge servers in CDNs. The original file is partitioned into k subfiles, and each subfile is replicated via a correspondingly constructed multicast tree. Nodes from the different multicast trees use additional cross-nodes connections to exchange their corresponding subfiles such that each node eventually receives an entire file. This new replication method significantly reduces file replication time, up to 5-15 times compared to the traditional unicast (or point-to-point) schema. Since a single node failure in the multicast tree during the file distribution may impact the file delivery to a significant number of nodes, it is important to design an algorithm which is able to deal with node failures. We augment ALM-FastReplica with an efficient reliability mechanism, that can deal with node failures by making local repair decisions within a particular replication group of nodes. Under the proposed algorithm, the load of the failed node is shared among the nodes of the corresponding replication group, making the performance degradation gradual.
内容分发网络(cdn)为提供http和流媒体内容提供了有效的支持,从而最大限度地减少了内容分发对网络的影响,并克服了服务器过载问题。为了提供大型文档和媒体文件,还存在一个额外的问题,即跨CDN边缘服务器分发原始内容。我们提出了一种称为ALM-fastreplica的算法,用于优化cdn中跨边缘服务器的大文件复制。将原始文件划分为k个子文件,每个子文件通过相应构造的多播树进行复制。来自不同多播树的节点使用额外的跨节点连接来交换它们相应的子文件,这样每个节点最终都会接收到一个完整的文件。这种新的复制方法显著减少了文件复制时间,与传统的单播(或点对点)模式相比,最多可减少5-15倍。由于在文件分发过程中,组播树中单个节点的故障可能会影响到大量节点的文件传递,因此设计一种能够处理节点故障的算法是很重要的。我们用一种高效的可靠性机制增强了ALM-FastReplica,该机制可以通过在特定的节点复制组中做出本地修复决策来处理节点故障。在该算法下,故障节点的负载由相应复制组的节点分担,使得性能逐渐下降。
{"title":"Optimizing the reliable distribution of large files within CDNs","authors":"L. Cherkasova","doi":"10.1109/ISCC.2005.116","DOIUrl":"https://doi.org/10.1109/ISCC.2005.116","url":null,"abstract":"Content delivery networks (CDNs) provide an efficient support for serving http and streaming media content white minimizing the network impact of content delivery as well as overcoming the server overload problem. For serving the large documents and media files, there is an additional problem of the original content distribution across the CDN edge servers. We propose an algorithm, called ALM-fastreplica, for optimizing replication of large files across the edge servers in CDNs. The original file is partitioned into k subfiles, and each subfile is replicated via a correspondingly constructed multicast tree. Nodes from the different multicast trees use additional cross-nodes connections to exchange their corresponding subfiles such that each node eventually receives an entire file. This new replication method significantly reduces file replication time, up to 5-15 times compared to the traditional unicast (or point-to-point) schema. Since a single node failure in the multicast tree during the file distribution may impact the file delivery to a significant number of nodes, it is important to design an algorithm which is able to deal with node failures. We augment ALM-FastReplica with an efficient reliability mechanism, that can deal with node failures by making local repair decisions within a particular replication group of nodes. Under the proposed algorithm, the load of the failed node is shared among the nodes of the corresponding replication group, making the performance degradation gradual.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the impact of distributed power control over multicast routing protocols 分布式功率控制对组播路由协议的影响
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.113
C. Taddia, A. Giovanardi, G. Mazzini
In this paper we investigate the impact of a distributed power control (DPC) technique over two multicast routing protocols, AMRIS and ODMRP. Such routing schemes are tested with 802.11 and 802.11b MAC protocols. The aim of this work is to investigate the influence of different MAC solutions, the effective reduction in terms of power consumption allowed by the DPC mechanism, and also to check the not excessive performance degradation for the other figures of merit, like packet delivery fraction and average delay. Comparisons between the various solutions are performed through an extensive simulation study.
本文研究了分布式功率控制(DPC)技术对两种组播路由协议AMRIS和ODMRP的影响。这些路由方案在802.11和802.11b MAC协议下进行了测试。这项工作的目的是研究不同的MAC解决方案的影响,有效降低DPC机制允许的功耗,并检查其他指标(如数据包传输分数和平均延迟)的性能下降。通过广泛的模拟研究,对各种解决方案进行了比较。
{"title":"On the impact of distributed power control over multicast routing protocols","authors":"C. Taddia, A. Giovanardi, G. Mazzini","doi":"10.1109/ISCC.2005.113","DOIUrl":"https://doi.org/10.1109/ISCC.2005.113","url":null,"abstract":"In this paper we investigate the impact of a distributed power control (DPC) technique over two multicast routing protocols, AMRIS and ODMRP. Such routing schemes are tested with 802.11 and 802.11b MAC protocols. The aim of this work is to investigate the influence of different MAC solutions, the effective reduction in terms of power consumption allowed by the DPC mechanism, and also to check the not excessive performance degradation for the other figures of merit, like packet delivery fraction and average delay. Comparisons between the various solutions are performed through an extensive simulation study.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"14 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
10th IEEE Symposium on Computers and Communications (ISCC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1