首页 > 最新文献

Next Generation Internet Networks, 2005最新文献

英文 中文
Routing with partially disjoint shared path (PDSP) protection 具有部分不相交共享路径(PDSP)保护的路由
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431646
T. Clinker, D. Meško, G. Viola, János Tapolcai
We propose two algorithms for dynamic routing of guaranteed bandwidth pipes with shared protection that provide low blocking through thrifty resource usage. We assume that a single working path can be protected by one or multiple protection paths, which are partially or fully disjoint from the working path. This allows better capacity re-use (i.e., better capacity sharing among protection paths). Furthermore, the resources used by the paths affected by the failure, can be also re-used. The significance of the proposed method "PDSP-LD" is that we consider the amount of shareable protection capacity of each link, while determining the protection path for all affected demands simultaneously. Therefore it gives optimal routing of shared protection paths in case of any single link failure! The obtained results can be used for routing with protection in SDH/SONET, ATM, MPLS, WR-DWDM (including ASTN/GMPLS) and other networks.
我们提出了两种具有共享保护的保证带宽管道的动态路由算法,通过节约资源使用来提供低阻塞。我们假设一条工作路径可以被一条或多条与工作路径部分或完全不相交的保护路径所保护。这样可以更好地重用容量(即在保护路径之间更好地共享容量)。此外,受故障影响的路径所使用的资源也可以被重用。提出的“pdp - ld”方法的意义在于,我们考虑了每条链路的可共享保护容量,同时确定了所有受影响需求的保护路径。因此,在任何单个链路故障的情况下,它提供了共享保护路径的最佳路由!所得结果可用于SDH/SONET、ATM、MPLS、WR-DWDM(包括ASTN/GMPLS)等网络中的带保护路由。
{"title":"Routing with partially disjoint shared path (PDSP) protection","authors":"T. Clinker, D. Meško, G. Viola, János Tapolcai","doi":"10.1109/NGI.2005.1431646","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431646","url":null,"abstract":"We propose two algorithms for dynamic routing of guaranteed bandwidth pipes with shared protection that provide low blocking through thrifty resource usage. We assume that a single working path can be protected by one or multiple protection paths, which are partially or fully disjoint from the working path. This allows better capacity re-use (i.e., better capacity sharing among protection paths). Furthermore, the resources used by the paths affected by the failure, can be also re-used. The significance of the proposed method \"PDSP-LD\" is that we consider the amount of shareable protection capacity of each link, while determining the protection path for all affected demands simultaneously. Therefore it gives optimal routing of shared protection paths in case of any single link failure! The obtained results can be used for routing with protection in SDH/SONET, ATM, MPLS, WR-DWDM (including ASTN/GMPLS) and other networks.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of 'user-oriented' and 'black-box' traffic models for link provisioning 评估“面向用户”和“黑箱”流量模型用于链路配置
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431691
Meent van de Remco, M. Mandjes
To offer users a sufficient performance level, network links should be properly provisioned. The required bandwidth capacity may be determined through the use of a model of the real network traffic. In this paper, we study the use of two classes of traffic models: (i) 'user-oriented models', which capture the behavior of individual flows, and (ii) 'black-box models', which statistically describe the superposition of many users (and do not distinguish between individual flows). User-oriented models have the advantage that they allow for sensitivity analysis: the impact of a change in the user parameters (access rate, flow-size distribution) can be assessed. In general, however, our measurements indicated that black-box models are easier to estimate, and yield accurate provisioning guidelines.
为了给用户提供足够的性能水平,应该适当地配置网络链接。所需的带宽容量可以通过使用真实网络流量的模型来确定。在本文中,我们研究了两类交通模型的使用:(i)“面向用户的模型”,捕捉单个流的行为,以及(ii)“黑盒模型”,统计上描述了许多用户的叠加(并且不区分单个流)。面向用户的模型具有允许进行敏感性分析的优点:可以评估用户参数(访问速率、流量大小分布)变化的影响。然而,一般来说,我们的测量表明黑盒模型更容易估计,并产生准确的供应指导方针。
{"title":"Evaluation of 'user-oriented' and 'black-box' traffic models for link provisioning","authors":"Meent van de Remco, M. Mandjes","doi":"10.1109/NGI.2005.1431691","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431691","url":null,"abstract":"To offer users a sufficient performance level, network links should be properly provisioned. The required bandwidth capacity may be determined through the use of a model of the real network traffic. In this paper, we study the use of two classes of traffic models: (i) 'user-oriented models', which capture the behavior of individual flows, and (ii) 'black-box models', which statistically describe the superposition of many users (and do not distinguish between individual flows). User-oriented models have the advantage that they allow for sensitivity analysis: the impact of a change in the user parameters (access rate, flow-size distribution) can be assessed. In general, however, our measurements indicated that black-box models are easier to estimate, and yield accurate provisioning guidelines.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Tweak-it: BGP-based interdomain traffic engineering for transit ASs Tweak-it:基于bgp的transit as域间流量工程
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431650
Steve Uhlig, B. Quoitin
Today, engineering interdomain traffic in large transit ASs is a difficult task due the opacity of BGP and the interactions between the BGP decision process and IGP routing. In this paper we propose Tweak-it, a tool that, based on the steady-state view of BGP routing inside the AS and the traffic demands of the AS, computes the BGP updates to be sent to the ingress routers of a transit AS to traffic engineer its interdomain traffic over time. Tweak-it is based on two components: 1) a scalable BGP simulator (CBGP) that computes the steady-state behavior of BGP routing and 2) a multiple-objectives evolutionary heuristic that can deal with multiple conflicting objectives as they can occur in real networks. Tweak-it takes the intradomain configuration (IGP weights and topology), BGP messages received from peers, BGP routing policies, and traffic demands. By keeping the state of the routing inside the AS up-to-date and based on the traffic demands, the heuristics computes how to engineer the traffic of the AS while trying to minimize the number of BGP tweakings required.
目前,由于BGP的不透明性以及BGP决策过程与IGP路由之间的相互作用,大型transit as的域间流量工程是一项艰巨的任务。本文提出了一种基于自治系统内部BGP路由的稳态视图和自治系统的流量需求的工具Tweak-it,它计算发送到传输自治系统的入口路由器的BGP更新,以对其域间流量进行流量工程。它基于两个组件:1)一个可扩展的BGP模拟器(CBGP),计算BGP路由的稳态行为;2)一个多目标进化启发式,可以处理现实网络中可能出现的多个冲突目标。调整—根据域内配置(IGP权重和拓扑)、从对等体收到的BGP消息、BGP路由策略和流量需求进行调整。通过保持AS内部路由的最新状态并基于流量需求,启发式算法计算如何设计AS的流量,同时尽量减少所需的BGP调整数量。
{"title":"Tweak-it: BGP-based interdomain traffic engineering for transit ASs","authors":"Steve Uhlig, B. Quoitin","doi":"10.1109/NGI.2005.1431650","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431650","url":null,"abstract":"Today, engineering interdomain traffic in large transit ASs is a difficult task due the opacity of BGP and the interactions between the BGP decision process and IGP routing. In this paper we propose Tweak-it, a tool that, based on the steady-state view of BGP routing inside the AS and the traffic demands of the AS, computes the BGP updates to be sent to the ingress routers of a transit AS to traffic engineer its interdomain traffic over time. Tweak-it is based on two components: 1) a scalable BGP simulator (CBGP) that computes the steady-state behavior of BGP routing and 2) a multiple-objectives evolutionary heuristic that can deal with multiple conflicting objectives as they can occur in real networks. Tweak-it takes the intradomain configuration (IGP weights and topology), BGP messages received from peers, BGP routing policies, and traffic demands. By keeping the state of the routing inside the AS up-to-date and based on the traffic demands, the heuristics computes how to engineer the traffic of the AS while trying to minimize the number of BGP tweakings required.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Enhanced admission control solution for multicasting with DiffServ 使用DiffServ进行多播的增强接纳控制解决方案
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431676
O. Alanen, Mikko Pääkkönen, Mikko Ketola, Timo Hämäläinen, J. Joutsensalo
Multicast admission control in differentiated services network is an important but shortly researched subject. We propose a parameter-based admission control method. The method rejects new multicast join requests that would otherwise decrease the quality experienced by the existing receivers. DiffServ network edge nodes filter join requests and generate new requests. The proposed method is developed as an extension to the DSMCast protocol but could also be adapted to other protocols. In this paper the parameter-based admission control is compared to earlier created, measurement-based admission control methods, as well to situation when no admission control is used.
差分业务网络中的组播准入控制是一个重要但研究较少的课题。我们提出了一种基于参数的准入控制方法。该方法拒绝新的多播连接请求,否则会降低现有接收方所经历的质量。DiffServ网络边缘节点过滤加入请求并生成新的请求。所提出的方法是作为DSMCast协议的扩展而开发的,但也可以适应其他协议。本文将基于参数的准入控制方法与先前创建的基于测量的准入控制方法进行了比较,并与不使用准入控制的情况进行了比较。
{"title":"Enhanced admission control solution for multicasting with DiffServ","authors":"O. Alanen, Mikko Pääkkönen, Mikko Ketola, Timo Hämäläinen, J. Joutsensalo","doi":"10.1109/NGI.2005.1431676","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431676","url":null,"abstract":"Multicast admission control in differentiated services network is an important but shortly researched subject. We propose a parameter-based admission control method. The method rejects new multicast join requests that would otherwise decrease the quality experienced by the existing receivers. DiffServ network edge nodes filter join requests and generate new requests. The proposed method is developed as an extension to the DSMCast protocol but could also be adapted to other protocols. In this paper the parameter-based admission control is compared to earlier created, measurement-based admission control methods, as well to situation when no admission control is used.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Marginal productivity index policies for scheduling multiclass delay-/loss-sensitive traffic 多类延迟/丢失敏感流量调度的边际生产率指数策略
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431648
J. Niño-Mora
We address the problem of scheduling transmissions of heterogeneous packet traffic streams on a single link in the setting of a Markovian multiclass queueing model with losses, where every class has a dedicated finite buffer. Some classes correspond to real-time/delay-sensitive traffic (e.g. voice, video) whereas others correspond to nonreal-time/loss-sensitive traffic (e.g. data). Different levels of tolerance to delay and packet loss are modeled by suitable cost rates. The goal is to design well-grounded and tractable scheduling policies that nearly minimize the discounted or average expected cost objective. We develop new dynamic index policies, prescribing to give higher service priority to classes with larger index values, where the priority index of a class measures the marginal productivity of work at its current state. Such index policies are shown to furnish new, insightful structural results.
我们在具有损失的马尔可夫多类排队模型中解决了在单个链路上异构分组流量流的调度问题,其中每个类都有一个专用的有限缓冲区。一些类对应于实时/延迟敏感的流量(如语音、视频),而另一些类对应于非实时/丢失敏感的流量(如数据)。通过适当的成本率对不同级别的延迟和包丢失容忍进行建模。目标是设计基础良好且易于处理的调度策略,使折扣或平均预期成本目标最小化。我们开发了新的动态指标策略,规定对指标值较大的类给予更高的服务优先级,其中一个类的优先级指数衡量其当前状态下的边际工作生产率。这种指数政策被证明提供了新的、深刻的结构性结果。
{"title":"Marginal productivity index policies for scheduling multiclass delay-/loss-sensitive traffic","authors":"J. Niño-Mora","doi":"10.1109/NGI.2005.1431648","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431648","url":null,"abstract":"We address the problem of scheduling transmissions of heterogeneous packet traffic streams on a single link in the setting of a Markovian multiclass queueing model with losses, where every class has a dedicated finite buffer. Some classes correspond to real-time/delay-sensitive traffic (e.g. voice, video) whereas others correspond to nonreal-time/loss-sensitive traffic (e.g. data). Different levels of tolerance to delay and packet loss are modeled by suitable cost rates. The goal is to design well-grounded and tractable scheduling policies that nearly minimize the discounted or average expected cost objective. We develop new dynamic index policies, prescribing to give higher service priority to classes with larger index values, where the priority index of a class measures the marginal productivity of work at its current state. Such index policies are shown to furnish new, insightful structural results.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance modeling of a wireless 4G cell under a GPS scheme with hand off 无线4G蜂窝在GPS方案下的性能建模
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431695
D. Kouvatsos, I. Awan, Y. Li
A analytic framework is devised, based on the principle of maximum entropy (ME), for the performance modeling of a wireless 4G cell with bursty multimedia traffic with hand off under an efficient MAC protocol with a buffer threshold-based generalized partial sharing (GPS) traffic handling scheme. In this context, an open queueing network model (QNM) is proposed consisting of three interacting multiclass GE-type queueing and delay systems, namely a GE/GE/c/sub 1//c/sub 1/ loss system of IP voice calls, a GE/GE/c/sub 2//N/sub 2//FCFS/CBS(T/sub l/T/sub h/) queueing system of streaming media packets with low (T/sub l/) and high (T/sub h/) buffer thresholds and a GE/GE/l/N/sub 3//PS delay system with a discriminatory PS transfer rule. Analytic ME solutions for the state probabilities of these systems are characterized, subject to appropriate GE-type queueing and delay theoretic constraints and new closed form expressions for the aggregate state and blocking probabilities are determined. Typical numerical examples are included to validate the ME performance metrics against Java-based simulation results and also to study the effect of bursty multiple class traffic upon the performance of the cell.
基于最大熵(ME)原理,设计了一个分析框架,用于在基于缓冲阈值的广义部分共享(GPS)流量处理方案的高效MAC协议下,对具有突发多媒体业务切换的4G无线小区进行性能建模。在此背景下,提出了一个开放排队网络模型(QNM),该模型由三个相互作用的多类GE型排队和延迟系统组成,即IP语音呼叫的GE/GE/c/sub 1//c/sub 1/丢失系统,具有低(T/sub l/)和高(T/sub h/)缓冲阈值的流媒体数据包的GE/GE/c/sub 2//N/sub 2//FCFS/CBS(T/sub l/T/sub h/)排队系统和具有歧视性PS传输规则的GE/GE/l/N/sub 3//PS延迟系统。在适当的ge型排队和延迟理论约束下,对这些系统状态概率的解析ME解进行了表征,并确定了聚合状态和阻塞概率的新的封闭形式表达式。本文包括典型的数值示例,以根据基于java的模拟结果验证ME性能指标,并研究突发的多类流量对计算单元性能的影响。
{"title":"Performance modeling of a wireless 4G cell under a GPS scheme with hand off","authors":"D. Kouvatsos, I. Awan, Y. Li","doi":"10.1109/NGI.2005.1431695","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431695","url":null,"abstract":"A analytic framework is devised, based on the principle of maximum entropy (ME), for the performance modeling of a wireless 4G cell with bursty multimedia traffic with hand off under an efficient MAC protocol with a buffer threshold-based generalized partial sharing (GPS) traffic handling scheme. In this context, an open queueing network model (QNM) is proposed consisting of three interacting multiclass GE-type queueing and delay systems, namely a GE/GE/c/sub 1//c/sub 1/ loss system of IP voice calls, a GE/GE/c/sub 2//N/sub 2//FCFS/CBS(T/sub l/T/sub h/) queueing system of streaming media packets with low (T/sub l/) and high (T/sub h/) buffer thresholds and a GE/GE/l/N/sub 3//PS delay system with a discriminatory PS transfer rule. Analytic ME solutions for the state probabilities of these systems are characterized, subject to appropriate GE-type queueing and delay theoretic constraints and new closed form expressions for the aggregate state and blocking probabilities are determined. Typical numerical examples are included to validate the ME performance metrics against Java-based simulation results and also to study the effect of bursty multiple class traffic upon the performance of the cell.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129173780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Buffer sizes for large multiplexers: TCP queueing theory and instability analysis 大型多路复用器的缓冲区大小:TCP排队理论和不稳定性分析
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431663
G. Raina, D. Wischik
In large multiplexers with many TCP flows, the aggregate traffic flow behaves predictably; this is a basis for the fluid model of Misra, Gong and Towsley V. Misra et al., (2000) and for a growing literature on fluid models of congestion control. In this paper we argue that different fluid models arise from different buffer-sizing regimes. We consider the large buffer regime (buffer size is bandwidth-delay product), an intermediate regime (divide the large buffer size by the square root of the number of flows), and the small buffer regime (buffer size does not depend on number of flows). Our arguments use various techniques from queueing theory. We study the behaviour of these fluid models (on a single bottleneck Kink, for a collection of identical long-lived flows). For what parameter regimes is the fluid model stable, and when it is unstable what is the size of oscillations and the impact on goodput? Our analysis uses an extension of the Poincare-Linstedt method to delay-differential equations. We find that large buffers with drop-tail have much the same performance as intermediate buffers with either drop-tail or AQM; that large buffers with RED are better at least for window sizes less than 20 packets; and that small buffers with either drop-tail or AQM are best over a wide range of window sizes, though the buffer size must be chosen carefully. This suggests that buffer sizes should be much much smaller than is currently recommended.
在具有许多TCP流的大型多路复用器中,聚合流量的行为是可预测的;这是Misra、Gong和Towsley V. Misra等人(2000)的流体模型的基础,也是越来越多关于拥塞控制流体模型的文献的基础。在本文中,我们认为不同的流体模型产生于不同的缓冲大小制度。我们考虑了大缓冲区制度(缓冲区大小是带宽延迟的乘积),中间制度(大缓冲区大小除以流量数量的平方根)和小缓冲区制度(缓冲区大小不依赖于流量的数量)。我们的参数使用了排队理论中的各种技术。我们研究了这些流体模型的行为(在一个单一的瓶颈扭结上,对于一个相同的长寿命流的集合)。流体模型在什么参数下是稳定的,当它不稳定时,振荡的大小和对goodput的影响是什么?我们的分析使用了对延迟微分方程的庞加莱-林斯泰特方法的扩展。我们发现,具有落尾的大缓冲区与具有落尾或AQM的中间缓冲区的性能基本相同;使用RED的大缓冲区至少对于小于20个数据包的窗口大小更好;并且具有落尾或AQM的小缓冲区在大范围的窗口大小范围内是最好的,尽管缓冲区大小必须仔细选择。这表明缓冲区大小应该比当前推荐的小得多。
{"title":"Buffer sizes for large multiplexers: TCP queueing theory and instability analysis","authors":"G. Raina, D. Wischik","doi":"10.1109/NGI.2005.1431663","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431663","url":null,"abstract":"In large multiplexers with many TCP flows, the aggregate traffic flow behaves predictably; this is a basis for the fluid model of Misra, Gong and Towsley V. Misra et al., (2000) and for a growing literature on fluid models of congestion control. In this paper we argue that different fluid models arise from different buffer-sizing regimes. We consider the large buffer regime (buffer size is bandwidth-delay product), an intermediate regime (divide the large buffer size by the square root of the number of flows), and the small buffer regime (buffer size does not depend on number of flows). Our arguments use various techniques from queueing theory. We study the behaviour of these fluid models (on a single bottleneck Kink, for a collection of identical long-lived flows). For what parameter regimes is the fluid model stable, and when it is unstable what is the size of oscillations and the impact on goodput? Our analysis uses an extension of the Poincare-Linstedt method to delay-differential equations. We find that large buffers with drop-tail have much the same performance as intermediate buffers with either drop-tail or AQM; that large buffers with RED are better at least for window sizes less than 20 packets; and that small buffers with either drop-tail or AQM are best over a wide range of window sizes, though the buffer size must be chosen carefully. This suggests that buffer sizes should be much much smaller than is currently recommended.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
Performance study of the control and forwarding planes in a high speed MPLS network 高速MPLS网络中控制和转发平面的性能研究
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431677
D. Adami, N. Carlotti, S. Giordano, M. Pagano, M. Repeti
Multiprotocol label switching (MPLS) was originally conceived to improve the efficiency of packet forwarding in network equipments and it relies on a strict separation between the control and forwarding planes in the network functions as well as in the software and hardware architecture of the routers. The paper presents the results of an experimental study aimed at evaluating the performance of the control and forwarding planes in a metropolitan MPLS network, interconnecting three sites, located in Pisa and equipped with M10 Juniper routers. In particular, experimental tests have been carried out to deeply investigate the behaviour of the network control and forwarding planes in different working conditions.
多协议标签交换(Multiprotocol label switching, MPLS)最初是为了提高网络设备中分组转发的效率而提出的,它依赖于网络功能中控制平面和转发平面的严格分离以及路由器的软硬件结构。本文介绍了一项实验研究的结果,旨在评估城域MPLS网络中控制和转发平面的性能,该网络连接位于比萨的三个站点,并配备了M10 Juniper路由器。特别进行了实验测试,深入研究了网络控制平面和转发平面在不同工况下的行为。
{"title":"Performance study of the control and forwarding planes in a high speed MPLS network","authors":"D. Adami, N. Carlotti, S. Giordano, M. Pagano, M. Repeti","doi":"10.1109/NGI.2005.1431677","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431677","url":null,"abstract":"Multiprotocol label switching (MPLS) was originally conceived to improve the efficiency of packet forwarding in network equipments and it relies on a strict separation between the control and forwarding planes in the network functions as well as in the software and hardware architecture of the routers. The paper presents the results of an experimental study aimed at evaluating the performance of the control and forwarding planes in a metropolitan MPLS network, interconnecting three sites, located in Pisa and equipped with M10 Juniper routers. In particular, experimental tests have been carried out to deeply investigate the behaviour of the network control and forwarding planes in different working conditions.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133328619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auction-based bandwidth trading in a competitive hierarchical market 竞争等级市场中基于拍卖的带宽交易
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431690
M. Bitsaki, G. Stamoulis, C. Courcoubetis
We deal with the problem of bandwidth allocation in a two-level hierarchical market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet service providers (ISPs)], who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. As we have already established, this problem can be solved efficiently by means of an incentive compatible mechanism comprising auctions in both levels; the payment rule of the lower-level auction is imposed by the top-level seller. We investigate the properties of the mechanism in case where each of the competing intermediate providers can select the payment rule on his own, under a variety of assumptions on the information possessed by the various players as well as on their level of freedom to act in the market. For one of the cases analyzed we prove that providers have no incentive to deviate from the original payment rule.
研究了两层分层市场中的带宽分配问题。在顶层,唯一的销售商将带宽分配给中间提供商[例如因特网服务提供商(isp)],后者再将分配给他们的带宽份额分配给底层的自己的客户。正如我们已经确定的那样,这个问题可以通过在两个层面上包含拍卖的激励相容机制来有效地解决;低级拍卖的付款规则由顶级卖家强制执行。我们研究了在不同参与者所拥有的信息以及他们在市场中行动的自由水平的各种假设下,每个相互竞争的中间提供者可以自己选择支付规则的情况下,机制的性质。对于所分析的一个案例,我们证明了提供者没有偏离原始支付规则的动机。
{"title":"Auction-based bandwidth trading in a competitive hierarchical market","authors":"M. Bitsaki, G. Stamoulis, C. Courcoubetis","doi":"10.1109/NGI.2005.1431690","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431690","url":null,"abstract":"We deal with the problem of bandwidth allocation in a two-level hierarchical market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet service providers (ISPs)], who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. As we have already established, this problem can be solved efficiently by means of an incentive compatible mechanism comprising auctions in both levels; the payment rule of the lower-level auction is imposed by the top-level seller. We investigate the properties of the mechanism in case where each of the competing intermediate providers can select the payment rule on his own, under a variety of assumptions on the information possessed by the various players as well as on their level of freedom to act in the market. For one of the cases analyzed we prove that providers have no incentive to deviate from the original payment rule.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IPSec hardware resource requirements evaluation IPSec硬件资源需求评估
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431672
Alberto Ferrante, Vincenzo Piuri, J. Owen
IPSec is a suite of protocols that adds security to communications at the IP level. This suite of protocols is becoming more and more important as it is included as mandatory security mechanism in IPv6. In this paper we provide an evaluation of the hardware resources needed for supporting virtual private networking through IPSec. The target system of this study is a home secure gateway, therefore only the tunnel mode is considered. Focus is on ESP protocol, but also some evaluations on AH are provided. We discuss usage of the AES, HMAC-SHA-1, and HMAC-SHA-2 cryptographic algorithms. In this paper we show that enabling IPSec in a 100 Mbit/s network kills its performance in almost every case. In a 10 Mbit/s network the results obtained for performance and CPU usage are much better. An interesting case within this network configuration is that in which IPComp is enabled and used on compressible data: CPU usage grows to 100%, but network throughput rises over the 10 Mbit/s limit, due to data compression. This performance evaluation leads the conclusion that while a hardware crypto-accelerator is really key in reaching high performance, it may also be useful in small, slow systems (e.g. small embedded systems) where it would help improving performance and security.
IPSec是一套为IP级别的通信增加安全性的协议。这一协议套件作为IPv6的强制安全机制而变得越来越重要。本文对通过IPSec支持虚拟专用网所需的硬件资源进行了评估。本研究的目标系统是家庭安全网关,因此只考虑隧道模式。重点介绍了ESP协议,并对AH协议进行了评价。我们讨论了AES、HMAC-SHA-1和HMAC-SHA-2加密算法的使用。在本文中,我们展示了在100 Mbit/s的网络中启用IPSec几乎在任何情况下都会降低其性能。在10mbit /s的网络中,性能和CPU使用率的结果要好得多。在这个网络配置中,一个有趣的情况是IPComp被启用并用于可压缩数据:CPU使用率增长到100%,但由于数据压缩,网络吞吐量超过了10mbit /s的限制。这一性能评估得出的结论是,虽然硬件加密加速器是实现高性能的关键,但它在小型、缓慢的系统(例如小型嵌入式系统)中也可能有用,因为它有助于提高性能和安全性。
{"title":"IPSec hardware resource requirements evaluation","authors":"Alberto Ferrante, Vincenzo Piuri, J. Owen","doi":"10.1109/NGI.2005.1431672","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431672","url":null,"abstract":"IPSec is a suite of protocols that adds security to communications at the IP level. This suite of protocols is becoming more and more important as it is included as mandatory security mechanism in IPv6. In this paper we provide an evaluation of the hardware resources needed for supporting virtual private networking through IPSec. The target system of this study is a home secure gateway, therefore only the tunnel mode is considered. Focus is on ESP protocol, but also some evaluations on AH are provided. We discuss usage of the AES, HMAC-SHA-1, and HMAC-SHA-2 cryptographic algorithms. In this paper we show that enabling IPSec in a 100 Mbit/s network kills its performance in almost every case. In a 10 Mbit/s network the results obtained for performance and CPU usage are much better. An interesting case within this network configuration is that in which IPComp is enabled and used on compressible data: CPU usage grows to 100%, but network throughput rises over the 10 Mbit/s limit, due to data compression. This performance evaluation leads the conclusion that while a hardware crypto-accelerator is really key in reaching high performance, it may also be useful in small, slow systems (e.g. small embedded systems) where it would help improving performance and security.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
Next Generation Internet Networks, 2005
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1