首页 > 最新文献

Next Generation Internet Networks, 2005最新文献

英文 中文
Mixed TDM and packet technologies as a best compromise solution to ensure a cost-effective bandwidth use with the current traffic evolution 混合TDM和分组技术作为一种最佳折衷解决方案,以确保在当前流量发展的情况下具有成本效益的带宽使用
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431702
L. Noirie
Nowadays, transport networks are mainly based on SDH/SONET whereas the traffic becomes more Ethernet/IP oriented. The trend is to make the transport infrastructure more packet-aware, using for example multi-service transport platforms (MSTP). For transport infrastructure, such MSTP solutions are in competition with pure TDM platforms and pure packets ones. The paper demonstrates that, considering a network evolution in which the users' access rates increase faster than their mean rates, introduction of MSTP is justified when one considers the efficiency of the bandwidth use in the links of the networks. For this comparison, we developed an equivalent bandwidth model, including non-Gaussian characteristics, uncertainty and variability of the traffic. We defined the equivalent access rate, and the corresponding equivalent number of active flows, which is the key parameter to dimension the links. This new model may have some limitations. But it is simple, and it is realistic enough to understand the general trends between packet and TDM solutions in the transport networks.
目前,传输网络主要是基于SDH/SONET,而流量则越来越面向以太网/IP。现在的趋势是使传输基础设施更能感知数据包,例如使用多服务传输平台(MSTP)。对于传输基础设施,这种MSTP解决方案与纯TDM平台和纯分组平台存在竞争。本文论证了在用户接入速率增长速度大于平均速率的网络演进过程中,当考虑到网络链路的带宽使用效率时,引入MSTP是合理的。为了进行比较,我们开发了一个等效带宽模型,包括流量的非高斯特性、不确定性和可变性。我们定义了等效访问速率和相应的等效活动流数,这是衡量链路维度的关键参数。这种新模式可能有一些局限性。但是它很简单,并且足够现实,可以理解传输网络中分组和时分复用解决方案之间的一般趋势。
{"title":"Mixed TDM and packet technologies as a best compromise solution to ensure a cost-effective bandwidth use with the current traffic evolution","authors":"L. Noirie","doi":"10.1109/NGI.2005.1431702","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431702","url":null,"abstract":"Nowadays, transport networks are mainly based on SDH/SONET whereas the traffic becomes more Ethernet/IP oriented. The trend is to make the transport infrastructure more packet-aware, using for example multi-service transport platforms (MSTP). For transport infrastructure, such MSTP solutions are in competition with pure TDM platforms and pure packets ones. The paper demonstrates that, considering a network evolution in which the users' access rates increase faster than their mean rates, introduction of MSTP is justified when one considers the efficiency of the bandwidth use in the links of the networks. For this comparison, we developed an equivalent bandwidth model, including non-Gaussian characteristics, uncertainty and variability of the traffic. We defined the equivalent access rate, and the corresponding equivalent number of active flows, which is the key parameter to dimension the links. This new model may have some limitations. But it is simple, and it is realistic enough to understand the general trends between packet and TDM solutions in the transport networks.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131066761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sensitivity of backup capacity requirements to traffic distribution and resilience constraints 备份容量需求对流量分布和弹性约束的敏感性
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431659
M. Menth, J. Milbrandt, A. Reifert
In this work, we present several end-to-end protection switching mechanisms for application in multiprotocol label switching (MPLS). In case of local outages in the network, they deviate the traffic around the failed element over backup paths. They are easy to implement and reduce the additional capacity to maintain the quality of service (QoS) on the backup paths. We study the capacity savings of the presented methods for various protection schemes with different traffic matrices. We further test the influence of different resilience constraints such as the set of protected failure scenarios, bandwidth reuse restrictions due to optical communication, and traffic reduction due to failed border routers.
在这项工作中,我们提出了几种应用于多协议标签交换(MPLS)的端到端保护交换机制。在网络局部中断的情况下,它们将故障元素周围的流量转移到备份路径上。它们易于实现,并且减少了在备份路径上维护服务质量(QoS)的额外容量。研究了不同流量矩阵下不同保护方案的容量节约问题。我们进一步测试了不同弹性约束的影响,如受保护的故障场景集、由于光通信导致的带宽重用限制以及由于边界路由器故障导致的流量减少。
{"title":"Sensitivity of backup capacity requirements to traffic distribution and resilience constraints","authors":"M. Menth, J. Milbrandt, A. Reifert","doi":"10.1109/NGI.2005.1431659","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431659","url":null,"abstract":"In this work, we present several end-to-end protection switching mechanisms for application in multiprotocol label switching (MPLS). In case of local outages in the network, they deviate the traffic around the failed element over backup paths. They are easy to implement and reduce the additional capacity to maintain the quality of service (QoS) on the backup paths. We study the capacity savings of the presented methods for various protection schemes with different traffic matrices. We further test the influence of different resilience constraints such as the set of protected failure scenarios, bandwidth reuse restrictions due to optical communication, and traffic reduction due to failed border routers.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Auction-based resource allocation in UMTS high speed downlink packet access (HSDPA) 基于拍卖的UMTS高速下行分组接入(HSDPA)资源分配
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431698
Manos Dramitinos, G. Stamoulis, C. Courcoubetis
Data, audio and video services over 3G networks possess certain requirements in QoS and thus in resources. Accommodating such service requests constitutes a challenge for UMTS networks. To this end, 3GPP Release 5 introduces the high speed downlink packet access (HSDPA). In this paper, we propose: i) an auction-based HSDPA resource allocation mechanism, which consists of a series of Generalized Vickrey Auctions that are conducted in the short time-scale over which the network resources are allocated and ii) a set of innovative user utility functions. These functions provide a quantification of both the user's willingness to pay for reserving resources in the short time-scale auctions and his attained utility from the pattern of resources allocated during his long time-scale service session. The utility functions are additive and are used as bidding functions in the series of auctions the user participates. Each user selects one of these functions, which is scaled by his total willingness to pay. Then, the network runs the auctions by bidding on behalf of each user. The effectiveness of our mechanism has been assessed experimentally and it appears that most of the users either are served very satisfactorily or are allocated very limited quantities of resources (if at all) at a low total charge.
3G网络上的数据、音频和视频业务对QoS有一定的要求,因此对资源也有一定的要求。容纳这样的服务请求对UMTS网络构成了挑战。为此,3GPP Release 5引入了HSDPA (high speed downlink packet access)技术。本文提出:1)基于拍卖的HSDPA资源分配机制,该机制由一系列在网络资源分配的短时间尺度上进行的广义维克里拍卖(Generalized Vickrey Auctions)和2)一套创新的用户效用函数组成。这些函数提供了用户在短时间尺度拍卖中为保留资源付费的意愿,以及他在长时间尺度服务期间从资源分配模式中获得的效用。效用函数是加性的,在用户参与的一系列拍卖中用作竞价函数。每个用户选择这些功能中的一个,这是由他的总支付意愿缩放的。然后,网络通过代表每个用户竞标来运行拍卖。我们的机制的有效性已经通过实验进行了评估,似乎大多数用户要么得到了非常满意的服务,要么以很低的总收费分配了非常有限的资源(如果有的话)。
{"title":"Auction-based resource allocation in UMTS high speed downlink packet access (HSDPA)","authors":"Manos Dramitinos, G. Stamoulis, C. Courcoubetis","doi":"10.1109/NGI.2005.1431698","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431698","url":null,"abstract":"Data, audio and video services over 3G networks possess certain requirements in QoS and thus in resources. Accommodating such service requests constitutes a challenge for UMTS networks. To this end, 3GPP Release 5 introduces the high speed downlink packet access (HSDPA). In this paper, we propose: i) an auction-based HSDPA resource allocation mechanism, which consists of a series of Generalized Vickrey Auctions that are conducted in the short time-scale over which the network resources are allocated and ii) a set of innovative user utility functions. These functions provide a quantification of both the user's willingness to pay for reserving resources in the short time-scale auctions and his attained utility from the pattern of resources allocated during his long time-scale service session. The utility functions are additive and are used as bidding functions in the series of auctions the user participates. Each user selects one of these functions, which is scaled by his total willingness to pay. Then, the network runs the auctions by bidding on behalf of each user. The effectiveness of our mechanism has been assessed experimentally and it appears that most of the users either are served very satisfactorily or are allocated very limited quantities of resources (if at all) at a low total charge.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"207 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134427829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A cost transformation based routing mechanism and its applications on constraint-routing problems 基于成本转换的路由机制及其在约束路由问题中的应用
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431667
J. Wang, Y. Dong
In this paper, we discuss a cost transformation based routing mechanism. The idea is to transform any traffic engineering (TE) routing problem to a known (e.g. shortest path routing) problem, such that a solution to the known problem is a sub-optimal solution to the original. Instead of relying on human to "guess" the best transformation function for each practical problem; we developed a numerical search mechanism to automatically discover the function. So far, we have tested this mechanism on four routing problems-among them are some classic constraint-routing problems and an emerging dual-path routing problem-and the results are comparable or better than those from some well-known heuristics. More importantly, these example applications showcase how routing solutions are achieved with minimum human intervention.
本文讨论了一种基于成本转换的路由机制。其思想是将任何交通工程(TE)路由问题转换为已知(例如最短路径路由)问题,这样已知问题的解决方案是原始问题的次优解决方案。而不是依靠人类“猜测”每个实际问题的最佳变换函数;我们开发了一个数值搜索机制来自动发现该函数。到目前为止,我们已经在四个路由问题上测试了这种机制——其中包括一些经典的约束路由问题和一个新出现的双路径路由问题——结果与一些著名的启发式方法相当或更好。更重要的是,这些示例应用程序展示了如何在最少的人为干预下实现路由解决方案。
{"title":"A cost transformation based routing mechanism and its applications on constraint-routing problems","authors":"J. Wang, Y. Dong","doi":"10.1109/NGI.2005.1431667","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431667","url":null,"abstract":"In this paper, we discuss a cost transformation based routing mechanism. The idea is to transform any traffic engineering (TE) routing problem to a known (e.g. shortest path routing) problem, such that a solution to the known problem is a sub-optimal solution to the original. Instead of relying on human to \"guess\" the best transformation function for each practical problem; we developed a numerical search mechanism to automatically discover the function. So far, we have tested this mechanism on four routing problems-among them are some classic constraint-routing problems and an emerging dual-path routing problem-and the results are comparable or better than those from some well-known heuristics. More importantly, these example applications showcase how routing solutions are achieved with minimum human intervention.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On dropping sequences for RED 关于为RED丢弃序列
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431674
B. Gaujal, A. Hordijk
In this note, we show how to compare the dropping sequences in the random early detection algorithm once all the parameters have been fixed. This is done for a single node, as well as for one TCP connection. The method proposed here uses convexity properties to provide comparing tools for all types of dropping schemes. In particular, we compare Bernoulli with uniform dropping. We also provide the optimal dropping scheme in terms of workload for the single node and end-to-end delay for the connection.
在本文中,我们将展示如何在所有参数固定后比较随机早期检测算法中的下降序列。这是针对单个节点和一个TCP连接完成的。本文提出的方法利用凸性特性为各种类型的抛落方案提供了比较工具。特别地,我们比较了伯努利方程和均匀滴下方程。我们还在单节点的工作负载和连接的端到端延迟方面提供了最佳的丢弃方案。
{"title":"On dropping sequences for RED","authors":"B. Gaujal, A. Hordijk","doi":"10.1109/NGI.2005.1431674","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431674","url":null,"abstract":"In this note, we show how to compare the dropping sequences in the random early detection algorithm once all the parameters have been fixed. This is done for a single node, as well as for one TCP connection. The method proposed here uses convexity properties to provide comparing tools for all types of dropping schemes. In particular, we compare Bernoulli with uniform dropping. We also provide the optimal dropping scheme in terms of workload for the single node and end-to-end delay for the connection.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new protocol for group authentication providing partial anonymity 提供部分匿名的组认证新协议
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431688
A. Zwierko, Z. Kotulski
This paper provides a description of a new protocol for group authentication. The demand for anonymity have grown with a recent development of networking. On the other hand, all service providers, bound by the legal regulations have to be able to trace an entity that performed every single action, sent a specific data and so on. Finding a reasonable trade-off between these two requirements is rather hard. In this paper, we propose a protocol that provides a user within a group with the anonymity (for outside world the users within a group cannot be identified) and when needed provide a trusted authority with a possibility to identity each user.
提出了一种新的组认证协议。随着网络的发展,匿名的需求也在增长。另一方面,受法律法规约束的所有服务提供者必须能够跟踪执行每一个操作、发送特定数据等的实体。在这两种需求之间找到一个合理的取舍是相当困难的。在本文中,我们提出了一种协议,该协议为组内用户提供匿名性(对于外部世界,组内用户无法识别),并在需要时提供具有识别每个用户的可能性的可信权威。
{"title":"A new protocol for group authentication providing partial anonymity","authors":"A. Zwierko, Z. Kotulski","doi":"10.1109/NGI.2005.1431688","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431688","url":null,"abstract":"This paper provides a description of a new protocol for group authentication. The demand for anonymity have grown with a recent development of networking. On the other hand, all service providers, bound by the legal regulations have to be able to trace an entity that performed every single action, sent a specific data and so on. Finding a reasonable trade-off between these two requirements is rather hard. In this paper, we propose a protocol that provides a user within a group with the anonymity (for outside world the users within a group cannot be identified) and when needed provide a trusted authority with a possibility to identity each user.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Load balancing through efficient distributed content placement 通过高效的分布式内容放置实现负载平衡
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431653
T. Wauters, J. Coppens, B. Dhoedt, P. Demeester
The concept of content distribution networks (CDNs) has recently been introduced to enhance the delivery of bandwidth-intensive multimedia content to end users. In a CDN architecture, the content is replicated from the origin server to so-called surrogate servers at the edge of the Internet, to improve the quality of service and optimise network bandwidth usage. The introduction of peer-to-peer (P2P) architectures, where all nodes fundamentally play equal roles, enables self-organisation of the CDN and automatic recovery in case of node failures. To optimise the distribution of the content over the different surrogate servers, replica placement algorithms (RPAs) have been developed. In this paper, we present two distributed RPAs for CDNs. We will demonstrate that they further improve CDN performance by reducing the server load and the bandwidth usage. The introduction of link costs allows these algorithms to additionally support load balancing on the network links.
最近引入了内容分发网络(cdn)的概念,以增强向最终用户提供带宽密集型多媒体内容的能力。在CDN架构中,内容从原始服务器复制到互联网边缘的所谓代理服务器,以提高服务质量并优化网络带宽使用。引入点对点(P2P)架构,其中所有节点基本上发挥同等作用,使CDN能够自组织并在节点故障时自动恢复。为了优化内容在不同代理服务器上的分布,已经开发了副本放置算法(rpa)。在本文中,我们提出了两种用于cdn的分布式rpa。我们将演示它们通过减少服务器负载和带宽使用来进一步提高CDN性能。链路开销的引入允许这些算法额外支持网络链路上的负载平衡。
{"title":"Load balancing through efficient distributed content placement","authors":"T. Wauters, J. Coppens, B. Dhoedt, P. Demeester","doi":"10.1109/NGI.2005.1431653","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431653","url":null,"abstract":"The concept of content distribution networks (CDNs) has recently been introduced to enhance the delivery of bandwidth-intensive multimedia content to end users. In a CDN architecture, the content is replicated from the origin server to so-called surrogate servers at the edge of the Internet, to improve the quality of service and optimise network bandwidth usage. The introduction of peer-to-peer (P2P) architectures, where all nodes fundamentally play equal roles, enables self-organisation of the CDN and automatic recovery in case of node failures. To optimise the distribution of the content over the different surrogate servers, replica placement algorithms (RPAs) have been developed. In this paper, we present two distributed RPAs for CDNs. We will demonstrate that they further improve CDN performance by reducing the server load and the bandwidth usage. The introduction of link costs allows these algorithms to additionally support load balancing on the network links.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131733049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Optimal tree structures for large service networks 大型业务网络的最优树形结构
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431652
J. Palmer, I. Mitrani
We consider the problem of how best to structure and control a distributed computer system containing many processors. The performance trade-offs associated with different tree structures are evaluated approximately by applying appropriate queueing models. It is shown that, for a given set of parameters and job distribution policy, there is an optimal tree structure that minimizes the overall average response time. This is obtained numerically through comparison of average response times. A simple heuristic policy is shown to perform well under certain conditions.
我们考虑的问题是如何最好地构建和控制一个包含许多处理器的分布式计算机系统。通过应用适当的排队模型,可以近似地评估与不同树结构相关的性能权衡。结果表明,对于给定的一组参数和作业分配策略,存在一个使总体平均响应时间最小化的最优树结构。这是通过比较平均响应时间在数值上得到的。一个简单的启发式策略在某些条件下表现良好。
{"title":"Optimal tree structures for large service networks","authors":"J. Palmer, I. Mitrani","doi":"10.1109/NGI.2005.1431652","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431652","url":null,"abstract":"We consider the problem of how best to structure and control a distributed computer system containing many processors. The performance trade-offs associated with different tree structures are evaluated approximately by applying appropriate queueing models. It is shown that, for a given set of parameters and job distribution policy, there is an optimal tree structure that minimizes the overall average response time. This is obtained numerically through comparison of average response times. A simple heuristic policy is shown to perform well under certain conditions.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RCCMP: reliable congestion controlled multicast protocol RCCMP:可靠拥塞控制组播协议
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431685
Javier Munoz Kirschberg, M. Delgado, S. S. Ribes
This paper introduces a new protocol, called RCCMP (reliable congestion controlled multicast protocol). This protocol has been designed to be simple, scalable (NAK suppression), reliable and TCP-friendly. The congestion control is a central part of the protocol, where the feedback of the worse receiver is used to control a transmission window in a TCP-like fashion. The scalability issue is addressed with an exponential tuners scheme, that is also used to estimate the number of receivers involved in the communication. The protocol neither needs support from network elements nor maintains state information dependent of the number of receivers. The paper also presents a number of simulation results on its performance.
本文介绍了一种新的协议RCCMP(可靠拥塞控制组播协议)。该协议被设计为简单,可扩展(NAK抑制),可靠和tcp友好。拥塞控制是协议的中心部分,其中最差接收方的反馈用于以类似tcp的方式控制传输窗口。可伸缩性问题通过指数调谐器方案解决,该方案也用于估计通信中涉及的接收器数量。该协议既不需要网络元素的支持,也不维护依赖于接收方数量的状态信息。文中还对其性能进行了仿真。
{"title":"RCCMP: reliable congestion controlled multicast protocol","authors":"Javier Munoz Kirschberg, M. Delgado, S. S. Ribes","doi":"10.1109/NGI.2005.1431685","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431685","url":null,"abstract":"This paper introduces a new protocol, called RCCMP (reliable congestion controlled multicast protocol). This protocol has been designed to be simple, scalable (NAK suppression), reliable and TCP-friendly. The congestion control is a central part of the protocol, where the feedback of the worse receiver is used to control a transmission window in a TCP-like fashion. The scalability issue is addressed with an exponential tuners scheme, that is also used to estimate the number of receivers involved in the communication. The protocol neither needs support from network elements nor maintains state information dependent of the number of receivers. The paper also presents a number of simulation results on its performance.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123981288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Class-based minimum interference routing for traffic engineering in optical networks 光网络流量工程中基于类的最小干扰路由
Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431644
János Tapolcai, P. Fodor, G. Rétvári, M. Maliosz, T. Cinkler
In this paper an advanced framework for minimum interference routing is proposed, which, despite its universal nature, is best suited for traffic engineering in optical networks. Minimum interference routing is a method for engineering network resources to minimize the interference among high-volume traffic sources, in an attempt to maximize the useful throughput of the network. The main motivation behind the proposed framework Is a more advanced way of defining the "interference" between routes. This promotes the allocation of light-paths in an optical network without presuming any knowledge of future requests. The basic idea is that network links are classified into distinct criticality classes and additional capacity is defined for each criticality class. This additional capacity represents the amount of additional traffic that can be routed on those links, without increasing the network-wide interference. We provide a concise mathematical formula for class-based interference and propose a polynomial time heuristic to derive criticality classes. Based on our findings a flexible path selection scheme called MIRO is introduced. Finally, through extensive simulation studies, we show that the class-based interference framework more thoroughly describes link criticality than traditional methods, which transforms into more efficient routing in optical transport networks.
本文提出了一种先进的最小干扰路由框架,尽管它具有通用性,但它最适合于光网络中的流量工程。最小干扰路由是对工程网络资源进行优化,使大流量源之间的干扰最小化,从而使网络的有效吞吐量最大化的一种方法。提出框架的主要动机是一种更高级的方式来定义路由之间的“干扰”。这促进了光网络中光路的分配,而无需假定对未来的请求有任何了解。其基本思想是将网络链路划分为不同的临界级别,并为每个临界级别定义附加容量。这个额外的容量表示可以在这些链路上路由的额外通信量,而不会增加整个网络的干扰。我们为基于类的干扰提供了一个简明的数学公式,并提出了一个多项式时间启发式来推导临界类。在此基础上,提出了一种称为MIRO的柔性路径选择方案。最后,通过广泛的仿真研究,我们表明基于类的干扰框架比传统方法更彻底地描述链路临界性,从而转化为光传输网络中更有效的路由。
{"title":"Class-based minimum interference routing for traffic engineering in optical networks","authors":"János Tapolcai, P. Fodor, G. Rétvári, M. Maliosz, T. Cinkler","doi":"10.1109/NGI.2005.1431644","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431644","url":null,"abstract":"In this paper an advanced framework for minimum interference routing is proposed, which, despite its universal nature, is best suited for traffic engineering in optical networks. Minimum interference routing is a method for engineering network resources to minimize the interference among high-volume traffic sources, in an attempt to maximize the useful throughput of the network. The main motivation behind the proposed framework Is a more advanced way of defining the \"interference\" between routes. This promotes the allocation of light-paths in an optical network without presuming any knowledge of future requests. The basic idea is that network links are classified into distinct criticality classes and additional capacity is defined for each criticality class. This additional capacity represents the amount of additional traffic that can be routed on those links, without increasing the network-wide interference. We provide a concise mathematical formula for class-based interference and propose a polynomial time heuristic to derive criticality classes. Based on our findings a flexible path selection scheme called MIRO is introduced. Finally, through extensive simulation studies, we show that the class-based interference framework more thoroughly describes link criticality than traditional methods, which transforms into more efficient routing in optical transport networks.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121183541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Next Generation Internet Networks, 2005
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1