The explosive growth of the Internet has induced a need for developing tools to understand the composition and dynamics of the Internet traffic. Measurements of the various characteristics of a network provide insight...
详细信息
The explosive growth of the Internet has induced a need for developing tools to understand the composition and dynamics of the Internet traffic. Measurements of the various characteristics of a network provide insight into the state and performance of the network whether it is behaving as expected and whether changes in the network have improved or degraded its performance. Available bandwidth on the links of a network is an important metric which can predict the performance of the network. In this paper, an estimation algorithm for the available bandwidth on a link is presented. The algorithm estimates the available bandwidth and tells the duration for which the estimate is valid with a high degree of confidence. The algorithm dynamically changes the number of past samples that an used for prediction and also the duration for which the prediction holds.
End-to-end congestion control mechanisms such as those in TCP are not enough to prevent congestion collapse in the Internet, and they must be supplemented by control mechanisms inside the network. The IRTF has singled...
详细信息
End-to-end congestion control mechanisms such as those in TCP are not enough to prevent congestion collapse in the Internet, and they must be supplemented by control mechanisms inside the network. The IRTF has singled out random early detection (RED) as one queue management scheme recommended for rapid deployment throughout the Internet. However, RED is not a thoroughly understood scheme-witness for example how the recommended parameter setting, or even the various benefits RED is claimed to provide, have changed over the past few years. In this paper, we describe simple analytic models for RED, and use these models to quantify the benefits (or lack thereof) brought about by RED. In particular, we examine the impact of RED on the loss and delay suffered by bursty and less bursty traffic (such as TCP and UDP traffic, respectively). We find that: (i) RED does eliminate the higher loss bias against bursty traffic observed with tail drop, but not by decreasing the loss rate of bursty traffic, rather by increasing that of non bursty traffic; (ii) the number of consecutive packet drops is higher with RED than tail drop, suggesting RED might not help as anticipated with the global synchronization of TCP flows; (iii) RED can be used to control the average queueing delay in routers and hence the end to end delay, but increases the jitter of non bursty streams. Thus, applications that generate smooth traffic, such as interactive audio applications, will suffer higher loss rates and require large playout buffers, thereby negating at least in part the lower mean delay brought about by RED.
With the convergence between phone and data networks in LTE and 4G, cellular signaling traffic is increasingly carried over ip. control plane functions, once performed by dedicated machinery, are evolving into large-s...
详细信息
With the convergence between phone and data networks in LTE and 4G, cellular signaling traffic is increasingly carried over ip. control plane functions, once performed by dedicated machinery, are evolving into large-scale network applications with strict requirements on delay, availability, and processing throughput as mandated by 3GPP standards. In this paper we present DMME, a distributed architecture that implements mobility management for next-generation cellular systems. DMME is a scalable and cost-effective drop-in replacement for the LTE mobility management entity (MME). We evaluate the DMME scheme via analysis and simulation under several deployment scenarios, using mobility patterns drawn from synthetic models and from traces collected in a production network. We also report preliminary performance figures by our DMME prototype implementation. Our results confirm that distributed architectures are a viable choice to reliably support high-throughput, latency-sensitive control plane functions.
A new cross-layer architecture is employed in this paper for the transmission of scalable H.264 video over IEEE 802.11e networks. The architecture enables flexible using of access categories (ACs) for video transmitti...
详细信息
A new cross-layer architecture is employed in this paper for the transmission of scalable H.264 video over IEEE 802.11e networks. The architecture enables flexible using of access categories (ACs) for video transmitting based on information of both application and MAC layer. A novel significance-based early detection (SBED) algorithm is proposed, which maximizes the transmission of significant SVC packets. The SBED algorithm allocates each SVC packet to an appropriate AC based on both the significance of data and the traffic load of ACs. Experimental results show that our scheme outperforms the existing schemes of [7] and of [8] with maximum quality gains of 0.8385dB and 1.978dB respectively.
Flooding attacks are well-known security threats that can lead to a denial of service (DoS) in computer networks. These attacks consist of an excessive traffic generation, by which an attacker aim to disrupt or interr...
详细信息
Flooding attacks are well-known security threats that can lead to a denial of service (DoS) in computer networks. These attacks consist of an excessive traffic generation, by which an attacker aim to disrupt or interrupt some services in the network. The impact of flooding attacks is not just about some nodes, it can be also the whole network. Many routing protocols are vulnerable to these attacks, especially those using reactive mechanism of route discovery, like AODV. In this paper, we propose a statistical approach to defense against RREQ flooding attacks in MANETs. Our detection mechanism can be applied on AODV-based ad hoc networks. Simulation results prove that these attacks can be detected with a low rate of false alerts.
The Differentiated Service (DiffServ) architecture does not specify any priority scheme between assured forwarding (AF) out-profile packets and best-effort (BE) packets. Therefore, a misbehaving AF flow can penalize m...
详细信息
The Differentiated Service (DiffServ) architecture does not specify any priority scheme between assured forwarding (AF) out-profile packets and best-effort (BE) packets. Therefore, a misbehaving AF flow can penalize many BE flows unless a fair bandwidth sharing mechanism is employed in the routers. In this paper, we propose two different techniques for solving the inter- and intra-class fairness problems at the core and edge routers, respectively. For the core routers, we propose a fair weighted round robin (FWRR) scheduler that protects BE packets from monopolizing AF out-profile packets by dynamically adjusting the service weights and buffer spaces according to the traffic changes. For the edge routers, we propose a scheme, called fair dropper (FD), that provides intra-class fairness by penalizing the greedy flows. Simulation results indicate that both these techniques are quite effective in providing inter- and intra-class fairness, while maintaining a low packet loss rate.
This paper investigates the characteristics of Tahoe, Reno, New Reno, Vegas, and Sack, and calculated their throughputs in simulated environment using NS-2 simulator by varying various performances parameters such as ...
详细信息
This paper investigates the characteristics of Tahoe, Reno, New Reno, Vegas, and Sack, and calculated their throughputs in simulated environment using NS-2 simulator by varying various performances parameters such as bandwidth, simulation time and number of traffic sources in order to figure out which one of them is the best for which scenario. Simulation was performed to study the performance of the protocols in terms of Bandwidth, simulation time and number of traffic sources. The results of the simulation showed that Reno is good when packet losses are small. New Reno is found to be useful when there are more losses of data. Sack is found to robust when multiple losses occur in one congestion window, while Vegas is the best when varying bandwidth owing to the use of time based bandwidth estimation schemes to control its congestion window.
traffic behavior in a large-scale network can be viewed as a complex non-linear system. It is very difficult to illustrate the long-term network service traffic behavior in a large-scale network. The Internet underlyi...
详细信息
traffic behavior in a large-scale network can be viewed as a complex non-linear system. It is very difficult to illustrate the long-term network service traffic behavior in a large-scale network. The Internet underlying the modern SCM can be seen as the combination of Service Providers (SP) and Internet Exchange (IX) providers. Due to market competition among SPs and IX, Internet users, so as those logistic services, will experience the different kind of quality of services (QoS), which effectively affect the network traffic model. The paper presents a cybernetic traffic model in the Internet Exchange (IX) environment. The model simulates SP/IX market competition behavior. Exchange-providers' market share will be diluted through market competition. Several routing as well as service binding strategies are proposed in the study. The routing strategies vary with the different competing environment. The model is thus meant to lead competitive pricing strategies and capacity allocation for intelligent SCM decision supports.
A project of the wireless video monitoring system based on the Web has been worked out and applied to the freeway's toll station. The video signals will be collected by the camera and then be coded. The Winsock th...
详细信息
A project of the wireless video monitoring system based on the Web has been worked out and applied to the freeway's toll station. The video signals will be collected by the camera and then be coded. The Winsock through the Internet will transmit all the video data. With this technology application, the workers can inspect the real-time pictures and data shot by any one of the cameras and control the monitoring devices at the spot
We introduce a new concept of management system based on the scalable communication framework effectively working on mixture of several complex layers including private networks. Overlay network architecture with virt...
详细信息
We introduce a new concept of management system based on the scalable communication framework effectively working on mixture of several complex layers including private networks. Overlay network architecture with virtual ip addressing has been applied to identify nodes uniquely. Inter-node communication on different private networks is ensured by defined complex network protocol (CNP). We also develop a communication middleware for the cluster management system called SARK (scalable architecture routing kernel). The total elapsed time for gathering all information and its system overhead are measured. The scalability test performed on the cluster of clusters which contains 100 nodes, and shows our proposed work would be scalable in the cluster of 4,000 nodes. Therefore, our scalable communication framework would be considered as a suitable method for monitoring and controlling a large cluster system on mixture of several complex network layers
暂无评论