SIGMETRICS '04/Performance '04最新文献

筛选
英文 中文
Flow classification by histograms: or how to go on safari in the internet 通过直方图进行流量分类:或者如何在互联网上进行safari
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005696
Augustin Soule, Kave Salamatian, N. Taft, R. Emilion, K. Papagiannaki
{"title":"Flow classification by histograms: or how to go on safari in the internet","authors":"Augustin Soule, Kave Salamatian, N. Taft, R. Emilion, K. Papagiannaki","doi":"10.1145/1005686.1005696","DOIUrl":"https://doi.org/10.1145/1005686.1005696","url":null,"abstract":"In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the different behavior of flows belonging to these classes. In this paper we consider the problem of classifying BGP level prefix flows into a small set of homogeneous classes. We argue that using the entire distributional properties of flows can have significant benefits in terms of quality in the derived classification. We propose a method based on modeling flow histograms using Dirichlet Mixture Processes for random distributions. We present an inference procedure based on the Simulated Annealing Expectation Maximization algorithm that estimates all the model parameters as well as flow membership probabilities - the probability that a flow belongs to any given class. One of our key contributions is a new method for Internet flow classification. We show that our method is powerful in that it is capable of examining macroscopic flows while simultaneously making fine distinctions between different traffic classes. We demonstrate that our scheme can address issues with flows being close to class boundaries and the inherent dynamic behaviour of Internet flows.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121734986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Spatio-temporal available bandwidth estimation with STAB 使用STAB进行时空可用带宽估计
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005734
V. Ribeiro, R. Riedi, Richard Baraniuk
{"title":"Spatio-temporal available bandwidth estimation with STAB","authors":"V. Ribeiro, R. Riedi, Richard Baraniuk","doi":"10.1145/1005686.1005734","DOIUrl":"https://doi.org/10.1145/1005686.1005734","url":null,"abstract":"We study the problem of locating in space and over time a network path's tight link, that is the link with the least available bandwidth on the path. Tight link localization benefits network-aware applications, provides insight into the causes of network congestion and ways to circumvent it, and aids network operations. We present STAB, a light-weight probing tool to locate tight links. STAB combines the probing concepts of self-induced congestion, tailgating, and packet chirps in a novel fashion. We demonstrate its capabilities through experiments on the Internet and verify our results using router MRTG data.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"150 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120898325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Cross-architecture performance predictions for scientific applications using parameterized models 使用参数化模型的科学应用的跨架构性能预测
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005691
G. Marin, J. Mellor-Crummey
{"title":"Cross-architecture performance predictions for scientific applications using parameterized models","authors":"G. Marin, J. Mellor-Crummey","doi":"10.1145/1005686.1005691","DOIUrl":"https://doi.org/10.1145/1005686.1005691","url":null,"abstract":"This paper describes a toolkit for semi-automatically measuring and modeling static and dynamic characteristics of applications in an architecture-neutral fashion. For predictable applications, models of dynamic characteristics have a convex and differentiable profile. Our toolkit operates on application binaries and succeeds in modeling key application characteristics that determine program performance. We use these characterizations to explore the interactions between an application and a target architecture. We apply our toolkit to SPARC binaries to develop architecture-neutral models of computation and memory access patterns of the ASCI Sweep3D and the NAS SP, BT and LU benchmarks. From our models, we predict the L1, L2 and TLB cache miss counts as well as the overall execution time of these applications on an Origin 2000 system. We evaluate our predictions by comparing them against measurements collected using hardware performance counters.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122337905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 238
How to identify and estimate the largest traffic matrix elements in a dynamic environment 如何识别和估计动态环境中最大的流量矩阵元素
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005698
Augustin Soule, A. Nucci, R. Cruz, Emilio Leonardi, N. Taft
{"title":"How to identify and estimate the largest traffic matrix elements in a dynamic environment","authors":"Augustin Soule, A. Nucci, R. Cruz, Emilio Leonardi, N. Taft","doi":"10.1145/1005686.1005698","DOIUrl":"https://doi.org/10.1145/1005686.1005698","url":null,"abstract":"In this paper we investigate a new idea for traffic matrix estimation that makes the basic problem less under-constrained, by deliberately changing the routing to obtain additional measurements. Because all these measurements are collected over disparate time intervals, we need to establish models for each Origin-Destination (OD) pair to capture the complex behaviours of internet traffic. We model each OD pair with two components: the diurnal pattern and the fluctuation process. We provide models that incorporate the two components above, to estimate both the first and second order moments of traffic matrices. We do this for both stationary and cyclo-stationary traffic scenarios. We formalize the problem of estimating the second order moment in a way that is completely independent from the first order moment. Moreover, we can estimate the second order moment without needing any routing changes (i.e., without explicit changes to IGP link weights). We prove for the first time, that such a result holds for any realistic topology under the assumption of minimum cost routing and strictly positive link weights. We highlight how the second order moment helps the identification of the top largest OD flows carrying the most significant fraction of network traffic. We then propose a refined methodology consisting of using our variance estimator (without routing changes) to identify the top largest flows, and estimate only these flows. The benefit of this method is that it dramatically reduces the number of routing changes needed. We validate the effectiveness of our methodology and the intuitions behind it by using real aggregated sampled netflow data collected from a commercial Tier-1 backbone.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
On performance bounds for the integration of elastic and adaptive streaming flows 弹性流与自适应流集成的性能边界
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005716
T. Bonald, A. Proutière
{"title":"On performance bounds for the integration of elastic and adaptive streaming flows","authors":"T. Bonald, A. Proutière","doi":"10.1145/1005686.1005716","DOIUrl":"https://doi.org/10.1145/1005686.1005716","url":null,"abstract":"We consider a network model where bandwidth is fairly shared by a dynamic number of elastic and adaptive streaming flows. Elastic flows correspond to data transfers while adaptive streaming flows correspond to audio/video applications with variable rate codecs. In particular, the former are characterized by a fixed size (in bits) while the latter are characterized by a fixed duration. This flow-level model turns out to be intractable in general. In this paper, we give performance bounds for both elastic and streaming traffic by means of sample-path arguments. These bounds present the practical interest of being insensitive to traffic characteristics like the distributions of elastic flow size and streaming flow duration.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Insensitive load balancing 不敏感负载均衡
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005729
T. Bonald, M. Jonckheere, A. Proutière
{"title":"Insensitive load balancing","authors":"T. Bonald, M. Jonckheere, A. Proutière","doi":"10.1145/1005686.1005729","DOIUrl":"https://doi.org/10.1145/1005686.1005729","url":null,"abstract":"A large variety of communication systems, including telephone and data networks, can be represented by so-called Whittle networks. The stationary distribution of these networks is insensitive, depending on the service requirements at each node through their mean only. These models are of considerable practical interest as derived engineering rules are robust to the evolution of traffic characteristics. In this paper we relax the usual assumption of static routing and address the issue of dynamic load balancing. Specifically, we identify the class of load balancing policies which preserve insensitivity and characterize optimal strategies in some specific cases. Analytical results are illustrated numerically on a number of toy network examples.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Measuring adversaries 测量的敌人
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005688
V. Paxson
{"title":"Measuring adversaries","authors":"V. Paxson","doi":"10.1145/1005686.1005688","DOIUrl":"https://doi.org/10.1145/1005686.1005688","url":null,"abstract":"Many concepts and techniques developed for general Internet measurement have counterparts in the domain of detecting and analyzing network attacks. The task is greatly complicated, however, by the fact that the object of study is adversarial: attackers do not wish to be \"measured\" and will take steps to thwart observation. We look at the far-ranging consequences of this different measurement environment: the analysis difficulties-some fundamental-that arise due to subtle ambiguities in the true semantics of observed traffic; new notions of \"active measurement\"; the highly challenging task of rapidly characterizing Internet-scale pheonmena such as global worm pandemics; the need for detailed application-level analysis and related policy and legal difficulties; attacks that target passive analysis tools; and the inherent \"arms race\" nature of the undertaking.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multicast protocols for scalable on-demand download 可扩展的按需下载的多播协议
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005751
Niklas Carlsson, D. Eager, M. Vernon
{"title":"Multicast protocols for scalable on-demand download","authors":"Niklas Carlsson, D. Eager, M. Vernon","doi":"10.1145/1005686.1005751","DOIUrl":"https://doi.org/10.1145/1005686.1005751","url":null,"abstract":"Previous scalable protocols for downloading large, popular files from a single server include batching and cyclic multicast. With batching, clients wait to begin receiving a requested file until the beginning of its next multicast transmission, which collectively serves all of the waiting clients that have accumulated up to that point. With cyclic multicast, the file data is cyclically transmitted on a multicast channel. Clients can begin listening to the channel at an arbitrary point in time, and continue listening until all of the file data has been received. This paper first develops lower bounds on the average and maximum client delay for completely downloading a file, as functions of the average server bandwidth used to serve requests for that file, for systems with homogeneous clients. The results show that neither cyclic multicast nor batching consistently yields performance close to optimal. New hybrid download protocols are proposed that achieve within 15% of the optimal maximum delay and 20% of the optimal average delay in homogeneous systems. For heterogeneous systems in which clients have widely-varying achievable reception rates, an additional design question concerns the use of high rate transmissions, which can decrease delay for clients that can receive at such rates, in addition to low rate transmissions that can be received by all clients. A new scalable download protocol for such systems is proposed, and its performance is compared to that of alternative protocols as well as to new lower bounds on maximum client delay. The new protocol achieves within 25% of the optimal maximum client delay in all scenarios considered.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116685295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Emulating low-priority transport at the application layer: a background transfer service 在应用层模拟低优先级传输:后台传输服务
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005703
P. Key, L. Massoulié, B. Wang
{"title":"Emulating low-priority transport at the application layer: a background transfer service","authors":"P. Key, L. Massoulié, B. Wang","doi":"10.1145/1005686.1005703","DOIUrl":"https://doi.org/10.1145/1005686.1005703","url":null,"abstract":"Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefetching. Although the design of such a service is reasonably easy when the underlying network supports service differentiation, it becomes more challenging without such network support. We describe an application level approach to designing a low priority service -- one that is 'lower than best-effort' in the context of the current Internet. We require neither network support nor changes to TCP. Instead, we use a receive window control to limit the transfer rate of the application, and the optimal rate is determined by detecting a change-point. We motivate this joint control-estimation problem by considering a fluid-based optimisation framework, and describe practical solutions, based on stochastic approximation and binary search techniques. Simulation results demonstrate the effectiveness of the approach.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Characterization of queue fluctuations in probabilistic AQM mechanisms 概率AQM机制中队列波动的表征
SIGMETRICS '04/Performance '04 Pub Date : 2004-06-01 DOI: 10.1145/1005686.1005721
P. Tinnakornsrisuphap, R. La
{"title":"Characterization of queue fluctuations in probabilistic AQM mechanisms","authors":"P. Tinnakornsrisuphap, R. La","doi":"10.1145/1005686.1005721","DOIUrl":"https://doi.org/10.1145/1005686.1005721","url":null,"abstract":"We develop a framework for studying the interaction of a probabilistic active queue management (AQM) algorithm with a generic end-user congestion-control mechanism. We show that as the number of flows in the network increases, the queue dynamics can be accurately approximated by a simple deterministic process. In addition, we investigate the sources of queue fluctuations in this setup. We characterize two distinct sources of queue fluctuations; one is the deterministic oscillations which can be captured through the aforementioned deterministic process. The other source is the random fluctuations introduced by the probabilistic nature of the marking schemes. We discuss the relationship between these two types of fluctuations and provide insights into how to control them. Concrete examples in this framework are given for several popular algorithms such as Random Early Detection, Random Early Marking and Transmission Control Protocol.","PeriodicalId":172626,"journal":{"name":"SIGMETRICS '04/Performance '04","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114265926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信