{"title":"Dynamic Cooperation Enforcement through Trust-based Allocation Policies in P2P Systems","authors":"A. Satsiou, L. Tassiulas","doi":"10.1109/NGI.2008.50","DOIUrl":"https://doi.org/10.1109/NGI.2008.50","url":null,"abstract":"In this paper we propose distributed trust-based resource allocation policies to provide fairness in p2p-like systems. According to these policies, the portion of the available resource received by each competing peer depends on (a) his trust/reputation, (b) his resource demands and (c) his request generation rate. The reputation of a peer is quantified and an approach for continuously updating the reputation is proposed such that it reflects the contributions of the peer in the transactions he engages. We study both homogeneous and heterogeneous systems of peers with different resource capabilities and needs and we see from theoretical analysis and simulation results that proposed policies motivate peers to contribute resources in the network by guarantying that peers will only receive resources in proportion to their contributions; thus misbehaving (non contributive) peers cannot exploit the system. Furthermore, proposed policies lead to the dynamic formation of coalitions (cooperation) between peers who mutually benefit by their transactions, according to their capabilities and needs. Peers' coalitions are adaptive to network changes and self-organized as new peers enter the system or strategic peers vary their contributions.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121698404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Open Architecture for Monitoring and Measuring QoS Indicators in Wireless Community Networks","authors":"G. Parissis, S. Arkoulis, T. Apostolopoulos","doi":"10.1109/NGI.2008.45","DOIUrl":"https://doi.org/10.1109/NGI.2008.45","url":null,"abstract":"Wireless community networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. These networks are rarely supported by any infrastructure for measuring network performance indicators. In this paper, we present the design, the implementation and the experimental evaluation of KIXEM, an open agent-based architecture, whose design meets the special requirements and characteristics of WCNs. The proposed architecture is designed to passively monitor multiple wireless routing nodes within a WCN, in order to extract flow based network measurements. KIXEM is evaluated on a simulated WCN, representing part of the Athens wireless metropolitan network.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131467615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trend Based Bandwidth Provisioning: An Online Approach for Traffic Engineered Tunnels","authors":"S. Dasgupta, J. de Oliveira, J. Vasseur","doi":"10.1109/NGI.2008.14","DOIUrl":"https://doi.org/10.1109/NGI.2008.14","url":null,"abstract":"In this paper, a novel dynamic bandwidth provisioning scheme for traffic engineered tunnels is proposed. The mechanism uses information from the traffic trend to make resizing decisions and is designed to lower signaling and computational overhead while meeting QoS constraints. The traffic trend is observed using a slope estimator and a memory moderator unit. The slope estimator periodically analyzes traffic for growth and spikes whereas the memory moderator keeps track of traffic history and uses it to influence the update in reservation. Key metrics are identified and detailed analysis is then undertaken to gauge the performance of this approach. Accurate simulations on realistic traffic profiles and topologies show effective resizing and reduction in signaling overhead. A comparison with similar state-of-the-art mechanisms is also discussed.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131768379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust and Reactive Traffic Engineering for Dynamic Traffic Demands","authors":"P. Casas, L. Fillatre, Sandrine Vaton","doi":"10.1109/NGI.2008.16","DOIUrl":"https://doi.org/10.1109/NGI.2008.16","url":null,"abstract":"Traffic engineering (TE) has become a challenging mechanism for network management and resources optimization due to uncertain and difficult to predict traffic patterns. Recent works have proposed robust optimization techniques to cope with uncertain traffic, computing a stable routing configuration that is immune to demand variations within certain uncertainty set. However, using a single routing configuration for longtime periods can be highly inefficient. Even more, the presence of abnormal and malicious traffic has magnified the network operation problem, claiming for solutions which not only deal with traffic uncertainty but also allow to detect and identify faulty traffic to take the appropriate countermeasures. In this paper, we introduce the Reactive Robust Routing (RRR) for TE, an approach that combines both proactive and reactive techniques to tackle the problem. Based on expected traffic patterns, we adapt the uncertainty set and build a multi-hour yet robust routing scheme that outperforms the stable robust approach. For the case of anomalous and unexpected traffic, we propose a fast anomaly detection/isolation algorithm to detect and localize abrupt changes in traffic flows and decide routing changes. This algorithm is optimal in the sense that it minimizes the decision delay for a given mean false alarm rate and false isolation probability. We validate these proposals using real data from two different backbone networks and we show how the RRR can handle uncertain and highly dynamic traffic in an automatic fashion, simplifying network operation.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Content Distribution in a Push-VoD Scenario","authors":"S. Bessler","doi":"10.1109/NGI.2008.28","DOIUrl":"https://doi.org/10.1109/NGI.2008.28","url":null,"abstract":"This paper discusses a novel approach for distributing a large number of multimedia (video) titles to users via a managed network infrastructure based on DSL technology. The approach, sometimes called push-VoD, is based on multicasting and the direct download of the content on user disks, followed by the local, but delayed playback of the video. We analyze in a first step the optimization problems related to the efficient packing of multicast trees on capacity constrained links. Then, we show that the model in which the user requests several alternative titles for download performs much better than the single title case. Finally, we consider the multiperiod scheduling performance and describe ways to reduce both the number of downloads of the same title and the delivery time of less frequent titles.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132260283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large Scale Distributed Storage and Search for a Video on Demand Streaming System","authors":"Xonia Ivonne Olavarrieta, A. Leon-Garcia","doi":"10.1109/NGI.2008.30","DOIUrl":"https://doi.org/10.1109/NGI.2008.30","url":null,"abstract":"In the trend towards all IP networks, providing video services has proven to be a challenging task due to the high bandwidth requirements and the low delay and loss constraints. The architectural approaches taken by corporations to date mainly involve costly solutions that are difficult to manage and scale. Although IP multicast attempts to deal with the scalability of these systems at the network layer, it has not been widely deployed due to the extra cost of management and replacement of the existing infrastructure that involves. Therefore, if next generation service providers are to deliver high quality and on-demand video streaming to a large number of clients, new streaming methodologies such as peer-to-peer (P2P) need to be deployed to alleviate some of the current challenges involved in video streaming. We propose an effective and deployable solution for next generation video on demand (VoD) service providers based on a multilayered hybrid P2P topology for the distribution of and search for content, that addresses the requirements of low startup delay, provision of VCR-like commands and the scalability and management of a VoD streaming system.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134104797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP Limit: A Streaming Friendly Transport Protocol","authors":"F. Németh, S. Molnár, P. Tarján, R. Szabó","doi":"10.1109/NGI.2008.25","DOIUrl":"https://doi.org/10.1109/NGI.2008.25","url":null,"abstract":"In this paper we propose a simple enhancement to TCP (called TCP Limit) which significantly improves the utilization, delay, and jitter characteristics of standard TCP versions. TCP Limit requires only a small sender-side modification and can be applied on top of any TCP versions. Its main advantage is that it can be multiplexed with non-elastic streaming traffic without any router or protocol support. TCP Limit avoids the undesired effect of oscillation and keeps the delay and jitter as low as possible; so it does not ruin the performance of streaming applications. In the paper we present the initial performance evaluation of the proposed TCP Limit carried out by simulation and measurement. Analytical calculations are also included.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125200127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roland Bless, Christian Hübsch, S. Mies, O. P. Waldhorst
{"title":"The Underlay Abstraction in the Spontaneous Virtual Networks (SpoVNet) Architecture","authors":"Roland Bless, Christian Hübsch, S. Mies, O. P. Waldhorst","doi":"10.1109/NGI.2008.22","DOIUrl":"https://doi.org/10.1109/NGI.2008.22","url":null,"abstract":"Overlay-based services are a popular approach for providing functions like multicast, quality of service or security in the Internet without requiring infrastructure support. This paper presents the Underlay Abstraction Layer in the Spontaneous Virtual Networks (SpoVNet) architecture that enables easy and flexible creation of such services. Also building on an overlay approach, the Underlay Abstraction provides generic functionality to cope with mobility, multi-homing, and heterogeneity. It manages node mobility by separating node identifiers from network locators and it provides persistent connections by transparently switching locators. Multi-homing is supported by choosing the most appropriate pair of network locators for each connection. In order to cope with network and protocol heterogeneity, it uses dedicated overlay nodes, e.g., for relaying between IPv4 and IPv6 hosts. Since the functionality provided by the Underlay Abstraction can be used by several overlay-based services in parallel, redundant functionality is removed from services and applications.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A.E. Garcia, A. Berl, K. Hummel, R. Weidlich, A. Houyou, K. Hackbarth, H. de Meer, H. Hlavacs
{"title":"An Economical Cost Model for Fair Resource Sharing in Virtual Home Environments","authors":"A.E. Garcia, A. Berl, K. Hummel, R. Weidlich, A. Houyou, K. Hackbarth, H. de Meer, H. Hlavacs","doi":"10.1109/NGI.2008.27","DOIUrl":"https://doi.org/10.1109/NGI.2008.27","url":null,"abstract":"Home networks recently gain importance due to their development from pure internal networks in form of an Ethernet LAN to converged networks integrating home, Internet, and access provider infrastructure. In emerging future home networking scenarios, service provisioning and network management is proposed by distributed architectures forming virtual home environments (VHEs). This paper provides a service description and corresponding traffic and cost model for fair resource sharing in VHEs. The objective of the proposed cost model is to allow an evaluation of the contribution and consumption for each user participating in the VHE to find an economic balance in the distributed behavior. Hereby, the contribution counts positively and the consumption negatively. The economic balance controls the load balancing in the VHE and further limits the consumption of resources for users which over-pass a corresponding threshold of negative balance leading to an exclusion from the VHE, if the negative balance is not equilibrated over a mean- or long-time horizon.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117115497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrés Ferragut, D. Kofman, Federico Larroca, S. Oueslati
{"title":"Design and Analysis of Flow Aware Load Balancing Mechanisms for Multi-Service Networks","authors":"Andrés Ferragut, D. Kofman, Federico Larroca, S. Oueslati","doi":"10.1109/NGI.2008.18","DOIUrl":"https://doi.org/10.1109/NGI.2008.18","url":null,"abstract":"Ethernet technology is being deployed in metro and wide area networks. However, despite recent evolutions, Ethernet cannot be considered a carrier class technology due mainly to the lack of facilities for efficient traffic engineering (TE). In this article, we propose a Flow-aware TE approach for carrier class Ethernet networks providing services like those defined by the Metro Ethernet Forum. The flow-aware networking approach we consider is based on the Cross-protect router mechanisms, allowing satisfactory quality for streaming and elastic flows without explicitly identifying traffic classes by the combined use of fair queuing and admission control. Our proposal applies specifically to architectures where a tunnel is established between ingress and egress nodes (like Ethernet over MPLS). In this specific context, the Cross-protect mechanisms are applied on a per tunnel basis. We analyze the proposed approach in terms of flow blocking probabilities for which explicit formula are derived. We also extend the study framework to the case where several paths are established between a pair of ingress/egress nodes, and propose a simple load balancing scheme. We analyze its performance and derive approximate formula for the flow blocking probability in this case. The analysis is validated by extensive simulations.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127053668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}