13TH IEEE International Conference on Network Protocols (ICNP'05)最新文献

筛选
英文 中文
Efficient probabilistic packet marking 有效的概率分组标记
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.15
Qunfeng Dong, Suman Banerjee, M. Adler, Kazu Hirata
{"title":"Efficient probabilistic packet marking","authors":"Qunfeng Dong, Suman Banerjee, M. Adler, Kazu Hirata","doi":"10.1109/ICNP.2005.15","DOIUrl":"https://doi.org/10.1109/ICNP.2005.15","url":null,"abstract":"Probabilistic packet marking is a general technique which routers can use to reveal internal network information to end-hosts. Such information is probabilistically set by the routers in headers of regular IP packets on their way to destinations. A number of potential applications have been identified, such as IP traceback, congestion control, robust routing algorithms, dynamic network reconfiguration, and locating Internet bottlenecks, etc. In this paper, we define EPPM, an efficient general probabilistic packet marking scheme with a wide range of potential applications, of which locating Internet bottlenecks and IP traceback are investigated as two representative examples to demonstrate its effectiveness. Our proposed scheme imposes only a single-bit overhead in the IP packet headers. More importantly, it significantly reduces the number of IP packets required to convey the relevant information when compared to the prior best known scheme (almost by two orders of magnitude)","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Can coexisting overlays inadvertently step on each other? 共存的重叠是否会在不经意间相互踩到对方?
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.9
Ram Keralapura, C. Chuah, N. Taft, G. Iannaccone
{"title":"Can coexisting overlays inadvertently step on each other?","authors":"Ram Keralapura, C. Chuah, N. Taft, G. Iannaccone","doi":"10.1109/ICNP.2005.9","DOIUrl":"https://doi.org/10.1109/ICNP.2005.9","url":null,"abstract":"By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multiple similar or dissimilar overlay networks making independent routing decisions could experience race conditions, resulting in oscillations in both route selection and network load. We pinpoint the causes for synchronization in terms of partially overlapping routes and periodic path probing processes and derive an analytic formulation for the synchronization probability of two overlays. Our model indicates that the probability of synchronization is non-negligible across a wide range of parameter settings, thus implying that the ill-effects of synchronization should not be ignored. Using the analytical model, we find an upper bound on the duration of traffic oscillations. We validate our model through simulations that are designed to capture the transient routing behavior of both the IP- and overlay-layers. We use our model to study the effects of factors such as path diversity (measured in round trip times) and probing aggressiveness on these race conditions. Finally, we discuss the implications of our study on the design of overlay networks and the choice of their path probing parameters","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"94 33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Intersection characteristics of end-to-end Internet paths and trees 端到端互联网路径和树的交叉特性
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.20
Sevcan Bilir, K. Saraç, T. Korkmaz
{"title":"Intersection characteristics of end-to-end Internet paths and trees","authors":"Sevcan Bilir, K. Saraç, T. Korkmaz","doi":"10.1109/ICNP.2005.20","DOIUrl":"https://doi.org/10.1109/ICNP.2005.20","url":null,"abstract":"This paper focuses on understanding the scale and the distribution of \"state overhead'' (briefly load) that is incurred on the routers by various value-added network services, e.g., IP multicast and IP traceback. This understanding is essential to developing appropriate mechanisms and provisioning resources so that the Internet can support such value-added services in an efficient and scalable manner. We mainly consider the number of end-to-end paths or trees intersecting at a router to represent the amount of state overhead at that router. Hence, we analyze the router-level intersection characteristics of end-to-end Internet paths or trees to approximate the state overhead distribution in the Internet. For the reliability of our analysis, a representative, end-to-end router-level Internet map is essential. Although several maps are available, they are at best insufficient for our analysis. Therefore, in the first part of our work, we exert a measurement study to obtain a large size end-to-end router-level map conforming to our constraints. In the second part, we conduct various experiments using our map and shed some light on the scale and distribution of state overhead of value-added Internet services in both unicast and multicast environments.","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127434347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Shape shifting tries for faster IP route lookup 形状变换尝试更快的IP路由查找
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.36
Haoyu Song, J. Turner, J. Lockwood
{"title":"Shape shifting tries for faster IP route lookup","authors":"Haoyu Song, J. Turner, J. Lockwood","doi":"10.1109/ICNP.2005.36","DOIUrl":"https://doi.org/10.1109/ICNP.2005.36","url":null,"abstract":"Some of the fastest practical algorithms for IP route lookup are based on space-efficient encodings of multi-bit tries (M. Degermark, et al., 1997, W. Eatherton, 1999). Unfortunately, the time required by these algorithms grows in proportion to the address length, making them less attractive for IPv6. This paper describes and evaluates a new data structure called a shape-shifting trie, in which the data structure nodes correspond to arbitrarily shaped subtrees of the underlying binary trie for a given set of address prefixes. The ability to adapt the node shape to the trie reduces the number of nodes that must be accessed to perform a lookup, especially for tries with large sparse regions. We give a fast algorithm for optimally dividing a trie into nodes so as to minimize the maximum lookup depth. We show that seven data structure accesses are sufficient for route tables with more than 150,000 IPv6 prefixes. This makes it possible to achieve wire-speed processing for OC192 link using a single QDRII SRAM chip","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124331212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
On static and dynamic partitioning behavior of large-scale networks 大型网络的静态和动态分区行为
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.27
Derek Leonard, Z. Yao, Xiaoming Wang, D. Loguinov
{"title":"On static and dynamic partitioning behavior of large-scale networks","authors":"Derek Leonard, Z. Yao, Xiaoming Wang, D. Loguinov","doi":"10.1109/ICNP.2005.27","DOIUrl":"https://doi.org/10.1109/ICNP.2005.27","url":null,"abstract":"In this paper, we analyze the problem of network disconnection in the context of large-scale P2P networks and understand how both static and dynamic patterns of node failure affect the resilience of such graphs. We start by applying classical results from random graph theory to show that a large variety of deterministic and random P2P graphs almost surely (i.e., with probability 1-o(1)) remain connected under random failure if and only if they have no isolated nodes. This simple, yet powerful, result subsequently allows us to derive in closed-form the probability that a P2P network develops isolated nodes, and therefore partitions, under both types of node failure. We finish the paper by demonstrating that our models match simulations very well and that dynamic P2P systems are extremely resilient under node churn as long as the neighbor replacement delay is much smaller than the average user lifetime","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114317121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Adaptive sleep scheduling for energy-efficient movement-predicted wireless communication 基于节能运动预测的无线通信自适应睡眠调度
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.6
Yu Dong, David K. Y. Yau
{"title":"Adaptive sleep scheduling for energy-efficient movement-predicted wireless communication","authors":"Yu Dong, David K. Y. Yau","doi":"10.1109/ICNP.2005.6","DOIUrl":"https://doi.org/10.1109/ICNP.2005.6","url":null,"abstract":"Energy efficiency in network communication is critical for wirelessly connected small computing devices, which run on limited battery capacity. Under realistic movement scenarios (e.g., a person traveling at airplane, automobile, or biking speed), a mobile sender can track its own movement and postpone communication (subject to application deadline constraints) until it moves close to the communication target. This will save significant energy of sending, which grows superlinearly with the communication distance in, say, the single hop wireless context. However, movement tracking requires the mobile device to be turned on and hence consumes energy. Instead of continuous tracking, the mobile device should sample its movement and be allowed to sleep between the sampling instants (provided that the application also does not have work to do during the sleep). In this paper, we present an adaptive scheduler for determining an effective sampling schedule given changing operating conditions. Our experimental results show that the scheduler can achieve substantial energy savings over a device that is always on. Moreover, the scheduler's adaptivity allows it to outperform fixed sleep periods between tracking, since the \"right\" sleep period depends on dynamic system conditions and cannot be determined a priori.","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122265333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Path vector face routing: geographic routing with local face information 路径矢量面路由:具有本地面信息的地理路由
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.32
B. Leong, S. Mitra, B. Liskov
{"title":"Path vector face routing: geographic routing with local face information","authors":"B. Leong, S. Mitra, B. Liskov","doi":"10.1109/ICNP.2005.32","DOIUrl":"https://doi.org/10.1109/ICNP.2005.32","url":null,"abstract":"Existing geographic routing algorithms depend on the planarization of the network connectivity graph for correctness, and the planarization process gives rise to a well-defined notion of \"faces\". In this paper, we demonstrate that we can improve routing performance by storing a small amount of local face information at each node. We present a protocol, path vector exchange (PVEX), that maintains local face information at each node efficiently, and a new geographic routing algorithm, greedy path vector face routing (GPVFR), that achieves better routing performance in terms of both path stretch and hop stretch than existing geographic routing algorithms by exploiting available local face information. Our simulations demonstrate that GPVFR/PVEX achieves significantly reduced path and hop stretch than greedy perimeter stateless routing (GPSR) and somewhat better performance than greedy other adaptive face routing (GOAFR+) over a wide range of network topologies. The cost of this improved performance is a small amount of additional storage, and the bandwidth required for our algorithm is comparable to GPSR and GOAFR+ in quasi-static networks.","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116997477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 183
Z-ring: fast prefix routing via a low maintenance membership protocol Z-ring:通过低维护成员协议的快速前缀路由
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.45
Qiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, Ben Y. Zhao
{"title":"Z-ring: fast prefix routing via a low maintenance membership protocol","authors":"Qiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, Ben Y. Zhao","doi":"10.1109/ICNP.2005.45","DOIUrl":"https://doi.org/10.1109/ICNP.2005.45","url":null,"abstract":"In this paper, we introduce Z-ring, a fast prefix routing protocol for peer-to-peer overlay networks. Z-ring incorporates cost-efficient membership protocol to achieve fast routing with small maintenance cost. Z-ring achieves routing in logGN steps, where N is the network size and G is the size of a group that can be maintained by a membership protocol with low cost. With G=4096, it translates to one-hop routing for intranet environments (N<4096), two-hop routing for mid-scale internet applications (N<16 million), and three-hop routing for ultra-large Internet applications (N<64 billion). Z-ring maintains good routing success rate under churn and low maintenance cost even at large network size. Its modularized use of the membership protocol also makes it adaptive to dynamic and wide-range network size changes.","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Robust multiclass signaling overload control 鲁棒的多类信令过载控制
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.34
S. Kasera, J. Pinheiro, C. Loader, T. LaPorta, M. Karaul, A. Hari
{"title":"Robust multiclass signaling overload control","authors":"S. Kasera, J. Pinheiro, C. Loader, T. LaPorta, M. Karaul, A. Hari","doi":"10.1109/ICNP.2005.34","DOIUrl":"https://doi.org/10.1109/ICNP.2005.34","url":null,"abstract":"We propose multi-class signaling overload control algorithms, for telecommunication switches, that are robust against different input traffic patterns and system upgrades. In order to appropriately measure the system load when several classes of signaling traffic are present, we first introduce the concept of equivalent system load measure that converts the multiple system measures associated with different classes of traffic into a single measure with respect to a pre-defined base class. We use this measure to develop three multi-class overload detection and measurement algorithms. Next, we develop a new algorithm for partitioning the allowable equivalent system load across multiple traffic classes, using a strict priority scheme. Using simulations of call flows from mobile telecommunications standards, we compare different multi-class overload algorithms under a variety of overload conditions. Our simulation results indicate that our algorithm that measures system load using a combination of request acceptance rate and processor occupancy provides highly reactive and robust overload control. Last, for the purpose of making the overload control algorithms more robust, we propose a measurement-based simple regression technique to dynamically estimate key system parameters. We find that estimates derived in this manner converge rapidly to their true values.","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117010310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Does over-provisioning become more or less efficient as networks grow larger? 随着网络规模的扩大,过度配置的效率会提高还是降低?
13TH IEEE International Conference on Network Protocols (ICNP'05) Pub Date : 2005-11-06 DOI: 10.1109/ICNP.2005.12
Yaqing Huang, R. Guérin
{"title":"Does over-provisioning become more or less efficient as networks grow larger?","authors":"Yaqing Huang, R. Guérin","doi":"10.1109/ICNP.2005.12","DOIUrl":"https://doi.org/10.1109/ICNP.2005.12","url":null,"abstract":"IP networks have seen tremendous growth in not only their size and speed, but also in the volume of traffic they carry. Over-provisioning is commonly used to protect network performance against traffic variations, be they caused by failures or transient surges. This paper investigates the influence that increasing network size has on the efficacy of over-provisioning in absorbing a certain range of traffic variations and preserving performance guarantees. For that purpose, we develop a general model that accounts for network topology, base offered traffic, and traffic variations, and allows us to explore how their combination behaves as the network and the traffic it carries grow. The model's generality enables us to investigate several representative scenarios and to identify critical thresholds in the relation between network and traffic growth, which delineate regions where a given amount of over-provisioning provides increasingly better protection against traffic variations. The results offer insight into how to grow IP networks in order to enhance their robustness","PeriodicalId":191961,"journal":{"name":"13TH IEEE International Conference on Network Protocols (ICNP'05)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124526548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信