{"title":"Fast decoding of tagged message formats","authors":"T. Blackwell","doi":"10.1109/INFCOM.1996.497897","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497897","url":null,"abstract":"Many important protocols, such as Q.2931 or any protocol based on the ASN.1 basic encoding rules, are transmitted using tagged message formats, in which a message can be considered as a sequence of interleaved tag and data fields, where tag fields define the meaning of subsequent fields. These messages are computationally expensive to decode, partly because decoding each data field requires resting one or more tag fields. Evidence suggests that in some applications, although the potential space of message encodings may be very large, only a small number of message layouts are seen frequently, and thus some of the work required in decoding can be amortized over many messages. This paper analyzes the use of run-time code generation to generate optimized decoding instruction sequences for received messages matching previously observed layouts, and describes a prototype system that applies the techniques to decoding the Q.2931 and ASN.1 BER protocols. In the average case, substantial performance gains are seen.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133074355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymmetric ATM switch modules with imbalanced traffic","authors":"A. Chatterjee, V. Konangi","doi":"10.1109/INFCOM.1996.493378","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493378","url":null,"abstract":"This paper analyzes the performance of output channel grouped asymmetric packet switch modules in ATM networks, under geometrically bursty input traffic with input/output traffic imbalance. The switch module considered has n inputs and m outputs. A packet destined for a particular output address (out of g) needs to access only one of the r available physical output ports; m=gr. The motivation for the study of these switch modules is that they are the key building blocks in many large multistage switch architectures. A combination of exact derivation and numerical analysis yields the saturation throughput of input buffered switch modules for a wide range of traffic nonuniformity factors and burstiness. Results show a degradation in the maximum throughput, under input/output imbalance, as the average burst length increases. An interesting observation is that asymmetric switches tend to diminish the throughput advantage of the output-buffered switch module over the input buffered switch module under any traffic nonuniformity and burstiness. Our results also indicate that increasing the number of output ports per output address can significantly improve the switch performance, especially when traffic is highly nonuniform and bursty.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121962866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call admission and resource reservation for multicast sessions","authors":"V. Firoiu, D. Towsley","doi":"10.1109/INFCOM.1996.497882","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497882","url":null,"abstract":"Many multicast applications, including audio and video, require quality of service (QoS) guarantees from the network. Hence, multicast admission control and resource reservation procedures will be needed. In this paper we present a general framework for admission control and resource reservation for multicast sessions. Within this framework, efficient and practical algorithms that aim to efficiently utilize network resources are developed. The problem of admission control is decomposed into several subproblems that include: the division of end-to-end QoS requirements into local QoS requirements, the mapping of local QoS requirements into resource requirements, and the reclaiming of the resources allocated in excess. These are solved independently of each other yielding a set of mechanisms and policies that can be used to provide admission control and resource reservation for multicast connection establishment. The resource allocation algorithms we consider specifically accommodate receiver heterogeneity (in both end-to-end and per-hop QoS requirements) by reserving necessary and sufficient resources for a multicast session. An application of these algorithms in the context of packetized voice multicast connections over the Mbone is provided to illustrate their applicability.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context independent unique sequences generation for protocol testing","authors":"T. Ramalingom, K. Thulasiraman, Anindya Das","doi":"10.1109/INFCOM.1996.493058","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493058","url":null,"abstract":"A number of test sequence generation methods proposed for protocols represented as extended finite state machines (EFSMs) use state identification sequences for checking the states. However, neither a formal definition nor a method of computation of these sequences for an EFSM state is known. We define a new type of state identification sequence, called context independent unique sequence (CIUS) and present an algorithm for computing it. A unified method based on CIUSes is developed for automatically generating executable test cases for both control flow and data flow aspects of an EFSM. In control flow testing, CIUSes are very useful in confirming the tail state of the transitions. In data flow testing, CIUSes improve the observability of the test cases for the def-use associations of different variables used in the EFSM. Unlike general state identification sequences, the use of CIUSes does not increase the complexity of the already intractable feasibility problem in the test case generation.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable concurrent multicast from bursty sources","authors":"Y. Ofek, B. Yener","doi":"10.1109/INFCOM.1996.493092","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493092","url":null,"abstract":"This paper presents a protocol and design for concurrent and reliable group multicast (many-to-many) from bursty data sources in general networks. In a group multicast, any node can be a multicast source and multiple nodes may start to multicast simultaneously, i.e., an asynchronous access to the network. The reliable multicast protocol presented in this work is window based with a combined sender and receiver initiation of the recovery protocol. In reliable multicasting the necessary requirement is to ensure that data is received correctly by all the active members of the multicast group. The approach taken in this work is to combine the multicast operation with the internal flow control, as a result, it is possible to provide: (1) loss-free multicast routing with a single and immediate acknowledgement message to the sender. Furthermore, in every multicast, (2) a node can access all the capacity allocated to its group with no delay, however, if several nodes are active in the same group then the capacity will be shared fairly. In addition, (3) each sender in the multicast group uses a single timer, and (4) a node can join and leave a multicast group in a transparent fashion, i.e., there is no need to explicitly notify the members of the group. A multiple criteria optimization study of the bandwidth allocation to each multicast group is presented. The optimization problem has two min-max objective functions: (1) for delay, which caused by the number of links needed to connect the group, and (2) for congestion, which is caused by sharing a link among multiple multicast groups. The bandwidth allocation among multicast group sharing the same link are further optimized using the max-min fairness criterion.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The drop from front strategy in TCP and in TCP over ATM","authors":"T. V. Lakshman, A. Neidhardt, T. Ott","doi":"10.1109/INFCOM.1996.493070","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493070","url":null,"abstract":"This paper proposes the use of a \"drop from front\" scheme for improving TCP performance in high bandwidth-delay product networks. In particular, for \"TCP over ATM\" we compare the performance when drop from front is used at the output port of ATM switches with the performance under tail drop, its variations, and with variations of random early detection (RED). In drop from front, when a cell arrives at a full buffer, the cell closest to being transmitted is dropped, thus creating space for the arriving cell. This policy causes duplicate acknowledgements to be sent one whole buffer drain time earlier than is the case under tail drop. These quicker duplicate acknowledgements cause TCP with fast retransmit to recognize losses faster and invoke congestion control actions earlier than would be the case under tail drop. This earlier reaction translates into considerable performance improvement. Hence, drop from front successfully utilizes the ability of TCP with fast retransmit to quickly recognize and react to congestion information (at the third repeat acknowledgement, as opposed to time-out). Roughly, the earlier action by the sources causes the congestion not to grow quite as severe, which prevents later over-reaction by the sources, and thus increases throughput.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129822407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Source policing for ATM systems based on peakedness rate","authors":"P. I. Sánchez, R. Mazumdar","doi":"10.1109/INFCOM.1996.497915","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497915","url":null,"abstract":"We consider a new policing device suitable for ATM applications. The device operates on an arbitrary source which is fed to a single server queue with a deterministic server. The policing function is implemented at the cell level by assuming the source traffic passes through an infinite server queue whose performance allows a tight control of the policed parameters. An interesting element is that this policing function is not only capable of simultaneously enforcing source parameters like mean rate and burst length, but it also serves to control some desired performance of the single server queue like maximum and mean occupancies.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127636311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time scale analysis of explicit rate allocation in ATM networks","authors":"A. Charny, K. Ramakrishnan","doi":"10.1109/INFCOM.1996.493063","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493063","url":null,"abstract":"Rate based congestion management for computer communication networks has been the focus of considerable research. We examine some of the fundamental properties of such end-to-end rate based algorithms. The first is the requirement for a policy to ensure the feasibility of the transmission rates by the sources. The feasibility implies that the capacity of any of the resources is not exceeded at any time. We show that a source policy which defers increases in the explicit rate for a period of time, while allowing decreases to take effect immediately maintains the requirement of feasibility. We also examine the convergence properties of the end-to-end rate based schemes in general, and give an upper bound on the convergence time of the scheme presented.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Billhartz, J. Cain, E. Farrey-Goudreau, D. Fieg, S. Batsell
{"title":"Performance and resource cost comparisons for the CBT and PIM multicast routing protocols in DIS environments","authors":"T. Billhartz, J. Cain, E. Farrey-Goudreau, D. Fieg, S. Batsell","doi":"10.1109/INFCOM.1996.497881","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497881","url":null,"abstract":"Researchers have proposed the core based trees (CBT) and protocol independent multicasting (PIM) protocols to route multicast data on internetworks. The performance of these protocols is examined in the distributed interactive simulation (DIS) environment using the OPNET network simulation tool. The simulation results provide measures of important performance metrics including end-to-end delay, network resource usage, and join time. The size of the tables containing multicast routing information and the impact of the timers introduced by the protocols are also examined. Suggestions are offered to improve PIM Sparse while retaining the ability to offer both shared tree and source-based tree routing.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danny J. Mitzel, D. Estrin, S. Shenker, Lixia Zhang
{"title":"A study of reservation dynamics in integrated services packet networks","authors":"Danny J. Mitzel, D. Estrin, S. Shenker, Lixia Zhang","doi":"10.1109/INFCOM.1996.493386","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493386","url":null,"abstract":"The integrated services packet network (ISPN) architecture proposed within the Internet community incorporates a resource reservation mechanism for those applications requiring quality of service (QoS) guarantees. Resource reservation introduces a new form of resource contention that can lead to reduced network throughput and thrashing. We establish several necessary conditions to induce thrashing. We also look at the effects several different reservation models and user behavior can have on network stability. Our work is unique from previous network resource reservation investigations in that we consider the effects of reservations for multipoint-to-multipoint applications. We conclude with examples of how simple modifications to user behavior can result in significant increases in system stability.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115390664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}