Proceedings of IEEE INFOCOM '96. Conference on Computer Communications最新文献

筛选
英文 中文
Fast decoding of tagged message formats 标记消息格式的快速解码
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.497897
T. Blackwell
{"title":"Fast decoding of tagged message formats","authors":"T. Blackwell","doi":"10.1109/INFCOM.1996.497897","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497897","url":null,"abstract":"Many important protocols, such as Q.2931 or any protocol based on the ASN.1 basic encoding rules, are transmitted using tagged message formats, in which a message can be considered as a sequence of interleaved tag and data fields, where tag fields define the meaning of subsequent fields. These messages are computationally expensive to decode, partly because decoding each data field requires resting one or more tag fields. Evidence suggests that in some applications, although the potential space of message encodings may be very large, only a small number of message layouts are seen frequently, and thus some of the work required in decoding can be amortized over many messages. This paper analyzes the use of run-time code generation to generate optimized decoding instruction sequences for received messages matching previously observed layouts, and describes a prototype system that applies the techniques to decoding the Q.2931 and ASN.1 BER protocols. In the average case, substantial performance gains are seen.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133074355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Asymmetric ATM switch modules with imbalanced traffic ATM交换模块不对称,流量不均衡
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.493378
A. Chatterjee, V. Konangi
{"title":"Asymmetric ATM switch modules with imbalanced traffic","authors":"A. Chatterjee, V. Konangi","doi":"10.1109/INFCOM.1996.493378","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493378","url":null,"abstract":"This paper analyzes the performance of output channel grouped asymmetric packet switch modules in ATM networks, under geometrically bursty input traffic with input/output traffic imbalance. The switch module considered has n inputs and m outputs. A packet destined for a particular output address (out of g) needs to access only one of the r available physical output ports; m=gr. The motivation for the study of these switch modules is that they are the key building blocks in many large multistage switch architectures. A combination of exact derivation and numerical analysis yields the saturation throughput of input buffered switch modules for a wide range of traffic nonuniformity factors and burstiness. Results show a degradation in the maximum throughput, under input/output imbalance, as the average burst length increases. An interesting observation is that asymmetric switches tend to diminish the throughput advantage of the output-buffered switch module over the input buffered switch module under any traffic nonuniformity and burstiness. Our results also indicate that increasing the number of output ports per output address can significantly improve the switch performance, especially when traffic is highly nonuniform and bursty.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121962866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Call admission and resource reservation for multicast sessions 多播会话的呼叫允许和资源预留
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.497882
V. Firoiu, D. Towsley
{"title":"Call admission and resource reservation for multicast sessions","authors":"V. Firoiu, D. Towsley","doi":"10.1109/INFCOM.1996.497882","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497882","url":null,"abstract":"Many multicast applications, including audio and video, require quality of service (QoS) guarantees from the network. Hence, multicast admission control and resource reservation procedures will be needed. In this paper we present a general framework for admission control and resource reservation for multicast sessions. Within this framework, efficient and practical algorithms that aim to efficiently utilize network resources are developed. The problem of admission control is decomposed into several subproblems that include: the division of end-to-end QoS requirements into local QoS requirements, the mapping of local QoS requirements into resource requirements, and the reclaiming of the resources allocated in excess. These are solved independently of each other yielding a set of mechanisms and policies that can be used to provide admission control and resource reservation for multicast connection establishment. The resource allocation algorithms we consider specifically accommodate receiver heterogeneity (in both end-to-end and per-hop QoS requirements) by reserving necessary and sufficient resources for a multicast session. An application of these algorithms in the context of packetized voice multicast connections over the Mbone is provided to illustrate their applicability.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Context independent unique sequences generation for protocol testing 协议测试的上下文独立的唯一序列生成
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.493058
T. Ramalingom, K. Thulasiraman, Anindya Das
{"title":"Context independent unique sequences generation for protocol testing","authors":"T. Ramalingom, K. Thulasiraman, Anindya Das","doi":"10.1109/INFCOM.1996.493058","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493058","url":null,"abstract":"A number of test sequence generation methods proposed for protocols represented as extended finite state machines (EFSMs) use state identification sequences for checking the states. However, neither a formal definition nor a method of computation of these sequences for an EFSM state is known. We define a new type of state identification sequence, called context independent unique sequence (CIUS) and present an algorithm for computing it. A unified method based on CIUSes is developed for automatically generating executable test cases for both control flow and data flow aspects of an EFSM. In control flow testing, CIUSes are very useful in confirming the tail state of the transitions. In data flow testing, CIUSes improve the observability of the test cases for the def-use associations of different variables used in the EFSM. Unlike general state identification sequences, the use of CIUSes does not increase the complexity of the already intractable feasibility problem in the test case generation.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reliable concurrent multicast from bursty sources 可靠的突发源并发多播
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.493092
Y. Ofek, B. Yener
{"title":"Reliable concurrent multicast from bursty sources","authors":"Y. Ofek, B. Yener","doi":"10.1109/INFCOM.1996.493092","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493092","url":null,"abstract":"This paper presents a protocol and design for concurrent and reliable group multicast (many-to-many) from bursty data sources in general networks. In a group multicast, any node can be a multicast source and multiple nodes may start to multicast simultaneously, i.e., an asynchronous access to the network. The reliable multicast protocol presented in this work is window based with a combined sender and receiver initiation of the recovery protocol. In reliable multicasting the necessary requirement is to ensure that data is received correctly by all the active members of the multicast group. The approach taken in this work is to combine the multicast operation with the internal flow control, as a result, it is possible to provide: (1) loss-free multicast routing with a single and immediate acknowledgement message to the sender. Furthermore, in every multicast, (2) a node can access all the capacity allocated to its group with no delay, however, if several nodes are active in the same group then the capacity will be shared fairly. In addition, (3) each sender in the multicast group uses a single timer, and (4) a node can join and leave a multicast group in a transparent fashion, i.e., there is no need to explicitly notify the members of the group. A multiple criteria optimization study of the bandwidth allocation to each multicast group is presented. The optimization problem has two min-max objective functions: (1) for delay, which caused by the number of links needed to connect the group, and (2) for congestion, which is caused by sharing a link among multiple multicast groups. The bandwidth allocation among multicast group sharing the same link are further optimized using the max-min fairness criterion.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
The drop from front strategy in TCP and in TCP over ATM TCP协议和基于ATM的TCP协议的前端丢弃策略
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.493070
T. V. Lakshman, A. Neidhardt, T. Ott
{"title":"The drop from front strategy in TCP and in TCP over ATM","authors":"T. V. Lakshman, A. Neidhardt, T. Ott","doi":"10.1109/INFCOM.1996.493070","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493070","url":null,"abstract":"This paper proposes the use of a \"drop from front\" scheme for improving TCP performance in high bandwidth-delay product networks. In particular, for \"TCP over ATM\" we compare the performance when drop from front is used at the output port of ATM switches with the performance under tail drop, its variations, and with variations of random early detection (RED). In drop from front, when a cell arrives at a full buffer, the cell closest to being transmitted is dropped, thus creating space for the arriving cell. This policy causes duplicate acknowledgements to be sent one whole buffer drain time earlier than is the case under tail drop. These quicker duplicate acknowledgements cause TCP with fast retransmit to recognize losses faster and invoke congestion control actions earlier than would be the case under tail drop. This earlier reaction translates into considerable performance improvement. Hence, drop from front successfully utilizes the ability of TCP with fast retransmit to quickly recognize and react to congestion information (at the third repeat acknowledgement, as opposed to time-out). Roughly, the earlier action by the sources causes the congestion not to grow quite as severe, which prevents later over-reaction by the sources, and thus increases throughput.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129822407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
Source policing for ATM systems based on peakedness rate 基于峰值率的ATM系统源监管
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.497915
P. I. Sánchez, R. Mazumdar
{"title":"Source policing for ATM systems based on peakedness rate","authors":"P. I. Sánchez, R. Mazumdar","doi":"10.1109/INFCOM.1996.497915","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497915","url":null,"abstract":"We consider a new policing device suitable for ATM applications. The device operates on an arbitrary source which is fed to a single server queue with a deterministic server. The policing function is implemented at the cell level by assuming the source traffic passes through an infinite server queue whose performance allows a tight control of the policed parameters. An interesting element is that this policing function is not only capable of simultaneously enforcing source parameters like mean rate and burst length, but it also serves to control some desired performance of the single server queue like maximum and mean occupancies.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127636311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time scale analysis of explicit rate allocation in ATM networks ATM网络中显式费率分配的时间尺度分析
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.493063
A. Charny, K. Ramakrishnan
{"title":"Time scale analysis of explicit rate allocation in ATM networks","authors":"A. Charny, K. Ramakrishnan","doi":"10.1109/INFCOM.1996.493063","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493063","url":null,"abstract":"Rate based congestion management for computer communication networks has been the focus of considerable research. We examine some of the fundamental properties of such end-to-end rate based algorithms. The first is the requirement for a policy to ensure the feasibility of the transmission rates by the sources. The feasibility implies that the capacity of any of the resources is not exceeded at any time. We show that a source policy which defers increases in the explicit rate for a period of time, while allowing decreases to take effect immediately maintains the requirement of feasibility. We also examine the convergence properties of the end-to-end rate based schemes in general, and give an upper bound on the convergence time of the scheme presented.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Performance and resource cost comparisons for the CBT and PIM multicast routing protocols in DIS environments DIS环境下CBT和PIM组播路由协议的性能和资源成本比较
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.497881
T. Billhartz, J. Cain, E. Farrey-Goudreau, D. Fieg, S. Batsell
{"title":"Performance and resource cost comparisons for the CBT and PIM multicast routing protocols in DIS environments","authors":"T. Billhartz, J. Cain, E. Farrey-Goudreau, D. Fieg, S. Batsell","doi":"10.1109/INFCOM.1996.497881","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.497881","url":null,"abstract":"Researchers have proposed the core based trees (CBT) and protocol independent multicasting (PIM) protocols to route multicast data on internetworks. The performance of these protocols is examined in the distributed interactive simulation (DIS) environment using the OPNET network simulation tool. The simulation results provide measures of important performance metrics including end-to-end delay, network resource usage, and join time. The size of the tables containing multicast routing information and the impact of the timers introduced by the protocols are also examined. Suggestions are offered to improve PIM Sparse while retaining the ability to offer both shared tree and source-based tree routing.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A study of reservation dynamics in integrated services packet networks 综合业务包网络中的预留动态研究
Proceedings of IEEE INFOCOM '96. Conference on Computer Communications Pub Date : 1996-03-24 DOI: 10.1109/INFCOM.1996.493386
Danny J. Mitzel, D. Estrin, S. Shenker, Lixia Zhang
{"title":"A study of reservation dynamics in integrated services packet networks","authors":"Danny J. Mitzel, D. Estrin, S. Shenker, Lixia Zhang","doi":"10.1109/INFCOM.1996.493386","DOIUrl":"https://doi.org/10.1109/INFCOM.1996.493386","url":null,"abstract":"The integrated services packet network (ISPN) architecture proposed within the Internet community incorporates a resource reservation mechanism for those applications requiring quality of service (QoS) guarantees. Resource reservation introduces a new form of resource contention that can lead to reduced network throughput and thrashing. We establish several necessary conditions to induce thrashing. We also look at the effects several different reservation models and user behavior can have on network stability. Our work is unique from previous network resource reservation investigations in that we consider the effects of reservations for multipoint-to-multipoint applications. We conclude with examples of how simple modifications to user behavior can result in significant increases in system stability.","PeriodicalId":234566,"journal":{"name":"Proceedings of IEEE INFOCOM '96. Conference on Computer Communications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115390664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信