Cheng Cui, Lin Xue, Chui-Hui Chiu, Praveenkumar Kondikoppa, Seung-Jong Park
{"title":"DMCTCP: Desynchronized Multi-Channel TCP for high speed access networks with tiny buffers","authors":"Cheng Cui, Lin Xue, Chui-Hui Chiu, Praveenkumar Kondikoppa, Seung-Jong Park","doi":"10.1109/ICCCN.2014.6911722","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911722","url":null,"abstract":"The past few years have witnessed debate on how to improve link utilization of high-speed tiny-size buffer routers. Widely argued proposals for TCP traffic to realize acceptable link capacities mandate: (i) over-provisioned core link bandwidth; and (ii) non-bursty flows; and (iii) tens of thousands of asynchronous flows. However, in high speed access networks where flows are bursty, sparse and synchronous, TCP traffic suffer severely from routers with tiny buffers. We propose a new congestion control algorithm called Desyn-chronized Multi-Channel TCP (DMCTCP) that creates a flow with multiple channels. It avoids TCP loss synchronization by desynchronizing channels, and it avoids sending rate penalties from burst losses. Over a 10 Gb/s large delay network ruled by routers with only a few dozen packets of buffers, our results show that bottleneck link utilization can reach 80% with only 100 flows. Our study is a new step towards the deployment of optical packet switching networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114592321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel reservation based on contention and interference in wireless ad hoc networks","authors":"Xinming Zhang, Zhilong Dai, Haitao Zhu","doi":"10.1109/ICCCN.2014.6911824","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911824","url":null,"abstract":"Packet loss in multi-hop wireless ad hoc networks is an important factor in network performance optimization. Typically, MAC frame collisions and queue overflow caused by MAC contentions and interference are the main reasons of packet loss. Recently, MAC frame collisions had been paid much attentions to in mitigating packet loss. Whereas, queue overflow among inter-flow has rarely attracted attentions. In this paper, we first analyze how contentions among inter-flows will cause queue overflow and further packet loss. We show network local spatial reuse is also an important factor which will cause queue overflow at a forwarding station. With the information of queue status, each forwarding station determines whether to reserve the transmission of subsequent frames in the waiting queue. The reserved data frames will not suffer from contentions and interference and network local channel utilization is also improved. By theory analysis and simulations, we show our proposed channel reservation scheme can effectively reduce packet loss and improve network local channel efficiency in multi-hop wireless networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124358240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP congestion control based on accurate bandwidth-delay product in wireless Ad hoc networks","authors":"Xinming Zhang, Bo Yang, Yangyang Ma","doi":"10.1109/ICCCN.2014.6911825","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911825","url":null,"abstract":"Bandwidth-delay product (BDP) is an important indicator of the network capacity and usually used to measure the quality of a connection. In wireless ad hoc networks over IEEE 802.11, packets may be blocked due to link layer contention, and delay triggered by the contention called contention delay has been revealed has nothing to do with BDP. BDP in wireless ad hoc networks has been studied a lot to improve the transmission control protocol (TCP) performance, however, in the calculation of BDP, most of the previous studies neglected to remove the contention delay and thus obtained an overestimated value which may cause congestion window (CWND) overshooting problem. In this paper, we propose a new method to accurately measure the congestion delay which is the effective “delay” of BDP and calculate more accurate BDP. Then, based on the BDP, we set suitable congestion window limit (CWL) to alleviate the CWND overshooting problem and enhance TCP performance. Simulation results show that TCP with CWL based on our accurate BDP works more efficiently.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Foroozani, Mohammed Gharib, A. Hemmatyar, A. Movaghar
{"title":"A novel human mobility model for MANETs based on real data","authors":"Ahmad Foroozani, Mohammed Gharib, A. Hemmatyar, A. Movaghar","doi":"10.1109/ICCCN.2014.6911864","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911864","url":null,"abstract":"Performance evaluation of mobile networks needs accurate simulation set up including realistic characteristics. The most important issue in mobile networks' simulation is the mobility of the nodes. Since mobile nodes usually are carried by humans, thus, nodes mobility should be modelized as human movement. To the best of our knowledge, none of the existing mobility models have the ability to modelize all the human movement characteristics. In this paper, a new mobility model has been proposed based on the human mobility data collected for more than 6000 hours. The new model captures human mobility properties by introducing hotspot zones, using a graph of hotspot zones as the input area map, dividing day time to some periods and modeling various speeds in different times and spaces. Moreover, it models some other important human mobility features that had been modeled in previous works. To evaluate the performance of the proposed model, it is compared with real collected data.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new interference model for the IEEE 802.22 cognitive WRAN","authors":"Yanxiao Zhao, Md Nashid Anjum, Min Song","doi":"10.1109/ICCCN.2014.6911747","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911747","url":null,"abstract":"The IEEE 802.22 cognitive Wireless Regional Area Networks (WRAN) uses cognitive radio technique to allow Secondary Users (SUs) to opportunistically share the TV bands with TV broadcast service on a non-interfering basis and hence improve the spectrum utilization. WRAN employs Orthogonal Frequency Division Multiplexing (OFDM) technology for transmission and thus is sensitive to inter-carrier interference. So one of the challenging issues in WRAN performance analysis is the interference analysis from SUs. Existing research on interference primarily focuses on the co-channel interference. The study of inter-carrier interference in WRAN has not received considerable attention. In this paper, we design a new interference model for IEEE 802.22 cognitive WRAN that incorporates both the co-channel interference and inter-carrier interference. We first examine the interference in the context of one SU, and then study the aggregate interference in the context of multiple SUs. Existing work on studying the aggregate interference is to derive its probability density function, which is known computationally intensive. In this paper, we investigate the aggregate interference from a new perspective. Instead of deriving the probability density function, we calculate the aggregate interference by estimating the maximum number of interfering SUs. Our results suggest that the maximum number typically ranges from 6 to 10 depending on the network configurations. This finding significantly simplifies the interference estimation process. To verify the new interference model, comprehensive simulations are performed. Results confirm that the inter-carrier interference cannot be ignored especially when a high frequency offset is present. The maximum number of SUs and its effectiveness are also validated.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of energy aware big data computing measurements, benchmark methods and performance analysis","authors":"Zane Wei, D. Ren","doi":"10.1109/ICCCN.2014.6911835","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911835","url":null,"abstract":"In this paper we present a brief overview of the current benchmarks for energy efficiency as a way of keeping data centers as green as possible. To support energy management, this paper covers power and energy measurements, benchmarking and analysis in big data processing. The architecture and infrastructure challenges facing energy-aware data centers are summarized. Based on existing technologies, we review the methodologies used in power analysis and system energy optimization in research and reports relating to power benchmarks and energy efficiency improvements and awareness. Our main aim is to highlight the importance of this area in current research.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SLA evaluation in cloud-based data-centric distributed services","authors":"K. Ravindran, Michael Iannelli","doi":"10.1109/ICCCN.2014.6911762","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911762","url":null,"abstract":"Given the business mode of offering computing services to customers in a cloud setting, a major question arises: how good are the services of a cloud provider when compared to that of other providers. The paper attempts to answer the question by describing a methodology to measure the various cloud parameters (such as VM cycles and number of VM instances) at run-time and map them onto meaningful service-level attributes. The paper provides a concrete definition of the service attributes experienced by the client application: such as availability, agility, and elasticity, in terms of the underlying cloud infrastructure parameters (i.e., VM instances and network bandwidth). Since the IaaS parameters are hard to measure directly, we resort to a measurement methodology that maps the client-visible PaaS-layer service attributes onto the underlying IaaS parameters exported by the cloud provider. Our measurement methodology satisfies the requirements of cloud testing: stealthiness and non-intrusiveness, while minimizing the measurement overhead. The methodology is tested using a replicated image data store implementation on the PlanetLab.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"40 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121004623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An incentive protocol for distributed dynamic P2P video-on-demand streaming","authors":"Wenbin Tang, Xiaowei Wu, T-H. Hubert Chan","doi":"10.1109/ICCCN.2014.6911874","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911874","url":null,"abstract":"P2P file streaming has become very popular in online video sharing. Under the video on demand (VoD) setting, peers in the network may be interested in different portions of the same video. It is a new challenge to distribute the server load to peers under the VoD setting while at the same time maintaining the streaming performance, i.e., low latency and good fluency. Our approach is to use techniques in social recommendation to spread information on which portions are currently popular. However, peers might not always reveal the truth, because of privacy issues or selfish behavior. In this paper, we describe and discuss a synchronized large-scale P2P VoD system in which each peer can only communicate with one other peer in one round. We assume the video to be streamed is divided into M consecutive chunks and only one chunk can be transmitted due to network bandwidth every communication. We decentralize the whole system such that each peer has no extra information about the network or how other peers behave, and can only communicate with its own neighbors independently without the help of tracker to obtain robustness. Moreover, the model we consider is fully dynamic: peers leave and join the network frequently. We show by experiment that even under the bounded connection, bounded transmission and distributed setting, our protocol ensures that almost all peers in the dynamic P2P VoD network can achieve low latency and good fluency in different kinds of network topologies. We also analyze the streaming performance when peers behave differently (selfish vs. unselfish). We show that peers have little incentive to be selfish in our protocol, which means that our protocol is in a sense self-enforcing.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130613861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the fractal nature of individual user netflow data","authors":"L. Malott, S. Chellappan","doi":"10.1109/ICCCN.2014.6911837","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911837","url":null,"abstract":"Modeling and characterizing Internet traffic has been a widely studied problem since the conception of the Internet. The self-similar, bursty nature of the traffic has led to a number of conventional statistical models that unfortunately provide relatively weak modeling power. Recently, fractal analysis techniques have emerged to better characterize and model Internet traffic data. However, past research studies have focused on describing and quantifying the fractal nature of Internet traffic on user groups, instead of a single user. In this paper the authors investigate the issue of individual users exhibiting fractal (self-similar behavior) behavior across multiple application types. Using real Internet traffic traces (collected via Net-Flow logs) collected at a college campus for 30 days, our investigations reveal that in a number of application categories (http, chatting, p2p, email etc.) at least one user exhibits long-range correlations typical of fractal behavior. Of the 10 application groups, 7 had over 80% of users demonstrating self-similar behavior with 3 of those groups having > 98%. Potential benefits of our study in the realm of smart health and network security, by reducing the dimensionality of large Internet traffic datasets, are discussed.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131928062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic embedding of virtual networks in hybrid optical-electrical datacenters","authors":"S. Hegde, Raksha Srinivas, D. Divakaran, G. Mohan","doi":"10.1109/ICCCN.2014.6911749","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911749","url":null,"abstract":"A promising development in the design of datacenters is the hybrid network architecture consisting of both optical and electrical elements. In this context, the joint problem of bandwidth allocation and VM-placement, a problem that only recently received attention in all-electrical datacenter networks, poses new and different challenges not addressed yet in hybrid datacenters. In particular, we foresee two issues: (i) the number of edge-switches that can be simultaneously reached using optical paths from an edge-switch is limited by the switch size, (ii) the dynamic creation of optical paths can potentially establish a constrained optical network topology leading to poor performance. We abstract the requests of tenants as virtual networks, and study the problem of embedding virtual networks on a hybrid datacenter, which translates to the joint problem of bandwidth allocation and placement such that the topology constraints of virtual networks are satisfied. We develop and analyse two algorithms for embedding dynamically arriving virtual network demands on a hybrid optical-electrical datacenter. Through simulations, we demonstrate the effectiveness of not only exploiting the already established optical paths, but also of using electrical network in embedding requests of virtual networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}