Next Generation Internet Networks, 2005最新文献

筛选
英文 中文
Routing with partially disjoint shared path (PDSP) protection 具有部分不相交共享路径(PDSP)保护的路由
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431646
T. Clinker, D. Meško, G. Viola, János Tapolcai
{"title":"Routing with partially disjoint shared path (PDSP) protection","authors":"T. Clinker, D. Meško, G. Viola, János Tapolcai","doi":"10.1109/NGI.2005.1431646","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431646","url":null,"abstract":"We propose two algorithms for dynamic routing of guaranteed bandwidth pipes with shared protection that provide low blocking through thrifty resource usage. We assume that a single working path can be protected by one or multiple protection paths, which are partially or fully disjoint from the working path. This allows better capacity re-use (i.e., better capacity sharing among protection paths). Furthermore, the resources used by the paths affected by the failure, can be also re-used. The significance of the proposed method \"PDSP-LD\" is that we consider the amount of shareable protection capacity of each link, while determining the protection path for all affected demands simultaneously. Therefore it gives optimal routing of shared protection paths in case of any single link failure! The obtained results can be used for routing with protection in SDH/SONET, ATM, MPLS, WR-DWDM (including ASTN/GMPLS) and other networks.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of 'user-oriented' and 'black-box' traffic models for link provisioning 评估“面向用户”和“黑箱”流量模型用于链路配置
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431691
Meent van de Remco, M. Mandjes
{"title":"Evaluation of 'user-oriented' and 'black-box' traffic models for link provisioning","authors":"Meent van de Remco, M. Mandjes","doi":"10.1109/NGI.2005.1431691","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431691","url":null,"abstract":"To offer users a sufficient performance level, network links should be properly provisioned. The required bandwidth capacity may be determined through the use of a model of the real network traffic. In this paper, we study the use of two classes of traffic models: (i) 'user-oriented models', which capture the behavior of individual flows, and (ii) 'black-box models', which statistically describe the superposition of many users (and do not distinguish between individual flows). User-oriented models have the advantage that they allow for sensitivity analysis: the impact of a change in the user parameters (access rate, flow-size distribution) can be assessed. In general, however, our measurements indicated that black-box models are easier to estimate, and yield accurate provisioning guidelines.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Tweak-it: BGP-based interdomain traffic engineering for transit ASs Tweak-it:基于bgp的transit as域间流量工程
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431650
Steve Uhlig, B. Quoitin
{"title":"Tweak-it: BGP-based interdomain traffic engineering for transit ASs","authors":"Steve Uhlig, B. Quoitin","doi":"10.1109/NGI.2005.1431650","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431650","url":null,"abstract":"Today, engineering interdomain traffic in large transit ASs is a difficult task due the opacity of BGP and the interactions between the BGP decision process and IGP routing. In this paper we propose Tweak-it, a tool that, based on the steady-state view of BGP routing inside the AS and the traffic demands of the AS, computes the BGP updates to be sent to the ingress routers of a transit AS to traffic engineer its interdomain traffic over time. Tweak-it is based on two components: 1) a scalable BGP simulator (CBGP) that computes the steady-state behavior of BGP routing and 2) a multiple-objectives evolutionary heuristic that can deal with multiple conflicting objectives as they can occur in real networks. Tweak-it takes the intradomain configuration (IGP weights and topology), BGP messages received from peers, BGP routing policies, and traffic demands. By keeping the state of the routing inside the AS up-to-date and based on the traffic demands, the heuristics computes how to engineer the traffic of the AS while trying to minimize the number of BGP tweakings required.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Enhanced admission control solution for multicasting with DiffServ 使用DiffServ进行多播的增强接纳控制解决方案
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431676
O. Alanen, Mikko Pääkkönen, Mikko Ketola, Timo Hämäläinen, J. Joutsensalo
{"title":"Enhanced admission control solution for multicasting with DiffServ","authors":"O. Alanen, Mikko Pääkkönen, Mikko Ketola, Timo Hämäläinen, J. Joutsensalo","doi":"10.1109/NGI.2005.1431676","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431676","url":null,"abstract":"Multicast admission control in differentiated services network is an important but shortly researched subject. We propose a parameter-based admission control method. The method rejects new multicast join requests that would otherwise decrease the quality experienced by the existing receivers. DiffServ network edge nodes filter join requests and generate new requests. The proposed method is developed as an extension to the DSMCast protocol but could also be adapted to other protocols. In this paper the parameter-based admission control is compared to earlier created, measurement-based admission control methods, as well to situation when no admission control is used.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Marginal productivity index policies for scheduling multiclass delay-/loss-sensitive traffic 多类延迟/丢失敏感流量调度的边际生产率指数策略
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431648
J. Niño-Mora
{"title":"Marginal productivity index policies for scheduling multiclass delay-/loss-sensitive traffic","authors":"J. Niño-Mora","doi":"10.1109/NGI.2005.1431648","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431648","url":null,"abstract":"We address the problem of scheduling transmissions of heterogeneous packet traffic streams on a single link in the setting of a Markovian multiclass queueing model with losses, where every class has a dedicated finite buffer. Some classes correspond to real-time/delay-sensitive traffic (e.g. voice, video) whereas others correspond to nonreal-time/loss-sensitive traffic (e.g. data). Different levels of tolerance to delay and packet loss are modeled by suitable cost rates. The goal is to design well-grounded and tractable scheduling policies that nearly minimize the discounted or average expected cost objective. We develop new dynamic index policies, prescribing to give higher service priority to classes with larger index values, where the priority index of a class measures the marginal productivity of work at its current state. Such index policies are shown to furnish new, insightful structural results.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance modeling of a wireless 4G cell under a GPS scheme with hand off 无线4G蜂窝在GPS方案下的性能建模
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431695
D. Kouvatsos, I. Awan, Y. Li
{"title":"Performance modeling of a wireless 4G cell under a GPS scheme with hand off","authors":"D. Kouvatsos, I. Awan, Y. Li","doi":"10.1109/NGI.2005.1431695","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431695","url":null,"abstract":"A analytic framework is devised, based on the principle of maximum entropy (ME), for the performance modeling of a wireless 4G cell with bursty multimedia traffic with hand off under an efficient MAC protocol with a buffer threshold-based generalized partial sharing (GPS) traffic handling scheme. In this context, an open queueing network model (QNM) is proposed consisting of three interacting multiclass GE-type queueing and delay systems, namely a GE/GE/c/sub 1//c/sub 1/ loss system of IP voice calls, a GE/GE/c/sub 2//N/sub 2//FCFS/CBS(T/sub l/T/sub h/) queueing system of streaming media packets with low (T/sub l/) and high (T/sub h/) buffer thresholds and a GE/GE/l/N/sub 3//PS delay system with a discriminatory PS transfer rule. Analytic ME solutions for the state probabilities of these systems are characterized, subject to appropriate GE-type queueing and delay theoretic constraints and new closed form expressions for the aggregate state and blocking probabilities are determined. Typical numerical examples are included to validate the ME performance metrics against Java-based simulation results and also to study the effect of bursty multiple class traffic upon the performance of the cell.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129173780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Buffer sizes for large multiplexers: TCP queueing theory and instability analysis 大型多路复用器的缓冲区大小:TCP排队理论和不稳定性分析
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431663
G. Raina, D. Wischik
{"title":"Buffer sizes for large multiplexers: TCP queueing theory and instability analysis","authors":"G. Raina, D. Wischik","doi":"10.1109/NGI.2005.1431663","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431663","url":null,"abstract":"In large multiplexers with many TCP flows, the aggregate traffic flow behaves predictably; this is a basis for the fluid model of Misra, Gong and Towsley V. Misra et al., (2000) and for a growing literature on fluid models of congestion control. In this paper we argue that different fluid models arise from different buffer-sizing regimes. We consider the large buffer regime (buffer size is bandwidth-delay product), an intermediate regime (divide the large buffer size by the square root of the number of flows), and the small buffer regime (buffer size does not depend on number of flows). Our arguments use various techniques from queueing theory. We study the behaviour of these fluid models (on a single bottleneck Kink, for a collection of identical long-lived flows). For what parameter regimes is the fluid model stable, and when it is unstable what is the size of oscillations and the impact on goodput? Our analysis uses an extension of the Poincare-Linstedt method to delay-differential equations. We find that large buffers with drop-tail have much the same performance as intermediate buffers with either drop-tail or AQM; that large buffers with RED are better at least for window sizes less than 20 packets; and that small buffers with either drop-tail or AQM are best over a wide range of window sizes, though the buffer size must be chosen carefully. This suggests that buffer sizes should be much much smaller than is currently recommended.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
Performance study of the control and forwarding planes in a high speed MPLS network 高速MPLS网络中控制和转发平面的性能研究
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431677
D. Adami, N. Carlotti, S. Giordano, M. Pagano, M. Repeti
{"title":"Performance study of the control and forwarding planes in a high speed MPLS network","authors":"D. Adami, N. Carlotti, S. Giordano, M. Pagano, M. Repeti","doi":"10.1109/NGI.2005.1431677","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431677","url":null,"abstract":"Multiprotocol label switching (MPLS) was originally conceived to improve the efficiency of packet forwarding in network equipments and it relies on a strict separation between the control and forwarding planes in the network functions as well as in the software and hardware architecture of the routers. The paper presents the results of an experimental study aimed at evaluating the performance of the control and forwarding planes in a metropolitan MPLS network, interconnecting three sites, located in Pisa and equipped with M10 Juniper routers. In particular, experimental tests have been carried out to deeply investigate the behaviour of the network control and forwarding planes in different working conditions.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133328619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auction-based bandwidth trading in a competitive hierarchical market 竞争等级市场中基于拍卖的带宽交易
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431690
M. Bitsaki, G. Stamoulis, C. Courcoubetis
{"title":"Auction-based bandwidth trading in a competitive hierarchical market","authors":"M. Bitsaki, G. Stamoulis, C. Courcoubetis","doi":"10.1109/NGI.2005.1431690","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431690","url":null,"abstract":"We deal with the problem of bandwidth allocation in a two-level hierarchical market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet service providers (ISPs)], who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. As we have already established, this problem can be solved efficiently by means of an incentive compatible mechanism comprising auctions in both levels; the payment rule of the lower-level auction is imposed by the top-level seller. We investigate the properties of the mechanism in case where each of the competing intermediate providers can select the payment rule on his own, under a variety of assumptions on the information possessed by the various players as well as on their level of freedom to act in the market. For one of the cases analyzed we prove that providers have no incentive to deviate from the original payment rule.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IPSec hardware resource requirements evaluation IPSec硬件资源需求评估
Next Generation Internet Networks, 2005 Pub Date : 2005-04-18 DOI: 10.1109/NGI.2005.1431672
Alberto Ferrante, Vincenzo Piuri, J. Owen
{"title":"IPSec hardware resource requirements evaluation","authors":"Alberto Ferrante, Vincenzo Piuri, J. Owen","doi":"10.1109/NGI.2005.1431672","DOIUrl":"https://doi.org/10.1109/NGI.2005.1431672","url":null,"abstract":"IPSec is a suite of protocols that adds security to communications at the IP level. This suite of protocols is becoming more and more important as it is included as mandatory security mechanism in IPv6. In this paper we provide an evaluation of the hardware resources needed for supporting virtual private networking through IPSec. The target system of this study is a home secure gateway, therefore only the tunnel mode is considered. Focus is on ESP protocol, but also some evaluations on AH are provided. We discuss usage of the AES, HMAC-SHA-1, and HMAC-SHA-2 cryptographic algorithms. In this paper we show that enabling IPSec in a 100 Mbit/s network kills its performance in almost every case. In a 10 Mbit/s network the results obtained for performance and CPU usage are much better. An interesting case within this network configuration is that in which IPComp is enabled and used on compressible data: CPU usage grows to 100%, but network throughput rises over the 10 Mbit/s limit, due to data compression. This performance evaluation leads the conclusion that while a hardware crypto-accelerator is really key in reaching high performance, it may also be useful in small, slow systems (e.g. small embedded systems) where it would help improving performance and security.","PeriodicalId":435785,"journal":{"name":"Next Generation Internet Networks, 2005","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信