58 research outputs found

    Datacenter Traffic Control: Understanding Techniques and Trade-offs

    Get PDF
    Datacenters provide cost-effective and flexible access to scalable compute and storage resources necessary for today's cloud computing needs. A typical datacenter is made up of thousands of servers connected with a large network and usually managed by one operator. To provide quality access to the variety of applications and services hosted on datacenters and maximize performance, it deems necessary to use datacenter networks effectively and efficiently. Datacenter traffic is often a mix of several classes with different priorities and requirements. This includes user-generated interactive traffic, traffic with deadlines, and long-running traffic. To this end, custom transport protocols and traffic management techniques have been developed to improve datacenter network performance. In this tutorial paper, we review the general architecture of datacenter networks, various topologies proposed for them, their traffic properties, general traffic control challenges in datacenters and general traffic control objectives. The purpose of this paper is to bring out the important characteristics of traffic control in datacenters and not to survey all existing solutions (as it is virtually impossible due to massive body of existing research). We hope to provide readers with a wide range of options and factors while considering a variety of traffic control mechanisms. We discuss various characteristics of datacenter traffic control including management schemes, transmission control, traffic shaping, prioritization, load balancing, multipathing, and traffic scheduling. Next, we point to several open challenges as well as new and interesting networking paradigms. At the end of this paper, we briefly review inter-datacenter networks that connect geographically dispersed datacenters which have been receiving increasing attention recently and pose interesting and novel research problems.Comment: Accepted for Publication in IEEE Communications Surveys and Tutorial

    Just a Second -- Scheduling Thousands of Time-Triggered Streams in Large-Scale Networks

    Full text link
    Deterministic real-time communication with bounded delay is an essential requirement for many safety-critical cyber-physical systems, and has received much attention from major standardization bodies such as IEEE and IETF. In particular, Ethernet technology has been extended by time-triggered scheduling mechanisms in standards like TTEthernet and Time-Sensitive Networking. Although the scheduling mechanisms have become part of standards, the traffic planning algorithms to create time-triggered schedules are still an open and challenging research question due to the problem's high complexity. In particular, so-called plug-and-produce scenarios require the ability to extend schedules on the fly within seconds. The need for scalable scheduling and routing algorithms is further supported by large-scale distributed real-time systems like smart energy grids with tight communication requirements. In this paper, we tackle this challenge by proposing two novel algorithms called Hierarchical Heuristic Scheduling (H2S) and Cost-Efficient Lazy Forwarding Scheduling (CELF) to calculate time-triggered schedules for TTEthernet. H2S and CELF are highly efficient and scalable, calculating schedules for more than 45,000 streams on random networks with 1,000 bridges as well as a realistic energy grid network within sub-seconds to seconds

    Age-of-Information in Clocked Networks

    Full text link
    We derive key features of the Age-of-Information distribution in a system whose activities are strictly limited to periodic instances on a global time grid. In particular, one agent periodically generates updates while the other agent periodically uses the most recently received of those updates. Likewise, transmission of those updates over a network can only occur periodically. All periods may differ. We derive results for two different models: a basic one in which the mathematical problems can be handled directly and an extended model which, among others, can also account for stochastic transmission failure, making the results applicable to instances with wireless communication. For both models, a suitable approximation for the expected Age-of-Information and an upper bound for its largest occurring value are developed. For the extended model (which is the more relevant one from a practical standpoint) we also present numerical results for the distribution of the approximation error for numerous parameter choices

    Adaptive buffer power save mechanism for mobile multimedia streaming

    Get PDF
    With the proliferation of wireless networks, the use of mobile devices to stream multimedia is growing in popularity. Although the devices are improving in that they are becoming smaller, more complex and capable of running more applications than ever before, there is one aspect of them that is lagging behind. Batteries have seen little development, even though they are one of the most important parts of the devices. Multimedia streaming puts extra pressure on batteries, causing them to discharge faster. This often means that streaming tasks can not be completed, resulting in significant user dissatisfaction. Consequently, effort is required to devise mechanisms to enable and increase in battery life while streaming multimedia. In this context, this thesis presents a novel algorithm to save power in mobile devices during the streaming of multimedia content. The proposed Adaptive-Buffer Power Save Mechanism (AB-PSM) controls how the data is sent over wireless networks, achieving significant power savings. There is little or no effect on the user and the algorithm is very simple to implement. The thesis describes tests which show the effectiveness of AB-PSM in comparison with the legacy power save mechanism present in IEEE 802.11. The thesis also presents a detailed overview of the IEEE 802.11 protocols and an in-depth literature review in the area of power saving during multimedia streaming. A novel analysis of how the battery of a mobile device is affected by multimedia streaming in its different stages is given. A total-power-save algorithm is then described as a possible extension to the Adaptive-Buffer Power Save Mechanism

    Low-latency Networking: Where Latency Lurks and How to Tame It

    Full text link
    While the current generation of mobile and fixed communication networks has been standardized for mobile broadband services, the next generation is driven by the vision of the Internet of Things and mission critical communication services requiring latency in the order of milliseconds or sub-milliseconds. However, these new stringent requirements have a large technical impact on the design of all layers of the communication protocol stack. The cross layer interactions are complex due to the multiple design principles and technologies that contribute to the layers' design and fundamental performance limitations. We will be able to develop low-latency networks only if we address the problem of these complex interactions from the new point of view of sub-milliseconds latency. In this article, we propose a holistic analysis and classification of the main design principles and enabling technologies that will make it possible to deploy low-latency wireless communication networks. We argue that these design principles and enabling technologies must be carefully orchestrated to meet the stringent requirements and to manage the inherent trade-offs between low latency and traditional performance metrics. We also review currently ongoing standardization activities in prominent standards associations, and discuss open problems for future research

    Parallel and Distributed Computing

    Get PDF
    The 14 chapters presented in this book cover a wide variety of representative works ranging from hardware design to application development. Particularly, the topics that are addressed are programmable and reconfigurable devices and systems, dependability of GPUs (General Purpose Units), network topologies, cache coherence protocols, resource allocation, scheduling algorithms, peertopeer networks, largescale network simulation, and parallel routines and algorithms. In this way, the articles included in this book constitute an excellent reference for engineers and researchers who have particular interests in each of these topics in parallel and distributed computing

    Efficient Passive Clustering and Gateways selection MANETs

    Get PDF
    Passive clustering does not employ control packets to collect topological information in ad hoc networks. In our proposal, we avoid making frequent changes in cluster architecture due to repeated election and re-election of cluster heads and gateways. Our primary objective has been to make Passive Clustering more practical by employing optimal number of gateways and reduce the number of rebroadcast packets
    corecore