11,829 research outputs found
Less-than-Best-Effort capacity sharing over high BDP networks with LEDBAT
There has been a renewed interest at the Internet Engineering Task Force (IETF) in using Less-than-Best Effort (LBE) methods for background applications. IETF recently published a RFC for Low Extra Delay Background Transport (LEDBAT), a congestion control algorithm for LBE transmissions. This paper provides an analysis of LEDBAT performance over congested large bandwidth X delay product (LBDP) networks, and assesses the validity of having a fixed target queuing time. In particular, we lead a study of the impact of this target queuing delay when LEDBAT is used over 4G satellite networks. The rationale is to explore the possibility to grab the unused 4G satellite links' capacity to carry non-commercial traffic. We show that this is achievable with LEDBAT. However, depending on the fluctuation of the load, performance improvements could be obtained by properly setting the target value. We generalize this evaluation over different congested LBDP networks and confirm that the target value might need to be adjusted to networks' and traffic's characteristics. Further work will study whether and how this parameter should be dynamically adapted, and LEDBAT's congestion control improved
Modeling the interdependency of low-priority congestion control and active queue management
Recently, a negative interplay has been shown to arise when scheduling/AQM
techniques and low-priority congestion control protocols are used together:
namely, AQM resets the relative level of priority among congestion control
protocols. This work explores this issue by (i) studying a fluid model that
describes system dynamics of heterogeneous congestion control protocols
competing on a bottleneck link governed by AQM and (ii) proposing a system
level solution able to reinstate priorities among protocols.Comment: 9 page
FLOWER - Fuzzy lower than-best effort transport protocol
We present a new delay-based transport protocol named FLOWER, that aims at providing a Lower-than-Best-Effort (LBE) service. The objective is to propose an alternative to the Low Extra Delay Background Transport (LEDBAT) widely deployed within the official BitTorrent client. Indeed, besides its intra-fairness problem, known as latecomer unfairness, LEDBAT can be too aggressive against TCP, making it ill suited for providing LBE services over certain networks such as constrained wireless networks. By using a fuzzy controller to modulate the sending rate, FLOWER aims to solve LEDBAT issues while fulfilling the role of a LBE protocol. Our simulation results show that FLOWER can carry LBE traffic in network scenarios where LEDBAT cannot while solving the latecomer unfairness problem. Finally, the presented algorithm is simple to implement and does not require complex computation that would prevent its deployment
Issues in providing a reliable multicast facility
Issues involved in point-to-multipoint communication are presented and the literature for proposed solutions and approaches surveyed. Particular attention is focused on the ideas and implementations that align with the requirements of the environment of interest. The attributes of multicast receiver groups that might lead to useful classifications, what the functionality of a management scheme should be, and how the group management module can be implemented are examined. The services that multicasting facilities can offer are presented, followed by mechanisms within the communications protocol that implements these services. The metrics of interest when evaluating a reliable multicast facility are identified and applied to four transport layer protocols that incorporate reliable multicast
PBE-CC: Congestion Control via Endpoint-Centric, Physical-Layer Bandwidth Measurements
Wireless networks are becoming ever more sophisticated and overcrowded,
imposing the most delay, jitter, and throughput damage to end-to-end network
flows in today's internet. We therefore argue for fine-grained mobile
endpoint-based wireless measurements to inform a precise congestion control
algorithm through a well-defined API to the mobile's wireless physical layer.
Our proposed congestion control algorithm is based on Physical-Layer Bandwidth
measurements taken at the Endpoint (PBE-CC), and captures the latest 5G New
Radio innovations that increase wireless capacity, yet create abrupt rises and
falls in available wireless capacity that the PBE-CC sender can react to
precisely and very rapidly. We implement a proof-of-concept prototype of the
PBE measurement module on software-defined radios and the PBE sender and
receiver in C. An extensive performance evaluation compares PBE-CC head to head
against the leading cellular-aware and wireless-oblivious congestion control
protocols proposed in the research community and in deployment, in mobile and
static mobile scenarios, and over busy and quiet networks. Results show 6.3%
higher average throughput than BBR, while simultaneously reducing 95th
percentile delay by 1.8x
Solutions and Tools for Secure Communication in Wireless Sensor Networks
Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability.
As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase.
This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures
An experimental evaluation of LEDBAT++
LEDBAT++ is the evolution of LEDBAT, a congestion control algorithm originally designed to provide lessthan-
best-effort transport on the Internet. LEDBAT++ aims to address a number of shortcomings present in
LEDBAT, including late-comer advantage, latency drift, competition on equal grounds with best effort traffic
in the presence of small buffers and difficulties experienced while measuring the variations on the delay.
In this paper, we perform an experimental evaluation of LEDBAT++ using the Windows Serverâs LEDBAT++
implementation. We find that while LEDBAT++ overcomes all the limitations identified in LEDBAT, the change
introduced in LEDBAT++ to do so results in a performance penalty that prevents LEDBAT++ flows to seize
all the available capacity when there is no competing traffic. We propose two simple modifications to the
LEDBAT++ algorithm that would address the identified issues and reduce the penalty.This work has been partially supported by the EU EC through the NGI Pointer RIM project, Grant 871528 , and the Madrid Government (Comunidad de Madrid-Spain) under the Multiannual Agreement with UC3M in the line of Excellence of University Professors (EPUC3M21), and in the context of the V PRICIT (Regional Programme of Research and Technological Innovation)
- âŠ