177 research outputs found
Recommended from our members
The Impact of Multicast Layering on Network Fairness
Many definitions of fairness for multicast networks assume that sessions are single-rate, requiring that each multicast session trans- mits data to all of its receivers at the same rate. These defini- tions do not account for multi-rate approaches, such as layering, that permit receiving rates within a session to be chosen indepen- dently. We identify four desirable fairness properties for multicast networks, derived from properties that hold within the max-min fair allocations of unicast networks. We extend the definition of multicast max-min fairness to networks that contain multi-rate sessions, and show that all four fairness properties hold in a multi- rate max-min fair allocation, but need not hold in a single-rate max-min fair allocation. We then show that multi-rate max-min fair rate allocations can be achieved via intra-session coordinated joins and leaves of multicast groups. However, in the absence of coordination, the resulting max-min fair rate allocation uses link bandwidth inefficiently, and does not exhibit some of the desir- able fairness properties. We evaluate this inefficiency for several layered multi-rate congestion control schemes, and find that, in a protocol where the sender coordinates joins, this inefficiency has minimal impact on desirable fairness properties. Our results indicate that sender-coordinated layered protocols show promise for achieving desirable fairness properties for allocations in large- scale multicast networks
Optimal Caching and Routing in Hybrid Networks
Hybrid networks consisting of MANET nodes and cellular infrastructure have
been recently proposed to improve the performance of military networks. Prior
work has demonstrated the benefits of in-network content caching in a wired,
Internet context. We investigate the problem of developing optimal routing and
caching policies in a hybrid network supporting in-network caching with the
goal of minimizing overall content-access delay. Here, needed content may
always be accessed at a back-end server via the cellular infrastructure;
alternatively, content may also be accessed via cache-equipped "cluster" nodes
within the MANET. To access content, MANET nodes must thus decide whether to
route to in-MANET cluster nodes or to back-end servers via the cellular
infrastructure; the in-MANET cluster nodes must additionally decide which
content to cache. We model the cellular path as either i) a
congestion-insensitive fixed-delay path or ii) a congestion-sensitive path
modeled as an M/M/1 queue. We demonstrate that under the assumption of
stationary, independent requests, it is optimal to adopt static caching (i.e.,
to keep a cache's content fixed over time) based on content popularity. We also
show that it is optimal to route to in-MANET caches for content cached there,
but to route requests for remaining content via the cellular infrastructure for
the congestion-insensitive case and to split traffic between the in-MANET
caches and cellular infrastructure for the congestion-sensitive case. We
develop a simple distributed algorithm for the joint routing/caching problem
and demonstrate its efficacy via simulation.Comment: submitted to Milcom 201
Assessing the fidelity of COTS 802.11 sniffers
Proceedings of: 2009 IEEE INFOCOM, 19 – 25 April 2009, Rio de Janeiro, BrazilRecent measurement studies have analyzed WLAN performance by means of wireless sniffers that passively capture transmitted frames. Also, for relatively large (enterprise) WLAN scenarios, previous work has investigated multi-sniffer deployments with devices placed far apart in order to capture all traffic in the network (even frames transmitted simultaneously by different nodes at non-interfering locations). However, for both these single- and multi-sniffer scenarios, little attention has been given to the fidelity of an individual device, i.e., the ability of a given sniffer to capture all frames that could have been captured by a more faithful device. We assess this fidelity (a term we make precise in this paper) by running controlled experiments inside an anechoic chamber and analyzing the similarities and differences between the trace file from the device under study and those of additional "shadow" devices placed in its close proximity. Our results show that fidelity varies significantly across sniffers, both quantitatively and qualitatively, and that performance may also depend on the nature of the experiment under study and on slight changes of the sniffer position.European Community's Seventh Framework ProgramThis work was funded in part by the National Science Foundation under grants, EEC-0313747 001, ANI-0325868, and EIA-0080119, and by the Ministry of Education and Science of Spain, under a José Castillejo grant, and POSEIDON project (TSI2006-12507-C03-01)Publicad
Recommended from our members
Watch Global, Cache Local: YouTube Network Traffic at a Campus Network - Measurements and Implications
User Generated Content has become very popular since the birth of web services such as YouTube allowing the distribution of such user-produced media content in an easy manner. YouTube-like services are different from existing traditional VoD services because the service provider has only limited control over the creation of new content. We analyze how the content distribution in YouTube is realized and then conduct a measurement study of YouTube traffic in a large university campus network. The analysis of the traffic shows that: (1) No strong correlation is observed between global and local popularity; (2) neither time scale nor user population has an impact on the local popularity distribution; (3) video clips of local interest have a high local popularity. Using our measurement data to drive trace-driven simulations, we also demonstrate the implications of alternative distribution infrastructures on the performance of a YouTube-like VoD service. The results of these simulations show that client-based local caching, P2P-based distribution, and proxy caching can reduce network traffic significantly and allow faster access to video clips
Practical algorithms for gathering stored correlated data in a network
Many sensing systems remotely monitor/measure an environment at several sites, and then report these observations to a central site. We propose and investigate several practical algorithms for joint routing and compression of data files as they are forward from remote nodes to a central site, with the goal of minimizing the communication cost incurred. Our algorithms are practical in that they do not assume that nodes have a priori information about the correlation structure (and resulting compression gains) of the individual measurements at a given sensor or among multiple sensors. Instead, this correlation structure is learned as pieces of the files are routed and jointly compressed on their way to the sink, and routes are adaptively changed as the nodes learn more about the correlation structure of the data
Benefits of Network Coding in Disruption Tolerant Networks
In this report, we investigate the benefits of applying a form of network coding known as Random Linear Coding (RLC) to unicast communications in mobile Disruption Tolerant Networks (DTNs). Under RLC, DTN nodes store and forward random linear combinations of packets as they encounter other DTN nodes. We first consider RLC applied to a single block of K packets where (a) all K packets have the same source and destination, (b) the K packets have different sources but a common destination and (c) the K packets each have a different source/destination pair; we also consider the case where blocks of K packets arrive according to a Poisson bulk arrival process. The performance metric of interest is the delay until the last packet in a block is delivered. We show that for the single block case, when bandwidth is constrained, applying RLC over packets destined to the same node achieves (with high probability) the minimum delay to deliver the block of data. We find through simulation that the benefit over non-network-coded packet forwarding increases further when buffer space within DTN nodes is limited. For the case of multiple blocks, our simulations show that RLC offers only slight improvement over the non-coded scenario when only bandwidth is constrained, but more significant benefits when both bandwidth and buffers are constrained. We remark that when the network is relatively loaded, the RLC scheme achieves improvements over non-coded schemes only if the spreading of the information is appropriately controlled
On Optimal Packet Routing in Deterministic DTNs
International audienceIn this paper, we investigate the problem of determining the routing that minimizes the maximum/average delivery time or the maximum/average delivery delay for a set of packets in a deterministic Delay Tolerant Network, i.e. in a network for which all the nodes' transmission opportunities are known in advance. While the general problem with multiple sources and multiple destinations is NP-hard, we present a polynomial time algorithm that can efficiently compute the optimal routing in the case of a single destination or of a single packet that needs to be routed to multiple destinations
Benefits of Network Coding in Disruption Tolerant Networks
International audienceIn this paper, we investigate the benefits of applying a form of network coding known as random linear coding (RLC) to unicast applications in disruption-tolerant networks (DTNs). Under RLC, nodes store and forward random linear combinations of packets as they encounter each other. For the case of a single group of packets originating from the same source and destined for the same destination, we prove a lower bound on the probability that the RLC scheme achieves the minimum time to deliver the group of packets. Although RLC significantly reduces group delivery delays, it fares worse in terms of average packet delivery delay and network transmissions. When replication control is employed, RLC schemes reduce group delivery delays without increasing the number of transmissions. In general, the benefits achieved by RLC are more significant under stringent resource (bandwidth and buffer) constraints, limited signaling, highly dynamic networks, and when applied to packets in the same flow. For more practical settings with multiple continuous flows in the network, we show the importance of deploying RLC schemes with a carefully tuned replication control in order to achieve reduction in average delay, which is observed to be as large as 20% when buffer space is constrained
- …