Strong performance guarantees for asynchronous buffered crossbar scheduler
Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance guarantees now makes it possible to engineer systems that perform well, even ...
High-bandwidth network memory system through virtual pipelines
As network bandwidth increases, designing an effective memory system for network processors becomes a significant challenge. The size of the routing tables, the complexity of the packet classification rules, and the amount of packet buffering required ...
Source models for speech traffic revisited
In this paper, we analyze packet traces of widely used voice codecs and present analytical source models which describe their output by stochastic processes. Both the G.711 and the G.729.1 codec yield periodic packet streams with a fixed packet size, ...
PRIME: peer-to-peer receiver-driven mesh-based streaming
The success of file swarming mechanisms such as BitTorrent has motivated a new approach for scalable streaming of live content that we call mesh-based Peer-to-Peer (P2P) streaming. In this approach, participating end-systems (or peers) form a randomly ...
Packet pacing in small buffer optical packet switched networks
In the absence of a cost-effective technology for storing optical signals, emerging optical packet switched (OPS) networks are expected to have severely limited buffering capability. To mitigate the performance degradation resulting from small buffers, ...
Single-link failure detection in all-optical networks using monitoring cycles and paths
In this paper, we consider the problem of fault localization in all-optical networks. We introduce the concept of monitoring cycles (MCs) and monitoring paths (MPs) for unique identification of single-link failures. MCs and MPs are required to pass ...
Hybrid wireless-optical broadband access network (WOBAN): network planning using Lagrangean relaxation
The concept of a hybrid wireless-optical broadband access network (WOBAN) is a very attractive one. This is because it may be costly in several situations to run fiber to every home (or equivalent end-user premises) from the telecom central office (CO); ...
Asymptotic connectivity in wireless ad hoc networks using directional antennas
Connectivity is a crucial issue in wireless ad hoc networks (WANETs). Gupta and Kumar have shown that in WANETs using omnidirectional antennas, the critical transmission range to achieve asymptotic connectivity is O(√logn/n) if n nodes are uniformly and ...
The achievable rate region of 802.11-scheduled multihop networks
In this paper, we characterize the achievable rate region for any IEEE 802.11-scheduled static multihop network. To do so, we first characterize the achievable edge-rate region, that is, the set of edge rates that are achievable on the given topology. ...
Understanding the capacity region of the Greedy maximal scheduling algorithm in multihop wireless networks
In this paper, we characterize the performance of an important class of scheduling schemes, called greedy maximal scheduling (GMS), for multihop wireless networks. While a lower bound on the throughput performance of GMS has been well known, empirical ...
Delay analysis for maximal scheduling with flow control in wireless networks with bursty traffic
We consider the delay properties of one-hop networks with general interference constraints and multiple traffic streams with time-correlated arrivals. We first treat the case when arrivals are modulated by independent finite state Markov chains. We show ...
Opportunistic use of client repeaters to improve performance of WLANs
Currently deployed IEEE 802.11 WLANs (Wi-Fi networks) share access point (AP) bandwidth on a per-packet basis. However, various stations communicating with the AP often have different signal qualities, resulting in different transmission rates. This ...
On accurate and asymmetry-aware measurement of link quality in wireless mesh networks
This paper presents a highly efficient and accurate link-quality measurement framework, called Efficient and Accurate link-quality monitoR (EAR), for multihop wireless mesh networks (WMNs) that has several salient features. First, it exploits three ...
Error control in wireless sensor networks: a cross layer analysis
Error control is of significant importance for Wireless Sensor Networks (WSNs) because of their severe energy constraints and the low power communication requirements. In this paper, a cross-layer methodology for the analysis of error control schemes in ...
An economic framework for dynamic spectrum access and service pricing
The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition ...
Design and performance of wireless data gathering networks based on unicast random walk routing
Wireless environment monitoring applications with significantly relaxed quality-of-service constraints are emerging. Hence, the possibility to use rough low knowledge routing in sensor networks to reduce hardware resource and software complexity is ...
Virtual-coordinate-based delivery-guaranteed routing protocol in wireless sensor networks
In this paper, we first propose a method, ABVCap, to construct a virtual coordinate system in a wireless sensor network. ABVCap assigns each node multiple 5-tuple virtual coordinates. Subsequently, we introduce a protocol, ABVCap routing, to route ...
Scaling laws for data-centric storage and querying in wireless sensor networks
We use a constrained optimization framework to derive scaling laws for data-centric storage and querying in wireless sensor networks. We consider both unstructured sensor networks, which use blind sequential search for querying, and structured sensor ...
PRESTO: feedback-driven data management in sensor networks
This paper presents PRESTO, a novel two-tier sensor data management architecture comprising proxies and sensors that cooperate with one another for acquiring data and processing queries. PRESTO proxies construct time-series models of observed trends in ...
Rethinking enterprise network control
- Martín Casado,
- Michael J. Freedman,
- Justin Pettit,
- Jianying Luo,
- Natasha Gude,
- Nick McKeown,
- Scott Shenker
This paper presents Ethane, a new network architecture for the enterprise. Ethane allows managers to define a single network-wide fine-grain policy and then enforces it directly. Ethane couples extremely simple flow-based Ethernet switches with a ...
Scalable network-layer defense against internet bandwidth-flooding attacks
In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic ...
On the placement of infrastructure overlay nodes
Overlay routing has emerged as a promising approach to improving performance and reliability of Internet paths. To fully realize the potential of overlay routing under the constraints of deployment costs in terms of hardware, network connectivity and ...
Distributed iterative optimal resource allocation with concurrent updates of routing and flow control variables
Consider a set of active elastic sessions over a network. Session traffic is routed at each hop (potentially through multiple network paths) based only on its destination. Each session is associated with a concave increasing utility function of its ...
Markovian arrival process parameter estimation with group data
This paper addresses a parameter estimation problem of Markovian arrival process (MAP). In network traffic measurement experiments, one often encounters the group data where arrival times for a group are collected as one bin. Although the group data are ...
The role of PASTA in network measurement
Poisson Arrivals SeeTimeAverages (PASTA) is a well-known property applicable to many stochastic systems. In active probing, PASTA is invoked to justify the sending of probe packets (or trains) at Poisson times in a variety of contexts. However, due to ...