The effects of active queue management and explicit congestion notification on web performance
We present an empirical study of the effects of active queue management (AQM) and explicit congestion notification (ECN) on the distribution of response times experienced by users browsing the Web. Three prominent AQM designs are considered: the ...
Stability of multi-path dual congestion control algorithms
This paper investigates fair, scalable, stable congestion controls which achieve high bandwidth utilization over networks operating multi-path routing. It aims to take advantage of path diversity to achieve efficient bandwidth allocation without causing ...
Distributed rate allocation for inelastic flows
A common assumption behind most of the recent research on network rate allocation is that traffic flows are elastic, which means that their utility functions are concave and continuous and that there is no hard limit on the rate allocated to each flow. ...
A configurable and extensible transport protocol
The ability to configure transport protocols from collections of smaller software modules allows the characteristics of the protocol to be customized for a specific application or network technology. This paper describes a configurable transport ...
Implications of autonomy for the expressiveness of policy routing
Thousands of competing autonomous systems must cooperate with each other to provide global Internet connectivity. Each autonomous system (AS) encodes various economic, business, and performance decisions in its routing policy. The current interdomain ...
Avoiding transient loops during the convergence of link-state routing protocols
When using link-state protocols such as OSPF or IS-IS, forwarding loops can occur transiently when the routers adapt their forwarding tables as a response to a topological change. In this paper, we present a mechanism that lets the network converge to ...
On shortest path representation
Lately, it has been proposed to use shortest path first routing to implement Traffic Engineering in IP networks. The idea is to set the link weights so that the shortest paths, and the traffic thereof, follow the paths designated by the operator. ...
Assessing network service profitability: modeling from market science perspective
Network service providers regularly conduct network planning and upgrade processes to keep their businesses profitable. The effectiveness of a network upgrade/planning decision is intrinsically tied to the ability of a provider to retain and grow its ...
RT oblivious erasure correcting
An erasure correcting scheme is rateless if it is designed to tolerate any pattern of packet loss and reveal the transmitted information after a certain number of packets is received. On the one hand, transmission schemes that use rateless erasure ...
Fair resource allocation in wireless networks using queue-length-based scheduling and congestion control
We consider the problem of allocating resources (time slots, frequency, power, etc.) at a base station to many competing flows, where each flow is intended for a different receiver. The channel conditions may be time-varying and different for different ...
Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks
In ad hoc wireless networks, it is crucial to minimize power consumption while maintaining key network properties. This work studies power assignments of wireless devices that minimize power while maintaining k-fault tolerance. Specifically, we require ...
Modeling and optimization of transmission schemes in energy-constrained wireless sensor networks
We consider a wireless sensor network with energy constraints. We model the energy consumption in the transmitter circuit along with that for data transmission. We model the bottom three layers of the traditional networking stack--the link layer, the ...
Distributed optimal contention window control for elastic traffic in single-cell wireless LANs
This paper presents a theoretical study on distributed contention window control algorithms for achieving arbitrary bandwidth allocation policies and efficient channel utilization. By modeling different bandwidth allocation policies as an optimal ...
Inducing multiscale clustering using multistage MAC contention in CDMA ad hoc networks
This paper proposes a new principle for designing MAC protocols for CDMA-based ad hoc networks-inducing spatial clustering in contending transmitters/receivers. We first highlight the advantages of CDMA in handling quality of service (QoS) requirements, ...
Designing routes for source coding with explicit side information in sensor networks
In this paper, we study the problem of designing routes for source coding with explicit side information (i.e., with side information at both the encoder and the decoder) in sensor networks. Two difficulties in constructing such data-centric routes are ...
Radio planning of wireless local area networks
In this paper we propose mathematical models to tackle the WLAN planning problem. Our approach aims at maximizing network efficiency by taking into account the inter-AP domain interference and the access mechanism. Both the single-channel and the ...
Measurement-based characterization of IP VPNs
Virtual Private Networks (VPNs) provide secure and reliable communication between customer sites. With the increase in number and size of VPNs, providers need efficient provisioning techniques that adapt to customer demand by leveraging a good ...
A network calculus with effective bandwidth
This paper establishes a link between two principal tools for the analysis of network traffic, namely, effective bandwidth and network calculus. It is shown that a general version of effective bandwidth can be expressed within the framework of a ...
Exact GPS simulation and optimal fair scheduling with logarithmic complexity
Generalized Processor Sharing (GPS) is a fluid scheduling policy providing perfect fairness over both constant-rate and variable-rate links. The minimum deviation (lead/lag) with respect to the GPS service achievable by a packet scheduler is one maximum ...
Fast, memory efficient flow rate estimation using runs
Per-flow network traffic measurements are needed for effective network traffic management, network performance assessment, and detection of anomalous network events such as incipient denial-of-service (DoS) attacks. Explicit measurement of per-flow ...
A framework for evaluating the performance of cluster algorithms for hierarchical networks
Table-driven routing algorithms in flat networks have the scalability problem due to the need for global topology updates. To reduce update cost, networks are hierarchically organized. Clustering algorithms organize flat networks into hierarchical ...
Distributed algorithms for secure multipath routing in attack-resistant networks
To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple paths so that intruders require much more resources to mount successful ...
Building an application-aware IPsec policy system
As a security mechanism at the network-layer, the IP security protocol (IPsec) has been available for years, but its usage is limited to Virtual Private Networks (VPNs). The end-to-end security services provided by IPsec have not been widely used. To ...
Hierarchical group access control for secure multicast communications
Many group communications require a security infrastructure that ensures multiple levels of access control for group members. While most existing group key management schemes are designed for single level access control, we present a multi-group key ...
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
We address the problem of resource-efficient access control for group communications in wireless ad hoc networks. Restricting the access to group data can be reduced to the problem of securely distributing cryptographic keys to group members, known as ...
Optimal scheduling and routing for maximum network throughput
In this paper we consider packet networks loaded by admissible traffic patterns, i.e., by traffic patterns that, if optimally routed, do not overload network resources. We prove that simple distributed dynamic routing and scheduling algorithms based ...
An holistic framework for regular virtual topology design
A bifurcated approach is typically adopted to the regular virtual topology design problem. By exploiting key metrics that affect optimization solutions, it is shown that easily computed parameters, pertaining to the spread in inter-nodal distances and ...
WDM optical interconnects: a balanced design approach
In this paper, we develop a new design approach to wavelength division multiplexing (WDM) optical interconnects with the objective of designing cost-effective and scalable interconnects. Our design philosophy strikes a balance between switching and ...
Reliability assessment of optical p-cycles
Two recovery techniques suited for the Next Generation Internet are studied: traditional protection rings (BLSRs) and a novel, preconfigured protection cycles (p-cycles) technique. Theoretical formulas describing the reliability function as well as Mean ...
A 10/7 + ε approximation for minimizing the number of ADMs in SONET rings
SONET add/drop multiplexers (ADMs) are dominant cost factors in WDM SONET rings. Whereas most previous papers on the topic concentrated on the number of wavelengths assigned to a given set of lightpaths, more recent papers argue that the number of ADMs ...