Load Sharing in Networking Systems
|
|
- Constance Martin
- 6 years ago
- Views:
Transcription
1 Load Sharing in Networking Systems Lukas Kencl Intel Research Cambridge MFF UK Praha,, November 2005 (With lots of help from Weiguang Shi, University of Alberta, and citations from D. Thaler, R. Ravishankar and K. Ross)
2 Outline Intel Research Cambridge Intel Research Cambridge Load sharing in networking systems Problem statement Motivation Imbalance due to traffic properties. Break. Inspiration: distributed Web caching Solutions and properties: Adaptive HRW hashing Adaptive Burst Shifting. Break. Seminar: Q&A, Exercises and Homeworks IR Movies!!! 2
3 Intel Research Cambridge 3
4 Intel R&D Commitment Intel Research: 4 Lablets,, target 80 people worldwide Intel Research Cambridge California Washington Oregon Massachusetts Illinois Pennsylvania New Mexico Swindon Cambridge Shannon Glasgow Barcelona Copenhagen Stockholm Nice Gdansk Braunschweig, Ulm Nizhny Novgorod Sarov Beijing Shanghai China Arizona Haifa Delhi Bangalore Mumbai India Tsukuba Tokyo Over 75 labs & 7000 R&D professionals worldwide 4
5 Intel Research Mission Build the technical leadership, knowledge assets and systems perspective to make Intel a preeminent driver of disruptive information technologies David Tennenhouse Vice President, Corporate Technology Group Director of Research, Intel Corporation 5
6 What is unique about Intel Research? Research is largely exploratory Off roadmap, years out on timeline Innovative collaborative model engaging with key Universities Lablets (Berkeley, Seattle, Pittsburgh, Cambridge) Intel employee facilities co-located on University campus to facilitate collaboration Open Collaborative Agreements signed with Universities Strategic Research Projects (SRP) inside Intel Technology transfer mechanism from open collaborative research Proprietary exploratory research outside scope of any business unitu Alignment of University engagements Research Council, Academic Relations, Labs, Visiting Faculty, Internships!!! 6
7 Intel Research Cambridge (IRC) Established in March 2003 Currently 12 full-time time researchers Visiting faculty, student interns Make sure the smartest work with us: cooperation with Cambridge University, as well as others throughout UK, Europe and elsewhere 7
8 IRC Key Research Areas Optical Packet Switching Virtualisation Xen Para-virtualisation - run modified or new OS on specialised guest architecture Wired Networking CoMo Continuous Monitoring Adaptive methods Anticipate the wireless WIP: from internet to Intairnet wireless access network using multidirectional antennas HAGGLE: mobile ad-hoc networks Ubiquitous computing 8
9 Load Sharing in Networking Systems Problem Statement 9
10 Map packets to processors Incoming Packets Multiple (N) Inputs Multiple (M) Processors Assumptions: Data arrives in packets. Any processor can process any packet. Heterogenous processor capacity μ j. N M Task: Map packets to processors so that load within some measure of balance. 10
11 Packet flows: avoid remapping or out-of-sequence!!! Incoming Packets Multiple (N) Inputs Multiple (M) Processors Assumptions: Data arrives in packetized flows. Any processor can process any packet. Heterogenous processor capacity μ j. N M Task: Load on processors within some measure of balance. Same flow to same processor (reordering, context). Advantage: system optimization. Drawback: complexity, overhead. 11
12 Reduce state maintenance of Flow-to to-processor Mapping Incoming Packet Multiple (N) Inputs 1 Multiple (M) Processors 1 v 2 f ( v ) = flow identifier vector v 4 3 N M Upon packet arrival, a decision is made where to process the packet, based on the flow identifier. A flow-to to-processor mapping f is thus established. 12
13 Acceptable load sharing as a measure of balance Processing load on processor j j (t) Capacity on processor j Workload intensity on processor j j (t) = j (t) / j Total system workload intensity (t) = Σ j (t) / Σ j j Acceptable load sharing: if (t) [ 1 then j, j (t) [ 1, if (t) > 1 then j, j (t) > 1. No single processor is overutilized if the system in total is not overutilized, and vice versa. 13
14 Coefficient of Variation (CV) as a measure of balance Useful, as it takes the scale of measurements out of consideration. 14
15 Minimizing Disruption Possible Goal: Acceptable load sharing without maintaining flow state information and yet minimizing the probability of mapping disruption (flow remapping or reordering). Special Integer Programming Problem: max Σ v Δ v (t) ). Σ j (1{ f(t-δ t)(v) ) = j}. 1{ f(t)(v)= )= j}), while Σ v a v (t) ). 1{ f(t)(v)= )= j} = j (t) [ j, j. v - flow identifier vector in the packet header, f (t) (v) - function mapping flows to processors, changing over time, Δ v (t)c {0,1} - indicator if v has appeared in the intervals (t-2δ t, t t-δ t) and (t-δ t, t), a v (t) - how many times has v appeared in the interval (t-δ t, t), t - iteration interval. We suspect an NP-complete problem use heuristics. 15
16 Summarize Balance load Avoid remapping - or packets out-of of-sequence Minimize overhead 16
17 Load Sharing in Networking Systems Motivation 17
18 Practical Examples Distributed Router, or Parallel Forwarding Engine Server Farm Load Balancer Network Processor Multiple (M) Servers S 1 S 2 Incoming Packet Packet-toserver mapping computation Packet forwarding S M Server Farm Load Balancer 18
19 Network Processor NP Network processor: Pool of multi-threaded threaded forwarding engines Integrated or attached GPP Memories of varying bandwidth and capacity Large parallel programming problem Concurrency Packet order Resource allocation Load balancing At 10 Gbps,, packets arrive every 36 ns!!! Packets SRAM GPP DRAM Pool of Microengines (ME) 19
20 Load Sharing in Networking Systems Traffic properties make balancing difficult 20
21 Traffic Properties Address distribution 32bit address space very unevenly assigned and populated Burstiness Power law 21
22 TCP Traffic is Bursty TCP behaviour: ideal and typical Packets arrive in periodic bursts! 22
23 Networking Traffic Exhibits Power-Law (Zipf-law) Properties P(R)~1/R a Flow popularities in traffic traces Frequency of an event as a function of its rank obeys powerlaw. Popularity of network flows with a close to 1 (from above). 23
24 Power-law leads to imbalance if static mapping (Shi et al, 2004) m - number of processors, K - number of distinct object addresses or flow IDs, p i (0<i<K) - popularity of object i, q j (0<j<m) - number of distinct adresses or flow IDs mapped to processor j 24
25 Conclusion Part I Complex problem Traffic properties work against static solutions 25
26 Break 5 minutes 26
27 Load Sharing in Networking Systems Inspiration: Distributed Web Caching and Web Server Load Balancing 27
28 What is a Distributed Web Cache Internet Intranet Proxy Cache stores Web objects locally Collection of distributed Web caches 28
29 HRW Mapping Intel Research Cambridge Highest Random Weight (HRW) Mapping, Thaler, Ravishankar,, 1997, Ross, 1998,, CARP Protocol, Windows NT LB Def.: Object-to to-processor mapping function f, f (v): V d M : f (v)( ) = j w x j. g ( v, j ) = max k x k. g (v, k), where v is the object identifier vector, x = (x 1,..., x m ) is a weights' vector and g (v,(, j)c (0,1) is a pseudorandom function of uniform distribution. Minimal disruption of mapping in case of processor addition or removal/failure. Load balancing over heterogenous processors: : weights vector x is in a 1-to1 to-1 correspondence to p = (p 1,..., p m ), the vector of object fractions received at each processor. Pseudorandom function g (v,( j)c (0,1) can be implemented as a fast-computable hash function. Example: 3 processors x 3. g (v, 3) x 3 Map to max of: x 2 x 1. g (v, 2). g (v, 1) x 2 x
30 HRW Minimal Disruption Minimal disruption of mapping in case of processor addition: Partitioning into contiguous set HRW Example: Add processor No. 4, vectors mapped either (i) as before addition or (ii) to the newly added processor minimal number of vectors change mapping. Max of: 1 Max of: 1 g (v, 2) g (v, 4) g (v, 3) g (v, 1) g (v, 4) g (v, 2) g (v, 3) g (v, 1) 30
31 HRW Load Balancing Intel Research Cambridge m - number of servers, S 1,, S m K - number of distinct object addresses or flow IDs, from the set of objects O p i (0<i<K) - popularity of object i, q j (0<j<m) - number of distinct adresses or flow IDs mapped to processor j, e.g. sum of the popularities of objects mapped to S j 31
32 Load Sharing in Networking Systems Adaptive Methods - Adaptive HRW Hashing - Adaptive Burst Shifting 32
33 Adaptive HRW Hashing (Kencl, Le Boudec 2002) 33
34 Adaptive HRW mapping 34
35 Adaptation through Feedback Problem: incoming requests are packets, not flows! Packets not evenly distributed over flows -> not evenly distributed over the request object space -> > HRW mapping not sufficient for acceptable load sharing bounds > > need to adapt! 3. Compute new x (t) = (x 1 (t),,..., x m (t)). ). 4. Download new x := x(t). x Multiple (N) Input Cards 4 N Control Point CP 2. Evaluate (t) = ( ( 1 (t), 2 (t),,..., m (t)) (compare threshold). 1. Filtered workload intensity ( j) = j (t) M Multiple (M) processors Trigger definition targets preventing overload, if system in total not overloaded, and vice versa. A threshold triggers adaptation when close to load sharing bounds. Flow-to to-processor mapping f becomes a function of time f(t)(v) Adaptation may cause flow remapping! How to minimize the amount remapped? 35
36 Adaptation Algorithm Start Wait time t Compute filtered processor workload intensity (t) No Trigger Adaptation? Yes Adapt weights' vector x and upload Triggering Policy Adaptation Policy 36
37 Triggering Policy Intel Research Cambridge ρ(t), system in total workload intensity threshold ρ(t), system in total triggering threshold ρ(t), system in total max, min hysteresis bound Dynamic workload intensity threshold ' (t) = 1/2 (1+ (t)) (t)) Example: (t) = (0.8, 0.2, 0.2), (t) = 0.4 e (t) = 0.7, 1 (t) > (t) e adapt. Triggering threshold (t) = max( ' (t), upper) or vice versa Hysteresis bound upper: (1+ H (t)). (t) lower: (1 - H (t)). (t) Triggering policy (i) if (t) [ 1 and max j (t) > (t) then adapt; (ii) if (t) ) > 1 and min j (t) < (t) then adapt. 37
38 Adaptation Policy: Minimal Disruption A, B - mutually exclusive subsets of M={1,...,m}, M=A 4 B. α c (0, 1). f, f' two HRW mappings with the weights' vectors x, x': x' j = α. x j, j c A, x' j = x j, j c B. p j, p' j - fraction of objects mapped to node j using f, f'. Intel Research Cambridge p' j [ p j, j c A, 1) p' p' j m p j, j c B. 2) Fraction of objects mapped to a different node by each mapping is MINIMAL, that is, equal to p' j - p j. V at every node j. 38
39 Adaptation Policy: Minimal Disruption Example (3 proc.) Intel Research Cambridge x 3 x 3. g (v, 3) x 2 x Max of: x 2 x 1. g (v, 2). g (v, 1) x 3 x 3. g (v, 3) 2/3.x 2 Max of: 2/3. x 2. g (v, 2) 2/3.x 1 2/3. x 1. g (v, 1) reduced receives less, unaltered receives more, if reduction by a single, invariable multiplier. minimal disruption of the mapping. 39
40 Adaptation Policy Let (t) [ 1. Then: x j (t) : = c(t). x j (t- t) t), if j (t) > (t) ( j exceeds threshold (t)), x j (t) : = x j (t- t), t), if j (t) [ (t) ( j does not exceed threshold (t)). If (t) > 1, 1 the adaptation is carried out in a symmetrical manner. The weights' multiplier coefficient c(t) : c(t) = (t) ( ) min { j (t) j (t) > (t)} Factor c(t) is proportional to the minimal error and to the number of nodes. 1/m 40
41 Adaptive Burst Shifting (Shi, MacGregor, Gburzynski 2005) 41
42 Adaptive Burst Shifting Insight: the periodicity of bursts may allow shifting flows in-between bursts, without affecting order within flows. 42
43 Adaptive Burst Shifting Burst Distributor Algorithm 43
44 Performance evaluation 44
45 Adaptive HRW on generated traffic 45
46 Expectations Workload intensity on individual processors close to that of the system in total (acceptable load sharing); Packet loss probability lowered (acceptable load sharing); Persistent flows (appearing in two consecutive iterations) seldom remapped (minimize disruption). 46
47 AHH Keeps Per-processor Workload Intensity Close to Ideal 2.5 ρ(t), system in total 2.5 ρ(t), system in total 2 2 Workload intensity Workload intensity Time Naive, no LS Time Adaptive HRW ρ(t), system in total ρ(t), system in total Max, min ρj(t), no LS Max, min ρj(t), static LS Max, min ρj(t), adaptive LS Workload intensity Workload intensity Time Time Static HRW Max and min of all. 47
48 Packet Loss Significantly Reduced with the Adaptive Control Loop Packets droppeds x 10 4 System in total No LS Static LS Adaptive LS Packets dropped 3.5 x Static LS Adaptive LS Time Packet loss: Naive, Static, Adaptive, Ideal Time Packet loss in excess of Ideal: Static, Adaptive. Adaptive HRW saves on average 60% of packets dropped in by the static load sharing. 48
49 Minimal Disruption Property Ensures Few Flow Remappings Flows Flows appearing Flows persistent Flows remapped Time Flows, per iteration: appearing, persitent and remapped. Adaptive control loop leads on average to: less than 0.05% of the appearing flows remapped per iteration; less than 0.2% of the persistent flows remapped per iteration. 49
50 AHH and ABS on generated traffic 50
51 Adaptive HRW and Intel Research Cambridge Adaptive Burst Switching Packet drop rates. Packet reordering. Packet remapping. 51
52 Conclusion ABS better in preventing packet drop AHH better in preventing remapping and reordering, although larger table would improve ABS ABS works on much smaller time-scale can address packet bursts AHH converges to optimal allocation, but timescale too long for bursts Best solution probably hybrid under investigation must be careful to avoid conflicting feedback-control control mechanisms 52
53 The End Thank you! 10:40 53
54 Seminar 54
55 Seminar agenda Q & A Exercises 1, 2, 3 IRC Homework Q & A II. Cinema? 55
56 Exercise 1: Mapping Disruption Let there be a system with M servers of the same capacity, and an (M+1)th server be added to the system. Compute the amount of mapping disruption with the: a) Contiguous mapping b) Mod M mapping 56
57 Exercise 2: Prove the x2p relationship of HRW mapping 57
58 Homework: 1. Prove the mindisruption property of Adaptive HRW hashing 2. Try and design your own adaptive load balancing mapping that a) reduces packet reordering within flows, or b) reduces flow remapping. 58
59 Q & A 59
60 Internships? Films? Thank you! research.net/cambridge/ 60
Load Balancing with Minimal Flow Remapping for Network Processors
Load Balancing with Minimal Flow Remapping for Network Processors Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,
More informationFlow-Based Routing Architecture for Valiant Load-Balanced Networks
Flow-Based Routing Architecture for Valiant Load-Balanced Networks Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,
More informationIntel Corporation Silicon Technology Review
Intel Corporation Silicon Technology Review Ken David Director, Components Research SEMI Strategic Business Conference April 2003 Agenda Corporate Mission Leadership in Technology Leadership in Integration
More informationLOAD SCHEDULING FOR FLOW-BASED PACKET PROCESSING ON MULTI-CORE NETWORK PROCESSORS
LOAD SCHEDULING FOR FLOW-BASED PACKET PROCESSING ON MULTI-CORE NETWORK PROCESSORS Fei He,2, Yaxuan Qi,2, Yibo Xue 2,3 and Jun Li 2,3 Department of Automation, Tsinghua University, Beijing, China 2 Research
More informationLoad Sharing with OCGRR for Network Processors Which Supports Different services
1 Load Sharing with OCGRR for Network Processors Which Supports Different services R.Sunitha, Assistant Professor, CMS College of science and commerce. sunithar2001@yahoo.co.in Abstract A new scheme for
More informationTOGETHER, the continuing Internet bandwidth explosion
790 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 4, AUGUST 2005 Load Balancing for Parallel Forwarding Weiguang Shi, M. H. MacGregor, Senior Member, IEEE, and Pawel Gburzynski Abstract Workload distribution
More informationNetwork-on-chip (NOC) Topologies
Network-on-chip (NOC) Topologies 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and performance
More informationTopologies. Maurizio Palesi. Maurizio Palesi 1
Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationJinho Hwang and Timothy Wood George Washington University
Jinho Hwang and Timothy Wood George Washington University Background: Memory Caching Two orders of magnitude more reads than writes Solution: Deploy memcached hosts to handle the read capacity 6. HTTP
More informationTowards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu
Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Presenter: Guoxin Liu Ph.D. Department of Electrical and Computer Engineering, Clemson University, Clemson, USA Computer
More informationApplication of SDN: Load Balancing & Traffic Engineering
Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection
More informationAchieving the Science DMZ
Achieving the Science DMZ Eli Dart, Network Engineer ESnet Network Engineering Group Joint Techs, Winter 2012 Baton Rouge, LA January 22, 2012 Outline of the Day Motivation Services Overview Science DMZ
More informationCHAPTER 7 CONCLUSION AND FUTURE SCOPE
121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution
More informationRCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks
RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data
More informationResearch on Transmission Based on Collaboration Coding in WSNs
Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information
More informationCS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA
CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please
More informationWhen ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G
When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G Motivation Mobile Internet and explosion of its applications,
More informationPerformance and cost effectiveness of caching in mobile access networks
Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff
More informationChapter 6: CPU Scheduling. Operating System Concepts 9 th Edition
Chapter 6: CPU Scheduling Silberschatz, Galvin and Gagne 2013 Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Thread Scheduling Multiple-Processor Scheduling Real-Time
More informationStochastic Analysis of Horizontal IP Scanning
Stochastic Analysis of Horizontal IP Scanning Derek Leonard, Zhongmei Yao,, Xiaoming Wang, and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University
More informationHuawei European Research University Partnerships. Michael Hill-King European Research Institute, Huawei
Huawei European Research University Partnerships Michael Hill-King European Research Institute, Huawei Next 20 30 Years: The World Will Become Intelligent All things Sensing All things Connected All things
More informationIntroduction: Two motivating examples for the analytical approach
Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline
More informationSEDA: An Architecture for Well-Conditioned, Scalable Internet Services
SEDA: An Architecture for Well-Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University of California, Berkeley Operating Systems Principles
More informationCPU Scheduling. Operating Systems (Fall/Winter 2018) Yajin Zhou ( Zhejiang University
Operating Systems (Fall/Winter 2018) CPU Scheduling Yajin Zhou (http://yajin.org) Zhejiang University Acknowledgement: some pages are based on the slides from Zhi Wang(fsu). Review Motivation to use threads
More information6 Distributed data management I Hashing
6 Distributed data management I Hashing There are two major approaches for the management of data in distributed systems: hashing and caching. The hashing approach tries to minimize the use of communication
More informationAn Enhanced Dynamic Packet Buffer Management
An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared
More informationNested QoS: Providing Flexible Performance in Shared IO Environment
Nested QoS: Providing Flexible Performance in Shared IO Environment Hui Wang Peter Varman Rice University Houston, TX 1 Outline Introduction System model Analysis Evaluation Conclusions and future work
More informationTopologies. Maurizio Palesi. Maurizio Palesi 1
Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationIntroducing the FX-14 ASIC Design System. Embargoed until November 10, 2015
Introducing the FX-14 ASIC Design System Embargoed until November 10, 2015 Market Forces Are Driving Need for a New Breed of Semiconductor By 2019: Bandwidth Roughly one million minutes of video will cross
More informationEffects of a Hash-based Scheduler on Cache Performance in a Parallel Forwarding System
Effects of a Hash-based Scheduler on Cache Performance in a Parallel Forwarding System Weiguang Shi, Mike H. MacGregor and Pawel Gburzynski Department of Computing Science, University of Alberta, Edmonton,
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling
More informationRD-TCP: Reorder Detecting TCP
RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies
More informationTraffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010
Traffic in Network 1.0.0.0/8 Geoff Huston George Michaelson APNIC R&D April 2010 Background The address plan for IPv4 has a reservation for Private Use address space. This reservation, comprising of 3
More informationTowards a hybrid approach to Netflix Challenge
Towards a hybrid approach to Netflix Challenge Abhishek Gupta, Abhijeet Mohapatra, Tejaswi Tenneti March 12, 2009 1 Introduction Today Recommendation systems [3] have become indispensible because of the
More informationSingle Chip Heterogeneous Multiprocessor Design
Single Chip Heterogeneous Multiprocessor Design JoAnn M. Paul July 7, 2004 Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 The Cell Phone, Circa 2010 Cell
More informationOn the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement
More informationA Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ
A Probabilistic Approach for Achieving Fair Bandwidth Allocations in Peng Wang David L. Mills Department of Electrical & Computer Engineering University of Delaware Newark, DE 976 pwangee@udel.edu; mills@eecis.udel.edu
More informationTowards High-performance Flow-level level Packet Processing on Multi-core Network Processors
Towards High-performance Flow-level level Packet Processing on Multi-core Network Processors Yaxuan Qi (presenter), Bo Xu, Fei He, Baohua Yang, Jianming Yu and Jun Li ANCS 2007, Orlando, USA Outline Introduction
More informationInternet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks
Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),
More informationProactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS
ITU Kaleidoscope 2015 Trust in the Information Society Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS Presenter: Prof. PhD. Takuro SATO Waseda
More informationNetwork Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links
Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how
More informationLECTURE 3:CPU SCHEDULING
LECTURE 3:CPU SCHEDULING 1 Outline Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time CPU Scheduling Operating Systems Examples Algorithm Evaluation 2 Objectives
More informationSynthetic Trace Generation for the Internet: An Integrated Model
Synthetic Trace Generation for the Internet: An Integrated Model W. Shi, M. H. MacGregor and P. Gburzynski Department of Computing Science, University of Alberta, Edmonton, AB, T6G 2E8, Canada {wgshi,
More informationAdvanced Operating Systems (CS 202) Scheduling (2)
Advanced Operating Systems (CS 202) Scheduling (2) Lottery Scheduling 2 2 2 Problems with Traditional schedulers Priority systems are ad hoc: highest priority always wins Try to support fair share by adjusting
More informationImplementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400
The International Arab Journal of Information Technology, Vol. 6, No. 3, July 2009 289 Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400 Kandasamy Anusuya, Karupagouder
More informationLoad Balancing Overview
The "Load Balancing" feature is available only in the Barracuda Web Application Firewall 460 and above. A load balancer is a networking device that distributes traffic across multiple back-end servers
More informationA CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK
Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,
More informationGRASP. Greedy Randomized Adaptive. Search Procedure
GRASP Greedy Randomized Adaptive Search Procedure Type of problems Combinatorial optimization problem: Finite ensemble E = {1,2,... n } Subset of feasible solutions F 2 Objective function f : 2 Minimisation
More informationCache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK)
Cache Management for TelcoCDNs Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) d.tuncer@ee.ucl.ac.uk 06/01/2017 Agenda 1. Internet traffic: trends and evolution
More informationINCREASING THE EFFICIENCY OF NETWORK INTERFACE CARD. Amit Uppal
INCREASING THE EFFICIENCY OF NETWORK INTERFACE CARD By Amit Uppal A Thesis Submitted to the Faculty of Mississippi State University in Partial Fulfillment of the Requirements for the Degree of Master of
More informationComplexity results for throughput and latency optimization of replicated and data-parallel workflows
Complexity results for throughput and latency optimization of replicated and data-parallel workflows Anne Benoit and Yves Robert GRAAL team, LIP École Normale Supérieure de Lyon June 2007 Anne.Benoit@ens-lyon.fr
More informationExtending SLURM with Support for GPU Ranges
Available on-line at www.prace-ri.eu Partnership for Advanced Computing in Europe Extending SLURM with Support for GPU Ranges Seren Soner a, Can Özturana,, Itir Karac a a Computer Engineering Department,
More informationCSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE. George Porter November 27, 2017
CSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE George Porter November 27, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative
More informationTESTING A COGNITIVE PACKET CONCEPT ON A LAN
TESTING A COGNITIVE PACKET CONCEPT ON A LAN X. Hu, A. N. Zincir-Heywood, M. I. Heywood Faculty of Computer Science, Dalhousie University {xhu@cs.dal.ca, zincir@cs.dal.ca, mheywood@cs.dal.ca} Abstract The
More informationLarge-Scale Network Simulation Scalability and an FPGA-based Network Simulator
Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Stanley Bak Abstract Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid
More informationRouter Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13
Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Department of Electrical Engineering and Computer Sciences University of California Berkeley Review: Switch Architectures Input Queued
More information15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers
TCP & Routers 15-744: Computer Networking RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay Product Networks L-6
More informationImplementing and Experimenting with XCP
Implementing and Experimenting with XCP Ted Faber, Aaron Falk, Yuri Pryadkin, Bob Braden, Eric Coe, Aman Kapoor, Amit Yajurvedi, Nirav Jasapara USC/ISI USC Viterbi School of Engineering 28 Sept 2005 Outline
More informationProcess Scheduling. Copyright : University of Illinois CS 241 Staff
Process Scheduling Copyright : University of Illinois CS 241 Staff 1 Process Scheduling Deciding which process/thread should occupy the resource (CPU, disk, etc) CPU I want to play Whose turn is it? Process
More informationThe Total Network Volume chart shows the total traffic volume for the group of elements in the report.
Tjänst: Network Health Total Network Volume and Total Call Volume Charts Public The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Chart Description
More informationOptimize New Intel Xeon E based Ser vers with Emulex OneConnect and OneCommand Manager
W h i t e p a p e r Optimize New Intel Xeon E5-2600-based Ser vers with Emulex OneConnect and OneCommand Manager Emulex products complement Intel Xeon E5-2600 processor capabilities for virtualization,
More informationCounter Braids: A novel counter architecture
Counter Braids: A novel counter architecture Balaji Prabhakar Balaji Prabhakar Stanford University Joint work with: Yi Lu, Andrea Montanari, Sarang Dharmapurikar and Abdul Kabbani Overview Counter Braids
More informationPacket Doppler: Network Monitoring using Packet Shift Detection
Packet Doppler: Network Monitoring using Packet Shift Detection Tongqing Qiu, Nan Hua, Jun (Jim) Xu Georgia Tech Jian Ni, Hao Wang, Richard (Yang) Yang Yale University Presenter: Richard Ma December 10th,
More informationNetwork-Adaptive Video Coding and Transmission
Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213
More informationEXAM TCP/IP NETWORKING Duration: 3 hours
SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to
More informationTable of Contents. Cisco Buffer Tuning for all Cisco Routers
Table of Contents Buffer Tuning for all Cisco Routers...1 Interactive: This document offers customized analysis of your Cisco device...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1
More informationRandom Neural Networks for the Adaptive Control of Packet Networks
Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More informationData Intensive Science Impact on Networks
Data Intensive Science Impact on Networks Eli Dart, Network Engineer ESnet Network Engineering g Group IEEE Bandwidth Assessment Ad Hoc December 13, 2011 Outline Data intensive science examples Collaboration
More informationOn Improving the Performance of Cache Invalidation in Mobile Environments
Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO
More informationTowards Systematic Design of Enterprise Networks
Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All
More informationCache/Memory Optimization. - Krishna Parthaje
Cache/Memory Optimization - Krishna Parthaje Hybrid Cache Architecture Replacing SRAM Cache with Future Memory Technology Suji Lee, Jongpil Jung, and Chong-Min Kyung Department of Electrical Engineering,KAIST
More information13 Sensor networks Gathering in an adversarial environment
13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationCS 268: Computer Networking
CS 268: Computer Networking L-6 Router Congestion Control TCP & Routers RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay
More informationWireless Network Standard
Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationMitigation Framework Leadership Group (MitFLG) Charter DRAFT
Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent
More informationA Study of Cache-Based IP Flow Switching
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 2000 A Study of Cache-Based IP Flow Switching Osman Ertugay University of Pennsylvania
More informationAN exam March
AN exam March 29 2018 Dear student This exam consists of 7 questions. The total number of points is 100. Read the questions carefully. Be precise and concise. Write in a readable way. Q1. UDP and TCP (25
More informationWHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures
ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director
More informationBlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines. AtHoc SMS Codes
BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines AtHoc SMS Codes Version Version 7.5, May 1.0, November 2018 2016 1 Copyright 2010 2018 BlackBerry Limited. All Rights Reserved.
More informationChapter 5: Process Scheduling
Chapter 5: Process Scheduling Chapter 5: Process Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Thread Scheduling Operating Systems Examples Algorithm
More informationPassive NFS Tracing of and Research Workloads. Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo Seltzer FAST April 1, 2003
Passive NFS Tracing of Email and Research Workloads Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo Seltzer FAST 2003 - April 1, 2003 Talk Outline Motivation Tracing Methodology Trace Summary New Findings
More informationarxiv: v3 [cs.ni] 3 May 2017
Modeling Request Patterns in VoD Services with Recommendation Systems Samarth Gupta and Sharayu Moharir arxiv:1609.02391v3 [cs.ni] 3 May 2017 Department of Electrical Engineering, Indian Institute of Technology
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationSynthetic Trace Generation for the Internet: An Integrated Model
Synthetic Trace Generation for the Internet: An Integrated Model W. Shi, M. H. MacGregor and P. Gburzynski Department of Computing Science, University of Alberta, Edmonton, AB, T6G 2E8, Canada {wgshi,
More informationMeasurement of packet networks, e.g. the internet
Measurement of packet networks, e.g. the internet John Schormans (EE) Ben Parker (SMS) (next speaker in this joint talk) and Steven Gilmour (SMS Head of the Statistics Research Group and Director for the
More informationThis regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.
UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More information6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure
Packet Processing Software for Wireless Infrastructure Last Update: v1.0 - January 2011 Performance Challenges for Wireless Networks As advanced services proliferate and video consumes an ever-increasing
More informationAN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA
AN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA Ramyashree K.S, Arvind S & Shesharao M. Wanjerkhede GNDEC, Bidar-585403, Karnataka
More informationEARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.
: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department
More informationDesign and Performance Analysis of a DRAM-based Statistics Counter Array Architecture
Design and Performance Analysis of a DRAM-based Statistics Counter Array Architecture Chuck Zhao 1 Hao Wang 2 Bill Lin 2 Jim Xu 1 1 Georgia Institute of Technology 2 University of California, San Diego
More informationPageRank. CS16: Introduction to Data Structures & Algorithms Spring 2018
PageRank CS16: Introduction to Data Structures & Algorithms Spring 2018 Outline Background The Internet World Wide Web Search Engines The PageRank Algorithm Basic PageRank Full PageRank Spectral Analysis
More informationMaximum flow problem CE 377K. March 3, 2015
Maximum flow problem CE 377K March 3, 2015 Informal evaluation results 2 slow, 16 OK, 2 fast Most unclear topics: max-flow/min-cut, WHAT WILL BE ON THE MIDTERM? Most helpful things: review at start of
More information