Conference paper

On the Distribution of Traffic Volumes in the Internet and its Implications

Submitted by richard on Fri, 06/28/2019 - 10:23
Proc IEEE Infocom

This paper updates previous work on fitting traffic profiles. We use more modern statistical techniques to question (and refute) previous assumptions about heavy tails in statistics. In this case we believe that the best fit for traffic volume per unit time is the log-normal distribution. Tail distributions an have big impacts for capacity planning and for prediction of pricing (say 95th percentile).

FLICK: Developing and Running Application-Specific Network Services

Submitted by richard on Sun, 07/10/2016 - 14:55
USENIX ATC

This paper describes a system for middleboxes that process application level data -- that is reconstructed TCP flows not packets. The system consists of three parts:
1) A language specific to middleboxes that can quickly express data formats and how to process them but in a "safe" way that allows middleboxes to co-exist on the same physical hardware.
2) An abstraction, the task graph, that breaks middlebox logic into small, parallelisable logical units (tasks) connected by channels through which data flows.
3) A system that allows the compiled code to execute in a performant way.

Multichannel Cross-Layer Routing for Sensor Networks

Submitted by richard on Mon, 04/25/2016 - 13:57
Proc. of International Conference on Telecommunications

This paper looks at a new way to use multiple channels in ad-hoc sensor networks. It consists of two parts:
1) A protocol that allows a node, when sent a particular message, to attempt to change channel (reliably with a fall-back if the new channel is subject to interference).
2) An algorithm run at a single "command" node that selects which nodes should change channel according to a graph colouring problem.

The work is tested in simulation using Cooja (which simulates Contiki based sensor nodes).

A longitudinal analysis of Internet rate limitations

Submitted by richard on Wed, 01/22/2014 - 20:37
Proceedings of INFOCOM

This paper looks at when TCP is "not" TCP by analysis of five years of data on a Japanese data set. That is to say, when TCP throughput is limited by mechanisms other than traditional TCP rate control (loss or delay in the network feedback causing a reduction in window size).

Other mechanisms are important:
1) Application limiting where the sender "dribbles" out data more slowly, for example in the way that you tube does, to reduce their bandwidth.
2) Window size limitations -- where hosts have an OS built in limitation on how large the TCP window can be.
3) Middle box/receiver window tweaking -- where the receiver or (more likely) a middle box tweaks the advertised window size to reduce throughput.

It is found that in the traces studied these three mechanisms account for more than half the packets. The traces include data from well known sites such as YouTube and it seems likely that the findings are more general than just applicability to this particular trace set.

In general this paper finds that TCP in the wild is not behaving in the way it is traditionally taught... by a variety of mechanisms, TCP is not "filling a pipe" and "controlled by loss"... other mechanisms are at play beyond traditional TCP congestion control.

Balancing by PREFLEX: Congestion Aware Traffic Engineering

Submitted by richard on Sun, 10/27/2013 - 00:59
Networking 2011, Lecture Notes in Computer Science (6641)

This paper considers the problem of balancing traffic across network egresses. It achieves a workable solution using a scalable packet market scheme which couples end-hosts controlling their own connection with an overall controller which can select routes appropriately for each flow.

The flows are balanced to seek paths which minimise loss.