Event Category: In-house Presentation

Deep Diving into BitTorrent Locality

A substantial amount of work has recently gone into localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs. Several architectures and systems have been proposed and the initial results from specific ISPs and a few torrents have been encouraging. In this work we attempt to deepen and scale our understanding of locality and its potential. Looking at specific ISPs, we consider tens of thousands of concurrent torrents, and thus capture ISP-wide implications that cannot be appreciated by looking at only a handful of torrents. Secondly, we go beyond individual case studies and present results for the top 100 ISPs in terms of number of users represented in our dataset of up to 40K torrents involving more than 3.9M concurrent peers and more than 20M in the course of a day spread in 11K ASes. We develop scalable methodologies hat permit us to process this huge dataset and answer questions such as: What is the minimum and the maximum transit traffic reduction across hundreds of ISPs? What are the win-win boundaries for ISPs and their users? What is the maximum amount of transit traffic that can be localized without requiring fine-grained control of inter-AS overlay connections? What is the impact to transit traffic from upgrades of residential broadband speeds?

Read more arrow_right_alt

Providing Throughput Guarantees in Heterogeneous Wireless Mesh Networks

This talk addresses the problem of providing throughput guarantees in heterogeneous wireless mesh networks. As a first step, it proposes a novel model to represent the capacity region of a wireless link that, by linearizing this region, has the fundamental property of being very simple while providing a good approximation to the entire region. In a second step, this model is mapped to two of the most prominent wireless technologies nowadays, namely Wireless LAN and WiMAX. The last step addresses the issue of finding optimal routing strategies, which is done by solving an optimization problem subject to the constraints imposed by the linearized capacity region. The performance of the proposed approach has been compared against traditional routing metrics in mesh networks, such as ETT and ETX, and shown to overperform them by approximately a factor of 2.

Read more arrow_right_alt

Design and Evaluation of a robust delay-based congestion protocol

Many delay-based congestion protocols have been proposed. Some recent studies have questioned the validity of congestion prediction at end hosts Based on measurement studies. In this talk, we show that end-host based delay prediction can be more accurate than previously characterized. We propose PERT (Probabilistic Early Response TCP) to mitigate the uncertainties in end-host based congestion prediction. PERT emulates the behavior of AQM/ECN in the end hosts' response to congestion.

Read more arrow_right_alt

Computing: A small step from Classical to Quantum

The Theory of Computing is almost a hundred year old now. Its roots can actually be traced to the Entscheidungsproblem posed by David Hilbert in 1928. Another concrete theory in Physics called the Quantum Mechanics had its inceptions almost two hundred years ago (with Thomas Young's Double Slit Experiment in 1803) but actually started in the late 19th century. Today, Quantum Mechanics is proven to be the most successful theory of Physics. So the natural question to ask was that while the statement of Church-Turing Thesis is seen to be a statement of physics (laws of nature), then it should be compatible with the theory of Quantum Mechanics!

Read more arrow_right_alt

Cloud elasticity at a flat fee

Existing cloud computing platforms offer virtually unlimited compute resources (virtual machines, bandwidth, storage, etc.) that can be used on demand. Such on-demand model offers significant elasticity to the customers in terms when and where they use the resources. The existing pricing model, however, is pay-as-you-go which in turn can lead to unpredictable costs to the cloud customers. This talk will discuss two adaptive approaches for resource control under a fixed budget: Distributed Rate Limiting (DRL) and Temporal Rate Limiting (TRL). DRL is a fully decentralized mechanism for resource control over a distributed cloud service, that splits the available budget among the participating nodes subject to the load each node experiences. TRL in contrast, splits the budget over a time period, to optimize the performance of the customer with demand pattern that varies in time.

Read more arrow_right_alt

Analysis and Experimental study of operational 802.11-based Wireless Mesh Networks

The performance of IP flows in Wireless Mesh Networks is unfairly biased by the unplanned compounding behavior of MAC and transport protocols. This compounding protocol behavior can undesirably result in complete starvation of some flows and in consistent capacity reductions originated by, e.g., limited volumes of control traffic.

Read more arrow_right_alt

The pain of doing research with real (wireless) devices

A lot of attention has been given to multihop wireless networks lately. This attention has motivated an increase in the number of 802.11-based deployments, both indoor and outdoor, used to perform measurement studies to analyze WLAN performance by means of wireless sniffers that passively capture transmitted frames. In this talk talk we will introduce some of the major issues that systems researchers have to address when performing such measurements: i) on one hand, the testbed itself requires a significant amount of resources during both its deployment and its maintenance, and they require a "calibration" phase before running the experiments given that as off-the-shelf devices have recently been shown to deviate from the expected behavior--in this talk we summarize a few lessons learned from the deployment of a 28-node wireless testbed; ii) on the other hand, little attention has been given to the fidelity of an individual device, i.e., the ability of a given sniffer to capture all frames that could have been captured by a more faithful device. We assess this fidelity by running controlled experiments, and show that it varies significantly across sniffers, both quantitatively and qualitatively.

Read more arrow_right_alt

Characterizing the Behavior of Content Publishers in BitTorrent

Due to the increasing popularity of P2P systems and their contribution to overall Internet traffic, it is essential to understand how content, which is the main attraction in P2P systems, is fed. The main goal of this talk is to identify and characterize those communities of users that are primarily responsible for publishing/feeding content in BitTorrent. For this purpose we have performed two large scale measurement studies that collectively identify the feeders of more than 30k torrents. Out of these measurements we conclude that a significant part of the BitTorrent’s content (40%) is fed by two different groups: (i) users concentrated min a few IP addresses of Hosting Service Providers. In particular, there is a single Hosting Provider in this community that alone is responsible of feeding 25% of the content published in the current major BitTorrent Portal. (ii) A large number of regular BitTorrent users spread across the networks of big ISPs. In addition, we characterize how the feeders of both communities behave, finding out that the typical Hosting Providers feeder (i) publishes a larger number of torrents that become more popular and (ii) seeds longer its torrents than regular users acting as feeders. Our findings suggest that a small group of users in Hosting Providers effectively leverage BitTorrent to publish content. Therefore, their presence is essential for the livelihood of BitTorrent.

Read more arrow_right_alt

Energy Efficient Wireless Internet Access with Cooperative Cellular Networks

Marco Ajmone Marsan holds a double appointment as Chief Researcher at IMDEA Networks (Spain) and Full Professor at the Department of Electronics (Dipartimento di Elettronica) of the Politecnico di Torino (Polytechnic University of Turin) (Italy). He is the founder of the Telecommunication Networks Group, one of the top research groups in networking in Europe, based at the Politecnico di Torino.

Read more arrow_right_alt

An analytical model for a Cache Assisted IPv6 Address Autoconfiguration protocol for VANETs

Vehicular communications will increase road safety, traffic efficiency and driving comfort, by enabling vehicles to form Vehicular Ad-hoc Networks (VANETs) and to directly exchange information. Additionally, connecting the VANET to an IP based network infrastructure (e.g., the Internet) may enhance those applications, and creating the opportunity for others such as infotainment ones (e.g., games, web browsing, e-mail, etc.). One of the functionalities needed to bring IP to vehicular networks is the capability of vehicles to autoconfigure an IPv6 address. GeoSAC is a mechanism enabling IPv6 address autoconfiguration in vehicular networks based on geographic routing. In GeoSAC, as a result of the mobility of the vehicles, they cannot always use the same IP address. Each new address configuration introduces a delay during which communications are interrupted. We propose an improvement for GeoSAC, based on the caching of Router Advertisements, to avoid this disruption time. We also analytically model the probability of achieving seamless IP address reconfiguration as well as an expression for the average configuration time of nodes. The model is validated through extensive simulation. Results in different realistic scenarios show that the use of our proposed optimisation is valuable and would improve the performance in terms of configuration time and/or signaling overhead and the average configuration time expression would provide network administrators with a powerful tool that can be used during the network design.

Read more arrow_right_alt

Recent Comments

    Archives

    Categories