Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications 2006
DOI: 10.1109/infocom.2006.102
|View full text |Cite
|
Sign up to set email alerts
|

Dual-Resource TCP/AQM for Processing-Constrained Networks

Abstract: Abstract-This paper examines congestion control issues for TCP flows that require in-network processing on the fly in network elements such as gateways, proxies, firewalls and even routers. Applications of these flows are increasingly abundant in the future as the Internet evolves. Since these flows require use of CPUs in network elements, both bandwidth and CPU resources can be a bottleneck and thus congestion control must deal with "congestion" on both of these resources. In this paper, we show that conventi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…Workloads of each application demand different CPU processing resources. We call this notion as processing density (in cycles/bit) for NA, for NNA which are defined as the average number of CPU cycles required per bit when the application is processed by the CPU [31]. Smartphones with DVFS capability adjust CPU speed (in cycles/ ) 2 every time slot depending on the system policy [6].…”
Section: B Cpu and Network Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Workloads of each application demand different CPU processing resources. We call this notion as processing density (in cycles/bit) for NA, for NNA which are defined as the average number of CPU cycles required per bit when the application is processed by the CPU [31]. Smartphones with DVFS capability adjust CPU speed (in cycles/ ) 2 every time slot depending on the system policy [6].…”
Section: B Cpu and Network Modelsmentioning
confidence: 99%
“…Then, intuitively the time average of the process can be expressed as a sum over the steady-state probabilities as follows: (31) where is the steady-state probability of . Since the probability vector can be represented by sequence by a law of large number, there exist randomized control policies which support any arrival rate within capacity region.…”
Section: B Proof Of Theoremmentioning
confidence: 99%
“…It is non-decreasing and can be inverted, i.e., ψ −1 exists. For instance, suppose that a cluster represents a group of CPUs in the SLA-based service model as discussed in [25]. Then, ψ(n) can be seen as a CPU scaling factor for the number of CPUs from 1 to n. According to [7], ψ(n) = ξ log 2 n , where ξ is a basic scaling factor from 1 CPU to 2.…”
Section: The Solution Of the Resource Allocation Problemmentioning
confidence: 99%
“…Because above methods are only for bandwidth resource, they may fail in case of CPU-consuming attacks, e.g., ping flood and udp flood. And current QoS researches suggest taking both bandwidth and processing time into consideration [14,15]. To improve defense effectiveness, we propose FFDRF.…”
Section: Related Workmentioning
confidence: 99%