In this paper, we investigate the use of a size-based schedul- ing policy, LASTOTAL, inWLANs. A size-based scheduling policy is a priority policy where the priority of a flow is based on its size. LASTOTAL replaces the legacy IP level FIFO scheduler at the access point. The lower protocol layers, and especially the MAC 802.11 layer are left...
-
October 27, 2008 (v1)Conference paperUploaded on: February 22, 2023
-
November 4, 2019 (v1)Conference paper
With the increasing popularity of cloud networking and the widespread usage of virtualization as a way to offer flexible and virtual network and computing resources, it becomes more and more complex to monitor this new virtual environment. Yet, monitoring remains crucial for network troubleshooting and analysis. Controlling the ...
Uploaded on: December 4, 2022 -
2006 (v1)Report
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rarest first and choke algorithms. Whereas it is commonly admitted that BitTorrent performs well, recent studies have proposed the replacement of the rarest first and choke...
Uploaded on: April 5, 2025 -
October 2006 (v1)Conference paper
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rarest first and choke algorithms. Whereas it is commonly admitted that BitTorrent performs well, recent studies have proposed the replacement of the rarest first and choke...
Uploaded on: April 5, 2025 -
2014 (v1)Conference paper
no abstract
Uploaded on: February 28, 2023 -
2005 (v1)Report
BitTorrent is a recent, yet successful peer-to-peer protocol focused on efficient content delivery. To gain a better understanding of the key algorithms of the protocol, we have instrumented a client and run experiments on a large number of real torrents. Our experimental evaluation is peer oriented, instead of tracker oriented, which allows us...
Uploaded on: April 5, 2025 -
2014 (v1)Conference paper
no abstract
Uploaded on: February 28, 2023 -
May 11, 2020 (v1)Conference paper
The importance of Big Data is nowadays established, both in industry and research fields, especially stream processing for its capability to analyze continuous data streams and provide statistics in real-time. Several data stream processing (DSP) platforms exist like the Storm, Flink, Spark Streaming and Heron Apache projects, or industrial...
Uploaded on: December 4, 2022 -
May 9, 2011 (v1)Conference paper
Size-based scheduling methods receive a lot of attention as they can greatly enhance the responsiveness perceived by the users. In effect, they give higher priority to small interactive flows which are the important ones for a good user experience. In this paper, we propose a new packet scheduling method, Early Flow Discard (EFD), which belongs...
Uploaded on: February 28, 2023 -
June 8, 2015 (v1)Conference paper
In the last decade, path discovery has been extensively covered in the literature. In its simplest form, it generally works by sending probes that expire along the path from a host to a destination. It is also known that network administrators often configure their routers to limit the amount of ICMP replies sent, a common practice typically...
Uploaded on: March 25, 2023 -
2009 (v1)Conference paper
no abstract
Uploaded on: March 25, 2023 -
December 11, 2019 (v1)Conference paper
The relevance of Data Stream Processing (DSP) is nowadays established, thanks to its capability to analyze continuous streams and provide statistics in real-time. A considerable amount of work has been dedicated to improve performance and features of DSP platforms. Thus, benchmark application are necessary for comparison and evaluation....
Uploaded on: December 4, 2022 -
2019 (v1)Conference paper
Cloud technologies are becoming pervasive and available for private companies or public institutions in different flavors, mostly public cloud or private clouds. Our focus in this work is on the usage of public cloud technologies by the most popular sites in the Internet. While some studies have described the nascent landscape of public cloud...
Uploaded on: December 4, 2022 -
2013 (v1)Conference paper
no abstract
Uploaded on: February 28, 2023 -
2014 (v1)Conference paper
no abstract
Uploaded on: February 28, 2023 -
2019 (v1)Conference paper
Modern applications necessitate geographically-distributed fragments over several data centers (DCs). Typical examples include stream or batch processing of geo-distributed data, or the redirection of clients to the optimal data replica. While little is known on inter-DC networks, the common belief is that they are not as well provisioned as...
Uploaded on: December 4, 2022 -
September 8, 2015 (v1)Conference paper
In recent years network neutrality has been widely debated from both technical and economic points of view. Its proponents advocate that all network traffic should be treated equally by Internet Service Providers (ISP's) and no discrimination should take place on origin, destination, content or load. Opponents on the other hand maintain that...
Uploaded on: March 25, 2023 -
June 25, 2012 (v1)Conference paper
Size-based scheduling improves data transfer response times by favoring flows at an early stage. Although appealing, these techniques raise concerns as they require to keep track of the volume of data sent by each and every ongoing connections and they may starve long-lived flows even if they use up limited bandwidth. Early Flow Discard (EFD)...
Uploaded on: December 2, 2022 -
2011 (v1)Conference paper
no abstract
Uploaded on: February 28, 2023 -
April 14, 2014 (v1)Conference paper
An IP prefix can be announced on the Internet from multiple endpoints, possibly leading to so-calledMOAS (Multiple-Origin AS) prefixes. Longlived MOASes are traditionally considered to be the result of network topology engineering such as prefix multihoming. Short-lived MOAS are commonly attributed to be the result of router...
Uploaded on: March 26, 2023 -
June 25, 2012 (v1)Conference paper
Size-based scheduling improves data transfer response times by favoring flows at an early stage. Although appealing, these techniques raise concerns as they require to keep track of the volume of data sent by each and every ongoing connections and they may starve long-lived flows even if they use up limited bandwidth. Early Flow Discard (EFD)...
Uploaded on: October 11, 2023 -
2016 (v1)Conference paper
no abstract
Uploaded on: February 28, 2023 -
September 12, 2016 (v1)Conference paper
In the past decade it has been found that some Internet operators offer degraded service to selected user traffic by applying various differentiation techniques. If from a legal point of view many countries have discussed and approved laws in favor of Internet neutrality, confirmation with measuring tools for even an experienced user remains...
Uploaded on: February 28, 2023