-
HLoOP -- Hyperbolic 2-space Local Outlier Probabilities
Authors:
Clémence Allietta,
Jean-Philippe Condomines,
Jean-Yves Tourneret,
Emmanuel Lochin
Abstract:
Hyperbolic geometry has recently garnered considerable attention in machine learning due to its capacity to embed hierarchical graph structures with low distortions for further downstream processing. This paper introduces a simple framework to detect local outliers for datasets grounded in hyperbolic 2-space referred to as HLoOP (Hyperbolic Local Outlier Probability). Within a Euclidean space, wel…
▽ More
Hyperbolic geometry has recently garnered considerable attention in machine learning due to its capacity to embed hierarchical graph structures with low distortions for further downstream processing. This paper introduces a simple framework to detect local outliers for datasets grounded in hyperbolic 2-space referred to as HLoOP (Hyperbolic Local Outlier Probability). Within a Euclidean space, well-known techniques for local outlier detection are based on the Local Outlier Factor (LOF) and its variant, the LoOP (Local Outlier Probability), which incorporates probabilistic concepts to model the outlier level of a data vector. The developed HLoOP combines the idea of finding nearest neighbors, density-based outlier scoring with a probabilistic, statistically oriented approach. Therefore, the method consists in computing the Riemmanian distance of a data point to its nearest neighbors following a Gaussian probability density function expressed in a hyperbolic space. This is achieved by defining a Gaussian cumulative distribution in this space. The HLoOP algorithm is tested on the WordNet dataset yielding promising results. Code and data will be made available on request for reproductibility.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
XOR-based Source Routing
Authors:
Jérôme Lacan,
Emmanuel Lochin
Abstract:
We introduce a XOR-based source routing (XSR) scheme as a novel approach to enable fast forwarding and low-latency communications. XSR uses linear encoding operation to both 1)~build the path labels of unicast and multicast data transfers; 2)~perform fast computational efficient routing decisions compared to standard table lookup procedure without any packet modification all along the path. XSR sp…
▽ More
We introduce a XOR-based source routing (XSR) scheme as a novel approach to enable fast forwarding and low-latency communications. XSR uses linear encoding operation to both 1)~build the path labels of unicast and multicast data transfers; 2)~perform fast computational efficient routing decisions compared to standard table lookup procedure without any packet modification all along the path. XSR specifically focuses on decreasing the complexity of forwarding router operations. This allows packet switches (e.g, link-layer switch or router) to perform only simple linear operations over a binary vector label which embeds the path. XSR provides the building blocks to speed up the forwarding plane and can be applied to different data planes such as MPLS or IPv6. Compared to recent approaches based on modular arithmetic, XSR computes the smallest label possible and presents strong scalable properties allowing to be deployed over any kind of core vendor or datacenter networks. At last but not least, the same computed label can be used interchangeably to cross the path forward or reverse in the context of unicast communication.
△ Less
Submitted 8 January, 2020;
originally announced January 2020.
-
Network Calculus-based Timing Analysis of AFDX networks incorporating multiple TSN/BLS traffic classes
Authors:
Anais Finzi,
Ahlem Mifdaoui,
Fabrice Frances,
Emmanuel Lochin
Abstract:
We propose a formal timing analysis of an extension of the AFDX standard, incorporating the TSN/BLS shaper, to homogenize the avionics communication architecture, and enable the interconnection of different avionics domains with mixed-criticality levels, e.g., current AFDX traffic, Flight Control and In-Flight Entertainment. Existing Network Calculus models are limited to three classes, but applic…
▽ More
We propose a formal timing analysis of an extension of the AFDX standard, incorporating the TSN/BLS shaper, to homogenize the avionics communication architecture, and enable the interconnection of different avionics domains with mixed-criticality levels, e.g., current AFDX traffic, Flight Control and In-Flight Entertainment. Existing Network Calculus models are limited to three classes, but applications with heterogeneous traffic require additional classes. Hence, we propose to generalize an existing Network Calculus model to do a worst-case timing analysis of an architecture with multiple BLS on multi-hop networks, to infer real-time bounds. Then, we conduct the performance analysis of such a proposal. First we evaluate the model on a simple 3-classes single-hop network to assess the sensitivity and tightness of the model, and compare it to existing models (CPA and Network Calculus). Secondly, we study a realistic AFDX configuration with six classes and two BLS. Finally, we compute a real use-case to add A350 flight control traffic to the AFDX. Results show the good properties of the generalized Network Calculus model compared to the CPA model and the efficiency of the extended AFDX to noticeably enhance the medium priority level delay bounds, while respecting the higher priority level constraints, in comparison with the current AFDX standard.
△ Less
Submitted 6 August, 2019; v1 submitted 1 May, 2019;
originally announced May 2019.
-
Google QUIC performance over a public SATCOM access
Authors:
Ludovic Thomas,
Emmanuel Dubois,
Nicolas Kuhn,
Emmanuel Lochin
Abstract:
Google QUIC accounts for almost 10% of the Internet traffic and the protocol is not standardized at the IETF yet. We distinguish Google QUIC (GQUIC) and IETF QUIC (IQUIC) since there may be differences between the two. Both Google and IETF versions run over UDP and cannot be split the way satellite systems usually do with TCP connections. The need for adapting any-QUIC parameters needs to be evalu…
▽ More
Google QUIC accounts for almost 10% of the Internet traffic and the protocol is not standardized at the IETF yet. We distinguish Google QUIC (GQUIC) and IETF QUIC (IQUIC) since there may be differences between the two. Both Google and IETF versions run over UDP and cannot be split the way satellite systems usually do with TCP connections. The need for adapting any-QUIC parameters needs to be evaluated. Since GQUIC is available, we analyze its behavior over a satellite communication system. In our evaluations, GQUIC quick connection establishment does not compensate an inappropriate congestion control. The resulting page downloading time doubles when using GQUIC as opposed to the performance with optimized split TCP connections. This paper concludes that specific tuning are required when any-QUIC runs over a high BDP network.
△ Less
Submitted 14 February, 2019; v1 submitted 11 October, 2018;
originally announced October 2018.
-
Incorporating TSN/BLS in AFDX for Mixed-Criticality Avionics Applications: Specification and Analysis
Authors:
Anaïs Finzi,
Ahlem Mifdaoui,
Fabrice Frances,
Emmanuel Lochin
Abstract:
In this paper, we propose an extension of the AFDX standard, incorporating a TSN/BLS shaper, to homogenize the avionics communication architecture, and enable the interconnection of different avionics domains with mixed-criticality levels, e.g., legacy AFDX traffic, Flight Control and In-Flight Entertainment. First, we present the main specifications of such a proposed solution. Then, we detail th…
▽ More
In this paper, we propose an extension of the AFDX standard, incorporating a TSN/BLS shaper, to homogenize the avionics communication architecture, and enable the interconnection of different avionics domains with mixed-criticality levels, e.g., legacy AFDX traffic, Flight Control and In-Flight Entertainment. First, we present the main specifications of such a proposed solution. Then, we detail the corresponding worst-case timing analysis, using the Network Calculus framework, to infer real-time guarantees. Finally, we conduct the performance analysis of such a proposal on a realistic AFDX configuration. Results show the efficiency of the Extended AFDX standard to noticeably enhance the medium priority level delay bounds, while respecting the higher priority level constraints, in comparison with the legacy AFDX standard.
△ Less
Submitted 18 July, 2017;
originally announced July 2017.
-
Using emulation to validate applications on opportunistic networks
Authors:
Gwilherm Baudic,
Antoine Auger,
Victor Ramiro,
Emmanuel Lochin
Abstract:
The increasing trend on wireless-connected devices makes opportunistic networking a promising alternative to existing infrastructure-based networks. However, on these networks there is neither guarantee about the availability of the connections nor on the topology of the network. The development of opportunistic applications, i.e., applications running over opportunistic networks, is still in earl…
▽ More
The increasing trend on wireless-connected devices makes opportunistic networking a promising alternative to existing infrastructure-based networks. However, on these networks there is neither guarantee about the availability of the connections nor on the topology of the network. The development of opportunistic applications, i.e., applications running over opportunistic networks, is still in early stages. This is due to lack of tools to support the process in such uncertain conditions. Indeed, many tools have been introduced to study and characterize opportunistic networks, but none of them is focused on hel** developers to conceive opportunistic applications. In this paper, we argue that the gap between opportunistic applications development and network characterization can be filled with network emulation. First, this position paper points out important challenges about the development of opportunistic applications. Then, in order to cope with these challenges, it details a set of requirements that an emulator should meet to allow the testing of such applications.
△ Less
Submitted 22 June, 2016;
originally announced June 2016.
-
Joint On-the-Fly Network Coding/Video Quality Adaptation for Real-Time Delivery
Authors:
Tuan Tran Thai,
Jérôme Lacan,
Emmanuel Lochin
Abstract:
This paper introduces a redundancy adaptation algorithm for an on-the-fly erasure network coding scheme called Tetrys in the context of real-time video transmission. The algorithm exploits the relationship between the redundancy ratio used by Tetrys and the gain or loss in encoding bit rate from changing a video quality parameter called the Quantization Parameter (QP). Our evaluations show that wi…
▽ More
This paper introduces a redundancy adaptation algorithm for an on-the-fly erasure network coding scheme called Tetrys in the context of real-time video transmission. The algorithm exploits the relationship between the redundancy ratio used by Tetrys and the gain or loss in encoding bit rate from changing a video quality parameter called the Quantization Parameter (QP). Our evaluations show that with equal or less bandwidth occupation, the video protected by Tetrys with redundancy adaptation algorithm obtains a PSNR gain up to or more 4 dB compared to the video without Tetrys protection. We demonstrate that the Tetrys redundancy adaptation algorithm performs well with the variations of both loss pattern and delay induced by the networks. We also show that Tetrys with the redundancy adaptation algorithm outperforms FEC with and without redundancy adaptation.
△ Less
Submitted 18 April, 2013;
originally announced April 2013.
-
On the Trade-off Between Spectrum Efficiency with Dedicated Access and Short End-to-End Transmission Delays with Random Access in DVB-RCS2
Authors:
Nicolas Kuhn,
Huyen-Chi Bui,
Jerome Lacan,
Jose Radzik,
Emmanuel Lochin
Abstract:
This paper analyses the performance of TCP over random and dedicated access methods in the context of DVB-RCS2. Random access methods introduce a lower connection delay compared to dedicated methods. We investigate the poten- tial to improve the performance of short flows in regards to transmission delay, over random access methods for DVB- RCS2 that is currently under development. Our simulation…
▽ More
This paper analyses the performance of TCP over random and dedicated access methods in the context of DVB-RCS2. Random access methods introduce a lower connection delay compared to dedicated methods. We investigate the poten- tial to improve the performance of short flows in regards to transmission delay, over random access methods for DVB- RCS2 that is currently under development. Our simulation experiments show that the transmission of the first ten IP datagrams of each TCP flow can be 500 ms faster with ran- dom access than with dedicated access making the former of interest to carry Internet traffic. Such methods, however, are less efficient in regards to bandwidth usage than dedicated access mecanisms and less reliable in overloaded network conditions. Two aspects of channel usage optimization can be distinguished: reducing the duration of ressource utiliza- tion with random access methods, or increasing the spec- trum efficiency with dedicated access methods. This article argues that service providers may let low-cost users exploit the DVB-RCS2 to browse the web by introducing different services, which choice is based on the channel access method.
△ Less
Submitted 1 October, 2013; v1 submitted 24 January, 2013;
originally announced January 2013.
-
Physical Channel Access (PCA): Time and Frequency Access Methods Emulation in NS-2
Authors:
Nicolas Kuhn,
Olivier Mehani,
Huyen-Chi Bui,
Jerome Lacan,
Jose Radzik,
Emmanuel Lochin
Abstract:
We present an NS-2 module, Physical Channel Access (PCA), to simulate different access methods on a link shared with Multi-Frequency Time Division Multiple Access (MF-TDMA). This tech- nique is widely used in various network technologies, such as satellite communication. In this context, different access methods at the gateway induce different queuing delays and available capacities, which strongl…
▽ More
We present an NS-2 module, Physical Channel Access (PCA), to simulate different access methods on a link shared with Multi-Frequency Time Division Multiple Access (MF-TDMA). This tech- nique is widely used in various network technologies, such as satellite communication. In this context, different access methods at the gateway induce different queuing delays and available capacities, which strongly impact transport layer performance. Depending on QoS requirements, design of new congestion and flow control mechanisms and/or access methods requires evaluation through simulations.
PCA module emulates the delays that packets will experience using the shared link, based on descriptive parameters of lower layers characteris- tics. Though PCA has been developed with DVB-RCS2 considerations in mind (for which we present a use case), other MF-TDMA-based appli- cations can easily be simulated by adapting input parameters. Moreover, the presented implementation details highlight the main methods that might need modifications to implement more specific functionality or emulate other similar access methods (e.g., OFDMA).
△ Less
Submitted 19 March, 2013; v1 submitted 20 January, 2013;
originally announced January 2013.
-
Erasure Coding and Congestion Control for Interactive Real-Time Communication
Authors:
Pierre-Ugo Tournoux,
Tuan Tran Thai,
Emmanuel Lochin,
Jerome Lacan,
Vincent Roca
Abstract:
The use of real-time applications over the Internet is a challenging problem that the QoS epoch attempted to solve by proposing the DiffServ architecture. Today, the only existing service provided by the Internet is still best-effort. As a result, multimedia applications often perform on top of a transport layer that provides a variable sending rate. In an obvious manner, this variable sending rat…
▽ More
The use of real-time applications over the Internet is a challenging problem that the QoS epoch attempted to solve by proposing the DiffServ architecture. Today, the only existing service provided by the Internet is still best-effort. As a result, multimedia applications often perform on top of a transport layer that provides a variable sending rate. In an obvious manner, this variable sending rate is an issue for these applications with strong delay constraint. In a real-time context where retransmission can not be used to ensure reliability, video quality suffers from any packet losses. In this position paper, we discuss this problem and motivate why we want to bring out a certain class of erasure coding scheme inside multimedia congestion control protocols such as TFRC.
△ Less
Submitted 12 July, 2012;
originally announced July 2012.
-
CLIFT: a Cross-Layer InFormation Tool to perform cross-layer analysis based on real physical traces
Authors:
N. Kuhn,
E. Lochin,
J. Lacan,
R. Boreli,
C. Bes,
L. Clarac
Abstract:
Considering real physical (MAC/PHY) traces inside network simulations is a complex task that might lead to complex yet approximated models. However, realistic cross-layer analysis with the upper layer and in particular the transport layer cannot be driven without considering the MAC/PHY level. In this paper, we propose to cope with this problem by introducing a software that translates real physic…
▽ More
Considering real physical (MAC/PHY) traces inside network simulations is a complex task that might lead to complex yet approximated models. However, realistic cross-layer analysis with the upper layer and in particular the transport layer cannot be driven without considering the MAC/PHY level. In this paper, we propose to cope with this problem by introducing a software that translates real physical events from a given trace in order to be used inside a network simulator such as $ns$-2. The main objective is to accurately perform analysis of the impact of link layer reliability schemes (obtained by the use of real physical traces) on transport layer performance. We detail the internal mechanisms and the benefits of this software with a focus on 4G satellite communications scenarios and present the resulting metrics provided by CLIFT to perform consistent cross-layer analysis.
△ Less
Submitted 23 June, 2012;
originally announced June 2012.
-
Enabling Realistic Cross-Layer Analysis based on Satellite Physical Layer Traces
Authors:
Nicolas Kuhn,
Emmanuel Lochin,
Jerome Lacan,
Roksana Boreli,
Caroline Bes,
Laurence Clarac
Abstract:
We present a solution to evaluate the performance of transport protocols as a function of link layer reliability schemes (i.e. ARQ, FEC and Hybrid ARQ) applied to satellite physical layer traces. As modelling such traces is complex and may require approximations, the use of real traces will minimise the potential for erroneous performance evaluations resulting from imperfect models. Our Trace Mana…
▽ More
We present a solution to evaluate the performance of transport protocols as a function of link layer reliability schemes (i.e. ARQ, FEC and Hybrid ARQ) applied to satellite physical layer traces. As modelling such traces is complex and may require approximations, the use of real traces will minimise the potential for erroneous performance evaluations resulting from imperfect models. Our Trace Manager Tool (TMT) produces the corresponding link layer output, which is then used within the ns-2 network simulator via the additionally developed ns-2 interface module. We first present the analytical models for the link layer with bursty erasure packets and for the link layer reliability mechanisms with bursty erasures. Then, we present details of the TMT tool and our validation methodology, demonstrating that the selected performance metrics (recovery delay and throughput efficiency) exhibit a good match between the theoretical results and those obtained with TMT. Finally, we present results showing the impact of different link layer reliability mechanisms on the performance of TCP Cubic transport layer protocol.
△ Less
Submitted 16 May, 2012;
originally announced May 2012.
-
Online multipath convolutional coding for real-time transmission
Authors:
Tuan Tran Thai,
Emmanuel Lochin,
Jerome Lacan
Abstract:
Most of multipath multimedia streaming proposals use Forward Error Correction (FEC) approach to protect from packet losses. However, FEC does not sustain well burst of losses even when packets from a given FEC block are spread over multiple paths. In this article, we propose an online multipath convolutional coding for real-time multipath streaming based on an on-the-fly coding scheme called Tetry…
▽ More
Most of multipath multimedia streaming proposals use Forward Error Correction (FEC) approach to protect from packet losses. However, FEC does not sustain well burst of losses even when packets from a given FEC block are spread over multiple paths. In this article, we propose an online multipath convolutional coding for real-time multipath streaming based on an on-the-fly coding scheme called Tetrys. We evaluate the benefits brought out by this coding scheme inside an existing FEC multipath load splitting proposal known as Encoded Multipath Streaming (EMS). We demonstrate that Tetrys consistently outperforms FEC in both uniform and burst losses with EMS scheme. We also propose a modification of the standard EMS algorithm that greatly improves the performance in terms of packet recovery. Finally, we analyze different spreading policies of the Tetrys redundancy traffic between available paths and observe that the longer propagation delay path should be preferably used to carry repair packets.
△ Less
Submitted 6 April, 2012;
originally announced April 2012.
-
Modelling the Delay Distribution of Binary Spray and Wait Routing Protocol
Authors:
Rémi Diana,
Emmanuel Lochin
Abstract:
This article proposes a stochastic model to obtain the end-to-end delay law between two nodes of a Delay Tolerant Network (DTN). We focus on the commonly used Binary Spray and Wait (BSW) routing protocol and propose a model that can be applied to homogeneous or heterogeneous networks (i.e. when the inter-contact law parameter takes one or several values). To the best of our knowledge, this is the…
▽ More
This article proposes a stochastic model to obtain the end-to-end delay law between two nodes of a Delay Tolerant Network (DTN). We focus on the commonly used Binary Spray and Wait (BSW) routing protocol and propose a model that can be applied to homogeneous or heterogeneous networks (i.e. when the inter-contact law parameter takes one or several values). To the best of our knowledge, this is the first model allowing to estimate the delay distribution of Binary Spray and Wait DTN protocol in heterogeneous networks. We first detail the model and propose a set of simulations to validate the theoretical results.
△ Less
Submitted 13 April, 2012; v1 submitted 29 November, 2011;
originally announced November 2011.
-
FavourQueue: a Parameterless Active Queue Management to Speed Up Short TCP Flows (and others too!)
Authors:
Pascal Anelli,
Remi Diana,
Emmanuel Lochin
Abstract:
This paper presents and analyses the implementation of a novel active queue management (AQM) named FavorQueue that aims to improve delay transfer of short lived TCP flows over best-effort networks. The idea is to dequeue packets that do not belong to a flow previously enqueued first. The rationale is to mitigate the delay induced by long-lived TCP flows over the pace of short TCP data requests and…
▽ More
This paper presents and analyses the implementation of a novel active queue management (AQM) named FavorQueue that aims to improve delay transfer of short lived TCP flows over best-effort networks. The idea is to dequeue packets that do not belong to a flow previously enqueued first. The rationale is to mitigate the delay induced by long-lived TCP flows over the pace of short TCP data requests and to prevent dropped packets at the beginning of a connection and during recovery period. Although the main target of this AQM is to accelerate short TCP traffic, we show that FavorQueue does not only improve the performance of short TCP traffic but also improves the performance of all TCP traffic in terms of drop ratio and latency whatever the flow size. In particular, we demonstrate that FavorQueue reduces the loss of a retransmitted packet, decreases the number of dropped packets recovered by RTO and improves the latency up to 30% compared to DropTail. Finally, we show that this scheme remains compliant with recent TCP updates such as the increase of the initial slow-start value.
△ Less
Submitted 27 September, 2013; v1 submitted 11 March, 2011;
originally announced March 2011.
-
Analytical Model of TCP Relentless Congestion Control
Authors:
Rémi Diana,
Emmanuel Lochin
Abstract:
We introduce a model of the Relentless Congestion Control proposed by Matt Mathis. Relentless Congestion Control (RCC) is a modification of the AIMD (Additive Increase Multiplicative Decrease) congestion control which consists in decreasing the TCP congestion window by the number of lost segments instead of halving it. Despite some on-going discussions at the ICCRG IRTF-group, this congestion cont…
▽ More
We introduce a model of the Relentless Congestion Control proposed by Matt Mathis. Relentless Congestion Control (RCC) is a modification of the AIMD (Additive Increase Multiplicative Decrease) congestion control which consists in decreasing the TCP congestion window by the number of lost segments instead of halving it. Despite some on-going discussions at the ICCRG IRTF-group, this congestion control has, to the best of our knowledge, never been modeled. In this paper, we provide an analytical model of this novel congestion control and propose an implementation of RCC for the commonly-used network simulator ns-2. We also improve RCC with the addition of a loss retransmission detection scheme (based on SACK+) to prevent RTO caused by a loss of a retransmission and called this new version RCC+. The proposed models describe both the original RCC algorithm and RCC+ improvement and would allow to better assess the impact of this new congestion control scheme over the network traffic.
△ Less
Submitted 21 November, 2012; v1 submitted 16 February, 2011;
originally announced February 2011.
-
When Should I Use Network Emulation?
Authors:
Emmanuel Lochin,
Tanguy Perennou,
Laurent Dairaine
Abstract:
The design and development of a complex system requires an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the functional and non-functional properties of the tested protocols. Among the various tools used to provide experimental support for such developments, network emulation relies on real-time production of impairments on real traffic a…
▽ More
The design and development of a complex system requires an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the functional and non-functional properties of the tested protocols. Among the various tools used to provide experimental support for such developments, network emulation relies on real-time production of impairments on real traffic according to a communication model, either realistically or not.
This paper aims at simply presenting to newcomers in network emulation (students, engineers, ...) basic principles and practices illustrated with a few commonly used tools. The motivation behind is to fill a gap in terms of introductory and pragmatic papers in this domain.
The study particularly considers centralized approaches, allowing cheap and easy implementation in the context of research labs or industrial developments. In addition, an architectural model for emulation systems is proposed, defining three complementary levels, namely hardware, impairment and model levels. With the help of this architectural framework, various existing tools are situated and described. Various approaches for modeling the emulation actions are studied, such as impairment-based scenarios and virtual architectures, real-time discrete simulation and trace-based systems. Those modeling approaches are described and compared in terms of services and we study their ability to respond to various designer needs to assess when emulation is needed.
△ Less
Submitted 28 June, 2011; v1 submitted 15 February, 2010;
originally announced February 2010.
-
ECN verbose mode: a statistical method for network path congestion estimation
Authors:
Remi Diana,
Emmanuel Lochin
Abstract:
This article introduces a simple and effective methodology to determine the level of congestion in a network with an ECN-like marking scheme. The purpose of the ECN bit is to notify TCP sources of an imminent congestion in order to react before losses occur. However, ECN is a binary indicator which does not reflect the congestion level (i.e. the percentage of queued packets) of the bottleneck, t…
▽ More
This article introduces a simple and effective methodology to determine the level of congestion in a network with an ECN-like marking scheme. The purpose of the ECN bit is to notify TCP sources of an imminent congestion in order to react before losses occur. However, ECN is a binary indicator which does not reflect the congestion level (i.e. the percentage of queued packets) of the bottleneck, thus preventing any adapted reaction. In this study, we use a counter in place of the traditional ECN marking scheme to assess the number of times a packet has crossed a congested router. Thanks to this simple counter, we drive a statistical analysis to accurately estimate the congestion level of each router on a network path. We detail in this paper an analytical method validated by some preliminary simulations which demonstrate the feasibility and the accuracy of the concept proposed. We conclude this paper with possible applications and expected future work.
△ Less
Submitted 15 February, 2010; v1 submitted 23 October, 2009;
originally announced October 2009.
-
On-the-fly erasure coding for real-time video applications
Authors:
Pierre-Ugo Tournoux,
Emmanuel Lochin,
Jerome Lacan,
Amine Bouabdallah,
Vincent Roca
Abstract:
This paper introduces a robust point-to-point transmission scheme: Tetrys, that relies on a novel on-the-fly erasure coding concept which reduces the delay for recovering lost data at the receiver side. In current erasure coding schemes, the packets that are not rebuilt at the receiver side are either lost or delayed by at least one RTT before transmission to the application. The present contribut…
▽ More
This paper introduces a robust point-to-point transmission scheme: Tetrys, that relies on a novel on-the-fly erasure coding concept which reduces the delay for recovering lost data at the receiver side. In current erasure coding schemes, the packets that are not rebuilt at the receiver side are either lost or delayed by at least one RTT before transmission to the application. The present contribution aims at demonstrating that Tetrys coding scheme can fill the gap between real-time applications requirements and full reliability. Indeed, we show that in several cases, Tetrys can recover lost packets below one RTT over lossy and best-effort networks. We also show that Tetrys allows to enable full reliability without delay compromise and as a result: significantly improves the performance of time constrained applications. For instance, our evaluations present that video-conferencing applications obtain a PSNR gain up to 7dB compared to classic block-based erasure codes.
△ Less
Submitted 16 November, 2010; v1 submitted 27 April, 2009;
originally announced April 2009.
-
On-the-Fly Coding to Enable Full Reliability Without Retransmission
Authors:
Jerome Lacan,
Emmanuel Lochin
Abstract:
This paper proposes a new reliability algorithm specifically useful when retransmission is either problematic or not possible. In case of multimedia or multicast communications and in the context of the Delay Tolerant Networking (DTN), the classical retransmission schemes can be counterproductive in terms of data transfer performance or not possible when the acknowledgment path is not always ava…
▽ More
This paper proposes a new reliability algorithm specifically useful when retransmission is either problematic or not possible. In case of multimedia or multicast communications and in the context of the Delay Tolerant Networking (DTN), the classical retransmission schemes can be counterproductive in terms of data transfer performance or not possible when the acknowledgment path is not always available. Indeed, over long delay links, packets retransmission has a meaning of cost and must be minimized.In this paper, we detail a novel reliability mechanism with an implicit acknowledgment strategy that could be used either within these new DTN proposals, for multimedia traffic or in the context of multicast transport protocols. This proposal is based on a new on-the-fly erasure coding concept specifically designed to operate efficient reliable transfer over bi-directional links. This proposal, named Tetrys, allows to unify a full reliability with an error correction scheme. In this paper, we model the performance of this proposal and demonstrate with a prototype, that we can achieve a full reliability without acknowledgment path confirmation. Indeed, the main findings are that Tetrys is not sensitive to the loss of acknowledgments while ensuring a faster data availability to the application compared to other traditional acknowledgment schemes. Finally, we pave the first step of the integration of such algorithm inside a congestion controlled protocol.
△ Less
Submitted 26 September, 2008;
originally announced September 2008.
-
TCP throughput guarantee in the DiffServ Assured Forwarding service: what about the results?
Authors:
Emmanuel Lochin,
Pascal Anelli
Abstract:
Since the proposition of Quality of Service architectures by the IETF, the interaction between TCP and the QoS services has been intensively studied. This paper proposes to look forward to the results obtained in terms of TCP throughput guarantee in the DiffServ Assured Forwarding (DiffServ/AF) service and to present an overview of the different proposals to solve the problem. It has been demons…
▽ More
Since the proposition of Quality of Service architectures by the IETF, the interaction between TCP and the QoS services has been intensively studied. This paper proposes to look forward to the results obtained in terms of TCP throughput guarantee in the DiffServ Assured Forwarding (DiffServ/AF) service and to present an overview of the different proposals to solve the problem. It has been demonstrated that the standardized IETF DiffServ conditioners such as the token bucket color marker and the time sliding window color maker were not good TCP traffic descriptors. Starting with this point, several propositions have been made and most of them presents new marking schemes in order to replace or improve the traditional token bucket color marker. The main problem is that TCP congestion control is not designed to work with the AF service. Indeed, both mechanisms are antagonists. TCP has the property to share in a fair manner the bottleneck bandwidth between flows while DiffServ network provides a level of service controllable and predictable. In this paper, we build a classification of all the propositions made during these last years and compare them. As a result, we will see that these conditioning schemes can be separated in three sets of action level and that the conditioning at the network edge level is the most accepted one. We conclude that the problem is still unsolved and that TCP, conditioned or not conditioned, remains inappropriate to the DiffServ/AF service.
△ Less
Submitted 13 December, 2007; v1 submitted 28 March, 2007;
originally announced March 2007.
-
Managing network congestion with a Kohonen-based RED queue
Authors:
Emmanuel Lochin,
Bruno Talavera
Abstract:
The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, end-to-end applications experience large delay jitter. Many studies have proposed efficient Active Queue Management (AQM) mechanisms in order to reduce queue oscillations and stabilize the queue length. These AQM are mostly…
▽ More
The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, end-to-end applications experience large delay jitter. Many studies have proposed efficient Active Queue Management (AQM) mechanisms in order to reduce queue oscillations and stabilize the queue length. These AQM are mostly improvements of the Random Early Detection (RED) model. Unfortunately, these enhancements do not react in a similar manner for various network conditions and are strongly sensitive to their initial setting parameters. Although this paper proposes a solution to overcome the difficulties of setting these parameters by using a Kohonen neural network model, another goal of this study is to investigate whether cognitive intelligence could be placed in the core network to solve such stability problem. In our context, we use results from the neural network area to demonstrate that our proposal, named Kohonen-RED (KRED), enables a stable queue length without complex parameters setting and passive measurements.
△ Less
Submitted 13 December, 2007; v1 submitted 16 November, 2006;
originally announced November 2006.