a3 application aware acceleration for wireless data networks
Download
Skip this Video
Download Presentation
A3: APPLICATION AWARE ACCELERATION FOR WIRELESS DATA NETWORKS

Loading in 2 Seconds...

play fullscreen
1 / 29

A3: APPLICATION AWARE ACCELERATION FOR WIRELESS DATA NETWORKS - PowerPoint PPT Presentation


  • 77 Views
  • Uploaded on

A3: APPLICATION AWARE ACCELERATION FOR WIRELESS DATA NETWORKS. Athours: Zhenyun Zhuang and Tae-Young Chang GNAN Research Group, Georgia Tech, Atlanta, GA Raghupathy Sivakumar and Aravind Velayutham Asankya Networks, Inc., Atlanta, GA. MobiCom’06. OUTLINE. Motivation Methodology

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' A3: APPLICATION AWARE ACCELERATION FOR WIRELESS DATA NETWORKS' - dinos


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
a3 application aware acceleration for wireless data networks

A3: APPLICATION AWARE ACCELERATION FORWIRELESS DATA NETWORKS

Athours:

Zhenyun Zhuang and Tae-Young Chang

GNAN Research Group, Georgia Tech, Atlanta, GA

Raghupathy Sivakumar and Aravind Velayutham

Asankya Networks, Inc., Atlanta, GA

MobiCom’06

outline
OUTLINE
  • Motivation
  • Methodology
    • Transaction Prediction (TP)
    • Redundant and Aggressive Retransmissions (RAR)
    • Prioritized Fetching (PF)
    • Infinite Buffering (IB)
    • Application-aware Encoding (AE)
  • Integrated A3 Results
  • Pros and Cons
motivation
MOTIVATION
  • Wireless Environments
    • High loss rate
    • Large delay
    • Low bandwidth
  • Improving the performance of popular applications in wireless environments
    • Common Internet File Sharing protocol(CIFS)
    • Simple Mail Transfer Protocol(SMTP)
    • Hyper-Text Transfer Protocol(HTTP)

Common Internet File Sharing protocol(CIFS)

Figure from Business Communications Review (April 2006)

a3 application aware acceleration
A3: APPLICATION-AWARE ACCELERATION
  • Application aware
    • Recognize applications
  • Application transparent
    • No modifications to applications
  • A set of design elements
    • Transaction Prediction (TP)
    • Redundant and Aggressive Retransmissions(RAR)
    • Prioritized Fetching (PF)
    • Infinite Buffering (IB)
    • Application-aware Encoding (AE)
a3 application aware acceleration1
A3: APPLICATION-AWARE ACCELERATION
  • Implementation with Netfilter for Linux Systems
  • Using Netfilter hooks to capture the packets from traffic

Deployment Model

experimental setup
EXPERIMENTAL SETUP
  • Application Emulator (AppEm)
    • Using IxChariot to generate accurate application specific traffic patterns
  • A3 Emulator (A3Em)
  • Wireless Network Emulator(WNetEm)
    • are implemented with the framework of NS2
transaction prediction tp design
TRANSACTION PREDICTION (TP) - DESIGN
  • CIFS requests only16 – 32KB data in a request
  • When requested data < BDP
    • Low utilization
  • Not pre-fetching
  • Deterministically predict

future requests

  • Issue requests ahead of time

CIFS Traffic Patterns

slide10

Explicit Loss Notification(ELN)

    • Only reduce the congestion window due to congestion loss.
  • Wireless TCP(WTCP)
    • Any lost segments will have to wait in the WTCP\'s buffer until the first one is confirmed to have been received.
redundant and aggressive retransmissions rar design
Redundant and Aggressive Retransmissions(RAR) - Design
  • RAR helps to protect thin session

control messages from losses

  • Not applying to DATA

SMTP Traffic Patterns

redundant and aggressive retransmissions rar design1
Redundant and Aggressive Retransmissions(RAR) - Design
  • The interval between each redundant packets
    • RTTavg/10
      • RTTavg is the average RTT observed so far

(dynamical update)

  • Aggressive retransmission
    • Setting a timer = RTTavg + c
      • c is a small guard constant
    • If client gets response
      • stop the timer
    • If all copies of a message are lost
    • Time out=>Retransmission
prioritized fetching pf design
Prioritized Fetching (PF) - Design
  • Using a plugin of web browser to query

current focus window and scrolling information

  • The visible object will be downloaded immediately
  • If the object is not visible, then download it later
infinite buffering ib design
INFINITE BUFFERING (IB) - DESIGN
  • Mobile device may have small connection buffer and reading slowly from connection buffer
    • Setting advertised window to MAXIMUM value

2KB data

2KB

ACK window=0

0KB

2KB

ACK window=2K

infinite buffering ib design1
INFINITE BUFFERING (IB) - DESIGN
  • Mobile device may have small connection buffer and reading slowly from connection buffer
    • Setting advertised window to MAXIMUM value
    • Exceeded data will be stored to 2nd storage

2KB data

2KB

ACK window= MAXIMUM

0KB

2KB data

2KB

2nd Storage

infinite buffering ib isolated result
INFINITE BUFFERING (IB) - ISOLATED RESULT
  • How fast application layer reads the data?
  • What is the size of connection buffer?
application aware encoding ae design
Application-aware Encoding (AE) - Design
  • Uses application and user specific information
    • SMTP – Using previous mails
    • Only available to a pair user
  • Not binary compression(such as ZIP)

10 Persons (100 emails)

application aware encoding ae design1
Application-aware Encoding (AE) - Design
  • A > B
    • Hi B,

Do you have come to play a game with us?

  • B > A
    • Hi A,

Sorry, I can’t go to play a game with you.

=>

    • 0x1 A,

Sorry, I can’t go 0x2 0x3 a 0x40x5 you

  • Using 10-16bit to represent a word(6bytes)
slide24
PROS
  • This paper presents a way to improve the performance of the applications obviously with application transparent
  • Did not present that how the processing overhead affects the performance
  • Infinite Buffering result

CONS

ad