290 likes | 413 Views
This research paper presents innovative application-aware acceleration methods to enhance the performance of popular applications in wireless environments characterized by high loss rates, large delays, and limited bandwidth. Key methods discussed include Transaction Prediction (TP), Redundant and Aggressive Retransmissions (RAR), Prioritized Fetching (PF), Infinite Buffering (IB), and Application-aware Encoding (AE). These methodologies are designed to improve the efficiency and responsiveness of applications like CIFS, SMTP, and HTTP without requiring modifications to existing applications, enabling better data transmission and handling in wireless networks.
E N D
A3: APPLICATION AWARE ACCELERATION FORWIRELESS DATA NETWORKS Athours: Zhenyun Zhuang and Tae-Young Chang GNAN Research Group, Georgia Tech, Atlanta, GA Raghupathy Sivakumar and Aravind Velayutham Asankya Networks, Inc., Atlanta, GA MobiCom’06
OUTLINE • Motivation • Methodology • Transaction Prediction (TP) • Redundant and Aggressive Retransmissions (RAR) • Prioritized Fetching (PF) • Infinite Buffering (IB) • Application-aware Encoding (AE) • Integrated A3 Results • Pros and Cons
MOTIVATION • Wireless Environments • High loss rate • Large delay • Low bandwidth • Improving the performance of popular applications in wireless environments • Common Internet File Sharing protocol(CIFS) • Simple Mail Transfer Protocol(SMTP) • Hyper-Text Transfer Protocol(HTTP) Common Internet File Sharing protocol(CIFS) Figure from Business Communications Review (April 2006)
A3: APPLICATION-AWARE ACCELERATION • Application aware • Recognize applications • Application transparent • No modifications to applications • A set of design elements • Transaction Prediction (TP) • Redundant and Aggressive Retransmissions(RAR) • Prioritized Fetching (PF) • Infinite Buffering (IB) • Application-aware Encoding (AE)
A3: APPLICATION-AWARE ACCELERATION • Implementation with Netfilter for Linux Systems • Using Netfilter hooks to capture the packets from traffic Deployment Model
EXPERIMENTAL SETUP • Application Emulator (AppEm) • Using IxChariot to generate accurate application specific traffic patterns • A3 Emulator (A3Em) • Wireless Network Emulator(WNetEm) • are implemented with the framework of NS2
TRANSACTION PREDICTION (TP) - DESIGN • CIFS requests only16 – 32KB data in a request • When requested data < BDP • Low utilization • Not pre-fetching • Deterministically predict future requests • Issue requests ahead of time CIFS Traffic Patterns
TRANSACTION PREDICTION (TP) - DESIGN (CONT.) CIFS Traffic Patterns
Explicit Loss Notification(ELN) • Only reduce the congestion window due to congestion loss. • Wireless TCP(WTCP) • Any lost segments will have to wait in the WTCP's buffer until the first one is confirmed to have been received.
Redundant and Aggressive Retransmissions(RAR) - Design • RAR helps to protect thin session control messages from losses • Not applying to DATA SMTP Traffic Patterns
Redundant and Aggressive Retransmissions(RAR) - Design • The interval between each redundant packets • RTTavg/10 • RTTavg is the average RTT observed so far (dynamical update) • Aggressive retransmission • Setting a timer = RTTavg + c • c is a small guard constant • If client gets response • stop the timer • If all copies of a message are lost • Time out=>Retransmission
REDUNDANT AND AGGRESSIVE RETRANSMISSIONS(RAR) - ISOLATED RESULT
Prioritized Fetching (PF) - Design • Using a plugin of web browser to query current focus window and scrolling information • The visible object will be downloaded immediately • If the object is not visible, then download it later
INFINITE BUFFERING (IB) - DESIGN • Mobile device may have small connection buffer and reading slowly from connection buffer • Setting advertised window to MAXIMUM value 2KB data 2KB ACK window=0 0KB 2KB ACK window=2K
INFINITE BUFFERING (IB) - DESIGN • Mobile device may have small connection buffer and reading slowly from connection buffer • Setting advertised window to MAXIMUM value • Exceeded data will be stored to 2nd storage 2KB data 2KB ACK window= MAXIMUM 0KB 2KB data 2KB 2nd Storage
INFINITE BUFFERING (IB) - ISOLATED RESULT • How fast application layer reads the data? • What is the size of connection buffer?
Application-aware Encoding (AE) - Design • Uses application and user specific information • SMTP – Using previous mails • Only available to a pair user • Not binary compression(such as ZIP) 10 Persons (100 emails)
Application-aware Encoding (AE) - Design • A > B • Hi B, Do you have come to play a game with us? • B > A • Hi A, Sorry, I can’t go to play a game with you. => • 0x1 A, Sorry, I can’t go 0x2 0x3 a 0x40x5 you • Using 10-16bit to represent a word(6bytes)
PROS • This paper presents a way to improve the performance of the applications obviously with application transparent • Did not present that how the processing overhead affects the performance • Infinite Buffering result CONS