End - System Support for Idle - Time Networking Lars Eggert and Joe Touch USC
نویسنده
چکیده
Processing and transmission of idle-time network traffic ideally only occurs when resources would have been idle in its absence. Proposed extensions to the Internet service model are similar to idle-time networking, but focus on network support. This paper investigates end-system extensions needed under such a service model. It introduces a simple model with two preempting prioritized traffic classes (regular and idle-time). Experimental results show that current OS mechanisms cannot provide effective idle-time service. Analysis of OS network processing identifies its event-driven nature as the key issue. Experiments with a proof-of-concept implementation of minimal extensions for idle-time networking show them more than 97% effective in isolating higher-priority traffic from the presence of concurrent low-priority traffic. Index Terms — idle-time, preemption, quality of service, precedence, differentiated services
منابع مشابه
Speculative Use of Idle Resources
Even a fully loaded computer system, where the bottleneck resource is constantly busy, often has some idle capacities available on other resources. This proposal argues for using these idle capacities speculatively, increasing system performance for correct predictions. In such a system, all resources will ideally be constantly loaded with either regular foreground tasks, or speculative idle-ti...
متن کاملTetherNet Anti-NAT - Secure Internet Subnet Rental System
TetherNet is a system for dynamically relocating Internet subnets. It provides real Internet service consisting of real IP addresses, and forward and reverse DNS, even behind NAT boxes. TetherNet has been used to support demos at numerous DARPA PI meetings, and provides on-demand infrastructure for real network experiments.
متن کاملNetFS: Networking through the File System
NetFS provides a platform-independent file system interface to the network stack of operating systems. It unifies and integrates different existing APIs that each control parts of the network stack. NetFS offers a common, familiar interface that supports both existing functionality, as well as new capabilities for finegrained access control, user-based virtual views, and remote access. A subset...
متن کاملA Virtual Internet Architecture
A Virtual Internet (VI) is an IP network composed of tunneled links among a set of virtual routers and virtual hosts. The architecture, like its virtual memory counterpart, provides an abstraction that hides the complexity of the underlying network and provides isolation-based protection that encourages resource sharing. A VI completely decouples its component hosts and routers from the underly...
متن کاملDisruption Tolerant Networking Dagstuhl Seminar 05142 – Executive Summary
During the past 40+ years, numerous architectures were developed for network communication, including the ISO OSI reference model and its related protocol specifications and – of course – the Internet architecture. These network architectures have been designed with some implicit assumptions about specific target applications and deployment scenarios. Among the most important assumptions are sp...
متن کامل