Predicting TCP Throughput From Non-invasive Network Sampling

合集下载

BGP和OSPF在路由重分发时的注意点

BGP和OSPF在路由重分发时的注意点

RGNOSv10.3(3)BGP和OSPF在路由重分发时的注意点2008-5-15福建星网锐捷网络有限公司版权所有侵权必究前言本文档介绍了RGNOS V10.3(3)中BGP和OSPF路由重发布时的一些实现特点。

由于这些特点区别于友商CISCO的BGP功能实现,在具体的项目实施过程中需要注意。

1.☹本文档仅限公司内部使用,严禁外传。

1.☺如果您在阅读中产生疑问,请与文档维护人联系。

目录1. 1OSPF重分发BGP路由1. 1.1注意点1. 这里Cisco验证的版本为c7200-adventerprisek9-mz.124-9.T1.bin2. 1.2应用实例1. 1.2.1网络拓扑四台设备之间建立EBGP/IBGP/EBGP连接。

C1为CISCO 3550、C2、C3是Cisco模拟器,R1是我司设备,实验设备为RG-S5750。

C1和R1建立EBGP连接,R1和C2建立IBGP连接,C2和C3建立EBGP连接。

其中C1和C3主要是发送路由,具体的操作在R1和C2。

2. 1.2.2配置文件C1 简化配置C1#sho running-configBuilding configuration...Current configuration : 2557 bytes!version 12.2no service padservice timestamps debug uptimeservice timestamps log uptimeno service password-encryption!hostname C1!!no aaa new-modelip subnet-zeroip routing!!!!!!no file verify autospanning-tree mode pvstspanning-tree extend system-id!vlan internal allocation policy ascending!!interface Loopback0ip address 1.1.1.1 255.255.255.255!interface FastEthernet0/1no switchportip address 192.168.16.1 255.255.255.248!interface FastEthernet0/2switchport mode dynamic desirable!interface FastEthernet0/3switchport mode dynamic desirable!...!router bgp 1no synchronizationbgp log-neighbor-changesredistribute staticneighbor 192.168.16.2 remote-as 23no auto-summary!ip classlessip route 192.168.111.0 255.255.255.0 Loopback0ip route 192.168.112.0 255.255.255.0 Loopback0ip http serverip http secure-server!!!control-plane!!line con 0line vty 0 4privilege level 15password wlogin!!endC1#C2简化配置C2#sho runnBuilding configuration...Current configuration : 1450 bytes!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname C2!boot-start-markerwarm-rebootboot-end-marker!!no aaa new-model!resource policy!ip cef!!!!interface Loopback0ip address 192.168.125.1 255.255.255.0 secondary ip address 192.168.126.1 255.255.255.0 secondary ip address 2.2.2.2 255.255.255.255!interface FastEthernet0/0ip address 192.168.26.2 255.255.255.248duplex full!interface Ethernet1/0no ip addressshutdownduplex half!interface Ethernet1/1no ip addressshutdownduplex half!interface Ethernet1/2no ip addressshutdownduplex half!interface Ethernet1/3ip address 192.168.23.1 255.255.255.248duplex full!router ospf 1log-adjacency-changesnetwork 2.2.2.2 0.0.0.0 area 0network 192.168.26.0 0.0.0.7 area 0!router bgp 23no synchronizationbgp log-neighbor-changesnetwork 192.168.125.0network 192.168.126.0neighbor 6.6.6.6 remote-as 23neighbor 6.6.6.6 update-source Loopback0neighbor 6.6.6.6 next-hop-selfneighbor 192.168.23.2 remote-as 3no auto-summary!no ip http serverno ip http secure-server!!...!line con 0stopbits 1line aux 0line vty 0 4privilege level 15password wlogin!!endC2#C3简化配置C3#sho runnBuilding configuration...Current configuration : 1178 bytes!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname C3!boot-start-markerboot-end-marker!!no aaa new-model!resource policy!ip cef!!!!!!interface Loopback0ip address 3.3.3.3 255.255.255.255!interface FastEthernet0/0no ip addressshutdownduplex full!interface Ethernet1/0no ip addressshutdownduplex half!interface Ethernet1/1no ip addressshutdownduplex half!interface Ethernet1/2no ip addressshutdownduplex half!interface Ethernet1/3ip address 192.168.23.2 255.255.255.248duplex full!router bgp 3no synchronizationbgp log-neighbor-changesredistribute staticneighbor 192.168.23.1 remote-as 23no auto-summary!ip route 192.168.131.0 255.255.255.0 Loopback0ip route 192.168.132.0 255.255.255.0 Loopback0no ip http serverno ip http secure-server!!!logging alarm informational!...!line con 0stopbits 1line aux 0line vty 0 4privilege level 15password wlogin!!endC2#R1简化配置R1#show runnBuilding configuration...Current configuration : 2080 bytes!version RGNOS 10.3.00(3), Release(38105)(Fri Apr 25 15:29:44 CST 2008 -ngcf31)hostname R1co-operate enable!!!!route-map ospf_redist permit 10match route-type external!vlan 1!!!!!interface GigabitEthernet 0/1no switchportno ip proxy-arpip address 192.168.26.1 255.255.255.248!interface GigabitEthernet 0/2!...!interface GigabitEthernet 0/23!interface GigabitEthernet 0/24no switchportno ip proxy-arpip address 192.168.16.2 255.255.255.248!interface Loopback 0ip address 6.6.6.6 255.255.255.255ip address 192.168.165.1 255.255.255.0 secondaryip address 192.168.166.1 255.255.255.0 secondary!!!!!!!!router bgp 23neighbor 2.2.2.2 remote-as 23neighbor 2.2.2.2 update-source Loopback 0neighbor 192.168.16.1 remote-as 1!address-family ipv4network 192.168.165.0network 192.168.166.0neighbor 2.2.2.2 activateneighbor 2.2.2.2 next-hop-selfneighbor 192.168.16.1 activateexit-address-family!!router ospf 1router-id 6.6.6.6network 6.6.6.6 0.0.0.0 area 0network 192.168.26.0 0.0.0.7 area 0!!!ip route 192.168.161.0 255.255.255.0 Loopback 0ip route 192.168.162.0 255.255.255.0 Loopback 0!!line con 0line vty 0 10privilege level 15loginpassword w!!end3. 1.2.3检验配置效果C2使用show ip bgp可以看到125.0/126.0是源发路由,111.0/112.0/165.0/166.0是IBGP路由,131.0/132.0是EBGP路由。

基于BN-DBN的网络安全态势要素获取机制

基于BN-DBN的网络安全态势要素获取机制

基于BN-DBN的网络安全态势要素获取机制朱江; 王婷婷【期刊名称】《《计算机应用》》【年(卷),期】2019(039)0z1【总页数】5页(P100-104)【关键词】态势要素; 深度信念网络; 批量归一化; 主动学习【作者】朱江; 王婷婷【作者单位】移动通信技术重庆市重点实验室(重庆邮电大学) 重庆400065【正文语种】中文【中图分类】TP393.080 引言近几年全球互联网发展迅猛,全球网络用户量激增,网络安全问题也相伴而生。

基础网络存在较多的漏洞风险,数据泄露严重,各类网络攻击日趋频繁,网络管理越来越被动。

网络安全问题将是未来将着重看待的问题,因此学术界继而将研究重点转向了网络安全态势感知(Network Security Situation Awareness, NSSA) [1]研究。

神经网络在NSSA取得初步的成果后,有研究者猜想增加隐含层的情况下即构造一种深层网络是否会使分类精度会有更好的提高,但是实际上的深层神经网络所达到的效果一些简单的机制如支持向量机(Support Vector Machine,SVM)[2]也可以达到,经研究发现深层网络在越深的层次几乎起不到优化的作用了。

最近,被称为深度学习的一种半监督学习方法[3]已被引入到网络安全态势感知中。

将深度网络应用于态势要素的分类原本是不现实的,因为只有有限的训练样本可用,并且特征空间的维度较大。

训练更深的神经网络近年来一直是深度学习领域的重要趋势之一。

2015年初,Google提出了批量归一化(Batch Normalization,BN)算法[4],使得深层神经网络的训练更加稳定,加快了收敛,解决了深度网络在多维空间训练困难的问题。

态势要素提取本质上是对态势要素进行分类,主动学习(Active Learning, AL)[5]是分类中的有效工具,对于多标签学习问题与传统的半监督学习方法相比,AL可以更快地训练深度网络。

基于通信特征提取和IP聚集的僵尸网络相似性度量模型

基于通信特征提取和IP聚集的僵尸网络相似性度量模型
D 号 : 0 3 2 / P J 1 1. 0 0 0 0 5 OI 1 . 7 4 S .. 0 6 2 1 . 0 4
中 图 法分 类 号 TP 9 33

M o ei t e s d lng Bo n t ’S m ia iy Ba e n Co m u c to a u e Ex r c i n a i l rt s d o m ni a i n Fe t r t a to nd
po e o b ni g t o e m e rc e i e s d by c m i n h s t i s m nton d. Ex rm e s a e c r i d ou o a i to r — pe i nt r a re t f r v lda i n pu po s s, h o i nc h c ur c s e a u t d a d s w n, a d t i a i n s t ton o o ne e t e c nfde eoft e a c a y i v l a e n ho n he m gr to iua i f b t t
I smby P As e l
I n H e g W ANG i g H u . Ru — n ” I M n— a J A a I Y n
”( c o l f C mp t ,Na in lU ie st f De e s T c n lg S h o o o ue r t a n v ri o f n e eh o o y. n n 4 0 7 ) o y Hu a 1 0 3 ( t n l o u e t r me g n y R s o s Teh ia e m/ o r ia inC n e f C ia。B iig 1 0 2 ) Na i a mp trNe o C wo k E r e c e p n e c n c lT a C o d n t e tro h n o ejn 0 0 9

深度学习及其应用期末测试练习题及答案

深度学习及其应用期末测试练习题及答案

一、单选题1、对于某卷积层,关于卷积核大小的描述(假设通道数固定)正确的是哪个?A.卷积核越小,更新参数的计算量越少,但更容易得到局部的特征。

B.卷积核越大,其取得的特征越全面,得到的特征图越大。

C.卷积核越大,越容易提取细节特征D.卷积核只能选择3、5、7等奇数值。

正确答案:A2、下面有关神经网络梯度消失说法错误的是()A.当神经网络的隐层增加时,就容易发生梯度消失问题,表现在靠近输入层的权重难以更新。

B.网络梯度消失可以通过改变隐层和输出层的神经元激活函数减弱。

C.网络梯度消失可能导致有些权重难以更新,导致网路训练失败。

D.网络梯度消失可以通过减少隐层神经元的个数减弱。

正确答案:D3、假设卷积神经网络某隐层的特征图大小是19*19*8,其中8是通道数,使用大小为3*3的12个卷积核,步长为2,没有padding对此隐层进行操作,得到的特征图大小是?A.8*8*8B.8*8*12C.9*9*12D.14*14*8正确答案:C4、卷积神经网络隐层神经元的数量与下面哪些因素无关?A.输入图像大小B.卷积核大小C.步长D.激活函数正确答案:D5、以下哪个有关卷积神经网络的说法是错误的?A.输入一个300*300的彩色图,经过10个5*5的卷积核,隐层的参数量是260(含偏置)B.使用激活函数Relu的收敛速度比Sigmoid要快一些C.隐层的神经元输入输出可以看成一个相关权重和偏置的复合非线性多元函数。

D.在网络规模相同的情况下,增加网络深度比增加宽度能带来更强的网络特征获取能力正确答案:A6、以下哪个关于卷积神经网络的说法是错误的?A.卷积神经网络训练时值学习每层神经元的阈值B.AlexNet是一个8层的卷积神经网络C.目标检测网络Yolo网络结构中包含卷积层D.典型的卷积神经网络是由卷积层、池化层和全连接层等组成正确答案:A7、下列对于生成式对抗网络的叙述,哪个是错误的?A.训练可能不稳定B.可以产生清晰且真实的样本C.仅由一个生成网络与一个判别网络组成D.属于无监督学习正确答案:C8、假设卷积神经网络某卷积层的输入和输出特征图大小分别为63*63*16和33*33*64,卷积核大小是3*3,步长为2,那么Padding 值为多少?A.0B.3C.2D.1正确答案:C9、有关一般卷积神经网络的组成,下面哪种说法是正确的?A.卷积神经网络的层次结构依次是由输入层、卷积层、池化层、激活层和全连接层组成B.卷积神经网络的层次结构依次是由输入层、池化层、卷积层、激活层和全连接层组成C.卷积神经网络的层次结构依次是由输入层、卷积层、激活层、池化层和全连接层组成D.卷积神经网络的层次结构依次是由输入层、激活层、卷积层、池化层和全连接层组成正确答案:C10、有关卷积神经网络的说法哪个是正确的?A.在卷积层后面使用池化操作,可以减少网络可以训练的参数量B.1*1的卷积没有改变特征图的大小,因此没有获得新的特征C.不同卷积层或同一卷积层只能用一种大小的卷积核D.类似AlexNet网络使用的分组卷积可以增加卷积层的参数量,降低网络训练速度正确答案:A11、有关循环神经网络激活函数的说法,以下哪个是错误的?A.ReLU可以减少循环神经网络的梯度消失问题B.Sigmoid函数相对于Tanh函数来说更容易导致梯度消失C.取Tanh或Sigmoid函数作为激活函数,做梯度下降时,偏导数是一堆小数在做乘法,容易导致网络梯度消失。

路由器组播配置命令参考

路由器组播配置命令参考
第二章 IGMP配置任务列表.........................................................................................................16 2.1.1 clear ip igmp group ................................................................................................16 2.1.2 clear ip igmp interface............................................................................................17 2.1.3 ip igmp access-group..............................................................................................18 2.1.4 ip igmp immediate-leave group-list .......................................................................19 2.1.5 ip igmp last-member-query-count ..........................................................................20 2.1.6 ip igmp last-member-query-interval.......................................................................20 2.1.7 ip igmp limit (接口配置) .......................................................................................21 2.1.8 ip igmp query-interval............................................................................................22 2.1.9 ip igmp query-max-response-time .........................................................................23 2.1.10 ip igmp query-timeout..........................................................................................23 2.1.11 ip igmp robustness-variable..................................................................................24 2.1.12 ip igmp version.....................................................................................................25 2.1.13 ip igmp join-group................................................................................................26 2.1.14 ip igmp static-group .............................................................................................26 2.1.15 ip igmp immediate-leave group-list .....................................................................27 2.1.16 ip igmp limit (全局配置) .....................................................................................28 2.1.17 ip igmp proxy-service ..........................................................................................29 2.1.18 ip igmp mroute-proxy ..........................................................................................30 2.1.19 ip igmp ssm-map enable.......................................................................................30

第六届全国生物信息学与系统生物学学术大会

第六届全国生物信息学与系统生物学学术大会

第六届全国生物信息学与系统生物学学术大会
暨国际生物信息学前沿研讨会
会议时间:2014年10月6日— 9日
会议地点:南京市中山东路307号钟山宾馆(江苏省会议中心)
会议日程概要
会议期间联系:侯越,谢建明,孙啸
会议日程
3
四、主题报告、专题报告(三)10月7日下午,309会议室
五、10月8日上午, 三楼大会堂
六、主题报告、专题报告(四)10月8日下午,307会议室
5
八、主题报告、专题报告(六)10月8日下午,309会议室
九、会议墙报交流10月8日晚上,20:00开始,金陵厅
十、青年沙龙10月8日晚上,20:00开始,307会议室
欢迎青年科研工作者参加。

7
十一、10月9日上午, 三楼大会堂。

支持向量机在网络异常入侵检测中的应用研究

支持向量机在网络异常入侵检测中的应用研究
d f c l t b an s f ce t r i i g d t e ew r n i n n . C re tn t r nr s n d t cin h sh g i iu t o o t i u f in an n aa i a r a n t o k e v r me t u r n ewo k i tu i ee t a ih i t n l o o o
真。仿真结 果表 明, 小样本数据 的支持 向量机有较高的 网络入侵 检测准确率 , 有较好 的实 时性 , 具 是一种高 效 、 误报 和漏报
率低 的网络异常入侵检测方法 。 关键词 : 向量机 ; 支持 网络异常入侵 ; 检测
中图分类号:P 9 .8 T 33 0 文献标 识码: B .
第2卷 第7 8 期
文章编号 :0 6 9 4 ( 0 1 0 - 15 0 10 — 3 8 2 1 )7 0 3 — 3



仿

21年7 0 究
郭成 芳
( 河北劳动关系职业学院 , 河北 石家庄 0 0 0 ) 5 0 2 摘要 : 研究网络 安全 问题 , 针对对 网络异常入侵检测数据 的特征进行提取 , 用传统异常入侵检测算法存在小样本情 况下训练 精度高 , 预测精度低 的过拟合缺 陷, 出现误报和漏报现象 , 出一种基于支持 向量机的 网络异常入侵检测方法 。在 支持向量 提 机的网络 异常入侵检测过程 中, 利用 网格法寻找支持 向量机最优参 数 , 并找到 的最优 参数对 网络异常人侵训 练样本进 行训 练学习 , 得到最优异 常入侵检测模 型, 对入侵检测数据进行预测 。以网络异常入侵标准数据库 D R A 中的数据集进行 了仿 AP
ta io a b oma ee t n i e vl e e d n n telretann a lst e ihd tcin pe iin ti rdt n a n r ld tci sh a i d p n e tO h ag riigsmpe ogthg ee t rcso .I s i l o y o

3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Predicting TCP Throughput From Non-invasive NetworkSamplingAbstract—In this paper,we wish to derive analytic models that predict the performance of TCPflows between specified end-points using routinely observed network characteristics such as loss and delay.The ultimate goal of our approach is to convert network observables into representative user and application relevant performance metrics.The main con-tributions of this paper are in studying which network per-formance data sources are most reflective of session char-acteristics,and then in thoroughly investigating a new TCP model based on[14]that uses non-invasive network samples to predict the throughput of representative TCPflows be-tween given end-points.Keywords—TCP,Aggregation,Modelling,MeasurementsI.I NTRODUCTIONAs the Internet continues to evolve into the dominant commercial communications infrastructure,the need for service verification and quality monitoring is also increas-ing.This is reflected in the emergence of Service Level Agreements(SLAs)between providers and their(business) customers,which specify various levels of service guaran-tees that are to be met.Service guarantees are often speci-fied using aggregate measures,e.g.,a minimum bandwidth guarantee between sites,but the performance measures of real interest are usually the level of performance that in-dividual users and applications experience.As TCP[2] traffic represents about83%of the packets and91%of the bytes on the Internet1,monitoring TCP performance is a key step towards predicting,monitoring and analyzing network performance from an end-user perspective.In this paper,we wish to derive analytic models that predict the performance of TCPflows between specified end-points using routinely observed network characteris-tics such as loss and delay.The ultimate goal of our ap-proach is to convert network observables into representa-tive user and application relevant performance metrics.In doing so,we seek to draw upon three different approaches to performance characterization-network sampling,ap-plication sampling and analytic modeling.How does our approach relate to each of the above and to previous works on similar topics?Service providers routinely sample performance and fault data in the network,and many of them advertise de-See /outreach/papers/for recent y and loss information between city pairs as one form of feedback to customers.For scalability reasons,carriers use non-invasive sources;for example,loss and through-put data available from routers SNMP MIBs,or delay es-timates obtained from probes exchanged between routers; rather than invasive information obtained from stateful in-spection of individualflows.In order for this data to be meaningful to individual users,it must be transformed into a user/application specific metrics.Undertaking this trans-formation in the context of TCP is the focus of this paper. An alternative approach to user relevant monitoring is through application sampling.Several vendors offer SLA assurance software for periodically initiating and measur-ing web transfers,file transfer,email and other services between pre-defined end-points.While quite simple to implement and use,application sampling suffers from a number of limitations.Such sampling cannot distinguish between different factors that contribute to application per-formance.For instance,sampling web download per-formance composites DNS lookup times,web server la-tencies,as well as congestion in different network seg-ments.If the hosting provider is different from the net-work provider,it is difficult to decide which of them is responsible for poor performance.The lack of an under-lying model and inability to decompose result in unnec-essary over-sampling.For instance,web page download times cannot be re-used to predict FTP performance;nor can information be shared between web downloads pass-ing through the same bottleneck.Rather than treat the net-work as a“black box”,our approach allows information sharing between carrier and customer,with scalability and infrastructure savings as primary advantages.Of particular relevance to this paper is the extensive lit-erature on analytic modeling of TCP behavior targeting different environments[9],[11],[8],[14],[7],[3],[17], [18],[20].A direct approach to our goal would be to use network data to estimate model parameters.In doing so, we need to consider two related issues.How should the network be sampled?By polling MIBs in routers or by probing the network with end-to-end pings,for instance? The second issue is that of transforming the raw samples into into input parameters of the chosen model.We ruled out several analytic models because of the infeasibility of estimating their input parameters.For instance,some models use parameters such as“loss events”)the event of aTCPflow reducing its congestion window)that cannot be estimated from non-invasive network observables;some others depending on loss correlations between successive packets of a TCP session can work only with a mechanism that inspects packets on a per-session granularity;yet oth-ers are tailored to restricted environments.Given such con-straints,we tried instead to pick an analytically sound and well-tested model,and see how far we could go in retro-fitting network observables to model inputs.The model proposed in[14](henceforth called the Amherst Model), turned out to be a good starting point for our investiga-tions.While the straightforward approach of directly esti-mating Amherst Model parameters from network samples produced inaccurate results(see Section III),we were able to produce a more reliable variant based directly on net-work observables.A.ContributionsThe motivation for this paper is the need for user rel-evant performance metrics based on observable network data.Our work is a modest but necessary step towards this ambitious goal–we investigate the selection and transfor-mation of network data into metrics based on the predicted throughput of long-lived TCPflows.The main contributions of this paper are two-fold.First we investigate how to sample the network to obtain re-liable and accurate estimates of important network char-acteristics like Round-trip time(RTT)and loss rates.In this respect,it is important to understand how and when network observables are good estimators of TCP session observables.The importance of this contribution is evi-dent as even the most accurate TCP model will be ren-dered ineffective if the required input parameter values can not be determined accurately.The second contribu-tion is the development of a model capable of predicting steady state TCP throughput reasonably accurately,using only the input parameters that can be easily obtained in a non-invasive fashion.As mentioned earlier,the new model builds on the Amherst model of[14],but includes a number of non-trivial enhancements that improved overall model accuracy.The model was evaluated for a wide range of configurations using both testbed experiments and sim-ulations and found to predict steady state TCP throughput reasonably well,at least in scenarios where the network monitoring information available to the model was itself reasonably accurate.The rest of this paper is structured as follows.Sec-tion II discusses the feasibility and limitations of sampling network information.It reviews the various non-invasive methods we rely on,as well as their ability to estimate network properties accurately in variety of settings.Sec-tion IIIfirst examines the feasibility of transforming net-work observables into parameter estimates in the Amherst model.The resulting inaccuracies in TCP throughput pre-diction lead us to develop a new model better suited to the use of network information acquired in a non invasive manner.The performance of the new model is investigated for a wide range of network conditions and loss rates in Section IV,while Section V summarizes thefindings of the paper.II.Non-invasive E STIMATION OF N ETWORKP ROPERTIESThe information needed to predict the throughput of TCPflows consists of session level information such as packet size,retransmission timer granularity,maximum congestion window size,use of delayed acks,etc.,and of network level information such as sequence of successive round trip times and or losses.We are interested in the lat-ter category,as session level information can be regarded as chosen a priori while defining representativeflows.Fur-ther,analytic models of TCP performance use some sim-plified characteristic of the delay and loss sequences as predictors,rather than the sequences themselves.In this section,we examine loss and delay characteristics that can be derived from non-invasive network sampling,with a view to selecting and developing models that use them. work based parameters:What loss characteristicsto estimate?In predicting TCP throughput,there are a number of “plausible”loss models one can envision.The simplest one assumes random losses,i.e.,packet losses are modeled as a sequence of independent Bernoulli trials with param-eter equal to the loss rate.Such a parameter is easily esti-mated from the ratio of the numbers of lost and transmitted packets.More sophisticated models assume that losses are correlated in nature.Generally,these models assume that losses occur with probability as long as the system is not “congested”,and that they occur with probabilityafter the“first”loss,which is used to identify the start of a congestion period.These models require the estimation of two parameters,and,as well as the determination of the duration of a congestion period once it has started.Nei-ther of these tasks is straightforward,especially if they are to be performed using non-invasive procedures.Hence in this paper,we have presented only the random loss model. The results indicate that the model provides fairly accurate estimates of long term TCP throughput for a wide range of network conditions and loss rates.B.Techniques for Non-invasive Estimation:Polling andProbingThis section focuses on non-invasive estimation proce-dures and their use in estimating parameters of interest in the context of TCP throughput prediction.This means that rather than examining tcpdump traces or performingflow level monitoring to estimate loss probabilities,we would like to rely instead on information that is routinely gath-ered using basic network probing and polling mechanisms. The characteristics as well as the pros and cons of these two mechanisms are reviewed next.Probing:Probes can easily be implemented using exist-ing mechanisms such as ping packets sent from ingress towards egress routers.The ratio of probe packets lost and sent gives an estimate of loss rate while each reply to the ping probe provides a sample for the RTT.RTT samples obtained by ping probes can be used to maintain smoothed RTT(srtt)and smoothed mean deviation in RTT (rttvar)values[15],[19].These values along with that of clock granularity()can be used to estimate’first’re-transmission timeout value()using the well-known for-mula[15],[6]:(1) If the retransmission timeout value comes out to be less than1second,it is rounded up to1second[15].Hence,it is not crucial to have a very good estimate for rttvar unless it will make significant difference to T0values.The main advantage of probing methods is that they sample a complete network segment.As a result,they can provide direct estimates of end-to-end loss probabil-ities and round-trip times.However,our experiments sug-gested that while probing methods provide a good estimate of RTT(and timeout durations),the performance is not quite satisfactory for estimating loss rates as observed by the TCPflows[5].(1)probe packets do not sample net-work queues in the same fashion as TCPflows.We tried to rectify this problem by emulating the bursty or’ack paced’nature of TCPflows in our probing applications.Specif-ically,we experimented with a back-to-back and an ack-paced probing algorithm.Back-to-back probing involves sending all the packets in a single round of probing back to back while in ack-paced probing the timing between probe replies determines the timing between probe pack-ets in next round of probing.However,these specialized probing applications resulted in only a marginal improve-ment in the loss rate estimates.(2)Probe loss estimates are significantly affected by the number of packets in a round of probing,the inter-probe delay,the frequency of probing rounds and the packet size used in probes.(3)Loss es-timates obtained from probes converge slowly.(4)Probe packets do not always follow the same path or get the same treatment as the data packets.Infigure1,we show sample simulation results regard-ing the performance of the probing techniques in estimat-ing loss rates for a set of TCPflows passing through two congested routers with RED[4]buffers.In these simula-tions,the probing application sent4probes(of same size as the packets of TCPflows)in each round of probing and was frequent enough to consume0.5%of the bottleneck link bandwidth.Other simulation details can be seen later in the paper in section IV-B.It can be observed that ack-paced probing provides much better estimates than back-to-back probing but still the performance is far from satis-factory.Thefigure also shows that the loss rate estimates obtained from SNMP MIBs are quite good.These and other similar results led us to conclude that it is not easy to obtain accurate estimates of network loss rates as observed by TCPflows using probing methods.As we discuss next, a much better job can be done by polling SNMP MIBs on the routers.Polling:This refers to the periodic querying of the SNMP MIBs maintained in the routers to retrieve perfor-mance data.For example,the Interfaces table of SNMP MIB-II[12]can provide information regarding the number of transmitted and lost packets and the length of the output packet queue.The number of transmitted and lost packets can be used to obtain loss rate at the router while the length of the output packet queue can provide an estimate for the queueing delays which can be combined with propagation delays to obtain an estimate for the round trip time.One advantage of router MIBs is that they automatically aggre-gate statistics over time and do not require the transmis-sion of numerous(probe)packets into the network.The overhead of MIB polling is primarily dictated by the fre-quency at which the polling occurs,and there is a trade-off between the associated message and processing overhead, and the accuracy with which changes in network param-eters are being tracked.The MIB statistics are typically maintained at the interface level,so that the performance measures they track are for the aggregate traffic crossing that interface,and as with probes,those can differ from what individual TCPflows experience.In this respect,we found that the buffer management policy used at the inter-faces can have a significant effect.For RED[4]buffers,the random nature of packet drop tends to minimize the differ-ence between aggregate and individual loss rates.How-ever,for droptail buffers the differences can be significant especially for the small default buffer sizes.Infigure2, we present the loss rates experienced by TCPflows with different RTTs and the MIB loss rate for RED and droptail0.0009765620.001953120.003906250.00781250.0156250.031250.06250.1250.250.50510152025303540Simulation IDEstimating p for random loss modelActualfrom btb pingsfrom ack paced pingsfrom router MIBsFig.1.Loss Rate Estimates for Two Bottleneck RED RouterSimulations.MIB losses on individual routers were com-bined using ’Independent Loss’Assumption.buffers in our testbed experiments 2.Clearly,with default sized droptail buffers,the MIB loss rate is not a good esti-mate for the loss rates suffered by TCP flows.Our simula-tion results indicate that for droptail the situation does not improve even with increased buffer sizes [5].However,for RED buffers,the MIB loss rate can serve as a good estimate for TCP flow loss rates with accuracy improving as the buffer size increases.The improvement in estimate accuracy with increased buffer size can be explained as a result of increased randomness in packet drop.Since SNMP MIBs provide information specific to a single router (interface),generating end-to-end statistics requires combining MIB information from all bottleneck routers on the path of a flow.Generally a TCP flow’s path on the Internet is characterized by just one or two bottle-necks (on access links to high capacity backbone).Hence the problem of obtaining end-to-end loss rate is not that severe.Further,in general,the two bottleneck links on the path of a flow will be quite far away from each other and the traffic causing congestion in these links will be quite unrelated.Thus,it may be assumed that the losses at dif-ferent bottleneck routers on the path of a flow are indepen-dent in nature and can be accordingly combined to obtain end-to-end loss rates.Figure 1shows sample simulation results in this regard.It can be seen that ’independent loss’assumption provides quite satisfactory estimates of actual end-to-end loss rates.III.TCP T HROUGHPUT P REDICTION M ODELS B ASEDON N ON -I NVASIVELY O BTAINED P ARAMETERS In this section,we first briefly review why it is difficult to apply popular Amherst model to the setting where net-Testbed details are provided in section IV-A.0.020.040.060.080.10.120.140510152025L o s s R a t eExpt IDLoss RatesMIB Loss RateAvg Loss Rate for Large RTT flows Avg Loss Rate for Small RTT flows(a)Droptail Experiments (default buffer size:40packets)0.010.020.030.040.050.060.070.080510152025L o s s R a t eExpt IDLoss RatesMIB Loss RateAvg Loss Rate for Large RTT flows Avg Loss Rate for Small RTT flows(b)RED Experiments (buffer 100packets)0.010.020.030.040.050.060.070510152025L o s s R a t eExpt IDLoss RatesMIB Loss RateAvg Loss Rate for Large RTT flows Avg Loss Rate for Small RTT flows(c)RED Experiments (buffer 500packets)0.010.020.030.040.050.060.070510152025L o s s R a t eExpt IDLoss RatesMIB Loss RateAvg Loss Rate for Large RTT flows Avg Loss Rate for Small RTT flows(d)RED Experiments (buffer 1000pack-ets)Fig.2.Loss Rates of Flows with Different RTTs (for TestbedExperiments.)work parameters are assumed to be obtained using only non-invasive procedures.This is then followed by the de-velopment of several modifications and enhancements to the model,which allow for reasonably accurate predic-tions of TCP throughput based only on information ob-tained through non-invasive procedures.A.Motivation for Developing New ModelsWe assume that the reader is familiar with the Amherst Model[14].The model predicts the throughput of a TCP flow based on an expression that involves several param-eters,including average RTT,first time-out duration(), and more important for our purpose,the probability of “first”packet loss in an epoch3.Correctly estimating this parameter is,therefore,key to an accurate throughput pre-diction.In[14],this estimation was carried out based on the number of”loss events”(triple duplicate acks and time-outs)observed for theflow itself.The identification of loss events requires invasiveflow level awareness.Neverthe-less,ourfirst attempt was to determine if it was possible to obtain a reasonable estimate for thefirst packet loss used by the Amherst model,by using only non-invasive proce-dures such as the ones described in Section II.The approach we took was to develop a procedure for computing thefirst packet loss needed by the Amherst model,from the measured overall loss rate obtained using non-invasive procedures(Appendix A).Perform-ing such a mapping required relating the observed num-ber of losses to the number of lost packets(after thefirst loss)given by the loss model used in the Amherst model. Unfortunately,because the Amherst model assumes that, subsequent to thefirst packet loss,all the remaining pack-ets in the window are also lost,the resulting inversion of the observed loss rate into afirst packet loss probability ,is highly inaccurate.As a result and as shown in Fig-ure3,the resulting throughput estimates are also inaccu-rate.Note that this assumption regarding packet losses is of very limited consequence4in the environment assumed by the Amherst model,i.e.,when an accurate estimate is readily available for thefirst packet loss probability.This is,however,not true when we need to derive an estimate for based on the overall observed loss probability.In such a setting,the loss model used for relating these two quantities is of significant importance.Our next step was,therefore,to determine how to mod-ify the Amherst model,in order to use different loss mod-els,i.e.,models that rely on parameters that can be esti-An epoch corresponds to a period of time during which the TCPflow is in congestion avoidance mode and regularly increasing its window.As illustrated in[14],the Amherst model gives reasonably accurate TCP throughput estimates.1e+062e+063e+064e+065e+066e+067e+060510152025 ThruputExpt IDThruputAvg Thruput for Large RTT flowsAmherst Model prediction for Large RTT flows after inverting pAvg Thruput for Small RTT flowsAmherst Model prediction for small RTT flows after inverting pFig.3.Performance of the Amherst Model With First Loss Probability Estimated From Overall Loss Rate.(Results for RED experiments with100packet long buffers)mated using non-invasive procedures,such as the random loss model introduced in Section II.In the random loss model,packets are lost randomly with a loss probability.For such a loss model,the prob-ability that after thefirst packet loss in an epoch, a total of packets,including thefirst loss,are lost in the following window of size is given by:(2) where the window size is restricted to integer values. Before proceeding with the derivation of the model,we briefly point to two important modifications we introduce to the approach used by the Amherst model.Thefirst modification was in the computation of the probability of a retransmission time-out.In the Amherst Model,a re-transmission time-out is avoided if three duplicate acks are received after thefirst lost packet,and the corresponding probability is computed as the probability of being able to successfully transmit3or more packets after thefirst packet loss.Because of the particular loss model used by the Amherst model(after thefirst packet loss,all remain-ing packets in the window are assumed lost),this compu-tation is somewhat inaccurate.Our goal was,therefore,to develop a more precise model for computing the probabil-ity of retransmission time-out.One that would incorporate both the size of the congestion window at the time of thefirst loss,and the likelihood of losing a certain number of packets after thefirst packet loss.This required a care-ful enumeration of the different possible loss scenarios for a given window size,and this is treated in details in the larger version of the paper[5].The main result of this in-vestigation is summarized in equation(3),which indicates that a loss of3or more packets in the window(typically) leads to a retransmission timeout.ififotherwise(3) where is the probability that a timeout will take place when is the window size at the time of packet loss.As before,represents the probability of los-ing packets out of a window of packets,starting with thefirst lost packet.The second main modification we introduce is in the de-termination of the initial congestion window at the begin-ning of an epoch.In the case of the Amherst Model,this initial window is taken to always be half of the window size at the end of the previous epoch,irrespective of the actual number of losses that trigger the end of the epoch. Such an assumption is not likely to be much of a concern for SACK[10]implementations of TCP.However,in TCP Reno implementations,which still comprise about% of currently deployed implementations[1],the congestion window can be reduced by more than a half depending on the number of losses.This is significant,as it can be shown that for the same total number of packets transmitted in an epoch,the duration of the epoch,i.e.,the number of rounds,is larger when the initial window size is smaller. The implication of this result,is that always starting with the largest possible initial window size,as is done in the Amherst Model,can translate in over-estimates of the ac-tual throughput,because it under-estimates the amount of time needed to transmit a given number of packets.Hence, it is desirable to develop a model that relates the initial window size to thefinal window size in the previous epoch and to the number of losses that ended the epoch.For that purpose,we assume,as in the Amherst Model, that the steady state of aflow can be characterized by a sequence of similar epochs,with each epoch starting with a window of size and ending with a window of size.Let be the probability that equals.After an analy-sis similar to the one performed for retransmission timeout probability(details in[5]),we can obtain the following ex-pressions for:ifotherwise(4)ifotherwise(5)(6) where as before,is the probability of losing packets out of a window of packets starting with the first lost packet.Thus,the initial window size,instead of always being set to(7) In the next section,we bring together the two modifi-cations we have just outlined and the random loss model discussed earlier,to generate a new TCP throughput pre-diction model.As stated before,our goal is to develop a modified model that can operate on the basis of global net-work performance parameters that can be estimated using non-invasive procedures.B.A Modified Model for Bulk TCP Throughput Prediction In this section,we present a’cyclical’model for bulk transfer TCP throughput prediction.By’cyclical’we mean that the steady state of a Reno TCPflow can be characterized as a sequence of epochs during which the flow increases its congestion window linearly from an ini-tial value to afinal value with a slope of1packet per rounds.Here a round corresponds to the time during which the TCPflow sends a congestion window worth of packets and is the number of packets received before a TCP destination sends an ack back to the source.As in the Amherst Model,we assume that the duration of a round is independent of the congestion window size,and that an epoch consists of a congestion avoidance phase pos-sibly followed by a timeout phase.For simplicity,we ig-nored packets sent during the slow start and fast retransmit phases,although the latter were taken into consideration when computing time-out probabilities[5].The number of packets sent in the congestion avoidance phase of an epoch is determined by the packet loss prob-ability.Starting from the beginning of an epoch,let the th packet be thefirst one to be lost.The returning acks of the preceding successfully transmitted packets in the win-dow will allow the TCPflow to send more packets before the packet loss is detected.Thus,the total numberof packets sent in the congestion avoidance phase of the epoch is given by.Now,the probability that is equal to the probability that packets were successfully transmitted before a loss occurs,which for the random loss model we consider is given by(8) Thus,the expected value of is(10)The number of packets sent in the congestion avoidance phase of an epoch can also be written in terms of and .After thefirst lost packet,the TCPflow sendsmore packets before the packet loss is detected.Some of these packets are sent in the same round as thefirst lost packet,and the remaining packets constitute what we term another short round.Therefore the total number of packets sent in the congestion avoidance phase of an epoch can also be written as:.Therefore,the expected value of is given by:(13) Equations(10)and(13)provide two different ways for expressing the total number of packets sent in the conges-tion avoidance phase of an epoch.By equating these two expressions and simplifying we get:(15)(17) In case turns out to be more than,the max-imum permissible congestion window size,the formula above changes to:(19)。

相关文档
最新文档