THE COLUMBIA HOTSPOT RESCUE SERVICE: A RESEARCH PLAN

The technical reports in this series are considered to be semi-formal. The ideas expressed are solely those of the authors, and questions about the content should be directed to them. 1 Introduction Internet performance is unpredictable, and users often find the level of service inadequate. We expect this problem to worsen as the Internet continues to grow, both in the number of users and in the stringency of the requirements of new applications. Intolerable levels of service stem from a lack of sufficient resources being targeted to locations where service quality is lacking. In a system as complex as the Internet, the insufficient resource can be of many types. It may be a server with insufficient processing power to handle a large load of requests. It may be a router at the edge of the network that is forced to carry a heavy load to or from its local area network. It may be a router in the middle of the network that must carry a large load, perhaps connecting a set of ISPs, such that upgrading its performance does not directly increase any company's profits. Lastly, it may be an attacker intentionally trying to bring down a portion of the network. Commonly, the periods of insufficiency are short-lived. In other words, the resources allocated within a network to support a service are sufficient most of the time, but every so often and quite suddenly, there may be a sharp increase in demand, and the resource quickly becomes overwhelmed. Such an event is called a network hotspot [1, 2]. There are several remedies currently available to deal with network hotspots. The easiest, most common solution is to make do with the network as is and deal ad hoc with the unpredictable level of service. A second remedy that works in theory is to " build a better network " in which hot spots do not occur. Here, each network and server component must be provisioned with enough resources to handle the maximum possible short-term overload. However, such overprovisioning is extremely costly, making it an infeasible solution for the majority of network servers and users. Another remedy is for companies to offer content delivery services, such as caching or access to additional network bandwidth [3]. The content delivery company deploys servers throughout the network, and then profits when those wishing to provide information efficiently are forced to pay for access to …

[1]  A. Lazar,et al.  Asymptotic results for multiplexing subexponential on-off processes , 1999, Advances in Applied Probability.

[2]  Mark Crovella,et al.  Measuring Bottleneck Link Speed in Packet-Switched Networks , 1996, Perform. Evaluation.

[3]  Don Towsley,et al.  Asymptotic behavior of a multiplexer fed by a long-range dependent process , 1999, Journal of Applied Probability.

[4]  Ken Thompson,et al.  Plan 9 from Bell Labs , 1995 .

[5]  Abhijit Bose,et al.  Delayed Internet routing convergence , 2000, SIGCOMM.

[6]  Donald F. Towsley,et al.  Multicast-based inference of network-internal characteristics: accuracy of packet loss estimation , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[7]  Azer Bestavros,et al.  Robust identification of shared losses using end-to-end unicast probes , 2000, Proceedings 2000 International Conference on Network Protocols.

[8]  Hari Balakrishnan,et al.  Fine-Grained Failover Using Connection Migration , 2001, USITS.

[9]  Yuval Shavitt,et al.  Constrained mirror placement on the Internet , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[10]  Mary Baker,et al.  Measuring bandwidth , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[11]  Lixin Gao On inferring autonomous system relationships in the internet , 2001, TNET.

[12]  D. Katabi,et al.  A framework for scalable global IP-anycast (GIA) , 2000, CCRV.

[13]  Maurice J. Bach The Design of the UNIX Operating System , 1986 .

[14]  Predrag R. Jelenkovic,et al.  Capacity regions for network multiplexers with heavy-tailed fluid on-off sources , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[15]  Ellen W. Zegura,et al.  Application-layer anycasting: a server selection architecture and use in a replicated Web service , 2000, TNET.

[16]  Paul Francis,et al.  An architecture for a global Internet host distance estimation service , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[17]  Donald F. Towsley,et al.  Detecting shared congestion of flows via end-to-end measurement , 2000, SIGMETRICS '00.

[18]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.

[19]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[20]  Srinivasan Seshan,et al.  SPAND: Shared Passive Network Performance Discovery , 1997, USENIX Symposium on Internet Technologies and Systems.

[21]  Lixia Zhang,et al.  On the placement of Internet instrumentation , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[22]  Predrag R. Jelenkovic,et al.  The Effect of Multiple Time Scales and Subexponentiality in MPEG Video Streams on Queueing Behavior , 1997, IEEE J. Sel. Areas Commun..

[23]  Mary Baker,et al.  Measuring link bandwidths using a deterministic model of packet delay , 2000, SIGCOMM.

[24]  Daniel Pierre Bovet,et al.  Understanding the Linux Kernel , 2000 .