949 resultados para Packet-pair probing
Resumo:
The development and deployment of distributed network-aware applications and services over the Internet require the ability to compile and maintain a model of the underlying network resources with respect to (one or more) characteristic properties of interest. To be manageable, such models must be compact, and must enable a representation of properties along temporal, spatial, and measurement resolution dimensions. In this paper, we propose a general framework for the construction of such metric-induced models using end-to-end measurements. We instantiate our approach using one such property, packet loss rates, and present an analytical framework for the characterization of Internet loss topologies. From the perspective of a server the loss topology is a logical tree rooted at the server with clients at its leaves, in which edges represent lossy paths between a pair of internal network nodes. We show how end-to-end unicast packet probing techniques could b e used to (1) infer a loss topology and (2) identify the loss rates of links in an existing loss topology. Correct, efficient inference of loss topology information enables new techniques for aggregate congestion control, QoS admission control, connection scheduling and mirror site selection. We report on simulation, implementation, and Internet deployment results that show the effectiveness of our approach and its robustness in terms of its accuracy and convergence over a wide range of network conditions.
Resumo:
Current Internet transport protocols make end-to-end measurements and maintain per-connection state to regulate the use of shared network resources. When two or more such connections share a common endpoint, there is an opportunity to correlate the end-to-end measurements made by these protocols to better diagnose and control the use of shared resources. We develop packet probing techniques to determine whether a pair of connections experience shared congestion. Correct, efficient diagnoses could enable new techniques for aggregate congestion control, QoS admission control, connection scheduling and mirror site selection. Our extensive simulation results demonstrate that the conditional (Bayesian) probing approach we employ provides superior accuracy, converges faster, and tolerates a wider range of network conditions than recently proposed memoryless (Markovian) probing approaches for addressing this opportunity.
Resumo:
Accurate measurement of network bandwidth is crucial for flexible Internet applications and protocols which actively manage and dynamically adapt to changing utilization of network resources. These applications must do so to perform tasks such as distributing and delivering high-bandwidth media, scheduling service requests and performing admission control. Extensive work has focused on two approaches to measuring bandwidth: measuring it hop-by-hop, and measuring it end-to-end along a path. Unfortunately, best-practice techniques for the former are inefficient and techniques for the latter are only able to observe bottlenecks visible at end-to-end scope. In this paper, we develop and simulate end-to-end probing methods which can measure bottleneck bandwidth along arbitrary, targeted subpaths of a path in the network, including subpaths shared by a set of flows. As another important contribution, we describe a number of practical applications which we foresee as standing to benefit from solutions to this problem, especially in emerging, flexible network architectures such as overlay networks, ad-hoc networks, peer-to-peer architectures and massively accessed content servers.
Resumo:
We propose a two band model for superconductivity. It turns out that the simplest nontrivial case considers solely interband scattering, and both bands can be modeled as symmetric (around the Fermi level) and flat, thus each band is completely characterized by its half-band width Wn (n=1,2). A useful dimensionless parameter is d, proportional to W2 - W1. The case delta = 0 retrieves the conventional BCS model. We probe the specific heat, the ratio gap over critical temperature, the thermodynamic critical field and tunneling conductance as functions of d and temperature (from zero to Tc). We compare our results with experimental results for MgB2 and good quantitative agreement is obtained, indicating the relevance of interband coupling. Work in progress also considers the inclusion of band hybridization and general interband as well as intra-band scattering mechanisms.
Resumo:
We explore the use of polarized e(+)/e(-) beams and/or the information on final state decay lepton polarizations in probing the interaction of the Higgs boson with a pair of vector bosons. A model independent analysis of the process e(+)e(-) -> f (f) over barH, where f is any light fermion, is carried out through the construction of observables having identical properties under the discrete symmetry transformations as different individual anomalous interactions. This allows us to probe an individual anomalous term independent of the others. We find that initial state beam polarization can significantly improve the sensitivity to CP-odd couplings of the Z boson with the Higgs boson (ZZH). Moreover, an ability to isolate events with a particular tau helicity, with even 40% efficiency, can improve sensitivities to certain ZZH couplings by as much as a factor of 3. In addition, the contamination from the ZZH vertex contributions present in the measurement of the trilinear Higgs-W (WWH) couplings can be reduced to a great extent by employing polarized beams. The effects of initial state radiation and beamstrahlung, which can be relevant for higher values of the beam energy are also included in the analysis.
Resumo:
The recently discovered scalar resonance at the Large Hadron Collider is now almost confirmed to be a Higgs boson, whose CP properties are yet to be established. At the International Linear Collider with and without polarized beams, it may be possible to probe these properties at high precision. In this work, we study the possibility of probing departures from the pure CP-even case, by using the decay distributions in the process e(+)e(-) -> t (t) over bar Phi, with Phi mainly decaying into a b (b) over bar pair. We have compared the case of a minimal extension of the Standard Model case (model I) with an additional pseudoscalar degree of freedom, with a more realistic case namely the CP-violating two-Higgs doublet model (model II) that permits a more general description of the couplings. We have considered the International Linear Collider with root s = 800 GeV and integrated luminosity of 300 fb(-1). Our main findings are that even in the case of small departures from the CP-even case, the decay distributions are sensitive to the presence of a CP-odd component in model II, while it is difficult to probe these departures in model I unless the pseudoscalar component is very large. Noting that the proposed degrees of beam polarization increase the statistics, the process demonstrates the effective role of beam polarization in studies beyond the Standard Model. Further, our study shows that an indefinite CP Higgs would be a sensitive laboratory to physics beyond the Standard Model.
Resumo:
In geographical forwarding of packets in a large wireless sensor network (WSN) with sleep-wake cycling nodes, we are interested in the local decision problem faced by a node that has ``custody'' of a packet and has to choose one among a set of next-hop relay nodes to forward the packet toward the sink. Each relay is associated with a ``reward'' that summarizes the benefit of forwarding the packet through that relay. We seek a solution to this local problem, the idea being that such a solution, if adopted by every node, could provide a reasonable heuristic for the end-to-end forwarding problem. Toward this end, we propose a local relay selection problem consisting of a forwarding node and a collection of relay nodes, with the relays waking up sequentially at random times. At each relay wake-up instant, the forwarder can choose to probe a relay to learn its reward value, based on which the forwarder can then decide whether to stop (and forward its packet to the chosen relay) or to continue to wait for further relays to wake up. The forwarder's objective is to select a relay so as to minimize a combination of waiting delay, reward, and probing cost. The local decision problem can be considered as a variant of the asset selling problem studied in the operations research literature. We formulate the local problem as a Markov decision process (MDP) and characterize the solution in terms of stopping sets and probing sets. We provide results illustrating the structure of the stopping sets, namely, the (lower bound) threshold and the stage independence properties. Regarding the probing sets, we make an interesting conjecture that these sets are characterized by upper bounds. Through simulation experiments, we provide valuable insights into the performance of the optimal local forwarding and its use as an end-to-end forwarding heuristic.
Resumo:
We investigate methods to explore the CP nature of the t (t) over barh coupling at the LHC, focusing on associated production of the Higgs boson with a t (t) over bar pair. We first discuss the constraints implied by low-energy observables and by the Higgs-rate information from available LHC data, emphasizing that they cannot provide conclusive evidence on the nature of this coupling. We then investigate kinematic observables that could probe the t (t) over barh coupling directly, in particular, quantities that can be constructed out of just laboratory-frame kinematics. We define one such observable by exploiting the fact that t (t) over bar spin correlations do also carry information about the CP nature of the t (t) over barh coupling. Finally, we introduce a CP-odd quantity and a related asymmetry, able to probe CP violation in the t (t) over barh coupling and likewise, constructed out of laboratory-frame momenta only.
Resumo:
The structure of phenylalanine transfer ribonucleic acid (tRNA(Phe)) in solution was explored by H-1 NMR spectroscopy to evaluate the effect of lanthanide ion on the structural and conformational change. It was found that La3+ ions possess specific effects on the imino proton region of the H-1 NMR spectra for yeast tRNA(Phe). The dependence of the imino proton spectra of yeast tRNA(Phe) as a function of La3+ concentration was examined, and the results suggest that the tertiary base pair G(15). C-48, which is located in the terminal in the augmented dihydrouridine helix (D-helix), was markedly affected by La3+ (shifted to downfield by as much as 0.35). Base pair U-8. A(14) in yeast tRNA(Phe), which are stacked on G(15). C-48, was also affected by added La3+ when 1 similar to 2 Mg2+ were also present. Another imino proton that may be affected by La3+ in yeast tRNA(Phe) is that of the tertiary base pair G(19). C-56. The assignment of this resonance in yeast tRNA(Phe) is tentative since it is located in the region of highly overlapping resonances beween 12.6 and 12.2. This base pair helps to anchor the D-loop to the T Psi C loop. The binding of La3+ caused conformational change of tRNA, which is responsible for shifts to upfield or downfield in H-1 NMR spectra.
Resumo:
Growing interest in inference and prediction of network characteristics is justified by its importance for a variety of network-aware applications. One widely adopted strategy to characterize network conditions relies on active, end-to-end probing of the network. Active end-to-end probing techniques differ in (1) the structural composition of the probes they use (e.g., number and size of packets, the destination of various packets, the protocols used, etc.), (2) the entity making the measurements (e.g. sender vs. receiver), and (3) the techniques used to combine measurements in order to infer specific metrics of interest. In this paper, we present Periscope: a Linux API that enables the definition of new probing structures and inference techniques from user space through a flexible interface. PeriScope requires no support from clients beyond the ability to respond to ICMP ECHO REQUESTs and is designed to minimize user/kernel crossings and to ensure various constraints (e.g., back-to-back packet transmissions, fine-grained timing measurements) We show how to use Periscope for two different probing purposes, namely the measurement of shared packet losses between pairs of endpoints and for the measurement of subpath bandwidth. Results from Internet experiments for both of these goals are also presented.
Resumo:
Current Internet transport protocols make end-to-end measurements and maintain per-connection state to regulate the use of shared network resources. When a number of such connections share a common endpoint, that endpoint has the opportunity to correlate these end-to-end measurements to better diagnose and control the use of shared resources. A valuable characterization of such shared resources is the "loss topology". From the perspective of a server with concurrent connections to multiple clients, the loss topology is a logical tree rooted at the server in which edges represent lossy paths between a pair of internal network nodes. We develop an end-to-end unicast packet probing technique and an associated analytical framework to: (1) infer loss topologies, (2) identify loss rates of links in an existing loss topology, and (3) augment a topology to incorporate the arrival of a new connection. Correct, efficient inference of loss topology information enables new techniques for aggregate congestion control, QoS admission control, connection scheduling and mirror site selection. Our extensive simulation results demonstrate that our approach is robust in terms of its accuracy and convergence over a wide range of network conditions.
Resumo:
The duration of startles provides an inverse measure of motivation to resume the previous activity. Here, we use a novel method in which one convict cichlid fish (Amatitlania nigrofasciata) of a competing pair was startled independently of the opponent. Fish were given various opponents and the mean startle duration determined. This mean was negatively correlated with the mean use of highly escalated 'frontal activities' such as biting and frontal display, but not the less escalated lateral displays or tail beating. Thus the startle duration was a reliable surrogate measure of the most escalated components of aggressive interactions. That is, it provided a motivational probe for aggressiveness of individual fish. Fight motivation is often determined in terms of fight duration or physiological costs for losers, who reveal the costs they are prepared to pay. We discuss various potential advantages of the motivational probe over previous measures, particularly with respect to winners and losers and different times during the interactions.
Resumo:
A pair plasma consisting of two types of ions, possessing equal masses and opposite charges, is considered. The nonlinear propagation of modulated electrostatic wave packets is studied by employing a two-fluid plasma model. Considering propagation parallel to the external magnetic field, two distinct electrostatic modes are obtained, namely a quasiacoustic lower moddfe and a Langmuir-like, as optic-type upper one, in agreement with experimental observations and theoretical predictions. Considering small yet weakly nonlinear deviations from equilibrium, and adopting a multiple-scale technique, the basic set of model equations is reduced to a nonlinear Schrodinger equation for the slowly varying electric field perturbation amplitude. The analysis reveals that the lower (acoustic) mode is stable and may propagate in the form of a dark-type envelope soliton (a void) modulating a carrier wave packet, while the upper linear mode is intrinsically unstable, and may favor the formation of bright-type envelope soliton (pulse) modulated wave packets. These results are relevant to recent observations of electrostatic waves in pair-ion (fullerene) plasmas, and also with respect to electron-positron plasma emission in pulsar magnetospheres. (c) 2006 American Institute of Physics.
Resumo:
Femtosecond time-resolved techniques with KETOF (kinetic energy time-of-flight) detection in a molecular beam are developed for studies of the vectorial dynamics of transition states. Application to the dissociation reaction of IHgI is presented. For this system, the complex [I---Hg---I](++)* is unstable and, through the symmetric and asymmetric stretch motions, yields different product fragments: [I---Hg---I](++)* -> HgI(X^2/sigma^+) + I(^2P_3/2) [or I*(^2P_l/2)] (1a); [I---Hg---I](++)* -> Hg(^1S_0) + I(^2P_3/2) + I(^2P_3/2) [or I* (^2P_1/2)] (1 b). These two channels, (1a) and (1b), lead to different kinetic energy distributions in the products. It is shown that the motion of the wave packet in the transition-state region can be observed by MPI mass detection; the transient time ranges from 120 to 300 fs depending on the available energy. With polarized pulses, the vectorial properties (transition moments alignment relative to recoil direction) are studied for fragment separations on the femtosecond time scale. The results indicate the nature of the structure (symmetry properties) and the correlation to final products. For 311-nm excitation, no evidence of crossing between the I and I* potentials is found at the internuclear separations studied. (Results for 287-nm excitation are also presented.) Molecular dynamics simulations and studies by laser-induced fluorescence support these findings.
Resumo:
TCP flows from applications such as the web or ftp are well supported by a Guaranteed Minimum Throughput Service (GMTS), which provides a minimum network throughput to the flow and, if possible, an extra throughput. We propose a scheme for a GMTS using Admission Control (AC) that is able to provide different minimum throughput to different users and that is suitable for "standard" TCP flows. Moreover, we consider a multidomain scenario where the scheme is used in one of the domains, and we propose some mechanisms for the interconnection with neighbor domains. The whole scheme uses a small set of packet classes in a core-stateless network where each class has a different discarding priority in queues assigned to it. The AC method involves only edge nodes and uses a special probing packet flow (marked as the highest discarding priority class) that is sent continuously from ingress to egress through a path. The available throughput in the path is obtained at the egress using measurements of flow aggregates, and then it is sent back to the ingress. At the ingress each flow is detected using an implicit way and then it is admission controlled. If it is accepted, it receives the GMTS and its packets are marked as the lowest discarding priority classes; otherwise, it receives a best-effort service. The scheme is evaluated through simulation in a simple "bottleneck" topology using different traffic loads consisting of "standard" TCP flows that carry files of varying sizes