scispace - formally typeset
Search or ask a question
Institution

AT&T Labs

Company
About: AT&T Labs is a based out in . It is known for research contribution in the topics: Network packet & The Internet. The organization has 1879 authors who have published 5595 publications receiving 483151 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: It is proved that the given planning goals cannot be achieved with a smaller area, given the modeling assumptions and data, so an alternate formalization of a minimum range size moving through time is proposed and used to achieve the revised goals, again with the smallest possible newly protected area.
Abstract: We introduce a new way of measuring and optimizing connectivity in conservation landscapes through time, accounting for both the biological needs of multiple species and the social and financial constraint of minimizing land area requiring additional protection. Our method is based on the concept of network flow; we demonstrate its use by optimizing protected areas in the Western Cape of South Africa to facilitate autogenic species shifts in geographic range under climate change for a family of endemic plants, the Cape Proteaceae. In 2005, P. Williams and colleagues introduced a novel framework for this protected area design task. To ensure population viability, they assumed each species should have a range size of at least 100 km 2 of predicted suitable conditions contained in protected areas at all times between 2000 and 2050. The goal was to design multiple dispersal corridors for each species, connecting suitable conditions between time periods, subject to each species' limited dispersal ability, and minimizing the total area requiring additional protection. We show that both minimum range size and limited dispersal abilities can be naturally modeled using the concept of network flow. This allows us to apply well-established tools from operations research and computer science for solving network flow problems. Using the same data and this novel modeling approach, we reduce the area requiring additional protection by a third compared to previous methods, from 4593 km 2 to 3062 km 2 , while still achieving the same conservation planning goals. We prove that this is the best solution mathematically possible: the given planning goals cannot be achieved with a smaller area, given our modeling assumptions and data. Our method allows for flexibility and refinement of the underlying climate-change, species-habitat-suitability, and dispersal models. In particular, we propose an alternate formalization of a minimum range size moving through time and use network flow to achieve the revised goals, again with the smallest possible newly protected area (2850 km 2 ). We show how to relate total dispersal distance to probability of successful dispersal, and compute a trade-off curve between this quantity and the total amount of extra land that must be protected.

160 citations

Proceedings ArticleDOI
01 Jun 1997
TL;DR: This paper presents a method for analysing feedback-based protocols with a Web-user-like input traffic where the source alternates between "transfer" periods followed by "think" periods, and the method based on the Engset model can be applied to analyze other feedback systems.
Abstract: Most of the studies of feedback-based flow and congestion control consider only persistent sources which always have data to send. However, with the rapid growth of Internet applications built on TCP/IP such as the World Wide Web and the standardization of traffic management schemes such as Available Bit Rate (ABR) in Asynchronous Transfer Mode (ATM) networks, it is essential to evaluate the performance of feedback-based protocols using traffic models which are specific to dominant applications. This paper presents a method for analysing feedback-based protocols with a Web-user-like input traffic where the source alternates between "transfer" periods followed by "think" periods. Our key results, which are presented for the TCP protocol, are:(1) The goodputs and the fraction of time that the system has some given number of transferring sources are insensitive to the distributions of transfer (file or page) sizes and think times except through the ratio of their means. Thus, apart from network round-trip times, only the ratio of average transfer sizes and think times of users need be known to size the network for achieving a specific quality of service.(2) The Engset model can be adapted to accurately compute goodputs for TCP and TCP over ATM, with different buffer management schemes. Though only these adaptations are given in the paper, the method based on the Engset model can be applied to analyze other feedback systems, such as ATM ABR, by finding a protocol specific adaptation. Hence, the method we develop is useful not only for analysing TCP using a source model significantly different from the commonly used persistent sources, but also can be useful for analysing other feedback schemes.(3) Comparisons of simulated TCP traffic to measured Ethernet traffic shows qualitatively similar autocorrelation when think times follow a Pareto distribution with infinite variance. Also, the simulated and measured traffic have long range dependence. In this sense our traffic model, which purports to be Web-user-like, also agrees with measured traffic.

159 citations

Proceedings ArticleDOI
08 Jan 2001
TL;DR: This work proposes and evaluates different enhancements to passive caching that reduce the fraction of HTTP connection establishments that are delayed by long DNS resolutions and demonstrates that a significant fraction of cache misses can be eliminated with a moderate overhead.
Abstract: The resolution of a host name to an IP-address is a necessary predecessor to connection establishment and HTTP exchanges. Nonetheless, DNS resolutions often involve multiple remote name-servers and prolong Web response times. To alleviate this problem name servers and Web browsers cache query results. Name servers currently incorporate passive cache management where records are brought into the cache only as a result of clients' requests and are used for the TTL duration (a TTL value is provided with each record). We propose and evaluate different enhancements to passive caching that reduce the fraction of HTTP connection establishments that are delayed by long DNS resolutions. Renewal policies refresh selected expired cached entries by issuing unsolicited queries. Trace-based simulations using Web proxy logs demonstrated that a significant fraction of cache misses can be eliminated with a moderate overhead. Simultaneous-validation (SV) transparently uses expired records. A DNS query is issued if the respective cached entry is no longer fresh, but concurrently, the expired entry is used to connect to the Web server and fetch the requested content. The content is served only if the expired records used turn out to be in agreement with the query response.

159 citations

Journal ArticleDOI
TL;DR: Just Fast Keying is described, a new key-exchange protocol primarily designed for use in the IP security architecture that is simple, efficient, and secure; a proof of the latter property is sketched.
Abstract: We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and secure; we sketch a proof of the latter property. JFK also has a number of novel engineering parameters that permit a variety of tradeoffs, most notably the ability to balance the need for perfect forward secrecy against susceptibility to denial-of-service attacks.

159 citations

Journal ArticleDOI
Joseph Abate, Ward Whitt1
TL;DR: It is shown that the low-priority steady-state waiting-time can be expressed as a geometric random sum of i.i.d. random variables, just like the M/G/1 FIFO waiting- time distribution, and asymptotic results for cases with long-tail service-time distributions are established.
Abstract: We consider the classical M/G/1 queue with two priority classes and the nonpreemptive and preemptive-resume disciplines. We show that the low-priority steady-state waiting-time can be expressed as a geometric random sum of i.i.d. random variables, just like the M/G/1 FIFO waiting-time distribution. We exploit this structures to determine the asymptotic behavior of the tail probabilities. Unlike the FIFO case, there is routinely a region of the parameters such that the tail probabilities have non-exponential asymptotics. This phenomenon even occurs when both service-time distributions are exponential. When non-exponential asymptotics holds, the asymptotic form tends to be determined by the non-exponential asymptotics for the high-priority busy-period distribution. We obtain asymptotic expansions for the low-priority waiting-time distribution by obtaining an asymptotic expansion for the busy-period transform from Kendall’s functional equation. We identify the boundary between the exponential and non-exponential asymptotic regions. For the special cases of an exponential high-priority service-time distribution and of common general service-time distributions, we obtain convenient explicit forms for the low-priority waiting-time transform. We also establish asymptotic results for cases with long-tail service-time distributions. As with FIFO, the exponential asymptotics tend to provide excellent approximations, while the non-exponential asymptotics do not, but the asymptotic relations indicate the general form. In all cases, exact results can be obtained by numerically inverting the waiting-time transform.

159 citations


Authors

Showing all 1881 results

NameH-indexPapersCitations
Yoshua Bengio2021033420313
Scott Shenker150454118017
Paul Shala Henry13731835971
Peter Stone130122979713
Yann LeCun121369171211
Louis E. Brus11334763052
Jennifer Rexford10239445277
Andreas F. Molisch9677747530
Vern Paxson9326748382
Lorrie Faith Cranor9232628728
Ward Whitt8942429938
Lawrence R. Rabiner8837870445
Thomas E. Graedel8634827860
William W. Cohen8538431495
Michael K. Reiter8438030267
Network Information
Related Institutions (5)
Microsoft
86.9K papers, 4.1M citations

94% related

Google
39.8K papers, 2.1M citations

91% related

Hewlett-Packard
59.8K papers, 1.4M citations

89% related

Bell Labs
59.8K papers, 3.1M citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20225
202133
202069
201971
2018100
201791