The constant pursuit for performance in Internet communications leads to network protocols and their mechanisms getting more and more involved and hence complex. Even seemingly simple mechanisms such as resource prioritization in HTTP/2 turn out to have very complex parameter interdependencies. Today’s protocol performance does not only depend on its configuration on client- and server-side, but also on the configuration of the other protocol layers in the respective network stack, rendering protocol tailoring into a vertical and horizontal cross-layer optimization problem. Traditional cross-layer optimization work analyses the influences and dependencies manually and finds optimization strategies. However, the increasing complexities let the parameter space grow, such that it is hard to find appropriate strategies. Thus, the parameter space is typically reduced, which, however, limits the holistic view and can hence reduce the effective performance gains. E.g., for resource prioritization, the strategies achieve only mediocre speedups in comparison to their complexities. Hence, the mechanism is mainly left unused. This effect is not exclusive to HTTP/2, but occurs in many similar cases.Techniques from the area of machine learning can handle big parameter spaces. They are already used for protocol optimization and the approaches using these techniques give insights on how to use them, emphasizing that simply applying them is not the right way, as domain knowledge is needed for validation. However, the approaches view the layers agnostically ignoring the cross-layer component. Hence, it is unknown how to apply these techniques in the realm of cross-layer optimization. We propose to create a methodology for cross-layer protocol optimization involving machine learning, where we answer how to use it for capturing the complex interdependencies of the Internet protocol landscape. Our goals are not limited to only optimizing network protocols. Instead, insights should be given in regard to which approaches are suitable, how to constrain them, what decisions they make and how to feed the gained strategies back into protocol development.
ResearchersPrincipal Researchers | Students (COMSYS)
| Alumni (COMSYS) |
For questions and inquiries regarding the project LEGATO, please contact:
Constantin Sander
Network Architectures
E-Mail: sander[at]comsys.rwth-aachen.de
This project is funded by Deutsche Forschungsgemeinschaft (DFG).
6. |
Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24)
Publisher: IEEE/IFIP,
May
2024
|
5. |
Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '23)
Publisher: IFIP/IEEE,
June
2023
ISBN: 978-3-903176-58-4
|
4. |
Proceedings of the Internet Measurement Conference (IMC '23)
Publisher: ACM,
October
2023
|
3. |
Proceedings of the Internet Measurement Conference (IMC '23)
Publisher: ACM,
October
2023
ISBN: 979-8-4007-0382-9/23/10
|
2. |
Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '22)
Publisher: IFIP,
June
2022
ISBN: 978-3-903176-47-8
|
1. |
Proceedings of the Internet Measurement Conference (IMC '21)
Publisher: ACM,
November
2021
ISBN: 978-1-4503-9129-0/21/11
|