首页 > 最新文献

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Voyager: Complete Container State Migration 旅行者:完成容器状态迁移
S. Nadgowda, Sahil Suneja, Nilton Bila, C. Isci
Due to the small memory footprint and fast startup times offerred by container virtualization, made ever more popular by the Docker platform, containers are seeing rapid adoption as a foundational capability to build PaaS and SaaS clouds. For such container clouds, which are fundamentally different from VM clouds, various cloud management services need to be revisited. In this paper, we present our Voyager - just-in-time live container migration service, designed in accordance with the Open Container Initiative (OCI) principles. Voyager is a novel filesystem-agnostic and vendor-agnostic migration service that provides consistent full-system migration. Voyager combines CRIU-based memory migration together with the data federation capabilities of union mounts to minimize migration downtime. With a union view of data between the source and target hosts, Voyager containers can resume operation instantly on the target host, while performing disk state transfer lazily in the background.
由于容器虚拟化所提供的内存占用小,启动时间快,并且由于Docker平台而变得越来越流行,容器作为构建PaaS和SaaS云的基础能力被迅速采用。对于这样的容器云,它们与VM云有本质的不同,需要重新访问各种云管理服务。在本文中,我们介绍了我们的Voyager——实时实时容器迁移服务,它是根据开放容器倡议(OCI)原则设计的。Voyager是一种新颖的与文件系统无关和与供应商无关的迁移服务,它提供一致的全系统迁移。Voyager将基于criu的内存迁移与union mount的数据联合功能相结合,以最大限度地减少迁移停机时间。通过源主机和目标主机之间的联合数据视图,Voyager容器可以在目标主机上立即恢复操作,同时在后台惰性地执行磁盘状态传输。
{"title":"Voyager: Complete Container State Migration","authors":"S. Nadgowda, Sahil Suneja, Nilton Bila, C. Isci","doi":"10.1109/ICDCS.2017.91","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.91","url":null,"abstract":"Due to the small memory footprint and fast startup times offerred by container virtualization, made ever more popular by the Docker platform, containers are seeing rapid adoption as a foundational capability to build PaaS and SaaS clouds. For such container clouds, which are fundamentally different from VM clouds, various cloud management services need to be revisited. In this paper, we present our Voyager - just-in-time live container migration service, designed in accordance with the Open Container Initiative (OCI) principles. Voyager is a novel filesystem-agnostic and vendor-agnostic migration service that provides consistent full-system migration. Voyager combines CRIU-based memory migration together with the data federation capabilities of union mounts to minimize migration downtime. With a union view of data between the source and target hosts, Voyager containers can resume operation instantly on the target host, while performing disk state transfer lazily in the background.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Are HTTP/2 Servers Ready Yet? HTTP/2服务器准备好了吗?
Muhui Jiang, Xiapu Luo, TungNgai Miu, Shengtuo Hu, Weixiong Rao
Superseding HTTP/1.1, the dominating web protocol, HTTP/2 promises to make web applications faster and safer by introducing many new features, such as multiplexing, header compression, request priority, server push, etc. Although a few recent studies examined the adoption of HTTP/2 and evaluated its impacts, little is known about whether the popular HTTP/2 servers have correctly realized the new features and how the deployed servers use these features. To fill in the gap, in this paper, we conduct the first systematic investigation by inspecting six popular implementations of HTTP/2 servers (i.e., Nginx, Apache, H2O, Lightspeed, nghttpd and Tengine) and measuring the top 1 million Alexa web sites. In particular, we propose new methods and develop a tool named H2Scope to assess the new features in those servers. The results of the large-scale measurement on HTTP/2 web sites reveal new observations and insights. This study sheds light on the current status and the future research of HTTP/2.
HTTP/2取代了占主导地位的web协议HTTP/1.1,通过引入许多新特性,如多路复用、报头压缩、请求优先级、服务器推送等,承诺使web应用程序更快、更安全。尽管最近有一些研究检查了HTTP/2的采用并评估了它的影响,但对于流行的HTTP/2服务器是否正确地实现了新功能以及部署的服务器如何使用这些功能,人们知之甚少。为了填补这一空白,在本文中,我们通过检查六种流行的HTTP/2服务器实现(即Nginx, Apache, H2O, Lightspeed, ightttpd和engine)并测量前100万个Alexa网站进行了第一次系统调查。特别是,我们提出了新的方法,并开发了一个名为H2Scope的工具来评估这些服务器中的新功能。对HTTP/2网站的大规模测量结果揭示了新的观察和见解。本研究揭示了HTTP/2的现状和未来的研究方向。
{"title":"Are HTTP/2 Servers Ready Yet?","authors":"Muhui Jiang, Xiapu Luo, TungNgai Miu, Shengtuo Hu, Weixiong Rao","doi":"10.1109/ICDCS.2017.279","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.279","url":null,"abstract":"Superseding HTTP/1.1, the dominating web protocol, HTTP/2 promises to make web applications faster and safer by introducing many new features, such as multiplexing, header compression, request priority, server push, etc. Although a few recent studies examined the adoption of HTTP/2 and evaluated its impacts, little is known about whether the popular HTTP/2 servers have correctly realized the new features and how the deployed servers use these features. To fill in the gap, in this paper, we conduct the first systematic investigation by inspecting six popular implementations of HTTP/2 servers (i.e., Nginx, Apache, H2O, Lightspeed, nghttpd and Tengine) and measuring the top 1 million Alexa web sites. In particular, we propose new methods and develop a tool named H2Scope to assess the new features in those servers. The results of the large-scale measurement on HTTP/2 web sites reveal new observations and insights. This study sheds light on the current status and the future research of HTTP/2.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks 多用户雾无线接入网中延迟驱动的协同任务计算
Ai-Chun Pang, W. Chung, Te-Chuan Chiu, Junshan Zhang
Fog computing is emerging as one promising solution to meet the increasing demand for ultra-low latency services in wireless networks. Taking a forward-looking perspective, we propose a Fog-Radio Access Network (F-RAN) model, which utilizes the existing infrastructure, e.g., small cells and macro base stations, to achieve the ultra-low latency by joint computing across multiple F-RAN nodes and near-range communications at the edge. We treat the low latency design as an optimization problem, which characterizes the tradeoff between communication and computing across multiple F-RAN nodes. Since this problem is NP-hard, we propose a latency-driven cooperative task computing algorithm with one-for-all concept for simultaneous selection of the F-RAN nodes to serve with proper heterogeneous resource allocation for multi-user services. Considering the limited heterogeneous resources shared among all users, we advocate the one-for-all strategy for every user taking other's situation into consideration and seek for a "win-win" solution. The numerical results show that the low latency services can be achieved by F-RAN via latency-driven cooperative task computing.
雾计算作为一种很有前途的解决方案正在兴起,以满足无线网络中对超低延迟服务日益增长的需求。从前瞻性的角度出发,我们提出了一种雾-无线接入网(F-RAN)模型,该模型利用现有的基础设施,如小蜂窝和宏基站,通过跨多个F-RAN节点的联合计算和边缘的近距离通信来实现超低延迟。我们将低延迟设计视为一个优化问题,其特征是跨多个F-RAN节点的通信和计算之间的权衡。由于该问题是np困难的,我们提出了一种延迟驱动的协作任务计算算法,该算法具有“一人为全”的概念,用于同时选择F-RAN节点,为多用户服务提供适当的异构资源分配。考虑到所有用户共享的异构资源有限,我们提倡每个用户兼顾其他用户的情况,寻求“双赢”的解决方案。数值结果表明,通过延迟驱动的协同任务计算,F-RAN可以实现低延迟服务。
{"title":"Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks","authors":"Ai-Chun Pang, W. Chung, Te-Chuan Chiu, Junshan Zhang","doi":"10.1109/ICDCS.2017.83","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.83","url":null,"abstract":"Fog computing is emerging as one promising solution to meet the increasing demand for ultra-low latency services in wireless networks. Taking a forward-looking perspective, we propose a Fog-Radio Access Network (F-RAN) model, which utilizes the existing infrastructure, e.g., small cells and macro base stations, to achieve the ultra-low latency by joint computing across multiple F-RAN nodes and near-range communications at the edge. We treat the low latency design as an optimization problem, which characterizes the tradeoff between communication and computing across multiple F-RAN nodes. Since this problem is NP-hard, we propose a latency-driven cooperative task computing algorithm with one-for-all concept for simultaneous selection of the F-RAN nodes to serve with proper heterogeneous resource allocation for multi-user services. Considering the limited heterogeneous resources shared among all users, we advocate the one-for-all strategy for every user taking other's situation into consideration and seek for a \"win-win\" solution. The numerical results show that the low latency services can be achieved by F-RAN via latency-driven cooperative task computing.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"446 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance 电动汽车匹配:桥接大型视觉数据和电子数据,实现高效监控
Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, D. Xuan, Biao Chen, Wei Zhao
Visual (V) surveillance systems are extensively deployed and becoming the largest source of big data. On the other hand, electronic (E) data also plays an important role in surveillance and its amount increases explosively with the ubiquity of mobile devices. One of the major problems in surveillance is to determine human objects' identities among different surveillance scenes. Traditional way of processing big V and E datasets separately does not serve the purpose well because V data and E data are imperfect alone for information gathering and retrieval. Matching human objects in the two datasets can merge the good of the two for efficient large-scale surveillance. Yet such matching across two heterogeneous big datasets is challenging. In this paper, we propose an efficient set of parallel algorithms, called EV-Matching, to bridge big E and V data. We match E and V data based on their spatiotemporal correlation. The EV-Matching algorithms are implemented on Apache Spark to further accelerate the whole procedure. We conduct extensive experiments on a large synthetic dataset under different settings. Results demonstrate the feasibility and efficiency of our proposed algorithms.
视觉(V)监控系统被广泛部署,并成为最大的大数据来源。另一方面,电子数据在监控中也发挥着重要作用,随着移动设备的普及,电子数据的数量呈爆炸式增长。如何在不同的监控场景中确定人的身份是监控的主要问题之一。传统的大V数据集和大E数据集分开处理的方法不能很好地达到目的,因为V数据和E数据单独用于信息收集和检索是不完善的。在两个数据集中匹配人类目标可以融合两者的优点,从而实现高效的大规模监控。然而,在两个异构的大数据集之间进行匹配是具有挑战性的。在本文中,我们提出了一套高效的并行算法,称为EV-Matching,以桥接大E和V数据。我们根据E和V数据的时空相关性进行匹配。在Apache Spark上实现了ev匹配算法,进一步加快了整个过程。我们在不同设置的大型合成数据集上进行了广泛的实验。实验结果验证了算法的可行性和有效性。
{"title":"EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance","authors":"Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, D. Xuan, Biao Chen, Wei Zhao","doi":"10.1109/ICDCS.2017.89","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.89","url":null,"abstract":"Visual (V) surveillance systems are extensively deployed and becoming the largest source of big data. On the other hand, electronic (E) data also plays an important role in surveillance and its amount increases explosively with the ubiquity of mobile devices. One of the major problems in surveillance is to determine human objects' identities among different surveillance scenes. Traditional way of processing big V and E datasets separately does not serve the purpose well because V data and E data are imperfect alone for information gathering and retrieval. Matching human objects in the two datasets can merge the good of the two for efficient large-scale surveillance. Yet such matching across two heterogeneous big datasets is challenging. In this paper, we propose an efficient set of parallel algorithms, called EV-Matching, to bridge big E and V data. We match E and V data based on their spatiotemporal correlation. The EV-Matching algorithms are implemented on Apache Spark to further accelerate the whole procedure. We conduct extensive experiments on a large synthetic dataset under different settings. Results demonstrate the feasibility and efficiency of our proposed algorithms.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130573541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones 你可以听到,但你不能偷窃:防范智能手机上的语音模仿攻击
Si Chen, K. Ren, Sixu Piao, Cong Wang, Qian Wang, J. Weng, Lu Su, Aziz Mohaisen
Voice, as a convenient and efficient way of information delivery, has a significant advantage over the conventional keyboard-based input methods, especially on small mobile devices such as smartphones and smartwatches. However, the human voice could often be exposed to the public, which allows an attacker to quickly collect sound samples of targeted victims and further launch voice impersonation attacks to spoof those voice-based applications. In this paper, we propose the design and implementation of a robust software-only voice impersonation defense system, which is tailored for mobile platforms and can be easily integrated with existing off-the-shelf smart devices. In our system, we explore magnetic field emitted from loudspeakers as the essential characteristic for detecting machine-based voice impersonation attacks. Furthermore, we use a state-of-the-art automatic speaker verification system to defend against human imitation attacks. Finally, our evaluation results show that our system achieves simultaneously high accuracy (100%) and low equal error rates (EERs) (0%) in detecting the machine-based voice impersonation attack on smartphones.
语音作为一种方便高效的信息传递方式,与传统的基于键盘的输入法相比,具有显著的优势,特别是在智能手机和智能手表等小型移动设备上。然而,人类的声音经常会暴露在公众面前,这使得攻击者能够快速收集目标受害者的声音样本,并进一步发起语音模拟攻击,以欺骗那些基于语音的应用程序。在本文中,我们提出了一个强大的软件语音模拟防御系统的设计和实现,该系统是为移动平台量身定制的,可以很容易地与现有的现成智能设备集成。在我们的系统中,我们探索从扬声器发出的磁场作为检测基于机器的语音模仿攻击的基本特征。此外,我们使用最先进的自动说话人验证系统来防御人类模仿攻击。最后,我们的评估结果表明,我们的系统在检测基于机器的智能手机语音模拟攻击时同时实现了高精度(100%)和低等错误率(EERs)(0%)。
{"title":"You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones","authors":"Si Chen, K. Ren, Sixu Piao, Cong Wang, Qian Wang, J. Weng, Lu Su, Aziz Mohaisen","doi":"10.1109/ICDCS.2017.133","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.133","url":null,"abstract":"Voice, as a convenient and efficient way of information delivery, has a significant advantage over the conventional keyboard-based input methods, especially on small mobile devices such as smartphones and smartwatches. However, the human voice could often be exposed to the public, which allows an attacker to quickly collect sound samples of targeted victims and further launch voice impersonation attacks to spoof those voice-based applications. In this paper, we propose the design and implementation of a robust software-only voice impersonation defense system, which is tailored for mobile platforms and can be easily integrated with existing off-the-shelf smart devices. In our system, we explore magnetic field emitted from loudspeakers as the essential characteristic for detecting machine-based voice impersonation attacks. Furthermore, we use a state-of-the-art automatic speaker verification system to defend against human imitation attacks. Finally, our evaluation results show that our system achieves simultaneously high accuracy (100%) and low equal error rates (EERs) (0%) in detecting the machine-based voice impersonation attack on smartphones.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
A First Look at Information Entropy-Based Data Pricing 基于信息熵的数据定价初探
Xijun Li, Jianguo Yao, Xue Liu, Haibing Guan
Distribution of intangible information goods is experiencing tremendous growth in recent years, which has facilitated a blossoming of information goods economics. As big data develops, there are more and more information goods markets for data trading. In the current of data pricing policies in data trading, there are many metrics to measure the value of data goods, such as the data generation date, data volume, and data integrity, etc. However, it is very challenging to identify the amount of data information and its distribution, and the corresponding data pricing has rarely been discussed. In this paper, we propose a new data pricing metric, i.e., the data information entropy, which helps to make a reasonable price in the data trading. We first demonstrate a data information measurement method based on information entropy, and then propose a pricing function based on the result of data information measurement. To comprehensively understand the new data pricing metric and facilitate its application in data trading, we verify the rationality of the data information measurement method and give three concrete pricing functions. It is the first time to look at the information entropy-based data pricing, which can inspire the research concerning the pricing mechanism of data goods, further promoting the development of data products business.
近年来,无形信息产品的流通迅猛发展,促进了信息产品经济学的蓬勃发展。随着大数据的发展,数据交易的信息商品市场越来越多。在当前数据交易中的数据定价政策中,衡量数据商品价值的指标有很多,如数据生成日期、数据量、数据完整性等。然而,数据信息量的确定及其分布是非常具有挑战性的,相应的数据定价也很少被讨论。本文提出了一种新的数据定价度量,即数据信息熵,它有助于在数据交易中制定合理的价格。首先给出了一种基于信息熵的数据信息度量方法,然后提出了基于数据信息度量结果的定价函数。为了全面理解新的数据定价度量,便于其在数据交易中的应用,我们验证了数据信息度量方法的合理性,并给出了三个具体的定价函数。本文首次对基于信息熵的数据定价进行了研究,可以对数据商品定价机制的研究产生启发,进一步促进数据产品业务的发展。
{"title":"A First Look at Information Entropy-Based Data Pricing","authors":"Xijun Li, Jianguo Yao, Xue Liu, Haibing Guan","doi":"10.1109/ICDCS.2017.45","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.45","url":null,"abstract":"Distribution of intangible information goods is experiencing tremendous growth in recent years, which has facilitated a blossoming of information goods economics. As big data develops, there are more and more information goods markets for data trading. In the current of data pricing policies in data trading, there are many metrics to measure the value of data goods, such as the data generation date, data volume, and data integrity, etc. However, it is very challenging to identify the amount of data information and its distribution, and the corresponding data pricing has rarely been discussed. In this paper, we propose a new data pricing metric, i.e., the data information entropy, which helps to make a reasonable price in the data trading. We first demonstrate a data information measurement method based on information entropy, and then propose a pricing function based on the result of data information measurement. To comprehensively understand the new data pricing metric and facilitate its application in data trading, we verify the rationality of the data information measurement method and give three concrete pricing functions. It is the first time to look at the information entropy-based data pricing, which can inspire the research concerning the pricing mechanism of data goods, further promoting the development of data products business.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124118091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modeling and Analyzing Latency in the Memcached system Memcached系统的延迟建模与分析
Wenxue Cheng, Fengyuan Ren, Wanchun Jiang, Tong Zhang
Memcached is a widely used in-memory caching solution in large-scale searching scenarios. The most pivotal performance metric in Memcached is latency, which is affected by various factors including the workload pattern, the service rate, the unbalanced load distribution and the cache miss ratio. To quantitate the impact of each factor on latency, we establish a theoretical model for the Memcached system. Specially, we formulate the unbalanced load distribution among Memcached servers by a set of probabilities, capture the burst and concurrent key arrivals at Memcached servers in form of batching blocks, and add a cache miss processing stage. Based on this model, algebraic derivations are conducted to estimate latency in Memcached. The latency estimation is validated by intensive experiments. Moreover, we obtain a quantitative understanding of how much improvement of latency performance can be achieved by optimizing each factor and provide several useful recommendations to optimal latency in Memcached.
Memcached是在大规模搜索场景中广泛使用的内存缓存解决方案。Memcached中最关键的性能指标是延迟,它受到各种因素的影响,包括工作负载模式、服务率、不平衡负载分布和缓存缺失率。为了量化每个因素对延迟的影响,我们为Memcached系统建立了一个理论模型。特别地,我们用一组概率来表示Memcached服务器之间的不平衡负载分布,以批处理块的形式捕获突发和并发密钥到达Memcached服务器,并增加缓存缺失处理阶段。在此模型的基础上,进行了代数推导来估计Memcached中的延迟。通过大量的实验验证了延迟估计的有效性。此外,我们定量地了解了通过优化每个因素可以实现多少延迟性能的改进,并提供了一些关于Memcached中优化延迟的有用建议。
{"title":"Modeling and Analyzing Latency in the Memcached system","authors":"Wenxue Cheng, Fengyuan Ren, Wanchun Jiang, Tong Zhang","doi":"10.1109/ICDCS.2017.122","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.122","url":null,"abstract":"Memcached is a widely used in-memory caching solution in large-scale searching scenarios. The most pivotal performance metric in Memcached is latency, which is affected by various factors including the workload pattern, the service rate, the unbalanced load distribution and the cache miss ratio. To quantitate the impact of each factor on latency, we establish a theoretical model for the Memcached system. Specially, we formulate the unbalanced load distribution among Memcached servers by a set of probabilities, capture the burst and concurrent key arrivals at Memcached servers in form of batching blocks, and add a cache miss processing stage. Based on this model, algebraic derivations are conducted to estimate latency in Memcached. The latency estimation is validated by intensive experiments. Moreover, we obtain a quantitative understanding of how much improvement of latency performance can be achieved by optimizing each factor and provide several useful recommendations to optimal latency in Memcached.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"576 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116262160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Anonymous Routing to Maximize Delivery Rates in DTNs 匿名路由在ddn中最大化投递率
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu
In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that can adapt to the different levels of security requirements. In this paper, we first design a set of anonymous routing protocols for DTNs, called anonymous epidemic and zone-based anonymous routing, based on the original anonymous routing protocols for ad hoc networks. Then, we propose a framework of anonymous routing (FAR) for DTNs, which subsumes all the aforementioned protocols. By tuning its parameters, the proposed FAR is able to outperform onion-based, anonymous Epidemic, and zone-based routing.
在本文中,我们寻求解决延迟容忍网络(DTNs)中的匿名通信。虽然互联网和自组织网络有许多不同的方法,但据我们所知,只有基于洋葱的路由的变体已经为ddn量身定制。由于每种类型的匿名路由协议都有其优点和缺点,因此没有单一的ddn匿名路由协议可以适应不同级别的安全需求。本文首先在原有的ad hoc网络匿名路由协议的基础上,设计了一套用于dtn的匿名路由协议,称为匿名流行病匿名路由和基于区域的匿名路由。然后,我们提出了一个包含上述所有协议的DTNs匿名路由(FAR)框架。通过调整其参数,所提出的FAR能够优于基于洋葱、匿名流行病和基于区域的路由。
{"title":"Anonymous Routing to Maximize Delivery Rates in DTNs","authors":"Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu","doi":"10.1109/ICDCS.2017.44","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.44","url":null,"abstract":"In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that can adapt to the different levels of security requirements. In this paper, we first design a set of anonymous routing protocols for DTNs, called anonymous epidemic and zone-based anonymous routing, based on the original anonymous routing protocols for ad hoc networks. Then, we propose a framework of anonymous routing (FAR) for DTNs, which subsumes all the aforementioned protocols. By tuning its parameters, the proposed FAR is able to outperform onion-based, anonymous Epidemic, and zone-based routing.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things: From Small- to Large-Scale Orchestration 物联网:从小型到大型业务流程
C. Consel, Milan Kabác
The domain of Internet of Things (IoT) is rapidly expanding beyond research, and becoming a major industrial market with such stakeholders as major manufacturers of chips and connected entities (i.e., things), and fast-growing operators of wide-area networks. Importantly, this emerging domain is driven by applications that leverage an IoT infrastructure to provide users with innovative, high-value services. IoT infrastructures range from small scale (e.g., homes and personal health) to large scale (e.g., cities and transportation systems). In this paper, we argue that there is a continuum between orchestrating connected entities in the small and in the large. We propose a unified approach to application development, which covers this spectrum. To do so, we examine the requirements for orchestrating connected entities and address them with domainspecific design concepts. We then show how to map these design concepts into dedicated programming patterns and runtime mechanisms.Our work revolves around domain-specific concepts and notations, integrated into a tool-based design methodology and dedicated to develop IoT applications. We have applied our work across a spectrum of infrastructure sizes, ranging from an automated pilot in avionics, to an assisted living platform for the home of seniors, to a parking management system in a smart city.
物联网(IoT)领域正在迅速超越研究领域,成为一个主要的工业市场,其利益相关者包括芯片和连接实体(即物)的主要制造商,以及快速增长的广域网运营商。重要的是,这个新兴领域是由利用物联网基础设施为用户提供创新、高价值服务的应用程序驱动的。物联网基础设施的范围从小规模(如家庭和个人健康)到大规模(如城市和交通系统)。在本文中,我们认为在协调小的和大的连接实体之间存在一个连续体。我们提出了一种统一的应用程序开发方法,它涵盖了这个范围。为此,我们检查了编排连接实体的需求,并使用特定于领域的设计概念来处理它们。然后,我们将展示如何将这些设计概念映射到专用的编程模式和运行时机制。我们的工作围绕特定领域的概念和符号,集成到基于工具的设计方法中,致力于开发物联网应用程序。我们已经将我们的工作应用于各种规模的基础设施,从航空电子设备中的自动飞行员,到老年人家中的辅助生活平台,再到智能城市中的停车管理系统。
{"title":"Internet of Things: From Small- to Large-Scale Orchestration","authors":"C. Consel, Milan Kabác","doi":"10.1109/ICDCS.2017.314","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.314","url":null,"abstract":"The domain of Internet of Things (IoT) is rapidly expanding beyond research, and becoming a major industrial market with such stakeholders as major manufacturers of chips and connected entities (i.e., things), and fast-growing operators of wide-area networks. Importantly, this emerging domain is driven by applications that leverage an IoT infrastructure to provide users with innovative, high-value services. IoT infrastructures range from small scale (e.g., homes and personal health) to large scale (e.g., cities and transportation systems). In this paper, we argue that there is a continuum between orchestrating connected entities in the small and in the large. We propose a unified approach to application development, which covers this spectrum. To do so, we examine the requirements for orchestrating connected entities and address them with domainspecific design concepts. We then show how to map these design concepts into dedicated programming patterns and runtime mechanisms.Our work revolves around domain-specific concepts and notations, integrated into a tool-based design methodology and dedicated to develop IoT applications. We have applied our work across a spectrum of infrastructure sizes, ranging from an automated pilot in avionics, to an assisted living platform for the home of seniors, to a parking management system in a smart city.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131412679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On Data Parallelism of Erasure Coding in Distributed Storage Systems 论分布式存储系统中擦除编码的数据并行性
Jun Li, Baochun Li
Deployed in various distributed storage systems, erasure coding has demonstrated its advantages of low storage overhead and high failure tolerance. Typically in an erasure-coded distributed storage system, systematic maximum distance seperable (MDS) codes are chosen since the optimal storage overhead can be achieved and meanwhile data can be read directly without decoding operations. However, data parallelism of existing MDS codes is limited, because we can only read data from some specific servers in parallel without decoding operations. In this paper, we propose Carousel codes, designed to allow data to be read from an arbitrary number of servers in parallel without decoding, while preserving the optimal storage overhead of MDS codes. Furthermore, Carousel codes can achieve the optimal network traffic to reconstruct an unavailable block. We have implemented a prototype of Carousel codes on Apache Hadoop. Our experimental results have demonstrated that Carousel codes can make MapReduce jobs finish with almost 50% less time and reduce data access latency significantly, with a comparable throughput in the encoding and decoding operations and no additional sacrifice of failure tolerance or the network overhead to reconstruct unavailable data.
在各种分布式存储系统中,擦除编码已显示出其低存储开销和高故障容错性的优势。通常情况下,在消除编码分布式存储系统中,会选择系统化的最大距离可分离(MDS)编码,因为这样可以达到最佳存储开销,同时无需解码操作即可直接读取数据。然而,现有 MDS 代码的数据并行性是有限的,因为我们只能从某些特定服务器并行读取数据,而无需进行解码操作。在本文中,我们提出了旋转木马代码(Carousel codes),目的是在保留 MDS 代码最佳存储开销的前提下,允许从任意数量的服务器并行读取数据而无需解码。此外,旋转木马代码还能以最佳网络流量重建不可用的数据块。我们在 Apache Hadoop 上实现了 Carousel 代码的原型。我们的实验结果表明,在编码和解码操作吞吐量相当、不额外牺牲故障容忍度或网络开销以重建不可用数据的情况下,Carousel代码能使MapReduce作业完成的时间缩短近50%,并显著减少数据访问延迟。
{"title":"On Data Parallelism of Erasure Coding in Distributed Storage Systems","authors":"Jun Li, Baochun Li","doi":"10.1109/ICDCS.2017.191","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.191","url":null,"abstract":"Deployed in various distributed storage systems, erasure coding has demonstrated its advantages of low storage overhead and high failure tolerance. Typically in an erasure-coded distributed storage system, systematic maximum distance seperable (MDS) codes are chosen since the optimal storage overhead can be achieved and meanwhile data can be read directly without decoding operations. However, data parallelism of existing MDS codes is limited, because we can only read data from some specific servers in parallel without decoding operations. In this paper, we propose Carousel codes, designed to allow data to be read from an arbitrary number of servers in parallel without decoding, while preserving the optimal storage overhead of MDS codes. Furthermore, Carousel codes can achieve the optimal network traffic to reconstruct an unavailable block. We have implemented a prototype of Carousel codes on Apache Hadoop. Our experimental results have demonstrated that Carousel codes can make MapReduce jobs finish with almost 50% less time and reduce data access latency significantly, with a comparable throughput in the encoding and decoding operations and no additional sacrifice of failure tolerance or the network overhead to reconstruct unavailable data.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129896391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1