首页 > 最新文献

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Keddah: Capturing Hadoop Network Behaviour Keddah:捕获Hadoop网络行为
Jie Deng, Gareth Tyson, F. Cuadrado, S. Uhlig
As a distributed system, Hadoop heavily relies on the network to complete data processing jobs. While Hadoop traffic is perceived to be critical for job execution performance, the actual behaviour of Hadoop network traffic is still poorly understood. This lack of understanding greatly complicates research relying on Hadoop workloads. In this paper, we explore Hadoop traffic through experimentation. We analyse the generated traffic of multiple types of MapReduce jobs, with varying input sizes, and cluster configuration parameters. As a result, we present Keddah, a toolchain for capturing, modelling and reproducing Hadoop traffic, for use with network simulators. Keddah can be used to create empirical Hadoop traffic models, enabling reproducible Hadoop research in more realistic scenarios.
作为一个分布式系统,Hadoop在很大程度上依赖于网络来完成数据处理工作。虽然Hadoop流量被认为对作业执行性能至关重要,但Hadoop网络流量的实际行为仍然知之甚少。这种理解的缺乏使依赖Hadoop工作负载的研究变得非常复杂。在本文中,我们通过实验来探索Hadoop流量。我们分析了多种类型的MapReduce作业产生的流量,这些作业具有不同的输入大小和集群配置参数。因此,我们提出了Keddah,一个用于捕获、建模和再现Hadoop流量的工具链,用于网络模拟器。Keddah可用于创建经验Hadoop流量模型,从而在更现实的场景中实现可重复的Hadoop研究。
{"title":"Keddah: Capturing Hadoop Network Behaviour","authors":"Jie Deng, Gareth Tyson, F. Cuadrado, S. Uhlig","doi":"10.1109/ICDCS.2017.211","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.211","url":null,"abstract":"As a distributed system, Hadoop heavily relies on the network to complete data processing jobs. While Hadoop traffic is perceived to be critical for job execution performance, the actual behaviour of Hadoop network traffic is still poorly understood. This lack of understanding greatly complicates research relying on Hadoop workloads. In this paper, we explore Hadoop traffic through experimentation. We analyse the generated traffic of multiple types of MapReduce jobs, with varying input sizes, and cluster configuration parameters. As a result, we present Keddah, a toolchain for capturing, modelling and reproducing Hadoop traffic, for use with network simulators. Keddah can be used to create empirical Hadoop traffic models, enabling reproducible Hadoop research in more realistic scenarios.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs) 利用协同分布式处理管道(CDPPs)实现广域数据分析
A. Feldmann, M. Hauswirth, V. Markl
Life without the Internet is no longer possible nor thinkable. Consider the effects of a prolonged Internet outage: In the least impactful way, most of our kids and peers just would no longer be able to interact with their peers. They might severely miss out on the quality of their leisure time activities which increasingly relies on social networks, online games, YouTube, and other online entertainment offers. This may be a nuisance but still is tolerable. More seriously and economically relevant, manufacturing and trade would no longer work as all interactions inside and among companies rely on a working Internet. Indeed, just-in-time ordering mechanisms and Internet of Things-enhanced production chains within the Industry 4.0 framework would no longer be operational as old-style communication means such as phone and faxes have completely been replaced. Indeed, neither of these alternative mechanisms—faxes, phone, and also messaging—would be available either as they also rely on Internet technology. Even worse, the control of critical infrastructures would also be affected severely as they increasingly rely on the Internet for gathering input data and propagating control information. Moreover, all big data analytic applications, including financial transactions, would fail as they can no longer gather and process their input data. Even worse, the fact that there is “no communication without energy” nowadays also means that the reciprocal statement applies that there is no “energy without communication.”
没有互联网的生活是不可能的,也是不可想象的。想想长时间网络中断的影响吧:影响最小的是,我们的大多数孩子和同龄人将不再能够与他们的同龄人互动。他们可能会严重错过休闲活动的质量,这些活动越来越依赖于社交网络、在线游戏、YouTube和其他在线娱乐服务。这可能是一个麻烦,但仍然是可以容忍的。更为严肃和经济相关的是,制造业和贸易将不再正常运作,因为企业内部和企业之间的所有互动都依赖于有效的互联网。事实上,随着电话和传真等旧式通信手段被完全取代,工业4.0框架内的准时制订购机制和物联网增强的生产链将不再有效。实际上,这两种替代机制——传真、电话和消息传递——都不可用,因为它们也依赖于Internet技术。更糟糕的是,关键基础设施的控制也将受到严重影响,因为它们越来越依赖互联网来收集输入数据和传播控制信息。此外,包括金融交易在内的所有大数据分析应用程序都将失败,因为它们无法再收集和处理输入数据。更糟糕的是,如今“没有能量就没有交流”的事实也意味着“没有交流就没有能量”这一相互命题的适用。
{"title":"Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs)","authors":"A. Feldmann, M. Hauswirth, V. Markl","doi":"10.1109/ICDCS.2017.332","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.332","url":null,"abstract":"Life without the Internet is no longer possible nor thinkable. Consider the effects of a prolonged Internet outage: In the least impactful way, most of our kids and peers just would no longer be able to interact with their peers. They might severely miss out on the quality of their leisure time activities which increasingly relies on social networks, online games, YouTube, and other online entertainment offers. This may be a nuisance but still is tolerable. More seriously and economically relevant, manufacturing and trade would no longer work as all interactions inside and among companies rely on a working Internet. Indeed, just-in-time ordering mechanisms and Internet of Things-enhanced production chains within the Industry 4.0 framework would no longer be operational as old-style communication means such as phone and faxes have completely been replaced. Indeed, neither of these alternative mechanisms—faxes, phone, and also messaging—would be available either as they also rely on Internet technology. Even worse, the control of critical infrastructures would also be affected severely as they increasingly rely on the Internet for gathering input data and propagating control information. Moreover, all big data analytic applications, including financial transactions, would fail as they can no longer gather and process their input data. Even worse, the fact that there is “no communication without energy” nowadays also means that the reciprocal statement applies that there is no “energy without communication.”","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117106956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SPHINX: A Password Store that Perfectly Hides Passwords from Itself SPHINX:一个完美隐藏密码的密码存储
Maliheh Shirvanian, Stanislaw Jarecki, H. Krawczyk, Nitesh Saxena
Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a "device" serving the role of the manager (e.g., a smartphone or an online third-party service) on the basis of a single memorable (low-entropy) master password. Existing password managers work well to defeat offline dictionary attacks upon web service compromise, assuming the use of high-entropy passwords is enforced. However, they are vulnerable to leakage of all passwords in the event the device is compromised, due to the need to store the passwords encrypted under the master password and/or the need to input the master password to the device (as in smartphone managers). Evidence exists that password managers can be attractive attack targets. In this paper, we introduce a novel approach to password management, called SPHINX, which remains secure even when the password manager itself has been compromised. In SPHINX, the information stored on the device is information theoretically independent of the user's master password - an attacker breaking into the device learns no information about the master password or the user's site-specific passwords. Moreover, an attacker with full control of the device, even at the time the user interacts with it, learns nothing about the master password - the password is not entered into the device in plaintext form or in any other way that may leak information on it. Unlike existing managers, SPHINX produces strictly high-entropy passwords and makes it compulsory for the users to register these randomized passwords with the web services, hence fully defeating offline dictionary attack upon service compromise. The design and security of SPHINX is based on the device-enhanced PAKE model of Jarecki et al. that provides the theoretical basis for this construction and is backed by rigorous cryptographic proofs of security. While SPHINX is suitable for different device and online platforms, in this paper, we report on its concrete instantiation on smartphones given their popularity and trustworthiness as password managers (or even two-factor authentication). We present the design, implementation and performance evaluation of SPHINX, offering prototype browser plugins, smartphone apps and transparent device-client communication. Based on our inspection analysis, the overall user experience of SPHINX improves upon current managers. We also report on a lab-based usability study of SPHINX, which indicates that users' perception of SPHINX security and usability is high and satisfactory when compared to regular password-based authentication. Finally, we discuss how SPHINX may be extended to an online service for the purpose of back-up or as an independent password manager.
密码管理器(又名商店或保险库)允许用户存储和检索(通常是高熵)密码为她的多个密码保护的服务,通过与“设备”服务的管理者的角色(例如,智能手机或在线第三方服务)在一个单一的记忆(低熵)主密码的基础上进行交互。假设强制使用高熵密码,现有的密码管理器可以很好地挫败针对web服务的离线字典攻击。然而,由于需要存储在主密码下加密的密码和/或需要将主密码输入到设备(如智能手机管理器),因此在设备被入侵的情况下,它们很容易受到所有密码泄露的影响。有证据表明,密码管理器可能成为有吸引力的攻击目标。在本文中,我们介绍了一种新的密码管理方法,称为SPHINX,即使在密码管理器本身被破坏时,它也保持安全。在SPHINX中,存储在设备上的信息理论上是与用户的主密码无关的信息——入侵设备的攻击者不会了解到有关主密码或用户特定于站点的密码的信息。此外,即使在用户与设备交互时,完全控制设备的攻击者也不会了解主密码——密码不会以明文形式输入设备,也不会以任何其他可能泄露设备信息的方式输入设备。与现有的管理器不同,SPHINX生成严格的高熵密码,并强制用户向web服务注册这些随机密码,因此在服务泄露时完全击败了离线字典攻击。SPHINX的设计和安全性基于Jarecki等人的设备增强PAKE模型,该模型为该构造提供了理论基础,并有严格的安全性加密证明作为支持。虽然SPHINX适用于不同的设备和在线平台,但在本文中,我们报告了它在智能手机上的具体实例,因为它们作为密码管理器(甚至是双因素身份验证)的受欢迎程度和可信度。我们介绍了SPHINX的设计、实现和性能评估,提供了原型浏览器插件、智能手机应用程序和透明的设备-客户端通信。根据我们的检查分析,SPHINX的整体用户体验比当前的管理器有所改善。我们还报告了一项基于实验室的SPHINX可用性研究,该研究表明,与常规的基于密码的身份验证相比,用户对SPHINX安全性和可用性的看法很高,令人满意。最后,我们将讨论如何将SPHINX扩展为用于备份的在线服务或作为独立的密码管理器。
{"title":"SPHINX: A Password Store that Perfectly Hides Passwords from Itself","authors":"Maliheh Shirvanian, Stanislaw Jarecki, H. Krawczyk, Nitesh Saxena","doi":"10.1109/ICDCS.2017.64","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.64","url":null,"abstract":"Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a \"device\" serving the role of the manager (e.g., a smartphone or an online third-party service) on the basis of a single memorable (low-entropy) master password. Existing password managers work well to defeat offline dictionary attacks upon web service compromise, assuming the use of high-entropy passwords is enforced. However, they are vulnerable to leakage of all passwords in the event the device is compromised, due to the need to store the passwords encrypted under the master password and/or the need to input the master password to the device (as in smartphone managers). Evidence exists that password managers can be attractive attack targets. In this paper, we introduce a novel approach to password management, called SPHINX, which remains secure even when the password manager itself has been compromised. In SPHINX, the information stored on the device is information theoretically independent of the user's master password - an attacker breaking into the device learns no information about the master password or the user's site-specific passwords. Moreover, an attacker with full control of the device, even at the time the user interacts with it, learns nothing about the master password - the password is not entered into the device in plaintext form or in any other way that may leak information on it. Unlike existing managers, SPHINX produces strictly high-entropy passwords and makes it compulsory for the users to register these randomized passwords with the web services, hence fully defeating offline dictionary attack upon service compromise. The design and security of SPHINX is based on the device-enhanced PAKE model of Jarecki et al. that provides the theoretical basis for this construction and is backed by rigorous cryptographic proofs of security. While SPHINX is suitable for different device and online platforms, in this paper, we report on its concrete instantiation on smartphones given their popularity and trustworthiness as password managers (or even two-factor authentication). We present the design, implementation and performance evaluation of SPHINX, offering prototype browser plugins, smartphone apps and transparent device-client communication. Based on our inspection analysis, the overall user experience of SPHINX improves upon current managers. We also report on a lab-based usability study of SPHINX, which indicates that users' perception of SPHINX security and usability is high and satisfactory when compared to regular password-based authentication. Finally, we discuss how SPHINX may be extended to an online service for the purpose of back-up or as an independent password manager.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Scalable and Distributed Approach for NFV Service Chain Cost Minimization NFV服务链成本最小化的可扩展和分布式方法
Zijun Zhang, Zongpeng Li, Chuan Wu, Chuanhe Huang
Network function virtualization (NFV) represents the latest technology advancement in network service provisioning. Traditional hardware middleboxes are replaced by software programs running on industry standard servers and virtual machines, for service agility, flexibility, and cost reduction. NFV users are provisioned with service chains composed of virtual network functions (VNFs). A fundamental problem in NFV service chain provisioning is to satisfy user demands with minimum system-wide cost. We jointly consider two types of cost in this work: nodal resource cost and link delay cost, and formulate the service chain provisioning problem using nonlinear optimization. Through the method of auxiliary variables, we transform the optimization problem into its separable form, and then apply the alternating direction method of multipliers (ADMM) to design scalable and fully distributed solutions. Through simulation studies, we verify the convergence and efficacy of our distributed algorithm design.
网络功能虚拟化(Network function virtualization, NFV)代表了网络业务提供的最新技术进展。传统的硬件中间件被运行在行业标准服务器和虚拟机上的软件程序所取代,以实现服务敏捷性、灵活性和降低成本。NFV为用户提供由虚拟网络功能(VNFs)组成的服务链。在NFV服务链的配置中,一个基本问题是如何以最小的系统成本来满足用户需求。本文综合考虑节点资源成本和链路延迟成本两种成本类型,采用非线性优化的方法求解服务链的配置问题。通过辅助变量法,将优化问题转化为可分形式,然后应用乘法器的交替方向法(ADMM)设计可伸缩的全分布解。通过仿真研究,验证了分布式算法设计的收敛性和有效性。
{"title":"A Scalable and Distributed Approach for NFV Service Chain Cost Minimization","authors":"Zijun Zhang, Zongpeng Li, Chuan Wu, Chuanhe Huang","doi":"10.1109/ICDCS.2017.210","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.210","url":null,"abstract":"Network function virtualization (NFV) represents the latest technology advancement in network service provisioning. Traditional hardware middleboxes are replaced by software programs running on industry standard servers and virtual machines, for service agility, flexibility, and cost reduction. NFV users are provisioned with service chains composed of virtual network functions (VNFs). A fundamental problem in NFV service chain provisioning is to satisfy user demands with minimum system-wide cost. We jointly consider two types of cost in this work: nodal resource cost and link delay cost, and formulate the service chain provisioning problem using nonlinear optimization. Through the method of auxiliary variables, we transform the optimization problem into its separable form, and then apply the alternating direction method of multipliers (ADMM) to design scalable and fully distributed solutions. Through simulation studies, we verify the convergence and efficacy of our distributed algorithm design.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124813246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Task-aware TCP in Data Center Networks 数据中心网络中的任务感知TCP
Sen Liu, Jiawei Huang, Yutao Zhou, Jianxin Wang, T. He
In modern data centers, many flow-based and task-based schemes have been proposed to speed up the data transmission in order to provide fast, reliable services for millions of users. However, existing flow-based schemes treat all flows in isolation, contributing less to or even hurting user experience due to the stalled flows. Other prevalent task-based approaches, such as centralized and decentralized scheduling, are sophisticated or unable to share task information. In this work, we first reveal that relinquishing bandwidth of leading flows to the stalled ones effectively reduces the task completion time. We further present the design and implementation of a general supporting scheme that shares the flow-tardiness information through a receiver-driven coordination. Our scheme can be flexibly and widely integrated with the state-of-the-art TCP protocols designed for data centers, while making no modification on switches. Through the testbed experiments and simulations of typical data center applications, we show that our scheme reduces the task completion time by 70% and 50% compared with the flow-based protocols (e.g. DCTCP, L2DCT) and task-based scheduling (e.g. Baraat), respectively. Moreover, our scheme also outperforms other approaches by 18% to 25% in prevalent topologies of data center.
在现代数据中心中,为了为数百万用户提供快速、可靠的服务,提出了许多基于流和基于任务的方案来加快数据传输速度。然而,现有的基于流的方案孤立地对待所有流,由于流的停滞,对用户体验的贡献较小,甚至损害用户体验。其他流行的基于任务的方法,如集中式和分散式调度,都很复杂,或者无法共享任务信息。在这项工作中,我们首先揭示了将领先流的带宽让给停滞流可以有效地减少任务完成时间。我们进一步提出了一个通用支持方案的设计和实现,该方案通过接收器驱动的协调共享流延迟信息。我们的方案可以灵活和广泛地集成为数据中心设计的最先进的TCP协议,而不需要修改交换机。通过典型数据中心应用的试验台实验和仿真,我们表明,与基于流的协议(如DCTCP、L2DCT)和基于任务的调度(如Baraat)相比,我们的方案分别减少了70%和50%的任务完成时间。此外,我们的方案在数据中心流行的拓扑结构中也比其他方法高出18%到25%。
{"title":"Task-aware TCP in Data Center Networks","authors":"Sen Liu, Jiawei Huang, Yutao Zhou, Jianxin Wang, T. He","doi":"10.1109/ICDCS.2017.175","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.175","url":null,"abstract":"In modern data centers, many flow-based and task-based schemes have been proposed to speed up the data transmission in order to provide fast, reliable services for millions of users. However, existing flow-based schemes treat all flows in isolation, contributing less to or even hurting user experience due to the stalled flows. Other prevalent task-based approaches, such as centralized and decentralized scheduling, are sophisticated or unable to share task information. In this work, we first reveal that relinquishing bandwidth of leading flows to the stalled ones effectively reduces the task completion time. We further present the design and implementation of a general supporting scheme that shares the flow-tardiness information through a receiver-driven coordination. Our scheme can be flexibly and widely integrated with the state-of-the-art TCP protocols designed for data centers, while making no modification on switches. Through the testbed experiments and simulations of typical data center applications, we show that our scheme reduces the task completion time by 70% and 50% compared with the flow-based protocols (e.g. DCTCP, L2DCT) and task-based scheduling (e.g. Baraat), respectively. Moreover, our scheme also outperforms other approaches by 18% to 25% in prevalent topologies of data center.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Networked Drone Cameras for Sports Streaming 用于体育流媒体的联网无人机摄像机
Xiaoli Wang, Aakanksha Chowdhery, M. Chiang
A network of drone cameras can be deployed to cover live events, such as high-action sports game played on a large field, but managing networked drone cameras in real-time is challenging. Distributed approaches yield suboptimal solutions from lack of coordination but coordination with a centralized controller incurs round-trip latencies of several hundreds of milliseconds over a wireless channel. We propose a fog-networking based system architecture to automatically coordinate a network of drones equipped with cameras to capture and broadcast the dynamically changing scenes of interest in a sports game. We design both optimal and practical algorithms to balance the tradeoff between two metrics: coverage of the most important scenes and streamed video bitrate. To compensate for network round-trip latencies, the centralized controller uses a predictive approach to predict which locations the drones should cover next. The controller maximizes video bitrate by associating each drone to an optimally matched server and dynamically re-assigns drones as relay nodes to boost the throughput in low-throughput scenarios. This dynamic assignment at centralized controller occurs at slower time-scale permitted by round-trip latencies, while the predictive approach and drones’ local decision ensures that the system works in real-time. Experimental results over tens of flights on the field suggest our system can achieve really good performance, for example, 8 drones can achieve a tradeoff of 94% coverage and (on average) 2K video support at 20 Mbps by optimizing between coverage and throughput. By dynamically allocating drones to cover the game or act as relays, our system also demonstrates a 2x gain over systems maximizing static coverage alone that achieves only 9 Mbps video throughput.
无人机摄像机网络可以用于覆盖现场活动,例如在大型场地上进行的高动作体育比赛,但实时管理联网无人机摄像机是一项挑战。分布式方法由于缺乏协调而产生次优解决方案,但与集中式控制器的协调会在无线信道上导致数百毫秒的往返延迟。我们提出了一种基于雾网络的系统架构,用于自动协调配备摄像机的无人机网络,以捕捉和广播体育比赛中动态变化的感兴趣场景。我们设计了最优和实用的算法来平衡两个指标之间的权衡:最重要场景的覆盖和流视频比特率。为了补偿网络往返延迟,中央控制器使用预测方法来预测无人机下一步应该覆盖的位置。控制器通过将每个无人机关联到最优匹配的服务器来最大化视频比特率,并动态地将无人机重新分配为中继节点,以提高低吞吐量场景下的吞吐量。这种在中央控制器上的动态分配在允许往返延迟的较慢时间尺度上发生,而预测方法和无人机的本地决策确保系统实时工作。现场数十次飞行的实验结果表明,我们的系统可以实现非常好的性能,例如,8架无人机可以实现94%的覆盖率和(平均)2K视频支持,在20mbps之间通过优化覆盖率和吞吐量。通过动态分配无人机来覆盖游戏或充当中继,我们的系统还展示了比系统最大化静态覆盖的2倍增益,仅实现9 Mbps的视频吞吐量。
{"title":"Networked Drone Cameras for Sports Streaming","authors":"Xiaoli Wang, Aakanksha Chowdhery, M. Chiang","doi":"10.1109/ICDCS.2017.200","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.200","url":null,"abstract":"A network of drone cameras can be deployed to cover live events, such as high-action sports game played on a large field, but managing networked drone cameras in real-time is challenging. Distributed approaches yield suboptimal solutions from lack of coordination but coordination with a centralized controller incurs round-trip latencies of several hundreds of milliseconds over a wireless channel. We propose a fog-networking based system architecture to automatically coordinate a network of drones equipped with cameras to capture and broadcast the dynamically changing scenes of interest in a sports game. We design both optimal and practical algorithms to balance the tradeoff between two metrics: coverage of the most important scenes and streamed video bitrate. To compensate for network round-trip latencies, the centralized controller uses a predictive approach to predict which locations the drones should cover next. The controller maximizes video bitrate by associating each drone to an optimally matched server and dynamically re-assigns drones as relay nodes to boost the throughput in low-throughput scenarios. This dynamic assignment at centralized controller occurs at slower time-scale permitted by round-trip latencies, while the predictive approach and drones’ local decision ensures that the system works in real-time. Experimental results over tens of flights on the field suggest our system can achieve really good performance, for example, 8 drones can achieve a tradeoff of 94% coverage and (on average) 2K video support at 20 Mbps by optimizing between coverage and throughput. By dynamically allocating drones to cover the game or act as relays, our system also demonstrates a 2x gain over systems maximizing static coverage alone that achieves only 9 Mbps video throughput.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123059450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
SRLB: The Power of Choices in Load Balancing with Segment Routing SRLB:分段路由负载均衡中选择的力量
Yoann Desmouceaux, P. Pfister, Jerome Tollet, M. Townsley, T. Clausen
Network load-balancers generally either do not take application state into account, or do so at the cost of a centralized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, i.e. in an application protocol agnostic fashion - yet which still provides application-awareness and makes real-time, decentralized decisions. To that end, IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based on its local state. This way, applications themselves naturally decide on how to share incoming connections, while incurring minimal network overhead, and no out-of-band signaling. Tests on different workloads - including realistic workloads such as replaying actual Wikipedia access traffic towards a set of replica Wikipedia instances - show significant performance benefits, in terms of shorter response times, when compared to a traditional random load-balancer.
网络负载平衡器通常要么不考虑应用程序状态,要么以集中监控系统为代价。本文介绍了一个负载均衡器,它只在IP转发平面上运行,即以一种与应用协议无关的方式运行,但它仍然提供应用感知,并做出实时的、分散的决策。为此,IPv6段路由用于将数据包从一个新的流通过候选服务器链,直到一个决定接受连接,基于它的本地状态。通过这种方式,应用程序自己自然地决定如何共享传入连接,同时产生最小的网络开销,并且没有带外信令。在不同的工作负载上进行测试——包括实际的工作负载,比如对一组副本Wikipedia实例重播实际的Wikipedia访问流量——与传统的随机负载平衡器相比,在更短的响应时间方面显示出显著的性能优势。
{"title":"SRLB: The Power of Choices in Load Balancing with Segment Routing","authors":"Yoann Desmouceaux, P. Pfister, Jerome Tollet, M. Townsley, T. Clausen","doi":"10.1109/ICDCS.2017.180","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.180","url":null,"abstract":"Network load-balancers generally either do not take application state into account, or do so at the cost of a centralized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, i.e. in an application protocol agnostic fashion - yet which still provides application-awareness and makes real-time, decentralized decisions. To that end, IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based on its local state. This way, applications themselves naturally decide on how to share incoming connections, while incurring minimal network overhead, and no out-of-band signaling. Tests on different workloads - including realistic workloads such as replaying actual Wikipedia access traffic towards a set of replica Wikipedia instances - show significant performance benefits, in terms of shorter response times, when compared to a traditional random load-balancer.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128142274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Calvin Constrained — A Framework for IoT Applications in Heterogeneous Environments 卡尔文约束——异构环境中物联网应用的框架
Amardeep Mehta, R. Baddour, Fredrik Svensson, H. Gustafsson, E. Elmroth
Calvin is an IoT framework for application development, deployment and execution in heterogeneous environments, that includes clouds, edge resources, and embedded or constrained resources. Inside Calvin, all the distributed resources are viewed as one environment by the application. The framework provides multi-tenancy and simplifies development of IoT applications, which are represented using a dataflow of application components (named actors) and their communication. The idea behind Calvin poses similarity with the serverless architecture and can be seen as Actor as a Service instead of Function as a Service. This makes Calvin very powerful as it does not only scale actors quickly but also provides an easy actor migration capability. In this work, we propose Calvin Constrained, an extension to the Calvin framework to cover resource-constrained devices. Due to limited memory and processing power of embedded devices, the constrained side of the framework can only support a limited subset of the Calvin features. The current implementation of Calvin Constrained supports actors implemented in C as well as Python, where the support for Python actors is enabled by using MicroPython as a statically allocated library, by this we enable the automatic management of state variables and enhance code re-usability. As would be expected, Python-coded actors demand more resources over C-coded ones. We show that the extra resources needed are manageable on current off-the-shelve micro-controller-equipped devices when using the Calvin framework.
Calvin是一个物联网框架,用于在异构环境中开发、部署和执行应用程序,包括云、边缘资源和嵌入式或受限资源。在Calvin内部,应用程序将所有分布式资源视为一个环境。该框架提供了多租户并简化了物联网应用程序的开发,这些应用程序使用应用程序组件(称为参与者)及其通信的数据流来表示。Calvin背后的思想与无服务器架构相似,可以看作是Actor即服务,而不是函数即服务。这使得Calvin非常强大,因为它不仅可以快速扩展actor,而且还提供了一个简单的actor迁移功能。在这项工作中,我们提出卡尔文约束,卡尔文框架的扩展,以涵盖资源受限的设备。由于嵌入式设备的内存和处理能力有限,框架的约束端只能支持Calvin特性的有限子集。Calvin Constrained的当前实现支持用C和Python实现的actor,其中对Python actor的支持是通过使用MicroPython作为静态分配库来实现的,这样我们就可以自动管理状态变量并增强代码的可重用性。正如预期的那样,python编码的actor比c编码的actor需要更多的资源。我们表明,当使用卡尔文框架时,所需的额外资源在当前现成的配备微控制器的设备上是可管理的。
{"title":"Calvin Constrained — A Framework for IoT Applications in Heterogeneous Environments","authors":"Amardeep Mehta, R. Baddour, Fredrik Svensson, H. Gustafsson, E. Elmroth","doi":"10.1109/ICDCS.2017.181","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.181","url":null,"abstract":"Calvin is an IoT framework for application development, deployment and execution in heterogeneous environments, that includes clouds, edge resources, and embedded or constrained resources. Inside Calvin, all the distributed resources are viewed as one environment by the application. The framework provides multi-tenancy and simplifies development of IoT applications, which are represented using a dataflow of application components (named actors) and their communication. The idea behind Calvin poses similarity with the serverless architecture and can be seen as Actor as a Service instead of Function as a Service. This makes Calvin very powerful as it does not only scale actors quickly but also provides an easy actor migration capability. In this work, we propose Calvin Constrained, an extension to the Calvin framework to cover resource-constrained devices. Due to limited memory and processing power of embedded devices, the constrained side of the framework can only support a limited subset of the Calvin features. The current implementation of Calvin Constrained supports actors implemented in C as well as Python, where the support for Python actors is enabled by using MicroPython as a statically allocated library, by this we enable the automatic management of state variables and enhance code re-usability. As would be expected, Python-coded actors demand more resources over C-coded ones. We show that the extra resources needed are manageable on current off-the-shelve micro-controller-equipped devices when using the Calvin framework.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Structured Overlay Networks for a New Generation of Internet Services 面向新一代互联网服务的结构化覆盖网络
Amy Babay, C. Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, J. Stanton, Thomas Tantillo, Y. Amir
The dramatic success and scaling of the Internet was made possible by the core principle of keeping it simple in the middle and smart at the edge (or the end-to-end principle). However, new applications bring new demands, and for many emerging applications, the Internet paradigm presents limitations. For applications in this new generation of Internet services, structured overlay networks offer a powerful framework for deploying specialized protocols that can provide new capabilities beyond what the Internet natively supports by leveraging global state and in-network processing. The structured overlay concept includes three principles: A resilient network architecture, a flexible overlay node software architecture that exploits global state and unlimited programmability, and flow-based processing. We demonstrate the effectiveness of structured overlay networks in supporting today's demanding applications and propose forward-looking ideas for leveraging the framework to develop protocols that push the boundaries of what is possible in terms of performance and resilience.
互联网的巨大成功和规模化是通过保持中间简单和边缘智能的核心原则(或端到端原则)实现的。然而,新的应用程序带来了新的需求,并且对于许多新兴的应用程序,Internet范式存在局限性。对于新一代Internet服务中的应用程序,结构化覆盖网络提供了一个强大的框架,用于部署专门的协议,这些协议可以通过利用全局状态和网络内处理来提供Internet原生支持之外的新功能。结构化覆盖概念包括三个原则:弹性网络架构,利用全局状态和无限可编程性的灵活覆盖节点软件架构,以及基于流的处理。我们展示了结构化覆盖网络在支持当今要求苛刻的应用程序方面的有效性,并提出了前瞻性的想法,以利用该框架开发协议,在性能和弹性方面突破可能的界限。
{"title":"Structured Overlay Networks for a New Generation of Internet Services","authors":"Amy Babay, C. Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, J. Stanton, Thomas Tantillo, Y. Amir","doi":"10.1109/ICDCS.2017.119","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.119","url":null,"abstract":"The dramatic success and scaling of the Internet was made possible by the core principle of keeping it simple in the middle and smart at the edge (or the end-to-end principle). However, new applications bring new demands, and for many emerging applications, the Internet paradigm presents limitations. For applications in this new generation of Internet services, structured overlay networks offer a powerful framework for deploying specialized protocols that can provide new capabilities beyond what the Internet natively supports by leveraging global state and in-network processing. The structured overlay concept includes three principles: A resilient network architecture, a flexible overlay node software architecture that exploits global state and unlimited programmability, and flow-based processing. We demonstrate the effectiveness of structured overlay networks in supporting today's demanding applications and propose forward-looking ideas for leveraging the framework to develop protocols that push the boundaries of what is possible in terms of performance and resilience.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123750078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices PhaseBeat:利用CSI相位数据与商品WiFi设备进行生命体征监测
Xuyu Wang, Chao Yang, S. Mao
Vital signs, such as respiration and heartbeat, are useful to health monitoring since such signals provide important clues of medical conditions. Effective solutions are needed to provide contact-free, easy deployment, low-cost, and long-term vital sign monitoring. In this paper, we present PhaseBeat to exploit channel state information (CSI) phase difference data to monitor breathing and heartbeat with commodity WiFi devices. We provide a rigorous analysis of the CSI phase difference data with respect to its stability and periodicity. Based on the analysis, we design and implement the PhaseBeat system with off-the-shelf WiFi devices, and conduct an extensive experimental study to validate its performance. Our experimental results demonstrate the superior performance of PhaseBeat over existing approaches in various indoor environments.
生命体征,如呼吸和心跳,对健康监测很有用,因为这些信号提供了医疗状况的重要线索。需要有效的解决方案来提供无接触、易于部署、低成本和长期的生命体征监测。在本文中,我们提出了PhaseBeat利用信道状态信息(CSI)相位差数据来监测商用WiFi设备的呼吸和心跳。我们对CSI相位差数据的稳定性和周期性进行了严格的分析。在此基础上,我们利用现成的WiFi设备设计并实现了PhaseBeat系统,并进行了广泛的实验研究来验证其性能。我们的实验结果表明,PhaseBeat在各种室内环境下的性能优于现有方法。
{"title":"PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices","authors":"Xuyu Wang, Chao Yang, S. Mao","doi":"10.1109/ICDCS.2017.206","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.206","url":null,"abstract":"Vital signs, such as respiration and heartbeat, are useful to health monitoring since such signals provide important clues of medical conditions. Effective solutions are needed to provide contact-free, easy deployment, low-cost, and long-term vital sign monitoring. In this paper, we present PhaseBeat to exploit channel state information (CSI) phase difference data to monitor breathing and heartbeat with commodity WiFi devices. We provide a rigorous analysis of the CSI phase difference data with respect to its stability and periodicity. Based on the analysis, we design and implement the PhaseBeat system with off-the-shelf WiFi devices, and conduct an extensive experimental study to validate its performance. Our experimental results demonstrate the superior performance of PhaseBeat over existing approaches in various indoor environments.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128544434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 229
期刊
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1