首页 > 最新文献

Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)最新文献

英文 中文
Autonomic Resource Management for Multiple-Spanning-Tree Metro-Ethernet Networks 多生成树城域以太网的自主资源管理
Shibiao Lin, Srikant Sharma, T. Chiueh
Viking [13] is a multi-spanning-tree Ethernet architecture that is designed to leverage commodity Ethernet switches to support Metro-Ethernet services. In particular, it exploits VLAN switching to provide network-wide load balancing across a metro-area network. However, Viking assumes the traffic matrix is fixed; as time goes by, the input load may gradually deviate from the assumed traffic matrix because of addition/deletion of subscribers and/or changes in bandwidth requirements from existing subscribers. Therefore, dynamic resource management is required to accommodate such traffic load fluctuations. This paper describes the design, implementation and evaluation of an autonomic network resource management system called Viking2 that enables a Metro-Ethernet network to dynamically self-reconfigure itself, with minimal human intervention, to adapt to changing traffic loads. In particular, whenever possible Viking2 uses a local repair approach to eliminate congestion while minimizing the number of flows affected. If local repair cannot fix a congestion problem, Viking2 resorts to a global reconfiguration approach that recomputes a new path for every flow and deploys the new routing state in a way that reduces the disruption during the period of transition to the minimum. Simulation results show that compared with the original Viking, Viking2 can indeed significantly improve a network's ability to dynamically adapt itself to changing traffic loads, to minimize the degree of congestion during normal network operation, and to increase the total effective network capacity.
Viking[13]是一种多扩展树以太网架构,其设计目的是利用商品以太网交换机来支持城域以太网服务。特别是,它利用VLAN交换在城域网络上提供全网范围的负载平衡。然而,维京假设流量矩阵是固定的;随着时间的推移,由于用户的增加/删除和/或现有用户带宽需求的变化,输入负载可能会逐渐偏离假定的流量矩阵。因此,需要动态资源管理来适应这种流量负载波动。本文描述了一个名为Viking2的自主网络资源管理系统的设计、实现和评估,该系统使城域以太网能够在最小的人为干预下动态地自我重新配置,以适应不断变化的流量负载。特别是,只要可能,Viking2使用本地修复方法来消除拥塞,同时最大限度地减少受影响的流量。如果局部修复无法解决拥塞问题,Viking2将采用全局重新配置方法,为每个流量重新计算一条新路径,并以一种将过渡期间的中断减少到最小的方式部署新的路由状态。仿真结果表明,与原有的Viking相比,Viking2确实能够显著提高网络动态适应流量负载变化的能力,最大限度地降低网络正常运行时的拥塞程度,提高网络总有效容量。
{"title":"Autonomic Resource Management for Multiple-Spanning-Tree Metro-Ethernet Networks","authors":"Shibiao Lin, Srikant Sharma, T. Chiueh","doi":"10.1109/NCA.2007.10","DOIUrl":"https://doi.org/10.1109/NCA.2007.10","url":null,"abstract":"Viking [13] is a multi-spanning-tree Ethernet architecture that is designed to leverage commodity Ethernet switches to support Metro-Ethernet services. In particular, it exploits VLAN switching to provide network-wide load balancing across a metro-area network. However, Viking assumes the traffic matrix is fixed; as time goes by, the input load may gradually deviate from the assumed traffic matrix because of addition/deletion of subscribers and/or changes in bandwidth requirements from existing subscribers. Therefore, dynamic resource management is required to accommodate such traffic load fluctuations. This paper describes the design, implementation and evaluation of an autonomic network resource management system called Viking2 that enables a Metro-Ethernet network to dynamically self-reconfigure itself, with minimal human intervention, to adapt to changing traffic loads. In particular, whenever possible Viking2 uses a local repair approach to eliminate congestion while minimizing the number of flows affected. If local repair cannot fix a congestion problem, Viking2 resorts to a global reconfiguration approach that recomputes a new path for every flow and deploys the new routing state in a way that reduces the disruption during the period of transition to the minimum. Simulation results show that compared with the original Viking, Viking2 can indeed significantly improve a network's ability to dynamically adapt itself to changing traffic loads, to minimize the degree of congestion during normal network operation, and to increase the total effective network capacity.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125191994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fail-Aware Publish/Subscribe Fail-Aware发布/订阅
Zbigniew Jerzak, Robert Fach, C. Fetzer
In this paper we present a wide area distributed system using a content-based publish/subscribe communication middleware which can deterministically detect and report failures with respect to timely message delivery and message omission. Our approach does not require external clock synchronization nor does it impose any constraints on the publish/subscribe middleware. We show that our system performs better and is safer than when using NTP for external clock synchronization. We provide a proof of concept implementation and present results of experiments carried out in the PlanetLab environment.
在本文中,我们提出了一个广域分布式系统,该系统使用基于内容的发布/订阅通信中间件,可以确定地检测和报告有关消息及时传递和消息遗漏的故障。我们的方法不需要外部时钟同步,也不会对发布/订阅中间件施加任何约束。我们证明了我们的系统比使用NTP进行外部时钟同步时性能更好,更安全。我们提供了在PlanetLab环境中进行的概念实现验证和实验结果。
{"title":"Fail-Aware Publish/Subscribe","authors":"Zbigniew Jerzak, Robert Fach, C. Fetzer","doi":"10.1109/NCA.2007.24","DOIUrl":"https://doi.org/10.1109/NCA.2007.24","url":null,"abstract":"In this paper we present a wide area distributed system using a content-based publish/subscribe communication middleware which can deterministically detect and report failures with respect to timely message delivery and message omission. Our approach does not require external clock synchronization nor does it impose any constraints on the publish/subscribe middleware. We show that our system performs better and is safer than when using NTP for external clock synchronization. We provide a proof of concept implementation and present results of experiments carried out in the PlanetLab environment.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Adaptive Search Radius - Lowering Internet P2P File-Sharing Traffic through Self-Restraint 自适应搜索半径——通过自我约束降低互联网P2P文件共享流量
R. Pereira, T. Vazão, R. Rodrigues
Peer-to-peer (P2P) file sharing accounts for a very significant part of the Internet's traffic, translating into significant peering costs for ISPs. It has been noticed that, just like WWW traffic, P2P file sharing traffic shows locality properties, which are not exploited by current P2P file sharing protocols. We propose a novel peer selection algorithm, adaptive search radius (ASR), whose primary goal is to reduce ISPs' peering costs, where peers exploit locality by only downloading from those other peers which are nearest (in network hops). Simulation studies, using the eMule protocol, show that ASR benefits both ISPs, by globally reducing P2P file sharing traffic, and users, who experience faster downloads.
点对点(P2P)文件共享占互联网流量的很大一部分,这对互联网服务提供商来说意味着巨大的对等成本。已经注意到,就像WWW流量一样,P2P文件共享流量显示出局部性,这是当前P2P文件共享协议没有利用的。我们提出了一种新的对等选择算法,自适应搜索半径(ASR),其主要目标是减少isp的对等成本,其中对等体通过仅从最近的其他对等体(在网络跳数中)下载来利用局域性。使用eMule协议的仿真研究表明,ASR对isp和用户都有好处,因为它们可以在全球范围内减少P2P文件共享流量,用户也可以体验到更快的下载速度。
{"title":"Adaptive Search Radius - Lowering Internet P2P File-Sharing Traffic through Self-Restraint","authors":"R. Pereira, T. Vazão, R. Rodrigues","doi":"10.1109/NCA.2007.6","DOIUrl":"https://doi.org/10.1109/NCA.2007.6","url":null,"abstract":"Peer-to-peer (P2P) file sharing accounts for a very significant part of the Internet's traffic, translating into significant peering costs for ISPs. It has been noticed that, just like WWW traffic, P2P file sharing traffic shows locality properties, which are not exploited by current P2P file sharing protocols. We propose a novel peer selection algorithm, adaptive search radius (ASR), whose primary goal is to reduce ISPs' peering costs, where peers exploit locality by only downloading from those other peers which are nearest (in network hops). Simulation studies, using the eMule protocol, show that ASR benefits both ISPs, by globally reducing P2P file sharing traffic, and users, who experience faster downloads.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123913862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Impact of request dispatching granularity in geographically distributed Web systems 地理分布式Web系统中请求调度粒度的影响
M. Andreolini, C. Canali, R. Lancellotti
The advent of the mobile Web and the increasing demand for personalized contents arise the need for computationally expensive services, such as dynamic generation and on-the- fly adaptation of contents. Providing these services exacerbates the performance issues that have to be addressed by the underlying Web architecture. When performance issues are addressed through geographically distributed Web systems with a large number of nodes located on the network edge, the dispatching mechanism that distributes requests among the system nodes becomes a critical element. In this paper, we investigate how the granularity of re- quest dispatching may affect the performance of a distributed Web system for personalized contents. Through a real prototype, we compare dispatching mechanisms operating at various levels of granularity for different workload and network scenarios. We demonstrate that the choice of the best granularity for request dispatching strongly depends on the characteristics of the workload in terms of heterogeneity and computational requirements. A coarse- grain dispatching is preferable only when the requests have similar computational requirements. In all other instances of skewed workloads, that we can consider more realistic, a fine-grain dispatching augments the control on the node load and allows the system to achieve better performance.
移动Web的出现和对个性化内容日益增长的需求产生了对计算成本高昂的服务的需求,例如动态生成和内容的动态适应。提供这些服务加剧了必须由底层Web体系结构解决的性能问题。当通过地理上分布的Web系统解决性能问题时,在网络边缘有大量节点,在系统节点之间分发请求的调度机制就成为一个关键因素。在本文中,我们研究了请求调度的粒度如何影响个性化内容的分布式Web系统的性能。通过一个真实的原型,我们比较了在不同工作负载和网络场景下在不同粒度级别上运行的调度机制。我们证明,请求调度的最佳粒度的选择在很大程度上取决于工作负载在异构性和计算需求方面的特征。只有当请求具有相似的计算需求时,才优选粗粒度调度。在我们可以更现实地考虑的所有其他倾斜工作负载实例中,细粒度调度增强了对节点负载的控制,并允许系统实现更好的性能。
{"title":"Impact of request dispatching granularity in geographically distributed Web systems","authors":"M. Andreolini, C. Canali, R. Lancellotti","doi":"10.1109/NCA.2007.28","DOIUrl":"https://doi.org/10.1109/NCA.2007.28","url":null,"abstract":"The advent of the mobile Web and the increasing demand for personalized contents arise the need for computationally expensive services, such as dynamic generation and on-the- fly adaptation of contents. Providing these services exacerbates the performance issues that have to be addressed by the underlying Web architecture. When performance issues are addressed through geographically distributed Web systems with a large number of nodes located on the network edge, the dispatching mechanism that distributes requests among the system nodes becomes a critical element. In this paper, we investigate how the granularity of re- quest dispatching may affect the performance of a distributed Web system for personalized contents. Through a real prototype, we compare dispatching mechanisms operating at various levels of granularity for different workload and network scenarios. We demonstrate that the choice of the best granularity for request dispatching strongly depends on the characteristics of the workload in terms of heterogeneity and computational requirements. A coarse- grain dispatching is preferable only when the requests have similar computational requirements. In all other instances of skewed workloads, that we can consider more realistic, a fine-grain dispatching augments the control on the node load and allows the system to achieve better performance.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experiences from Building Service and Object Replication Middleware 构建服务和对象复制中间件的经验
Johannes Osrael, Lorenz Froihofer, K. M. Göschka
Replication is a primary means to achieve fault tolerance in distributed systems. While replication techniques are well known and have been widely applied in distributed object and database systems, they have not yet been extensively used in service oriented systems. However, if the success of service oriented computing shall continue in critical settings, replication middleware will play a crucial role in service oriented infrastructures. Thus, we contribute with a discussion of our experiences in building distributed object and service replication middleware and present the main lessons learned. Our conclusions are drawn from several replication middleware implementations built upon J2EE, .NET, CORBA, and Axis2.
复制是在分布式系统中实现容错的主要手段。虽然复制技术在分布式对象和数据库系统中已经得到了广泛的应用,但在面向服务的系统中还没有得到广泛的应用。然而,如果面向服务的计算在关键环境中继续取得成功,那么复制中间件将在面向服务的基础设施中扮演至关重要的角色。因此,我们讨论了我们在构建分布式对象和服务复制中间件方面的经验,并给出了主要的经验教训。我们的结论来自于基于J2EE、。net、CORBA和Axis2构建的几个复制中间件实现。
{"title":"Experiences from Building Service and Object Replication Middleware","authors":"Johannes Osrael, Lorenz Froihofer, K. M. Göschka","doi":"10.1109/NCA.2007.21","DOIUrl":"https://doi.org/10.1109/NCA.2007.21","url":null,"abstract":"Replication is a primary means to achieve fault tolerance in distributed systems. While replication techniques are well known and have been widely applied in distributed object and database systems, they have not yet been extensively used in service oriented systems. However, if the success of service oriented computing shall continue in critical settings, replication middleware will play a crucial role in service oriented infrastructures. Thus, we contribute with a discussion of our experiences in building distributed object and service replication middleware and present the main lessons learned. Our conclusions are drawn from several replication middleware implementations built upon J2EE, .NET, CORBA, and Axis2.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transparent Reliable Multicast for Ethernet-Based Storage Area Networks 基于以太网的存储区域网络的透明可靠组播
Shibiao Lin, Maohua Lu, T. Chiueh
As disk storage density increases and data availability requirements become ever more demanding, data replication is increasingly an indispensable feature of enterprise-class storage systems. For highly available storage systems, every disk block is typically replicated on a local mirror server and a remote mirror server in addition to being stored on the main storage server. In a network storage environment, this N-way data replication increases the write traffic load on the storage client's network interface by N times. Multicast is a natural solution to this problem. However, existing storage area network technologies such as fibre channel and Ethernet do not provide adequate support for linklayer multicast. This paper describes a novel reliable multicast mechanism for Ethernet-based storage area networks that effectively exploits the virtual LAN technology and is able to keep the traffic load of N-way replication roughly at the same level as the no-replication case regardless of the value of N. This technology greatly increases the appeal of using Ethernet as the physical-layer technology for storage area networking, as fibre channel networks currently do not support such in-network replication. Performance measurements on an iSCSI-based network storage system demonstrate that the proposed reliable multicast mechanism is able to reduce the end-to-end data transport time by a factor of 2.6 for three-way replication when the disk write size is more than 4 Mbytes.
随着磁盘存储密度的增加和对数据可用性的要求越来越高,数据复制越来越成为企业级存储系统不可或缺的特性。对于高可用性存储系统,除了存储在主存储服务器上之外,每个磁盘块通常在本地镜像服务器和远程镜像服务器上进行复制。在网络存储环境中,这种N向数据复制会使存储客户端网络接口的写流量负载增加N倍。多播是解决这个问题的自然方法。然而,现有的存储区域网络技术,如光纤通道和以太网,并没有为链路层多播提供足够的支持。本文描述了一种新的基于以太网的存储区域网络可靠的组播机制,该机制有效地利用了虚拟局域网技术,使N-way复制的流量负荷与无复制情况保持大致相同的水平,而不考虑n的值。这种技术大大增加了使用以太网作为存储区域网络物理层技术的吸引力,因为光纤通道网络目前不支持这种网络内复制。在基于iscsi的网络存储系统上进行的性能测试表明,当磁盘写入大小大于4mb时,所提出的可靠组播机制能够将端到端数据传输时间减少2.6倍。
{"title":"Transparent Reliable Multicast for Ethernet-Based Storage Area Networks","authors":"Shibiao Lin, Maohua Lu, T. Chiueh","doi":"10.1109/NCA.2007.51","DOIUrl":"https://doi.org/10.1109/NCA.2007.51","url":null,"abstract":"As disk storage density increases and data availability requirements become ever more demanding, data replication is increasingly an indispensable feature of enterprise-class storage systems. For highly available storage systems, every disk block is typically replicated on a local mirror server and a remote mirror server in addition to being stored on the main storage server. In a network storage environment, this N-way data replication increases the write traffic load on the storage client's network interface by N times. Multicast is a natural solution to this problem. However, existing storage area network technologies such as fibre channel and Ethernet do not provide adequate support for linklayer multicast. This paper describes a novel reliable multicast mechanism for Ethernet-based storage area networks that effectively exploits the virtual LAN technology and is able to keep the traffic load of N-way replication roughly at the same level as the no-replication case regardless of the value of N. This technology greatly increases the appeal of using Ethernet as the physical-layer technology for storage area networking, as fibre channel networks currently do not support such in-network replication. Performance measurements on an iSCSI-based network storage system demonstrate that the proposed reliable multicast mechanism is able to reduce the end-to-end data transport time by a factor of 2.6 for three-way replication when the disk write size is more than 4 Mbytes.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security and performance analysis of a secure clustering protocol for sensor networks 传感器网络安全聚类协议的安全性和性能分析
P. Banerjee, D. Jacobson, S. Lahiri
Clustering protocols are often used in sensor networks. In many deployment scenarios, security is a key concern. In this paper we provide a secure solution to a commonly used clustering protocol, the LEACH protocol. We show that our protocol, the GS-LEACH protocol is more energy efficient than any of the secure flavors of LEACH. The GS-LEACH (grid-based secure LEACH) protocol uses pre deployment key distribution using prior knowledge of the deployment area. We also provide a detailed security analysis of our protocol and show that it is more secure than the secure versions of LEACH. Finally with the results of our simulation experiments we show that our protocol is very energy efficient and provides a longer network lifetime compared to the other flavors of LEACH.
聚类协议是传感器网络中常用的协议。在许多部署场景中,安全性是一个关键问题。本文为一种常用的集群协议LEACH协议提供了一种安全的解决方案。我们证明了我们的协议,GS-LEACH协议比任何安全的LEACH协议都更节能。GS-LEACH(基于网格的安全LEACH)协议使用部署区域的先验知识进行预部署密钥分发。我们还对我们的协议进行了详细的安全分析,并表明它比LEACH的安全版本更安全。最后,通过仿真实验的结果,我们证明了我们的协议非常节能,并且与其他类型的LEACH相比,提供了更长的网络生命周期。
{"title":"Security and performance analysis of a secure clustering protocol for sensor networks","authors":"P. Banerjee, D. Jacobson, S. Lahiri","doi":"10.1109/NCA.2007.40","DOIUrl":"https://doi.org/10.1109/NCA.2007.40","url":null,"abstract":"Clustering protocols are often used in sensor networks. In many deployment scenarios, security is a key concern. In this paper we provide a secure solution to a commonly used clustering protocol, the LEACH protocol. We show that our protocol, the GS-LEACH protocol is more energy efficient than any of the secure flavors of LEACH. The GS-LEACH (grid-based secure LEACH) protocol uses pre deployment key distribution using prior knowledge of the deployment area. We also provide a detailed security analysis of our protocol and show that it is more secure than the secure versions of LEACH. Finally with the results of our simulation experiments we show that our protocol is very energy efficient and provides a longer network lifetime compared to the other flavors of LEACH.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
A Topological Analysis of Monitor Placement 监视器放置的拓扑分析
A. Jackson, W. Milliken, C. Santivanez, M. Condell, W. Strayer
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper behavior (e.g., attacks). The reality, however, is that it is impractical to fully instrument anything but relatively small networks and impossible to even partially instrument many parts of the Internet. This paper analyzes a subset of the general monitor placement problem where the goal is to maximize the coverage of the entire universe of potential communication pairs (i.e., source and destination are randomly distributed in the routable Internet address space). This issue arises, for example, when trying to detect/track a distributed attack. We present results from a simulation, seeded with data from skitter and RouteViews, that indicate we can monitor a packet with a high probability by monitoring relatively few points in the Internet. Our analysis suggests that the preferred strategy to place monitors should be to instrument one or two specific inter-AS links per AS for many ASes rather than deeply instrumenting a subset of the largest ASes.
互联网是一个极其复杂的系统,我们必须能够进行准确的测量,以便了解其潜在的行为或检测不适当的行为(例如,攻击)。然而,现实情况是,除了相对较小的网络之外,完全仪器化任何东西都是不切实际的,甚至不可能部分仪器化互联网的许多部分。本文分析了一般监视器放置问题的一个子集,其目标是最大化潜在通信对的整个宇宙的覆盖范围(即,源和目标随机分布在可路由的Internet地址空间中)。例如,当试图检测/跟踪分布式攻击时,就会出现这个问题。我们给出了一个模拟的结果,其中包含了来自skitter和RouteViews的数据,表明我们可以通过监控互联网中相对较少的点来以高概率监控数据包。我们的分析表明,放置监视器的首选策略应该是为许多AS检测每个AS的一个或两个特定的AS间链接,而不是深度检测最大的AS的一个子集。
{"title":"A Topological Analysis of Monitor Placement","authors":"A. Jackson, W. Milliken, C. Santivanez, M. Condell, W. Strayer","doi":"10.1109/NCA.2007.3","DOIUrl":"https://doi.org/10.1109/NCA.2007.3","url":null,"abstract":"The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper behavior (e.g., attacks). The reality, however, is that it is impractical to fully instrument anything but relatively small networks and impossible to even partially instrument many parts of the Internet. This paper analyzes a subset of the general monitor placement problem where the goal is to maximize the coverage of the entire universe of potential communication pairs (i.e., source and destination are randomly distributed in the routable Internet address space). This issue arises, for example, when trying to detect/track a distributed attack. We present results from a simulation, seeded with data from skitter and RouteViews, that indicate we can monitor a packet with a high probability by monitoring relatively few points in the Internet. Our analysis suggests that the preferred strategy to place monitors should be to instrument one or two specific inter-AS links per AS for many ASes rather than deeply instrumenting a subset of the largest ASes.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122974879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network 允许跳图处理移动传感器网络中的k维范围查询
Gregory J. Brault, Christopher J. Augeri, B. Mullins, R. Baldwin, Christopher B. Mayer
A skip graph is a resilient application-layer routing structure that supports range queries of distributed k-dimensional data. By sorting deterministic keys into groups based on locally computed random membership vectors, nodes in a standard skip graph can optimize range query performance in mobile networks such as unmanned aerial vehicle swarms. We propose a skip graph extension that inverts the key and membership vector roles and bases group membership on deterministic vectors derived from the z-ordering of k-dimensional data and sorting within groups is based on locally computed random keys.
跳图是一种弹性的应用层路由结构,支持分布式k维数据的范围查询。基于局部计算的随机隶属向量对确定性键进行分组,标准跳图中的节点可以优化无人机群等移动网络中的距离查询性能。我们提出了一个跳跃图扩展,它反转了键和隶属向量的角色,并基于k维数据的z顺序派生的确定性向量来确定群的隶属关系,并且组内的排序是基于局部计算的随机键。
{"title":"Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network","authors":"Gregory J. Brault, Christopher J. Augeri, B. Mullins, R. Baldwin, Christopher B. Mayer","doi":"10.1109/NCA.2007.18","DOIUrl":"https://doi.org/10.1109/NCA.2007.18","url":null,"abstract":"A skip graph is a resilient application-layer routing structure that supports range queries of distributed k-dimensional data. By sorting deterministic keys into groups based on locally computed random membership vectors, nodes in a standard skip graph can optimize range query performance in mobile networks such as unmanned aerial vehicle swarms. We propose a skip graph extension that inverts the key and membership vector roles and bases group membership on deterministic vectors derived from the z-ordering of k-dimensional data and sorting within groups is based on locally computed random keys.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Accurate Inter-Transaction Dependency Tracking for Repairable DBMS 准确的事务间依赖跟踪可修复DBMS
Shweta Bajpai, A. Smirnov, T. Chiueh
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical challenge to building repairable database management systems is how to accurately and efficiently keep track of inter-transaction dependencies that take place through a database as well as through application logic. In this paper, we present the design, implementation and evaluation of the inter-transaction dependency tracking mechanisms used in a repairable database management system called RDB2, which adds fast repairability in a portable way to a commercial DBMS Oracle 9.2.0. RDB2 eliminates dependencies due to false sharing using fine-grained inter-transaction dependency tracking, and is able to successfully identify a major source of false negatives, phantom dependencies. With these advanced inter-transaction dependency tracking mechanisms, RDB2 can significantly improve the availability of modern DBMSs by facilitating and sometimes even automating the damage repair process after an error or attack. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time throughput penalty of these enhanced inter-transaction dependency tracking mechanisms is less than 18%.
可修复的数据库管理系统能够自动撤销被人为错误或恶意攻击破坏的事务集。构建可修复的数据库管理系统的关键技术挑战是如何准确有效地跟踪通过数据库和应用程序逻辑发生的事务间依赖关系。在本文中,我们介绍了可修复数据库管理系统RDB2中使用的事务间依赖跟踪机制的设计、实现和评估,该系统以一种可移植的方式为商业DBMS Oracle 9.2.0增加了快速可修复性。RDB2使用细粒度的事务间依赖项跟踪消除了由于错误共享而导致的依赖项,并且能够成功地识别错误否定的主要来源,即虚幻依赖项。有了这些高级事务间依赖关系跟踪机制,RDB2可以在发生错误或攻击后促进甚至自动化损坏修复过程,从而显著提高现代dbms的可用性。在TPC-C基准测试下对完全可操作原型的性能测量表明,这些增强的事务间依赖跟踪机制的运行时吞吐量损失小于18%。
{"title":"Accurate Inter-Transaction Dependency Tracking for Repairable DBMS","authors":"Shweta Bajpai, A. Smirnov, T. Chiueh","doi":"10.1109/NCA.2007.5","DOIUrl":"https://doi.org/10.1109/NCA.2007.5","url":null,"abstract":"A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical challenge to building repairable database management systems is how to accurately and efficiently keep track of inter-transaction dependencies that take place through a database as well as through application logic. In this paper, we present the design, implementation and evaluation of the inter-transaction dependency tracking mechanisms used in a repairable database management system called RDB2, which adds fast repairability in a portable way to a commercial DBMS Oracle 9.2.0. RDB2 eliminates dependencies due to false sharing using fine-grained inter-transaction dependency tracking, and is able to successfully identify a major source of false negatives, phantom dependencies. With these advanced inter-transaction dependency tracking mechanisms, RDB2 can significantly improve the availability of modern DBMSs by facilitating and sometimes even automating the damage repair process after an error or attack. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time throughput penalty of these enhanced inter-transaction dependency tracking mechanisms is less than 18%.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116144973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1