首页 > 最新文献

Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)最新文献

英文 中文
Exact Forwarding Table Partitioning for Efficient TCAM Power Savings 精确转发表分区为高效的TCAM省电
Gesan Wang, N. Tzeng
Excessive power consumption is deemed one of the major drawbacks of TCAM-based IP search engines. This paper proposes a simple and yet efficient forwarding table partitioning algorithm aiming to achieve significant TCAM power savings. Our algorithm partitions the IP address space into a set of adjoining but non-overlapping search ranges comprising an exactly identical number of prefixes to be accommodated in a TCAM segment, dubbed exact table partitioning (ETAP). During a search operation, only one single range is examined to reduce overall TCAM power consumption substantially.
过多的功耗被认为是基于tcam的IP搜索引擎的主要缺点之一。本文提出了一种简单而高效的转发表分区算法,以达到显著的TCAM节能目的。我们的算法将IP地址空间划分为一组相邻但不重叠的搜索范围,这些搜索范围包含一个TCAM段中容纳的完全相同数量的前缀,称为精确表分区(ETAP)。在搜索操作期间,只检查一个范围,以大大降低TCAM的总体功耗。
{"title":"Exact Forwarding Table Partitioning for Efficient TCAM Power Savings","authors":"Gesan Wang, N. Tzeng","doi":"10.1109/NCA.2007.20","DOIUrl":"https://doi.org/10.1109/NCA.2007.20","url":null,"abstract":"Excessive power consumption is deemed one of the major drawbacks of TCAM-based IP search engines. This paper proposes a simple and yet efficient forwarding table partitioning algorithm aiming to achieve significant TCAM power savings. Our algorithm partitions the IP address space into a set of adjoining but non-overlapping search ranges comprising an exactly identical number of prefixes to be accommodated in a TCAM segment, dubbed exact table partitioning (ETAP). During a search operation, only one single range is examined to reduce overall TCAM power consumption substantially.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134405005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent. 基于移动代理的分布式入侵检测系统(dIDS)生存体系结构。
S. Vongpradhip, Wichet Plaimart
The attacking of the infrastructure of the computer network is seems to be one of the major problems. The increasing number of the Internet user all over the world comes with the risk that occurs from many network threats. One of the major tools for protecting the network attacking is the intrusion detection system (IDS), which make the system being the first target that will be attacked by the intruder. As we cannot avoid them, the problem is when there is an attack, how does the intrusion detection system survived. In this research, we show the restriction of the present intrusion detection system architecture and propose the new architecture that can handle the attack via the network and survive from it, using the mobile agent technology with the network topology design that hides the main resource of the network behind the intrusion detection system which separates network resource into segments and installs the monitored host onto each of network segment for robustness from all pattern of the attacking. The design avoid the single point of failure, shadow agent, together with proxy agent, fast backup and recovery mechanism, multicast group and the encryption of the communication between all the IDS for the network security.
对计算机网络基础设施的攻击似乎是主要问题之一。随着全球互联网用户数量的不断增加,随之而来的是各种网络威胁带来的风险。入侵检测系统(IDS)是保护网络攻击的主要工具之一,它使系统成为入侵者的第一个攻击目标。既然我们无法避免,那么问题就来了,当受到攻击时,入侵检测系统如何生存。在本研究中,我们指出了现有入侵检测系统架构的局限性,并提出了一种新的入侵检测系统架构,该架构可以应对来自网络的攻击并从中生存下来。采用移动代理技术和网络拓扑设计,将网络的主要资源隐藏在入侵检测系统的背后,将网络资源分割成网段,并将被监控的主机安装在每个网段上,以增强对各种攻击的鲁棒性。该设计避免了单点故障、影子代理、代理代理、快速备份和恢复机制、多播组和所有入侵检测系统之间通信的加密,保证了网络的安全性。
{"title":"Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent.","authors":"S. Vongpradhip, Wichet Plaimart","doi":"10.1109/NCA.2007.47","DOIUrl":"https://doi.org/10.1109/NCA.2007.47","url":null,"abstract":"The attacking of the infrastructure of the computer network is seems to be one of the major problems. The increasing number of the Internet user all over the world comes with the risk that occurs from many network threats. One of the major tools for protecting the network attacking is the intrusion detection system (IDS), which make the system being the first target that will be attacked by the intruder. As we cannot avoid them, the problem is when there is an attack, how does the intrusion detection system survived. In this research, we show the restriction of the present intrusion detection system architecture and propose the new architecture that can handle the attack via the network and survive from it, using the mobile agent technology with the network topology design that hides the main resource of the network behind the intrusion detection system which separates network resource into segments and installs the monitored host onto each of network segment for robustness from all pattern of the attacking. The design avoid the single point of failure, shadow agent, together with proxy agent, fast backup and recovery mechanism, multicast group and the encryption of the communication between all the IDS for the network security.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126998000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based Networks 基于BIP的网络系统建模与验证——以tinos网络为例
A. Basu, L. Mounier, Marc Poulhiès, J. Pulou, J. Sifakis
We apply a model construction methodology to TinyOS- based networks, using the behavior-interaction-priority (BIP) component framework. The methodology consists in building the model of a node as the composition of a model extracted from a nesC program describing the application, and models of TinyOS components. Models for networks are obtained by composition of models for nodes by using BIP connectors implementing different types of radio chan- nels. This opens the way for enhanced analysis and early error detection by using verification techniques.
我们将模型构建方法应用于基于TinyOS的网络,使用行为交互优先级(BIP)组件框架。该方法包括构建节点模型,作为从描述应用程序的nesC程序中提取的模型和TinyOS组件模型的组合。通过使用实现不同类型无线信道的BIP连接器对节点模型进行组合,得到网络模型。这为使用验证技术增强分析和早期错误检测开辟了道路。
{"title":"Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based Networks","authors":"A. Basu, L. Mounier, Marc Poulhiès, J. Pulou, J. Sifakis","doi":"10.1109/NCA.2007.52","DOIUrl":"https://doi.org/10.1109/NCA.2007.52","url":null,"abstract":"We apply a model construction methodology to TinyOS- based networks, using the behavior-interaction-priority (BIP) component framework. The methodology consists in building the model of a node as the composition of a model extracted from a nesC program describing the application, and models of TinyOS components. Models for networks are obtained by composition of models for nodes by using BIP connectors implementing different types of radio chan- nels. This opens the way for enhanced analysis and early error detection by using verification techniques.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Improving Network Processing Concurrency using TCPServers 使用tcpserver提高网络处理并发性
A. Bohra, L. Iftode
Exponentially growing bandwidth requirements and slowing gains in processor speeds have led to the popularity of multiprocessor architectures. Network stack parallelism is increasingly important to support such architectures. In this paper, we present techniques to improve network stack concurrency using our previous work, TCPServers, a system architecture for offloading network processing within an SMP system. TCPServers dedicates a subset of processors as packet processing engines (PPEs), which handle all asynchronous network events and perform receive processing. We introduce Receive Queues, data structures associated with each socket that store incoming network packets and are accessed exclusively at the PPEs. Using Receive Queues, we modify TCPServers based network stacks to incorporate early packet demultiplexing. We also present an efficient proportional fair scheduling algorithm, which processes incoming packets at the priority of the destination socket. Our experimental evaluation demonstrates that our modifications reduce the scheduling and synchronization overheads and improve the aggregate TCP/IP throughput by up to 75% compared against the default SMP stack. We also show that our system sustains this throughput, even when a large number of short lived connections are present.
指数级增长的带宽需求和处理器速度的缓慢增长导致了多处理器架构的流行。网络堆栈并行性对于支持这种体系结构越来越重要。在本文中,我们介绍了使用我们以前的工作TCPServers来提高网络堆栈并发性的技术,TCPServers是一种在SMP系统中卸载网络处理的系统架构。TCPServers将处理器的一个子集专用为包处理引擎(ppe),它处理所有异步网络事件并执行接收处理。我们将介绍接收队列,这是与每个套接字相关联的数据结构,用于存储传入的网络数据包,并且只能在ppe上访问。使用接收队列,我们修改基于tcpserver的网络堆栈,以合并早期的数据包解复用。我们还提出了一种有效的比例公平调度算法,该算法以目标套接字的优先级处理传入数据包。我们的实验评估表明,与默认的SMP堆栈相比,我们的修改减少了调度和同步开销,并将TCP/IP总吞吐量提高了75%。我们还表明,即使存在大量的短期连接,我们的系统也能维持这种吞吐量。
{"title":"Improving Network Processing Concurrency using TCPServers","authors":"A. Bohra, L. Iftode","doi":"10.1109/NCA.2007.31","DOIUrl":"https://doi.org/10.1109/NCA.2007.31","url":null,"abstract":"Exponentially growing bandwidth requirements and slowing gains in processor speeds have led to the popularity of multiprocessor architectures. Network stack parallelism is increasingly important to support such architectures. In this paper, we present techniques to improve network stack concurrency using our previous work, TCPServers, a system architecture for offloading network processing within an SMP system. TCPServers dedicates a subset of processors as packet processing engines (PPEs), which handle all asynchronous network events and perform receive processing. We introduce Receive Queues, data structures associated with each socket that store incoming network packets and are accessed exclusively at the PPEs. Using Receive Queues, we modify TCPServers based network stacks to incorporate early packet demultiplexing. We also present an efficient proportional fair scheduling algorithm, which processes incoming packets at the priority of the destination socket. Our experimental evaluation demonstrates that our modifications reduce the scheduling and synchronization overheads and improve the aggregate TCP/IP throughput by up to 75% compared against the default SMP stack. We also show that our system sustains this throughput, even when a large number of short lived connections are present.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125212328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting Host Name Locality for Reduced Stretch P2P Routing 利用主机名局部性减少拉伸P2P路由
G. Pfeifer, C. Fetzer, Thomas Hohnstein
Structured P2P networks are a promising alternative for engineering new distributed services and for replacing existing distributed services like DNS. Providing competitive performance with traditional distributed services is however very difficult because existing services like DNS are highly tuned using a combination of caching and localized communication. Typically, P2P systems use randomized host IDs which destroys any locality that might have been inherent in the IP addresses or the names of the hosts. In this way, P2P communication can result in a high stretch. We propose a locality preserving structured P2P system that supports efficient local communication and low stretch. While this system was optimized for resolving domain names, it will also provide a low stretch to other applications and it can be combined with existing replication schemes to optimize the response times even further.
结构化的P2P网络对于设计新的分布式服务和取代现有的分布式服务(如DNS)是一个很有前途的选择。然而,与传统的分布式服务相比,提供具有竞争力的性能是非常困难的,因为像DNS这样的现有服务使用缓存和本地化通信的组合进行了高度调优。通常,P2P系统使用随机的主机id,这会破坏IP地址或主机名称中可能固有的任何位置。通过这种方式,P2P通信可以产生很高的拉伸。提出了一种局部保留的结构化P2P系统,该系统支持高效的本地通信和低扩展。虽然该系统针对域名解析进行了优化,但它也将为其他应用程序提供较低的扩展,并且可以与现有的复制方案相结合,进一步优化响应时间。
{"title":"Exploiting Host Name Locality for Reduced Stretch P2P Routing","authors":"G. Pfeifer, C. Fetzer, Thomas Hohnstein","doi":"10.1109/NCA.2007.22","DOIUrl":"https://doi.org/10.1109/NCA.2007.22","url":null,"abstract":"Structured P2P networks are a promising alternative for engineering new distributed services and for replacing existing distributed services like DNS. Providing competitive performance with traditional distributed services is however very difficult because existing services like DNS are highly tuned using a combination of caching and localized communication. Typically, P2P systems use randomized host IDs which destroys any locality that might have been inherent in the IP addresses or the names of the hosts. In this way, P2P communication can result in a high stretch. We propose a locality preserving structured P2P system that supports efficient local communication and low stretch. While this system was optimized for resolving domain names, it will also provide a low stretch to other applications and it can be combined with existing replication schemes to optimize the response times even further.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LAN 透明准确的企业无线局域网流量负荷估计
Gang Wu, F. Guo, T. Chiueh
The exponential increase in the deployment of IEEE 802.11-based wireless LAN (WLAN) technology has transformed it into an essential building block of the networking infrastructure of commercial enterprises. How to effectively manage these WLAN networks and stop malicious intruders are the two main barriers for further spread of this technology. At the same time, the enormous economies of scale behind IEEE 802.11-based WLAN products also result in rapid technological advances and astounding pricing efficiencies. Today, the street price of a low-end 802.11g access point is as low as $50 USD, with an estimated manufacturing cost of less than $25. In this paper, we describe the design, implementation, and evaluation of a scalable wireless LAN traffic monitoring system called wireless network sentry (Wintry), which provides real-time visibility of the usage of an enterprise's wireless links in a way that is completely transparent to the monitored WLAN networks. Moreover, Wintry is able to leverage low-cost programmable WLAN access points and reduce the total hardware cost to the minimum. A key feature of Wintry is an accurate radio channel busy time estimation algorithm that correctly takes into account both back-off delay and corrupted packets in WLAN traffic load computation without requiring any modification to monitored WLAN devices.
基于IEEE 802.11的无线局域网(WLAN)技术的部署呈指数级增长,已将其转变为商业企业网络基础设施的基本组成部分。如何对这些无线局域网进行有效的管理和阻止恶意入侵者是制约该技术进一步推广的两大主要障碍。与此同时,基于IEEE 802.11的WLAN产品背后的巨大规模经济也导致了快速的技术进步和惊人的定价效率。今天,低端802.11g接入点的街头价格低至50美元,估计制造成本不到25美元。在本文中,我们描述了一个可扩展的无线局域网流量监控系统的设计、实现和评估,该系统被称为无线网络哨兵(Wintry),它以一种对被监控的WLAN网络完全透明的方式提供了企业无线链路使用情况的实时可见性。此外,Wintry能够利用低成本的可编程WLAN接入点,并将总硬件成本降至最低。Wintry的一个关键特性是一个精确的无线电信道繁忙时间估计算法,该算法在WLAN流量负载计算中正确地考虑了后退延迟和损坏的数据包,而不需要对被监控的WLAN设备进行任何修改。
{"title":"Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LAN","authors":"Gang Wu, F. Guo, T. Chiueh","doi":"10.1109/NCA.2007.50","DOIUrl":"https://doi.org/10.1109/NCA.2007.50","url":null,"abstract":"The exponential increase in the deployment of IEEE 802.11-based wireless LAN (WLAN) technology has transformed it into an essential building block of the networking infrastructure of commercial enterprises. How to effectively manage these WLAN networks and stop malicious intruders are the two main barriers for further spread of this technology. At the same time, the enormous economies of scale behind IEEE 802.11-based WLAN products also result in rapid technological advances and astounding pricing efficiencies. Today, the street price of a low-end 802.11g access point is as low as $50 USD, with an estimated manufacturing cost of less than $25. In this paper, we describe the design, implementation, and evaluation of a scalable wireless LAN traffic monitoring system called wireless network sentry (Wintry), which provides real-time visibility of the usage of an enterprise's wireless links in a way that is completely transparent to the monitored WLAN networks. Moreover, Wintry is able to leverage low-cost programmable WLAN access points and reduce the total hardware cost to the minimum. A key feature of Wintry is an accurate radio channel busy time estimation algorithm that correctly takes into account both back-off delay and corrupted packets in WLAN traffic load computation without requiring any modification to monitored WLAN devices.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Message Diffusion in Unstructured Overlay Networks 非结构化覆盖网络中的消息扩散
Jianxia Chen, Lakshmish Ramaswamy, Archana Meka
Many unstructured overlay-based peer-to-peer (P2P) applications require techniques that can effectively send messages to various topological regions of the overlay. While searching in unstructured P2P networks has been widely studied in literature, the problem of diffusing messages to various parts of an arbitrary overlay network has received surprisingly little research attention. In this paper we analyze the message diffusion problem and make two technical contributions towards addressing it. First, we propose a novel message propagation technique called the cluster resilient random walk (CRW). While the CRW technique preserves the overall framework of random walks, at each step of message forwarding, it favors the neighbors that are more likely to send the message deeper into the network. Second, in order to ensure effective message diffusion in networks with small cuts, we introduce a unique message fission technique in which messages are split when they reach peers connecting two or more topological regions of the network. Our experiments show that the proposed technique are very effective in diffusing messages across overlay networks of various topologies.
许多基于非结构化覆盖的点对点(P2P)应用程序需要能够有效地将消息发送到覆盖的各种拓扑区域的技术。虽然在非结构化P2P网络中的搜索已经得到了广泛的研究,但将消息扩散到任意覆盖网络的各个部分的问题却很少得到研究的关注。本文对消息扩散问题进行了分析,并对解决该问题作出了两项技术贡献。首先,我们提出了一种新的消息传播技术,称为集群弹性随机漫步(CRW)。虽然CRW技术保留了随机漫步的总体框架,但在消息转发的每一步,它都倾向于更有可能将消息发送到网络深处的邻居。其次,为了确保在具有小切割的网络中有效的消息扩散,我们引入了一种独特的消息裂变技术,在该技术中,当消息到达连接两个或多个网络拓扑区域的对等点时,消息被分裂。我们的实验表明,所提出的技术在各种拓扑的覆盖网络中传播消息是非常有效的。
{"title":"Message Diffusion in Unstructured Overlay Networks","authors":"Jianxia Chen, Lakshmish Ramaswamy, Archana Meka","doi":"10.1109/NCA.2007.32","DOIUrl":"https://doi.org/10.1109/NCA.2007.32","url":null,"abstract":"Many unstructured overlay-based peer-to-peer (P2P) applications require techniques that can effectively send messages to various topological regions of the overlay. While searching in unstructured P2P networks has been widely studied in literature, the problem of diffusing messages to various parts of an arbitrary overlay network has received surprisingly little research attention. In this paper we analyze the message diffusion problem and make two technical contributions towards addressing it. First, we propose a novel message propagation technique called the cluster resilient random walk (CRW). While the CRW technique preserves the overall framework of random walks, at each step of message forwarding, it favors the neighbors that are more likely to send the message deeper into the network. Second, in order to ensure effective message diffusion in networks with small cuts, we introduce a unique message fission technique in which messages are split when they reach peers connecting two or more topological regions of the network. Our experiments show that the proposed technique are very effective in diffusing messages across overlay networks of various topologies.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132502448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
FRAC: Implementing Role-Based Access Control for Network File Systems 为网络文件系统实现基于角色的访问控制
A. Bohra, Stephen Smaldone, L. Iftode
We present FRAC, a Framework for role-based access control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and servers. FRAC supports role hierarchies, user sessions, and static and dynamic separation of duty constraints. It also allows administrators to define dynamic policies based on access history and the environment, e.g., time of day. FRAC introduces a virtual control namespace (VCN) that provides an interface to query and update the state of the access control framework over the standard file system protocol. This namespace eliminates the need for executing specialized user agents either at the client or at the server. Therefore, FRAC does not require any modification to either the file system client or the file server. We have implemented FRAC for the widely deployed NFS protocol using FileWall, a file system proxy previously developed by us. Our experimental evaluation shows that FRAC imposes minimal overheads for the common file system operations.
我们提出了基于角色的网络文件系统访问控制框架FRAC。FRAC是一个参考监视器,它控制文件系统客户机和服务器之间的消息流。FRAC支持角色层次结构、用户会话以及静态和动态职责分离约束。它还允许管理员根据访问历史和环境(例如,一天中的时间)定义动态策略。FRAC引入了一个虚拟控制命名空间(VCN),它提供了一个接口,可以通过标准文件系统协议查询和更新访问控制框架的状态。这个名称空间消除了在客户机或服务器上执行专门的用户代理的需要。因此,FRAC不需要对文件系统客户机或文件服务器进行任何修改。我们使用FileWall(我们之前开发的一个文件系统代理)为广泛部署的NFS协议实现了FRAC。我们的实验评估表明,FRAC对普通文件系统操作的开销最小。
{"title":"FRAC: Implementing Role-Based Access Control for Network File Systems","authors":"A. Bohra, Stephen Smaldone, L. Iftode","doi":"10.1109/NCA.2007.25","DOIUrl":"https://doi.org/10.1109/NCA.2007.25","url":null,"abstract":"We present FRAC, a Framework for role-based access control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and servers. FRAC supports role hierarchies, user sessions, and static and dynamic separation of duty constraints. It also allows administrators to define dynamic policies based on access history and the environment, e.g., time of day. FRAC introduces a virtual control namespace (VCN) that provides an interface to query and update the state of the access control framework over the standard file system protocol. This namespace eliminates the need for executing specialized user agents either at the client or at the server. Therefore, FRAC does not require any modification to either the file system client or the file server. We have implemented FRAC for the widely deployed NFS protocol using FileWall, a file system proxy previously developed by us. Our experimental evaluation shows that FRAC imposes minimal overheads for the common file system operations.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127346179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Study of Bursty Internet Traffic 突发互联网流量研究
Kannikar Siriwong, L. Lipsky, R. Ammar
We study the effects of bursty Internet traffic through simulations. Both short-range dependency (SRD) traffic and long-range dependency (LRD) traffic are simulated over different burst parameters. The results are collected for 10 different 24 hour simulated periods in order to study and measure day-to-day statistical fluctuation. Effects of employing different traffic admission constraints are examined. An alternative for improving network throughput and utilization is proposed. Finally, a case when arrival patterns of traffic are correlated is explored.
我们通过模拟研究了突发网络流量的影响。对不同突发参数下的短程依赖流量和远程依赖流量进行了仿真。为了研究和测量每天的统计波动,收集了10个不同的24小时模拟周期的结果。研究了采用不同交通准入约束的效果。提出了一种提高网络吞吐量和利用率的替代方案。最后,探讨了交通到达模式相关的一个案例。
{"title":"Study of Bursty Internet Traffic","authors":"Kannikar Siriwong, L. Lipsky, R. Ammar","doi":"10.1109/NCA.2007.45","DOIUrl":"https://doi.org/10.1109/NCA.2007.45","url":null,"abstract":"We study the effects of bursty Internet traffic through simulations. Both short-range dependency (SRD) traffic and long-range dependency (LRD) traffic are simulated over different burst parameters. The results are collected for 10 different 24 hour simulated periods in order to study and measure day-to-day statistical fluctuation. Effects of employing different traffic admission constraints are examined. An alternative for improving network throughput and utilization is proposed. Finally, a case when arrival patterns of traffic are correlated is explored.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
GORDA: An Open Architecture for Database Replication GORDA:数据库复制的开放架构
A. Correia, J. Pereira, L. Rodrigues, N. Carvalho, R. Vilaça, R. Oliveira, Susana Guedes
Database replication has been a common feature in database management systems (DBMSs) for a long time. In particular, asynchronous or lazy propagation of updates provides a simple yet efficient way of increasing performance and data availability and is widely available across the DBMS product spectrum. High end systems additionally offer sophisticated conflict resolution and data propagation options as well as, synchronous replication based on distributed locking and two-phase commit protocols. This paper presents GORDA architecture and programming interface (GAPI), that enables different replication strategies to be implemented once and deployed in multiple DBMSs. This is achieved by proposing a reflective interface to transaction processing instead of relying on-client interfaces or ad-hoc server extensions. The proposed approach is thus cost-effective, in enabling reuse of replication protocols or components in multiple DBMSs, as well as potentially efficient, as it allows close coupling with DBMS internals.
长期以来,数据库复制一直是数据库管理系统(dbms)中的一个常见特性。特别是,更新的异步或延迟传播提供了一种简单而有效的方法来提高性能和数据可用性,并且在整个DBMS产品系列中广泛使用。高端系统还提供复杂的冲突解决和数据传播选项,以及基于分布式锁定和两阶段提交协议的同步复制。本文介绍了GORDA体系结构和编程接口(GAPI),使不同的复制策略能够一次实现并部署在多个dbms中。这是通过为事务处理提供一个反射接口来实现的,而不是依赖于客户端接口或临时服务器扩展。因此,所建议的方法在支持在多个DBMS中重用复制协议或组件方面是经济有效的,而且可能是高效的,因为它允许与DBMS内部紧密耦合。
{"title":"GORDA: An Open Architecture for Database Replication","authors":"A. Correia, J. Pereira, L. Rodrigues, N. Carvalho, R. Vilaça, R. Oliveira, Susana Guedes","doi":"10.1109/NCA.2007.26","DOIUrl":"https://doi.org/10.1109/NCA.2007.26","url":null,"abstract":"Database replication has been a common feature in database management systems (DBMSs) for a long time. In particular, asynchronous or lazy propagation of updates provides a simple yet efficient way of increasing performance and data availability and is widely available across the DBMS product spectrum. High end systems additionally offer sophisticated conflict resolution and data propagation options as well as, synchronous replication based on distributed locking and two-phase commit protocols. This paper presents GORDA architecture and programming interface (GAPI), that enables different replication strategies to be implemented once and deployed in multiple DBMSs. This is achieved by proposing a reflective interface to transaction processing instead of relying on-client interfaces or ad-hoc server extensions. The proposed approach is thus cost-effective, in enabling reuse of replication protocols or components in multiple DBMSs, as well as potentially efficient, as it allows close coupling with DBMS internals.","PeriodicalId":135395,"journal":{"name":"Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1