首页 > 最新文献

2008 International Conference on Networking, Architecture, and Storage最新文献

英文 中文
Rectangularly Multi-Module Memory System with Table-Based Dynamic Addressing Scheme 基于表动态寻址的矩形多模块存储系统
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.42
Jinbo Xu, Y. Dou, Jie Zhou
Many researchers have been interested in the processor-memory bottleneck problem. Quite a few image applications are only interested in one or more partial regions in the images. This paper proposes an efficient multi-access memory scheme for these image applications with multiple interested regions. A multi-module memory structure is presented between the main memory and the processing units, which achieves conflict-free parallel access of randomly aligned rectangular blocks of data in the interested regions. To increase the accessing efficiency, only interested regions are transmitted from main memory to secondary multi-module memory structure, and overlapped data between different regions are reused without retransfer. The addressing scheme of secondary multi-module memory is not based on predetermined addressing function, but based on a table structure mapping virtual addresses of required data to physical addresses of secondary memory modules, which increases data reusability without losing addressing consistency. The table content is updated for addressing consistency every time processing a new region. The proposed twin-table structure and block-rescheduling scheme reduce the addressing latency. Synthesis results on FPGA indicate small hardware costs for a range of access pattern dimensions. Significant transfer speedups in our experiments are achieved when compared with the scheme that accesses main memory directly.
许多研究者对处理器-内存瓶颈问题很感兴趣。相当多的图像应用只对图像中的一个或多个局部区域感兴趣。针对具有多个感兴趣区域的图像应用,本文提出了一种高效的多访问存储方案。在主存储器和处理单元之间提出了一种多模块存储结构,实现了对感兴趣区域内随机排列的矩形数据块的无冲突并行访问。为了提高访问效率,只将感兴趣的区域从主存储器传输到辅助多模块存储器结构,不同区域之间的重叠数据被重用而不重传。辅助多模块内存的寻址方案不是基于预定的寻址功能,而是基于一种表结构,将所需数据的虚拟地址映射到辅助内存模块的物理地址,在保证寻址一致性的前提下提高了数据的可重用性。每次处理一个新区域时,都会更新表内容以解决一致性问题。提出的双表结构和块重调度方案降低了寻址延迟。FPGA上的综合结果表明,在一系列访问模式维度下,硬件成本较小。与直接访问主存的方案相比,我们的实验取得了显著的传输速度提高。
{"title":"Rectangularly Multi-Module Memory System with Table-Based Dynamic Addressing Scheme","authors":"Jinbo Xu, Y. Dou, Jie Zhou","doi":"10.1109/NAS.2008.42","DOIUrl":"https://doi.org/10.1109/NAS.2008.42","url":null,"abstract":"Many researchers have been interested in the processor-memory bottleneck problem. Quite a few image applications are only interested in one or more partial regions in the images. This paper proposes an efficient multi-access memory scheme for these image applications with multiple interested regions. A multi-module memory structure is presented between the main memory and the processing units, which achieves conflict-free parallel access of randomly aligned rectangular blocks of data in the interested regions. To increase the accessing efficiency, only interested regions are transmitted from main memory to secondary multi-module memory structure, and overlapped data between different regions are reused without retransfer. The addressing scheme of secondary multi-module memory is not based on predetermined addressing function, but based on a table structure mapping virtual addresses of required data to physical addresses of secondary memory modules, which increases data reusability without losing addressing consistency. The table content is updated for addressing consistency every time processing a new region. The proposed twin-table structure and block-rescheduling scheme reduce the addressing latency. Synthesis results on FPGA indicate small hardware costs for a range of access pattern dimensions. Significant transfer speedups in our experiments are achieved when compared with the scheme that accesses main memory directly.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122606907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Proof of the IDOP_SP Protocol Based on the Petri Net 基于Petri网的IDOP_SP协议的形式化证明
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.50
Yingjiu Guo, Chuang Lin, H. Yin
IDOP_SP (IPTV DRM interactive operating platform security protocol) protocol is a applied complicated protocol which distributes digital media content in the Internet. The flow of the protocol is based on the behavior of Web service composition and the digital content is transmitted to the customer in the form of hybrid digital objects. But the protocol security only can be assured after the protocol is formally analyzed and verified. In this paper, we use a Petri Net to model the IDOP_SP and verify the security of the IDOP_SP protocol based on the model. The result shows that the applied complicated protocol is secure which satisfies confidentiality, authentication and non-repudiation. It also shows that the Petri net is a good tool to verify the security of complicated protocols.
IDOP_SP (IPTV DRM交互操作平台安全协议)协议是一种在互联网上分发数字媒体内容的应用型复杂协议。协议流基于Web服务组合的行为,数字内容以混合数字对象的形式传输给客户。但是,只有对协议进行正式的分析和验证,才能保证协议的安全性。本文利用Petri网对IDOP_SP协议进行建模,并在此基础上验证了IDOP_SP协议的安全性。结果表明,所采用的复杂协议具有良好的保密性、可认证性和不可否认性。结果表明,Petri网是验证复杂协议安全性的良好工具。
{"title":"Formal Proof of the IDOP_SP Protocol Based on the Petri Net","authors":"Yingjiu Guo, Chuang Lin, H. Yin","doi":"10.1109/NAS.2008.50","DOIUrl":"https://doi.org/10.1109/NAS.2008.50","url":null,"abstract":"IDOP_SP (IPTV DRM interactive operating platform security protocol) protocol is a applied complicated protocol which distributes digital media content in the Internet. The flow of the protocol is based on the behavior of Web service composition and the digital content is transmitted to the customer in the form of hybrid digital objects. But the protocol security only can be assured after the protocol is formally analyzed and verified. In this paper, we use a Petri Net to model the IDOP_SP and verify the security of the IDOP_SP protocol based on the model. The result shows that the applied complicated protocol is secure which satisfies confidentiality, authentication and non-repudiation. It also shows that the Petri net is a good tool to verify the security of complicated protocols.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Analysis of a Scalable Third-Party Storage Security Protocol 一种可扩展第三方存储安全协议的设计与分析
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.11
Hu Jianzhong, Xie Changsheng, Zhong Haifeng
With the trend of networking and the growth of data value, networked storage security becomes hotpot of research. Aiming at the scalability and security requirement of massive storage system, we proposed a security storage service model combining storage mechanism and security policy and designed a set of scalable third-party security protocols. The protocols adopt public-key cryptography to guarantee the integrity of capability, avoiding the maintenance of shared key. The results of the formal analysis logically ensure the feasibility of the proposed security protocol. Furthermore, the overhead evaluation of the capability illustrates that the security protocol can meet the scalability requirement of storage system.
随着网络化的趋势和数据价值的增长,网络存储安全成为研究的热点。针对海量存储系统的可扩展性和安全性需求,提出了一种存储机制与安全策略相结合的安全存储服务模型,并设计了一套可扩展的第三方安全协议。协议采用公钥加密,保证了功能的完整性,避免了共享密钥的维护。形式化分析的结果从逻辑上保证了所提出的安全协议的可行性。此外,性能的开销评估表明,该安全协议能够满足存储系统的可扩展性需求。
{"title":"Design and Analysis of a Scalable Third-Party Storage Security Protocol","authors":"Hu Jianzhong, Xie Changsheng, Zhong Haifeng","doi":"10.1109/NAS.2008.11","DOIUrl":"https://doi.org/10.1109/NAS.2008.11","url":null,"abstract":"With the trend of networking and the growth of data value, networked storage security becomes hotpot of research. Aiming at the scalability and security requirement of massive storage system, we proposed a security storage service model combining storage mechanism and security policy and designed a set of scalable third-party security protocols. The protocols adopt public-key cryptography to guarantee the integrity of capability, avoiding the maintenance of shared key. The results of the formal analysis logically ensure the feasibility of the proposed security protocol. Furthermore, the overhead evaluation of the capability illustrates that the security protocol can meet the scalability requirement of storage system.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
POND: The Power of Zone Overlapping in DHT Networks POND:区域重叠在DHT网络中的作用
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.56
Zhiyong Xu, Jizhong Han, L. Bhuyan
Distributed hash table (DHT) based algorithms have been proposed to solve the routing issues in large-scale peer-to-peer (P2P) applications. DHT systems create an elegant peer-to-peer service model and work perfect in a homogeneous environment. Workload are evenly distributed on every participating peer and system is supposed to achieve the optimal performance. However, in the real world, the complicated scenarios such as peerspsila capability heterogeneity, diverse file popularities, and mismatching problem between physical network structure and logical routing data structure, jeopardize the efficiency of DHT infrastructure and may result in serious load imbalance problem. In this paper, we propose -- POND, a novel and efficient DHT algorithm to relieve the above problem. In POND, peers are divided into two types: main peers (MP) and shadow peers(SP). As other DHT systems, POND splits the name space into several disjointed zones. However, unlike other systems which only have one peer in charge of each zone, in POND, we use zone overlapping technique. In each zone, a MP and several SPs are used for services. Any of them is capable to handle service requests fallen into this zone. When a new request is coming,the peer with the minimal load has the high possibility to be chosen to provide the service. Thus, the risk of overload problem is reduced. With the introduction of shadow peers, POND also provides better failure tolerance and relieves the hot spot problem. Moreover, POND can improve the routing performance by reducing the average number of routing hops per request. We conduct extensive simulation experiments and the results show POND is superior to other DHT algorithms.
基于分布式哈希表(DHT)的算法被提出用于解决大规模点对点(P2P)应用中的路由问题。DHT系统创建了一种优雅的点对点服务模型,可以在同质环境中完美地工作。工作负载均匀地分布在每个参与节点上,系统应该达到最佳性能。但是,在实际应用中,由于peerspsila能力异构、文件流行度不同、物理网络结构与逻辑路由数据结构不匹配等复杂场景,会影响DHT基础设施的工作效率,并可能导致严重的负载不均衡问题。本文提出了一种新颖高效的DHT算法——POND来解决上述问题。在POND中,对等体分为主对等体(MP)和影子对等体(SP)两种类型。与其他DHT系统一样,POND将名称空间划分为几个互不关联的区域。然而,与其他系统只有一个对等体负责每个区域不同,在POND中,我们使用了区域重叠技术。每个zone中使用一个MP和几个sp来提供业务。它们中的任何一个都能够处理落入该区域的服务请求。当一个新请求到来时,具有最小负载的对等点有很高的可能性被选择提供服务。因此,减少了过载问题的风险。随着影子节点的引入,POND也提供了更好的容错能力,缓解了热点问题。此外,POND还可以通过减少每个请求的平均路由跳数来提高路由性能。我们进行了大量的仿真实验,结果表明POND算法优于其他DHT算法。
{"title":"POND: The Power of Zone Overlapping in DHT Networks","authors":"Zhiyong Xu, Jizhong Han, L. Bhuyan","doi":"10.1109/NAS.2008.56","DOIUrl":"https://doi.org/10.1109/NAS.2008.56","url":null,"abstract":"Distributed hash table (DHT) based algorithms have been proposed to solve the routing issues in large-scale peer-to-peer (P2P) applications. DHT systems create an elegant peer-to-peer service model and work perfect in a homogeneous environment. Workload are evenly distributed on every participating peer and system is supposed to achieve the optimal performance. However, in the real world, the complicated scenarios such as peerspsila capability heterogeneity, diverse file popularities, and mismatching problem between physical network structure and logical routing data structure, jeopardize the efficiency of DHT infrastructure and may result in serious load imbalance problem. In this paper, we propose -- POND, a novel and efficient DHT algorithm to relieve the above problem. In POND, peers are divided into two types: main peers (MP) and shadow peers(SP). As other DHT systems, POND splits the name space into several disjointed zones. However, unlike other systems which only have one peer in charge of each zone, in POND, we use zone overlapping technique. In each zone, a MP and several SPs are used for services. Any of them is capable to handle service requests fallen into this zone. When a new request is coming,the peer with the minimal load has the high possibility to be chosen to provide the service. Thus, the risk of overload problem is reduced. With the introduction of shadow peers, POND also provides better failure tolerance and relieves the hot spot problem. Moreover, POND can improve the routing performance by reducing the average number of routing hops per request. We conduct extensive simulation experiments and the results show POND is superior to other DHT algorithms.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6 移动IPv6中基于CGA的BU消息处理认证机制
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.8
Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu
In mobile IPv6, the location of a mobile node (MN) is obtained by implementing a binding update (BU) process. During the process, the unauthenticated BU message may give rise to many security risks, such as denial-of-service (DoS) attack. Thus, authentication of the BU message is most important for the security of mobile IPv6. The purpose of cryptographically generated addresses (CGA) is to prevent stealing and spoofing of existent IP addresses. In this paper, a novel authentication mechanism based on CGA is proposed for BU message in mobile IPv6. With the implementation of the novel authentication mechanism, care-of address of MN will be automatically generated, and this will be related to MN private attribute, hence, it would not be possible for a vicious node to steal it. With this method, the BU message can be authenticated.
在移动IPv6中,移动节点MN (mobile node)的位置是通过绑定更新(binding update)过程获得的。在此过程中,未经认证的BU消息可能会产生许多安全风险,例如DoS (denial-of-service)攻击。因此,BU消息的认证对移动IPv6的安全性至关重要。加密生成地址(CGA)的目的是防止窃取和欺骗现有的IP地址。提出了一种基于CGA的移动IPv6 BU消息认证机制。通过新的认证机制的实现,MN的看护地址会自动生成,并且看护地址与MN的私有属性相关,因此不可能被恶意节点窃取。通过这种方法,可以对BU消息进行身份验证。
{"title":"A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6","authors":"Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu","doi":"10.1109/NAS.2008.8","DOIUrl":"https://doi.org/10.1109/NAS.2008.8","url":null,"abstract":"In mobile IPv6, the location of a mobile node (MN) is obtained by implementing a binding update (BU) process. During the process, the unauthenticated BU message may give rise to many security risks, such as denial-of-service (DoS) attack. Thus, authentication of the BU message is most important for the security of mobile IPv6. The purpose of cryptographically generated addresses (CGA) is to prevent stealing and spoofing of existent IP addresses. In this paper, a novel authentication mechanism based on CGA is proposed for BU message in mobile IPv6. With the implementation of the novel authentication mechanism, care-of address of MN will be automatically generated, and this will be related to MN private attribute, hence, it would not be possible for a vicious node to steal it. With this method, the BU message can be authenticated.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127944686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Precise Interrupts Mechanism Based on Micro-Operation Tracing of Instruction Boundary for Embedded Processor 基于指令边界微操作跟踪的嵌入式处理器精确中断机制
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.25
Jun Zhang, Xiaoming Fan, Song-He Liu
Precise interrupts is a key technique of embedded processor, for assurance of properly executing and state resuming of the whole system. As interrupt occurs on the instruction boundary, pipeline flushing, interrupt transfer micro-program and interrupt handling routine are executed after the committing soon instruction finishes. This process spends lots of cycles to pre-fetch and decode instructions that will never be executed, and reduces the real time performance. Combined with the CISC processor execution characteristic of micro-operation, this paper proposes a precise interrupts mechanism based on Instruction Boundary Micro-operation Tracing, called IBMT. This technique inspects instruction boundary and interrupt window every clock cycle, and starts up the pipeline flushing, pre-fetch, interrupt transfer micro-program and interrupt handling routine in advance. As a result, 39.34% of the clock cycles can be saved at every interrupt acknowledgement.
精确中断是嵌入式处理器的一项关键技术,它保证了整个系统的正常执行和状态恢复。当中断发生在指令边界上时,在即将提交的指令结束后执行流水线冲洗、中断转移微程序和中断处理例程。这个过程花费了大量的周期来预取和解码永远不会执行的指令,并降低了实时性能。结合CISC处理器微操作的执行特点,提出了一种基于指令边界微操作跟踪的精确中断机制,即IBMT。该技术在每个时钟周期检查指令边界和中断窗口,并提前启动流水线冲洗、预取、中断转移微程序和中断处理程序。因此,在每次中断确认时可以节省39.34%的时钟周期。
{"title":"A Precise Interrupts Mechanism Based on Micro-Operation Tracing of Instruction Boundary for Embedded Processor","authors":"Jun Zhang, Xiaoming Fan, Song-He Liu","doi":"10.1109/NAS.2008.25","DOIUrl":"https://doi.org/10.1109/NAS.2008.25","url":null,"abstract":"Precise interrupts is a key technique of embedded processor, for assurance of properly executing and state resuming of the whole system. As interrupt occurs on the instruction boundary, pipeline flushing, interrupt transfer micro-program and interrupt handling routine are executed after the committing soon instruction finishes. This process spends lots of cycles to pre-fetch and decode instructions that will never be executed, and reduces the real time performance. Combined with the CISC processor execution characteristic of micro-operation, this paper proposes a precise interrupts mechanism based on Instruction Boundary Micro-operation Tracing, called IBMT. This technique inspects instruction boundary and interrupt window every clock cycle, and starts up the pipeline flushing, pre-fetch, interrupt transfer micro-program and interrupt handling routine in advance. As a result, 39.34% of the clock cycles can be saved at every interrupt acknowledgement.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spatial-Locality-Aware Virtual Storage Devices with Tangible QoS Expressions 具有有形QoS表达式的空间位置感知虚拟存储设备
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.66
Pei Yan, Song Jiang
Consolidated storage service receives its momentum in the building of various IT system infrastructures because of its cost efficiency, reliability, and maintainability. Meanwhile, only when users who run their applications on the consolidated storage system have a similar or better performance experience compared to those using direct-attached storage on each server can the storage design really be widely accepted. We propose a framework in which performance of servicing requests from one user is well isolated from that for the others in such a way that each user can be regarded as being allocated an independent virtual disk (VD) of performance as specified in its service-level agreement (SLA). Three SLA expressions that we believe are most tangible to users are supported in the spatial-locality-aware framework, which we name as rent-a-disk, latency-conscious, and throughput-conscious. Our proposed I/O scheduling algorithm for implementing the three types of VDs provides strong isolation, low interference, and high fidelity of performance for each VD if SLA is not violated. Our algorithm also enables different types of VDs to cooperate with each other to improve performance for each VD as well as for the entire physical storage.
统一存储服务以其成本效益、可靠性和可维护性在各种IT系统基础设施的构建中得到了广泛的应用。同时,只有当在统一存储系统上运行应用程序的用户与在每个服务器上使用直接连接存储的用户相比具有相似或更好的性能体验时,存储设计才能真正被广泛接受。我们提出了一个框架,在这个框架中,来自一个用户的服务请求的性能与其他用户的服务请求的性能很好地隔离开来,这样每个用户都可以被视为被分配了一个独立的虚拟磁盘(VD),其性能在其服务水平协议(SLA)中指定。空间位置感知框架支持三种我们认为对用户最切实的SLA表达式,我们将其命名为租用磁盘、延迟感知和吞吐量感知。我们提出的用于实现这三种类型VD的I/O调度算法在不违反SLA的情况下为每个VD提供强隔离、低干扰和高保真性能。我们的算法还允许不同类型的VD相互协作,以提高每个VD以及整个物理存储的性能。
{"title":"Spatial-Locality-Aware Virtual Storage Devices with Tangible QoS Expressions","authors":"Pei Yan, Song Jiang","doi":"10.1109/NAS.2008.66","DOIUrl":"https://doi.org/10.1109/NAS.2008.66","url":null,"abstract":"Consolidated storage service receives its momentum in the building of various IT system infrastructures because of its cost efficiency, reliability, and maintainability. Meanwhile, only when users who run their applications on the consolidated storage system have a similar or better performance experience compared to those using direct-attached storage on each server can the storage design really be widely accepted. We propose a framework in which performance of servicing requests from one user is well isolated from that for the others in such a way that each user can be regarded as being allocated an independent virtual disk (VD) of performance as specified in its service-level agreement (SLA). Three SLA expressions that we believe are most tangible to users are supported in the spatial-locality-aware framework, which we name as rent-a-disk, latency-conscious, and throughput-conscious. Our proposed I/O scheduling algorithm for implementing the three types of VDs provides strong isolation, low interference, and high fidelity of performance for each VD if SLA is not violated. Our algorithm also enables different types of VDs to cooperate with each other to improve performance for each VD as well as for the entire physical storage.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Analysis of InfiniBand Transport Services on WAN 广域网上ib传输业务的实验分析
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.65
Weikuan Yu, N. Rao, J. Vetter
InfiniBand architecture (IBA) has emerged as a standard system-area interconnect in industry for both data-center and high performance computing. While IBA continues to evolve with more capabilities, it has yet to permeate the field of grid and pervasive computing across wide area. This requires a software infrastructure to take the full advantage of IBA networking mechanisms without being dwarfed by the long distances. In this paper, we present a detailed analysis of InfiniBand transport services for their suitability to data transfer and message passing in the wide area. Three of the common InfiniBand transport services have been examined, including reliable connection (RC), unreliable connection (UC), and unreliable datagram (UD). Our analysis indicates that UC and UD are better suited to provide high bandwidth for MPI on wide-area networks (WAN). We have also demonstrated that the current existing MPI implementations, designed over RC and UD, can be tuned to provide improved MPI bandwidth on WAN. Furthermore, by developing a UC-based MPI implementa-tion, we have shown that, at a distance of 8600 miles, MPI over UC can improve MPI bandwidth by as much as 100%.
InfiniBand架构(IBA)已经成为工业中用于数据中心和高性能计算的标准系统区域互连。虽然IBA的功能在不断发展,但它还没有广泛地渗透到网格和普及计算领域。这就需要一个软件基础设施来充分利用IBA网络机制,而不会因为远距离而显得微不足道。本文详细分析了InfiniBand传输服务在广域数据传输和消息传递中的适用性。本文介绍了三种常见的InfiniBand传输服务,包括可靠连接(RC)、不可靠连接(UC)和不可靠数据报(UD)。我们的分析表明,UC和UD更适合在广域网(WAN)上为MPI提供高带宽。我们还证明了当前现有的MPI实现(基于RC和UD设计)可以在WAN上提供改进的MPI带宽。此外,通过开发基于UC的MPI实现,我们已经证明,在8600英里的距离上,UC上的MPI可以将MPI带宽提高100%。
{"title":"Experimental Analysis of InfiniBand Transport Services on WAN","authors":"Weikuan Yu, N. Rao, J. Vetter","doi":"10.1109/NAS.2008.65","DOIUrl":"https://doi.org/10.1109/NAS.2008.65","url":null,"abstract":"InfiniBand architecture (IBA) has emerged as a standard system-area interconnect in industry for both data-center and high performance computing. While IBA continues to evolve with more capabilities, it has yet to permeate the field of grid and pervasive computing across wide area. This requires a software infrastructure to take the full advantage of IBA networking mechanisms without being dwarfed by the long distances. In this paper, we present a detailed analysis of InfiniBand transport services for their suitability to data transfer and message passing in the wide area. Three of the common InfiniBand transport services have been examined, including reliable connection (RC), unreliable connection (UC), and unreliable datagram (UD). Our analysis indicates that UC and UD are better suited to provide high bandwidth for MPI on wide-area networks (WAN). We have also demonstrated that the current existing MPI implementations, designed over RC and UD, can be tuned to provide improved MPI bandwidth on WAN. Furthermore, by developing a UC-based MPI implementa-tion, we have shown that, at a distance of 8600 miles, MPI over UC can improve MPI bandwidth by as much as 100%.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132171320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Network Memory Architecture Model and Performance Analysis 一种网络内存体系结构模型及性能分析
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.22
This paper presents a network memory architecture and makes a performance model to analysis the slowdown caused by the remote access delay. In this architecture the network memory is accessed through a smart network memory controller. A local page cache and a virtual page prefetching engine are designed in the smart network memory controller to improve the memory access performance.
本文提出了一种网络存储器体系结构,并建立了性能模型来分析远程访问延迟所造成的性能下降。在这种架构中,通过智能网络存储器控制器访问网络存储器。在智能网络内存控制器中设计了本地页面缓存和虚拟页面预取引擎,以提高内存访问性能。
{"title":"A Network Memory Architecture Model and Performance Analysis","authors":"","doi":"10.1109/NAS.2008.22","DOIUrl":"https://doi.org/10.1109/NAS.2008.22","url":null,"abstract":"This paper presents a network memory architecture and makes a performance model to analysis the slowdown caused by the remote access delay. In this architecture the network memory is accessed through a smart network memory controller. A local page cache and a virtual page prefetching engine are designed in the smart network memory controller to improve the memory access performance.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121391618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy-Efficient Clustering Technique for Wireless Sensor Networks 一种无线传感器网络的节能聚类技术
Pub Date : 2008-06-12 DOI: 10.1109/NAS.2008.51
Guan Xin, YongXin Wang, Liu Fang
In the development of wireless sensor networks applications, how to organize the sensors into a wireless communication network and route the sensed data from the field sensors to a remote base station is a particular challenging problem. In this paper, we present a novel clustering technique for wireless sensor networks. During the phrase of cluster initialization, the sensed zone is divided into several virtual hexagons which it can avoid the overlapping nodes of circular cluster. Furthermore, we make some sub-circle in the formatted virtual hexagon base on the average distance between the common nodes and the cluster's center. Depending on the special factor's value, each node will form a cluster heads order list. The clustering technique adopts a new method for cluster head election, which can avoid the frequent election of cluster head. Simulation results demonstrate that our proposed algorithm is effective in prolonging the lifetime of networks.
在无线传感器网络应用的发展中,如何将传感器组织成一个无线通信网络,并将现场传感器的传感数据路由到远程基站是一个特别具有挑战性的问题。本文提出了一种新的无线传感器网络聚类技术。在聚类初始化阶段,将感知区域划分为多个虚拟六边形,避免了圆形聚类的节点重叠。在此基础上,根据普通节点到集群中心的平均距离,在格式化的虚拟六边形上画出一个子圆。根据特殊因子的值,每个节点将形成一个簇头顺序列表。聚类技术采用了一种新的簇头选举方法,避免了簇头的频繁选举。仿真结果表明,该算法能够有效地延长网络的生存期。
{"title":"An Energy-Efficient Clustering Technique for Wireless Sensor Networks","authors":"Guan Xin, YongXin Wang, Liu Fang","doi":"10.1109/NAS.2008.51","DOIUrl":"https://doi.org/10.1109/NAS.2008.51","url":null,"abstract":"In the development of wireless sensor networks applications, how to organize the sensors into a wireless communication network and route the sensed data from the field sensors to a remote base station is a particular challenging problem. In this paper, we present a novel clustering technique for wireless sensor networks. During the phrase of cluster initialization, the sensed zone is divided into several virtual hexagons which it can avoid the overlapping nodes of circular cluster. Furthermore, we make some sub-circle in the formatted virtual hexagon base on the average distance between the common nodes and the cluster's center. Depending on the special factor's value, each node will form a cluster heads order list. The clustering technique adopts a new method for cluster head election, which can avoid the frequent election of cluster head. Simulation results demonstrate that our proposed algorithm is effective in prolonging the lifetime of networks.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2008 International Conference on Networking, Architecture, and Storage
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1