首页 > 最新文献

2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)最新文献

英文 中文
Solving Consensus Using Structural Failure Models 用结构失效模型求解共识
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.44
Timo Warns, F. Freiling, W. Hasselbring
Failure models characterise the expected component failures in fault-tolerant computing. In the context of distributed systems, a failure model usually consists of two parts: a functional part specifying in what way individual processing entities may fail and a structural part specifying the potential scope of failures within the system. Such models must be expressive enough to cover all relevant practical situations, but must also be simple enough to allow uncomplicated reasoning about fault-tolerant algorithms. Usually, an increase in expressiveness complicates formal reasoning, but enables more accurate models that allow to improve the assumption coverage and resilience of solutions. In this paper, we introduce the structural failure model class DiDep that allows to specify directed dependent failures, which, for example, occur in the area of intrusion tolerance and security. DiDep is a generalisation of previous classes for undirected dependent failures, namely the general adversary structures, the fail-prone systems, and the core and survivor sets, which we show to be equivalent. We show that the increase in expressiveness of DiDep does not significantly penalise the simplicity of corresponding models by giving an algorithm that transforms any consensus algorithm for undirected dependent failures into a consensus algorithm for a DiDep model. We characterise the improved resilience obtained with DiDep and show that certain models even allow to circumvent the famous FLP impossibility result
故障模型描述了容错计算中预期的组件故障。在分布式系统的上下文中,故障模型通常由两部分组成:功能部分指定单个处理实体可能以何种方式失败,结构部分指定系统中潜在的故障范围。这样的模型必须具有足够的表现力,以涵盖所有相关的实际情况,但也必须足够简单,以允许对容错算法进行简单的推理。通常,表达能力的增加会使形式推理变得复杂,但会使模型更加准确,从而可以改进解决方案的假设覆盖范围和弹性。在本文中,我们引入了结构故障模型类DiDep,它允许指定定向依赖故障,例如,发生在入侵容忍和安全领域的故障。DiDep是以前的无向依赖故障类的推广,即一般对手结构,故障倾向系统,以及核心和幸存者集,我们证明它们是等价的。我们通过给出一种算法,将用于无向依赖故障的任何共识算法转换为用于DiDep模型的共识算法,证明了DiDep表达性的增加并没有显著地损害相应模型的简单性。我们描述了用DiDep获得的改进弹性,并表明某些模型甚至可以绕过著名的FLP不可能结果
{"title":"Solving Consensus Using Structural Failure Models","authors":"Timo Warns, F. Freiling, W. Hasselbring","doi":"10.1109/SRDS.2006.44","DOIUrl":"https://doi.org/10.1109/SRDS.2006.44","url":null,"abstract":"Failure models characterise the expected component failures in fault-tolerant computing. In the context of distributed systems, a failure model usually consists of two parts: a functional part specifying in what way individual processing entities may fail and a structural part specifying the potential scope of failures within the system. Such models must be expressive enough to cover all relevant practical situations, but must also be simple enough to allow uncomplicated reasoning about fault-tolerant algorithms. Usually, an increase in expressiveness complicates formal reasoning, but enables more accurate models that allow to improve the assumption coverage and resilience of solutions. In this paper, we introduce the structural failure model class DiDep that allows to specify directed dependent failures, which, for example, occur in the area of intrusion tolerance and security. DiDep is a generalisation of previous classes for undirected dependent failures, namely the general adversary structures, the fail-prone systems, and the core and survivor sets, which we show to be equivalent. We show that the increase in expressiveness of DiDep does not significantly penalise the simplicity of corresponding models by giving an algorithm that transforms any consensus algorithm for undirected dependent failures into a consensus algorithm for a DiDep model. We characterise the improved resilience obtained with DiDep and show that certain models even allow to circumvent the famous FLP impossibility result","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
AVCast : New Approaches For Implementing Availability-Dependent Reliability for Multicast Receivers AVCast:实现多播接收机可用性相关可靠性的新方法
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.11
Thadpong Pongthawornkamol, Indranil Gupta
Today's large-scale distributed systems consist of collections of nodes that have highly variable availability - a phenomenon sometimes called churn. This availability variation is often a hindrance to achieving reliability and performance for distributed applications such as multicast. This paper looks into utilizing and leveraging availability information in order to provide availability-dependent message reliability for multicast receivers. An application (e.g., a publish-sub scribe system) may want to scale the multicast message reliability at each receiver according to that receiver's availability (in terms of the fraction of time that receiver is online) ifferent options are that the reliability is independent of the availability, or proportional to it. We propose several gossip-based algorithms to support several such predicates. These techniques rely on each node's availability being monitored in a distributed manner by a small group of other nodes in such a way that the monitoring load is evenly distributed in the system. Our techniques are light-weight, scalable, and are space- and time-efficient. We analyze our algorithms and evaluate them experimentally by injecting availability traces collected from real peer-to-peer systems
今天的大规模分布式系统由具有高度可变可用性的节点集合组成——这种现象有时被称为“混乱”。这种可用性变化通常是实现多播等分布式应用程序的可靠性和性能的障碍。本文研究了利用和利用可用性信息,为组播接收机提供与可用性相关的消息可靠性。应用程序(例如,发布-订阅系统)可能希望根据每个接收方的可用性(就接收方在线的时间百分比而言)来扩展多播消息的可靠性,不同的选择是可靠性与可用性无关,或者与可用性成正比。我们提出了几种基于八卦的算法来支持几种这样的谓词。这些技术依赖于由一小组其他节点以分布式方式监视每个节点的可用性,从而使监视负载均匀地分布在系统中。我们的技术是轻量级的,可扩展的,并且是有效的空间和时间。我们分析了我们的算法,并通过注入从真实的点对点系统收集的可用性跟踪来实验评估它们
{"title":"AVCast : New Approaches For Implementing Availability-Dependent Reliability for Multicast Receivers","authors":"Thadpong Pongthawornkamol, Indranil Gupta","doi":"10.1109/SRDS.2006.11","DOIUrl":"https://doi.org/10.1109/SRDS.2006.11","url":null,"abstract":"Today's large-scale distributed systems consist of collections of nodes that have highly variable availability - a phenomenon sometimes called churn. This availability variation is often a hindrance to achieving reliability and performance for distributed applications such as multicast. This paper looks into utilizing and leveraging availability information in order to provide availability-dependent message reliability for multicast receivers. An application (e.g., a publish-sub scribe system) may want to scale the multicast message reliability at each receiver according to that receiver's availability (in terms of the fraction of time that receiver is online) ifferent options are that the reliability is independent of the availability, or proportional to it. We propose several gossip-based algorithms to support several such predicates. These techniques rely on each node's availability being monitored in a distributed manner by a small group of other nodes in such a way that the monitoring load is evenly distributed in the system. Our techniques are light-weight, scalable, and are space- and time-efficient. We analyze our algorithms and evaluate them experimentally by injecting availability traces collected from real peer-to-peer systems","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Managing Transaction Conflicts in Middleware-based Database Replication Architectures 管理基于中间件的数据库复制体系结构中的事务冲突
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.29
F. D. Muñoz-Escoí, J. Pla-Civera, M. I. Ruiz-Fuertes, L. Irún-Briz, H. Decker, J. E. Armendáriz-Iñigo, J. R. G. D. Mendívil
Database replication protocols need to detect, block or abort part of conflicting transactions. A possible solution is to check their writesets (and also their readsets in case a serialisable isolation level is requested), which however burdens the consumption of CPU time. This gets even worse when the replication support is provided by a middleware, since there is no direct DBMS support in that layer. We propose and discuss the use of the concurrency control support of the local DBMS for detecting conflicts between local transactions and writesets of remote transactions. This allows to simplify many database replication protocols and to enhance their performance
数据库复制协议需要检测、阻止或中止部分冲突事务。一种可能的解决方案是检查它们的写集(如果请求可序列化的隔离级别,也检查它们的读集),但是这会增加CPU时间的消耗。当复制支持由中间件提供时,情况会变得更糟,因为在该层中没有直接的DBMS支持。我们提出并讨论了使用本地DBMS的并发控制支持来检测本地事务和远程事务的写集之间的冲突。这允许简化许多数据库复制协议并增强其性能
{"title":"Managing Transaction Conflicts in Middleware-based Database Replication Architectures","authors":"F. D. Muñoz-Escoí, J. Pla-Civera, M. I. Ruiz-Fuertes, L. Irún-Briz, H. Decker, J. E. Armendáriz-Iñigo, J. R. G. D. Mendívil","doi":"10.1109/SRDS.2006.29","DOIUrl":"https://doi.org/10.1109/SRDS.2006.29","url":null,"abstract":"Database replication protocols need to detect, block or abort part of conflicting transactions. A possible solution is to check their writesets (and also their readsets in case a serialisable isolation level is requested), which however burdens the consumption of CPU time. This gets even worse when the replication support is provided by a middleware, since there is no direct DBMS support in that layer. We propose and discuss the use of the concurrency control support of the local DBMS for detecting conflicts between local transactions and writesets of remote transactions. This allows to simplify many database replication protocols and to enhance their performance","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127831333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
How To Safeguard Your Sensitive Data 如何保护你的敏感资料
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.25
B. Mungamuru, H. Garcia-Molina, S. Mitra
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to design a system that provides both good privacy and good longevity simultaneously. Systems are modelled as compositions of two basic operators, copy and split. We propose metrics with which to evaluate the privacy, longevity and performance offered by such systems. The search for the "best" system under these metrics is then formulated as a constrained optimization problem. Solving the optimization problem exactly turns out to be intractable, so we propose techniques for efficiently finding an approximate solution
为了保护一个敏感的数据库,我们必须确保它的私密性和寿命。然而,隐私和寿命往往是相互竞争的目标。我们展示了如何设计一个同时提供良好隐私和良好寿命的系统。系统建模为两个基本操作符的组合,复制和分割。我们提出了用于评估此类系统提供的隐私、寿命和性能的指标。然后,在这些指标下搜索“最佳”系统被表述为约束优化问题。结果表明,精确地求解优化问题非常棘手,因此我们提出了有效地寻找近似解的技术
{"title":"How To Safeguard Your Sensitive Data","authors":"B. Mungamuru, H. Garcia-Molina, S. Mitra","doi":"10.1109/SRDS.2006.25","DOIUrl":"https://doi.org/10.1109/SRDS.2006.25","url":null,"abstract":"In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to design a system that provides both good privacy and good longevity simultaneously. Systems are modelled as compositions of two basic operators, copy and split. We propose metrics with which to evaluate the privacy, longevity and performance offered by such systems. The search for the \"best\" system under these metrics is then formulated as a constrained optimization problem. Solving the optimization problem exactly turns out to be intractable, so we propose techniques for efficiently finding an approximate solution","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117081798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptive Batching for Replicated Servers 复制服务器的自适应批处理
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.8
R. Friedman, Erez Hadad
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically and immediately according to the current communication load. This is done without any explicit monitoring or calibration of the system. Additionally, the paper includes a detailed performance evaluation
提出了两种适用于复制服务器的通用自适应批处理方案。这两种方案都不受底层通信协议的影响。我们的新方案根据当前的通信负载自动地、即时地调整它们的批处理水平。这是在没有任何明确的监测或校准系统的情况下完成的。此外,本文还包括详细的性能评估
{"title":"Adaptive Batching for Replicated Servers","authors":"R. Friedman, Erez Hadad","doi":"10.1109/SRDS.2006.8","DOIUrl":"https://doi.org/10.1109/SRDS.2006.8","url":null,"abstract":"This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically and immediately according to the current communication load. This is done without any explicit monitoring or calibration of the system. Additionally, the paper includes a detailed performance evaluation","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124464638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Client-Transparent Approach to Defend Against Denial of Service Attacks 一个客户端透明的方法来防御拒绝服务攻击
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.6
M. Srivatsa, A. Iyengar, Jian Yin, Ling Liu
Denial of service (DoS) attacks attempt to consume a server's resources (network bandwidth, computing power, main memory, disk bandwidth etc.) to near exhaustion so that there are no resources left to handle requests from legitimate clients. An effective solution to defend against DoS attacks is to filter DoS attack requests at the earliest point (say, the Web site's firewall), before they consume much of the server's resources. Most defenses against DoS attacks attempt to filter requests from inauthentic clients before they consume much of the server's resources. Client authentication using techniques like IPSec or SSL may often require changes to the client-side software and may additionally require superuser privileges at the client for deployment. Further, using digital signatures (as in SSL) makes verification very expensive, thereby making the verification process itself a viable DoS target for the adversary. In this paper, we propose a light-weight client transparent technique to defend against DoS attacks with two unique features: (i) Our technique can be implemented entirely using JavaScript support provided by a standard client-side browser like Mozilla FireFox or Microsoft Internet Explorer. Client transparency follows from the fact that: (i) no changes to client-side software are required, (ii) no client-side superuser privileges are required, and (iii) clients (human beings or automated clients) can browse a DoS protected Web site in the same manner that they browse other Web sites, (ii) Although we operate using the client-side browser (HTTP layer), our technique enables fast IP level packet filtering at the server's firewall and requires no changes to the application(s) hosted by the Web server. In this paper we present a detailed design of our technique along with a detailed security analysis. We also describe a concrete implementation of our proposal on the Linux kernel and present an evaluation using two applications: bandwidth intensive Apache HTTPD and database intensive TPCW. Our experiments show that our approach incurs a low performance overhead and is resilient to DoS attacks
拒绝服务(DoS)攻击试图消耗服务器的资源(网络带宽、计算能力、主存、磁盘带宽等),使其接近耗尽,从而没有资源来处理来自合法客户端的请求。防御DoS攻击的有效解决方案是在DoS攻击请求消耗大量服务器资源之前,在最早的点(例如,Web站点的防火墙)过滤它们。大多数针对DoS攻击的防御都试图在不真实的客户端消耗大量服务器资源之前过滤请求。使用IPSec或SSL等技术的客户端身份验证通常需要更改客户端软件,并且可能还需要客户端的超级用户权限才能进行部署。此外,使用数字签名(如SSL)使验证成本非常高,从而使验证过程本身成为攻击者可行的DoS目标。在本文中,我们提出了一种轻量级的客户端透明技术来防御DoS攻击,该技术具有两个独特的特性:(i)我们的技术可以完全使用标准客户端浏览器(如Mozilla FireFox或Microsoft Internet Explorer)提供的JavaScript支持来实现。客户透明度源于以下事实:(i)不需要更改客户端软件,(ii)不需要客户端超级用户权限,(iii)客户端(人类或自动客户端)可以像浏览其他网站一样浏览受DoS保护的网站,(ii)虽然我们使用客户端浏览器(HTTP层)操作,但我们的技术可以在服务器的防火墙中实现快速IP级数据包过滤,并且不需要更改Web服务器托管的应用程序。在本文中,我们给出了我们技术的详细设计以及详细的安全性分析。我们还描述了我们的建议在Linux内核上的具体实现,并使用两个应用程序进行了评估:带宽密集型Apache HTTPD和数据库密集型TPCW。我们的实验表明,我们的方法产生了较低的性能开销,并且对DoS攻击具有弹性
{"title":"A Client-Transparent Approach to Defend Against Denial of Service Attacks","authors":"M. Srivatsa, A. Iyengar, Jian Yin, Ling Liu","doi":"10.1109/SRDS.2006.6","DOIUrl":"https://doi.org/10.1109/SRDS.2006.6","url":null,"abstract":"Denial of service (DoS) attacks attempt to consume a server's resources (network bandwidth, computing power, main memory, disk bandwidth etc.) to near exhaustion so that there are no resources left to handle requests from legitimate clients. An effective solution to defend against DoS attacks is to filter DoS attack requests at the earliest point (say, the Web site's firewall), before they consume much of the server's resources. Most defenses against DoS attacks attempt to filter requests from inauthentic clients before they consume much of the server's resources. Client authentication using techniques like IPSec or SSL may often require changes to the client-side software and may additionally require superuser privileges at the client for deployment. Further, using digital signatures (as in SSL) makes verification very expensive, thereby making the verification process itself a viable DoS target for the adversary. In this paper, we propose a light-weight client transparent technique to defend against DoS attacks with two unique features: (i) Our technique can be implemented entirely using JavaScript support provided by a standard client-side browser like Mozilla FireFox or Microsoft Internet Explorer. Client transparency follows from the fact that: (i) no changes to client-side software are required, (ii) no client-side superuser privileges are required, and (iii) clients (human beings or automated clients) can browse a DoS protected Web site in the same manner that they browse other Web sites, (ii) Although we operate using the client-side browser (HTTP layer), our technique enables fast IP level packet filtering at the server's firewall and requires no changes to the application(s) hosted by the Web server. In this paper we present a detailed design of our technique along with a detailed security analysis. We also describe a concrete implementation of our proposal on the Linux kernel and present an evaluation using two applications: bandwidth intensive Apache HTTPD and database intensive TPCW. Our experiments show that our approach incurs a low performance overhead and is resilient to DoS attacks","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Modeling Distributed Computing System Reliability with DRBD 基于DRBD的分布式计算系统可靠性建模
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.32
S. Distefano, M. Scarpa, A. Puliafito
Nowadays the great part of devices or systems we commonly use are often driven or managed by microchips and computers: cars, music players, phones, trains, planes, .... A consolidated trend of technology is to substitute mechanical with electronic parts, analogical with digital devices or controls, and so on. In this context, features like security, availability and reliability, usually summarized under the concept of dependability, are receiving higher attention. The dependability analysis, especially for what regards critical parts as computing systems or subsystems, is becoming more strategic: specific requirements and explicit or tighter constraints have to be satisfied. Even though this fact, there is a lack of suitable tools to properly model and analyze these aspects, with particular reference to reliability. To fill this gap, we propose the dynamic reliability block diagram (DRBD) modeling tool derived from the reliability block diagram (RBD) formalism. The DRBD permits to model the dynamic reliability behavior of a system through dependence models, exploited to represent dynamics behaviors as redundancy, load sharing, multiple, probabilistic and common failure mode. In this paper, the DRBD expressiveness and other capabilities, are illustrated through the analysis of a complex distributed computing system taken as example
如今,我们常用的大部分设备或系统都是由微芯片和计算机驱动或管理的:汽车、音乐播放器、电话、火车、飞机、....一个巩固的技术趋势是用电子部件代替机械部件,用数字装置或控制装置代替类比装置,等等。在这种情况下,安全性、可用性和可靠性等通常概括为可靠性概念的特性受到了越来越多的关注。可靠性分析,特别是对于被视为计算系统或子系统的关键部分,正变得更具战略性:必须满足特定的需求和明确的或更严格的约束。尽管如此,仍然缺乏适当的工具来正确地建模和分析这些方面,特别是关于可靠性。为了填补这一空白,我们提出了基于可靠性框图(RBD)形式化的动态可靠性框图(DRBD)建模工具。DRBD允许通过依赖模型对系统的动态可靠性行为进行建模,利用依赖模型来表示冗余、负载共享、多重、概率和常见故障模式等动态行为。本文以一个复杂的分布式计算系统为例,说明了DRBD的表达能力和其他能力
{"title":"Modeling Distributed Computing System Reliability with DRBD","authors":"S. Distefano, M. Scarpa, A. Puliafito","doi":"10.1109/SRDS.2006.32","DOIUrl":"https://doi.org/10.1109/SRDS.2006.32","url":null,"abstract":"Nowadays the great part of devices or systems we commonly use are often driven or managed by microchips and computers: cars, music players, phones, trains, planes, .... A consolidated trend of technology is to substitute mechanical with electronic parts, analogical with digital devices or controls, and so on. In this context, features like security, availability and reliability, usually summarized under the concept of dependability, are receiving higher attention. The dependability analysis, especially for what regards critical parts as computing systems or subsystems, is becoming more strategic: specific requirements and explicit or tighter constraints have to be satisfied. Even though this fact, there is a lack of suitable tools to properly model and analyze these aspects, with particular reference to reliability. To fill this gap, we propose the dynamic reliability block diagram (DRBD) modeling tool derived from the reliability block diagram (RBD) formalism. The DRBD permits to model the dynamic reliability behavior of a system through dependence models, exploited to represent dynamics behaviors as redundancy, load sharing, multiple, probabilistic and common failure mode. In this paper, the DRBD expressiveness and other capabilities, are illustrated through the analysis of a complex distributed computing system taken as example","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
"Open and challenging research issues in dependable distributed computing" A personal view from the Defence Industry “在可靠的分布式计算中开放和具有挑战性的研究问题”来自国防工业的个人观点
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.1
J. Davies
Network enabled capability (NEC) is the UK MoD's response to the rapidly changing conflict environment in which its forces must operate. The armed forces must be flexible, ready and rapidly deployable, and must possess attributes that allow the application of controlled and precise force to achieve realisable effects as part of a wider scene that includes diplomatic and political aspects. The implications of this operational goal are immense and will stimulate significant organisational changes throughout the entire defence supply chain, with knock-on effects in other industrial sectors and civilian environments. Recognising that achievement of NEC requires co-evolution across many different development areas and demands innovation throughout the supply chain, it is apparent that multidisciplinary research that includes a clear understanding of the integration issues is required. This may be attempted through development and application of systems engineering approaches to the delivery of through-life capability for NEC
网络启用能力(NEC)是英国国防部对其部队必须操作的快速变化的冲突环境的反应。武装部队必须灵活、随时准备和快速部署,并且必须具有能够在包括外交和政治方面在内的更广泛的场景中应用控制和精确的力量以实现可实现效果的属性。这一作战目标的影响是巨大的,将在整个国防供应链中刺激重大的组织变革,并在其他工业部门和民用环境中产生连锁反应。认识到NEC的成就需要跨许多不同的发展领域的共同发展,并要求整个供应链的创新,很明显,需要多学科研究,包括对集成问题的清晰理解。这可以通过开发和应用系统工程方法来尝试为NEC提供贯穿整个生命周期的能力
{"title":"\"Open and challenging research issues in dependable distributed computing\" A personal view from the Defence Industry","authors":"J. Davies","doi":"10.1109/SRDS.2006.1","DOIUrl":"https://doi.org/10.1109/SRDS.2006.1","url":null,"abstract":"Network enabled capability (NEC) is the UK MoD's response to the rapidly changing conflict environment in which its forces must operate. The armed forces must be flexible, ready and rapidly deployable, and must possess attributes that allow the application of controlled and precise force to achieve realisable effects as part of a wider scene that includes diplomatic and political aspects. The implications of this operational goal are immense and will stimulate significant organisational changes throughout the entire defence supply chain, with knock-on effects in other industrial sectors and civilian environments. Recognising that achievement of NEC requires co-evolution across many different development areas and demands innovation throughout the supply chain, it is apparent that multidisciplinary research that includes a clear understanding of the integration issues is required. This may be attempted through development and application of systems engineering approaches to the delivery of through-life capability for NEC","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Consistent Replication of Multithreaded Distributed Objects 多线程分布式对象的一致复制
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.14
Hans P. Reiser, Jörg Domaschka, F. Hauck, R. Kapitza, Wolfgang Schröder-Preikschat
Determinism is mandatory for replicating distributed objects with strict consistency guarantees. Multithreaded execution of method invocations is a source of nondeterminism, but helps to improve performance and avoids deadlocks that nested invocations can cause in a single-threaded execution model. This paper contributes a novel algorithm for deterministic thread scheduling based on the interception of synchronisation statements. It assumes that shared data are protected by mutexes and client requests are sent to all replicas in total order; requests are executed concurrently as long as they do not issue potentially conflicting synchronisation operations. No additional communication is required for granting locks in a consistent order in all replicas. In addition to reentrant mutex locks, the algorithm supports condition variables and time-bounded wait operations. An experimental evaluation shows that, in some typical usage patterns of distributed objects, the algorithm is superior to other existing approaches
对于复制具有严格一致性保证的分布式对象,确定性是强制性的。方法调用的多线程执行是不确定性的一个来源,但有助于提高性能并避免嵌套调用在单线程执行模型中可能导致的死锁。提出了一种基于同步语句拦截的确定性线程调度算法。它假设共享数据由互斥锁保护,客户端请求按总顺序发送到所有副本;只要请求不发出潜在冲突的同步操作,它们就可以并发执行。在所有副本中以一致的顺序授予锁不需要额外的通信。除了可重入互斥锁之外,该算法还支持条件变量和有时间限制的等待操作。实验结果表明,在一些典型的分布式对象使用模式下,该算法优于现有的方法
{"title":"Consistent Replication of Multithreaded Distributed Objects","authors":"Hans P. Reiser, Jörg Domaschka, F. Hauck, R. Kapitza, Wolfgang Schröder-Preikschat","doi":"10.1109/SRDS.2006.14","DOIUrl":"https://doi.org/10.1109/SRDS.2006.14","url":null,"abstract":"Determinism is mandatory for replicating distributed objects with strict consistency guarantees. Multithreaded execution of method invocations is a source of nondeterminism, but helps to improve performance and avoids deadlocks that nested invocations can cause in a single-threaded execution model. This paper contributes a novel algorithm for deterministic thread scheduling based on the interception of synchronisation statements. It assumes that shared data are protected by mutexes and client requests are sent to all replicas in total order; requests are executed concurrently as long as they do not issue potentially conflicting synchronisation operations. No additional communication is required for granting locks in a consistent order in all replicas. In addition to reentrant mutex locks, the algorithm supports condition variables and time-bounded wait operations. An experimental evaluation shows that, in some typical usage patterns of distributed objects, the algorithm is superior to other existing approaches","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131493168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments FT-PPTC:一种适用于移动环境的高效容错提交协议
Pub Date : 2006-10-02 DOI: 10.1109/SRDS.2006.22
Brahim Ayari, Abdelmajid Khelil, N. Suri
Transactions are required not only for wired networks but also for the emerging wireless environments where mobile and fixed hosts participate side by side in the execution of the transaction. This heterogenous environment is characterized by constraints in mobile host capabilities, network connectivity and also an increasing number of possible failure modes. Classical atomic commit protocols used in wired networks are therefore not directly suitable for this heterogenous environment. Furthermore, the few commit protocols designed for mobile transactions either consider mobile hosts only as initiators though not as active participants, or show a high resource blocking time. We present the Fault-Tolerant Pre-Phase Transaction Commit (FT-PPTC) protocol for mobile environments. FT-PPTC decouples the commit of mobile participants from that of fixed participants. Consequently, the commit set can be reduced to a set of entities in the fixed network. Thus, the commit can easily be supported by any traditional atomic commit protocol, such as the established 2PC protocol. We integrate fault-tolerance as a key feature of FT-PPTC. Performance evaluations confirm the efficiency, scalability and low resource blocking time of our approach
不仅有线网络需要事务,而且新兴的无线环境也需要事务,在这种环境中,移动和固定主机肩并肩地参与事务的执行。这种异构环境的特点是在移动主机能力、网络连接以及可能的故障模式数量增加方面受到限制。因此,有线网络中使用的经典原子提交协议不直接适用于这种异构环境。此外,为移动事务设计的少数提交协议要么只将移动主机视为发起者,而不是活动参与者,要么显示出较高的资源阻塞时间。提出了一种适用于移动环境的容错前期事务提交(FT-PPTC)协议。FT-PPTC将移动参与者的提交与固定参与者的提交解耦。因此,提交集可以简化为固定网络中的一组实体。因此,任何传统的原子提交协议都可以很容易地支持提交,比如已建立的2PC协议。我们将容错作为FT-PPTC的一个关键特性。性能评估证实了我们的方法的效率、可扩展性和低资源阻塞时间
{"title":"FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments","authors":"Brahim Ayari, Abdelmajid Khelil, N. Suri","doi":"10.1109/SRDS.2006.22","DOIUrl":"https://doi.org/10.1109/SRDS.2006.22","url":null,"abstract":"Transactions are required not only for wired networks but also for the emerging wireless environments where mobile and fixed hosts participate side by side in the execution of the transaction. This heterogenous environment is characterized by constraints in mobile host capabilities, network connectivity and also an increasing number of possible failure modes. Classical atomic commit protocols used in wired networks are therefore not directly suitable for this heterogenous environment. Furthermore, the few commit protocols designed for mobile transactions either consider mobile hosts only as initiators though not as active participants, or show a high resource blocking time. We present the Fault-Tolerant Pre-Phase Transaction Commit (FT-PPTC) protocol for mobile environments. FT-PPTC decouples the commit of mobile participants from that of fixed participants. Consequently, the commit set can be reduced to a set of entities in the fixed network. Thus, the commit can easily be supported by any traditional atomic commit protocol, such as the established 2PC protocol. We integrate fault-tolerance as a key feature of FT-PPTC. Performance evaluations confirm the efficiency, scalability and low resource blocking time of our approach","PeriodicalId":164765,"journal":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127765433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1