首页 > 最新文献

Proceedings 22nd International Conference on Distributed Computing Systems最新文献

英文 中文
Version stamps-decentralized version vectors 版本戳——分散的版本向量
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022304
Paulo Sérgio Almeida, Carlos Baquero, V. Fonte
Version vectors and their variants play a central role in update tracking in optimistic distributed systems. Existing mechanisms for a variable number of participants use a mapping from identities to integers, and rely on some form of global configuration or distributed naming protocol to assign unique identifiers to each participant. These approaches are incompatible with replica creation under arbitrary partitions, a typical mode of operation in mobile or poorly connected environments. We present an update tracking mechanism that overcomes this limitation; it departs from the traditional mapping and avoids the use of integer counters, while providing all the functionality of version vectors in what concerns version tracking.
版本向量及其变体在乐观分布式系统的更新跟踪中起着核心作用。用于可变数量参与者的现有机制使用从身份到整数的映射,并依赖某种形式的全局配置或分布式命名协议为每个参与者分配唯一标识符。这些方法与任意分区下的副本创建不兼容,这是移动或连接不良环境中的典型操作模式。我们提出了一种更新跟踪机制来克服这一限制;它脱离了传统的映射,避免了整数计数器的使用,同时提供了与版本跟踪相关的版本向量的所有功能。
{"title":"Version stamps-decentralized version vectors","authors":"Paulo Sérgio Almeida, Carlos Baquero, V. Fonte","doi":"10.1109/ICDCS.2002.1022304","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022304","url":null,"abstract":"Version vectors and their variants play a central role in update tracking in optimistic distributed systems. Existing mechanisms for a variable number of participants use a mapping from identities to integers, and rely on some form of global configuration or distributed naming protocol to assign unique identifiers to each participant. These approaches are incompatible with replica creation under arbitrary partitions, a typical mode of operation in mobile or poorly connected environments. We present an update tracking mechanism that overcomes this limitation; it departs from the traditional mapping and avoids the use of integer counters, while providing all the functionality of version vectors in what concerns version tracking.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Routing through the mist: privacy preserving communication in ubiquitous computing environments 迷雾中的路由:无处不在的计算环境中保护隐私的通信
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022244
J. Al-Muhtadi, R. Campbell, Apu Kapadia, M. D. Mickunas, Seung Yi
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design process, we will end up creating a very effective distributed surveillance system, which would be a dream come true for electronic stalkers and "big brothers". We present a protocol, which preserves the privacy of users and keeps their communication anonymous. In effect, we create a "mist" that conceals users from the system and other users. Yet, users will still be able to enjoy seamless interaction with services and other entities that wander within the ubiquitous computing environment.
无处不在的计算将彻底改变我们计算和相互交互的方式。然而,除非在设计过程的早期就考虑到隐私问题,否则我们最终将创建一个非常有效的分布式监控系统,这将是电子跟踪者和“老大哥”的梦想成真。我们提出了一种保护用户隐私并保持其通信匿名的协议。实际上,我们创建了一个“薄雾”,将用户从系统和其他用户中隐藏起来。然而,用户仍然能够享受与无处不在的计算环境中漫游的服务和其他实体的无缝交互。
{"title":"Routing through the mist: privacy preserving communication in ubiquitous computing environments","authors":"J. Al-Muhtadi, R. Campbell, Apu Kapadia, M. D. Mickunas, Seung Yi","doi":"10.1109/ICDCS.2002.1022244","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022244","url":null,"abstract":"Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design process, we will end up creating a very effective distributed surveillance system, which would be a dream come true for electronic stalkers and \"big brothers\". We present a protocol, which preserves the privacy of users and keeps their communication anonymous. In effect, we create a \"mist\" that conceals users from the system and other users. Yet, users will still be able to enjoy seamless interaction with services and other entities that wander within the ubiquitous computing environment.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
Towards a distributed platform for resource-constrained devices 面向资源受限设备的分布式平台
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022241
A. Messer, I. Greenberg, P. Bernadat, D. Milojicic, DeQing Chen, T. J. Giuli, Xiaohui Gu
Many visions of the future predict a world with pervasive computing, where computing services and resources permeate the environment. In these visions, people will want to execute a service on any available device without worrying about whether the service has been tailored for the device. We believe that it will be difficult to create services that can execute well on the wide variety of devices that are being developed because of problems with diversity and resource constraints. We believe that these problems can be greatly reduced by using an ad-hoc distributed platform to transparently off-load portions of a service from a resource-constrained device to a nearby server. We implemented a preliminary prototype and emulator to study this approach. Our experiments show the beneficial use of nearby resources to relieve both memory and processing constraints, when it is appropriate to do so. We believe that this approach will reduce the burden on developers by masking more device details.
许多对未来的展望预测了一个普适计算的世界,计算服务和资源渗透到环境中。在这些愿景中,人们将希望在任何可用的设备上执行服务,而不必担心该服务是否已为该设备量身定制。我们认为,由于多样性和资源限制的问题,很难在各种正在开发的设备上创建能够很好地执行的服务。我们相信,通过使用一个特设的分布式平台,将服务的一部分从资源受限的设备透明地卸载到附近的服务器上,可以大大减少这些问题。我们实现了一个初步的原型和仿真器来研究这种方法。我们的实验表明,在适当的时候,可以有益地使用附近的资源来缓解内存和处理限制。我们相信这种方法将通过屏蔽更多设备细节来减轻开发人员的负担。
{"title":"Towards a distributed platform for resource-constrained devices","authors":"A. Messer, I. Greenberg, P. Bernadat, D. Milojicic, DeQing Chen, T. J. Giuli, Xiaohui Gu","doi":"10.1109/ICDCS.2002.1022241","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022241","url":null,"abstract":"Many visions of the future predict a world with pervasive computing, where computing services and resources permeate the environment. In these visions, people will want to execute a service on any available device without worrying about whether the service has been tailored for the device. We believe that it will be difficult to create services that can execute well on the wide variety of devices that are being developed because of problems with diversity and resource constraints. We believe that these problems can be greatly reduced by using an ad-hoc distributed platform to transparently off-load portions of a service from a resource-constrained device to a nearby server. We implemented a preliminary prototype and emulator to study this approach. Our experiments show the beneficial use of nearby resources to relieve both memory and processing constraints, when it is appropriate to do so. We believe that this approach will reduce the burden on developers by masking more device details.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123873556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 134
Clustering algorithms for content-based publication-subscription systems 基于内容的发布-订阅系统的聚类算法
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022250
A. Riabov, Zhen Liu, J. Wolf, Philip S. Yu, Li Zhang
We consider efficient communication schemes based on both network-supported and application-level multicast techniques for content-based publication-subscription systems. We show that the communication costs depend heavily on the network configurations, distribution of publications and subscriptions. We devise new algorithms and adapt existing partitional data clustering algorithms. These algorithms can be used to determine multicast groups with as much commonality as possible, based on the totality of subscribers' interests. They perform well in the context of highly heterogeneous subscriptions, and they also scale well. An efficiency of 60% to 80% with respect to the ideal solution can be achieved with a small number of multicast groups (less than 100 in our experiments). Some of these same concepts can be applied to match publications to subscribers in real-time, and also to determine dynamically whether to unicast, multicast or broadcast information about the events over the network to the matched subscribers. We demonstrate the quality of our algorithms via simulation experiments.
我们考虑了基于网络支持和应用级多播技术的基于内容的发布-订阅系统的高效通信方案。我们表明,通信成本在很大程度上取决于网络配置、出版物的分布和订阅。我们设计了新的算法,并对现有的分区数据聚类算法进行了改进。这些算法可用于根据订阅者的总体兴趣来确定具有尽可能多的共性的多播组。它们在高度异构的订阅环境中表现良好,而且可扩展性也很好。相对于理想的解决方案,使用少量的多播组(在我们的实验中少于100个)可以实现60%到80%的效率。其中一些相同的概念可以应用于将发布实时地匹配到订阅者,也可以动态地确定是否通过网络将有关事件的信息单播、多播或广播给匹配的订阅者。我们通过仿真实验证明了我们算法的质量。
{"title":"Clustering algorithms for content-based publication-subscription systems","authors":"A. Riabov, Zhen Liu, J. Wolf, Philip S. Yu, Li Zhang","doi":"10.1109/ICDCS.2002.1022250","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022250","url":null,"abstract":"We consider efficient communication schemes based on both network-supported and application-level multicast techniques for content-based publication-subscription systems. We show that the communication costs depend heavily on the network configurations, distribution of publications and subscriptions. We devise new algorithms and adapt existing partitional data clustering algorithms. These algorithms can be used to determine multicast groups with as much commonality as possible, based on the totality of subscribers' interests. They perform well in the context of highly heterogeneous subscriptions, and they also scale well. An efficiency of 60% to 80% with respect to the ideal solution can be achieved with a small number of multicast groups (less than 100 in our experiments). Some of these same concepts can be applied to match publications to subscribers in real-time, and also to determine dynamically whether to unicast, multicast or broadcast information about the events over the network to the matched subscribers. We demonstrate the quality of our algorithms via simulation experiments.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125414064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
OS support for P2P programming: a case for TPS 操作系统对P2P编程的支持:TPS的一个案例
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022273
Sébastien Baehni, P. Eugster, R. Guerraoui
Just as the remote procedure call (RPC) turned out to be a very effective OS abstraction in building client-server applications over LANs, type-based publish-subscribe (TPS) can be viewed as a high-level candidate abstraction for building peer-to-peer (P2P) applications over WANs. This paper relates our preliminary, though positive, experience of implementing and using TPS over JXTA, which can be viewed as the P2P counterpart to sockets. We show that, at least for P2P applications with the Java type model, TPS provides a high-level programming support that ensures type safety and encapsulation, without hampering the decoupled nature of these applications. Furthermore, the loss of flexibility (inherent to the use of any high level abstraction) and the performance overhead, are negligible with respect to the simplicity gained by using TPS.
正如远程过程调用(RPC)被证明是在局域网上构建客户机-服务器应用程序时非常有效的操作系统抽象一样,基于类型的发布-订阅(TPS)可以被视为在广域网上构建点对点(P2P)应用程序的高级候选抽象。本文介绍了我们在JXTA上实现和使用TPS的初步经验,JXTA可以看作是对等的套接字。我们表明,至少对于使用Java类型模型的P2P应用程序,TPS提供了高级编程支持,确保了类型安全和封装,而不会妨碍这些应用程序的解耦特性。此外,与使用TPS获得的简单性相比,灵活性的损失(使用任何高级抽象所固有的)和性能开销可以忽略不计。
{"title":"OS support for P2P programming: a case for TPS","authors":"Sébastien Baehni, P. Eugster, R. Guerraoui","doi":"10.1109/ICDCS.2002.1022273","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022273","url":null,"abstract":"Just as the remote procedure call (RPC) turned out to be a very effective OS abstraction in building client-server applications over LANs, type-based publish-subscribe (TPS) can be viewed as a high-level candidate abstraction for building peer-to-peer (P2P) applications over WANs. This paper relates our preliminary, though positive, experience of implementing and using TPS over JXTA, which can be viewed as the P2P counterpart to sockets. We show that, at least for P2P applications with the Java type model, TPS provides a high-level programming support that ensures type safety and encapsulation, without hampering the decoupled nature of these applications. Furthermore, the loss of flexibility (inherent to the use of any high level abstraction) and the performance overhead, are negligible with respect to the simplicity gained by using TPS.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Design of a policy-driven middleware for secure distributed collaboration 为安全分布式协作设计策略驱动的中间件
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022277
A. Tripathi, Tanvir Ahmed, Richa Kumar, Shremattie Jaman
We present the execution model of policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification model supports nested collaboration activities, and uses role-based security policies and event count based coordination specification. From the specifications of a collaboration environment, appropriate policy modules are derived for enforcing security and coordination requirements. Policy-driven distributed middleware provides services to users to join roles in an activity, perform role specific operations, or create new activities. We describe the design challenges for middleware and present the run-time structures and protocols supported by it for creating activities, roles, and objects.
我们提出了策略驱动中间件的执行模型,用于根据其高级规范构建安全的分布式协作系统。我们的规范模型支持嵌套的协作活动,并使用基于角色的安全策略和基于事件计数的协调规范。从协作环境的规范中,派生出适当的策略模块,用于执行安全性和协调需求。策略驱动的分布式中间件为用户提供服务,以加入活动中的角色、执行特定于角色的操作或创建新活动。我们描述了中间件的设计挑战,并展示了中间件支持的运行时结构和协议,用于创建活动、角色和对象。
{"title":"Design of a policy-driven middleware for secure distributed collaboration","authors":"A. Tripathi, Tanvir Ahmed, Richa Kumar, Shremattie Jaman","doi":"10.1109/ICDCS.2002.1022277","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022277","url":null,"abstract":"We present the execution model of policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification model supports nested collaboration activities, and uses role-based security policies and event count based coordination specification. From the specifications of a collaboration environment, appropriate policy modules are derived for enforcing security and coordination requirements. Policy-driven distributed middleware provides services to users to join roles in an activity, perform role specific operations, or create new activities. We describe the design challenges for middleware and present the run-time structures and protocols supported by it for creating activities, roles, and objects.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121306347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Timestamping messages in synchronous computations 同步计算中的时间戳消息
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022305
V. Garg, Chakarat Skawratananond
We present a method of timestamping messages and events in synchronous computations that capture the order relationship with vectors of size less than or equal to the size of the vertex cover of the communication topology of the system. Our method is fundamentally different from the techniques of Fidge (1989) and Mattern (1989). The timestamps in our method do not use one component per process but still guarantee that the order relationship is captured accurately. Our algorithm is online and only requires piggybacking of timestamps on program messages. It is applicable to all programs that either use programming languages based on synchronous communication such as CSP or use synchronous remote procedure calls.
我们提出了一种在同步计算中对消息和事件进行时间戳的方法,该方法捕获了大小小于或等于系统通信拓扑的顶点覆盖大小的向量的顺序关系。我们的方法从根本上不同于Fidge(1989)和Mattern(1989)的技术。我们方法中的时间戳并不为每个流程使用一个组件,但仍然保证准确地捕获顺序关系。我们的算法是在线的,只需要在程序消息上附带时间戳。它适用于使用基于同步通信的编程语言(如CSP)或使用同步远程过程调用的所有程序。
{"title":"Timestamping messages in synchronous computations","authors":"V. Garg, Chakarat Skawratananond","doi":"10.1109/ICDCS.2002.1022305","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022305","url":null,"abstract":"We present a method of timestamping messages and events in synchronous computations that capture the order relationship with vectors of size less than or equal to the size of the vertex cover of the communication topology of the system. Our method is fundamentally different from the techniques of Fidge (1989) and Mattern (1989). The timestamps in our method do not use one component per process but still guarantee that the order relationship is captured accurately. Our algorithm is online and only requires piggybacking of timestamps on program messages. It is applicable to all programs that either use programming languages based on synchronous communication such as CSP or use synchronous remote procedure calls.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116474263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reasoning about joint administration of access policies for coalition resources 联合资源准入政策的联合管理推理
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022281
H. Khurana, V. Gligor, J. Linn
We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distributes attribute certificates authorizing access to policy objects (e.g., ACLs). Control over the issuance of such certificates is retained by member domains separately holding shares of the joint coalition authority's private key with which they sign the attribute certificates. Hence, any (proper) subset of the member domains need not be trusted to protect the private key. However, application servers that implement joint administration of access policies based on attribute certificates must trust all the signers of those certificates, namely all member domains of the coalition. To capture these trust relations we extend existing access control logics and show that the extensions are sound. To reason about joint administration of access policies, we illustrate an authorization protocol in our logic for accessing policy objects using threshold attribute certificates.
我们认为,对由自治域组成的动态联盟的访问策略的联合管理要求这些域建立一个联盟机构,该机构分发授权访问策略对象(例如,acl)的属性证书。对此类证书颁发的控制由单独持有联合联盟权威私钥的成员域保留,他们用私钥签署属性证书。因此,不需要信任成员域的任何(适当的)子集来保护私钥。但是,实现基于属性证书的访问策略联合管理的应用服务器必须信任这些证书的所有签名者,即联盟的所有成员域。为了捕获这些信任关系,我们扩展了现有的访问控制逻辑,并表明扩展是可靠的。为了理解访问策略的联合管理,我们在使用阈值属性证书访问策略对象的逻辑中说明了一个授权协议。
{"title":"Reasoning about joint administration of access policies for coalition resources","authors":"H. Khurana, V. Gligor, J. Linn","doi":"10.1109/ICDCS.2002.1022281","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022281","url":null,"abstract":"We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distributes attribute certificates authorizing access to policy objects (e.g., ACLs). Control over the issuance of such certificates is retained by member domains separately holding shares of the joint coalition authority's private key with which they sign the attribute certificates. Hence, any (proper) subset of the member domains need not be trusted to protect the private key. However, application servers that implement joint administration of access policies based on attribute certificates must trust all the signers of those certificates, namely all member domains of the coalition. To capture these trust relations we extend existing access control logics and show that the extensions are sound. To reason about joint administration of access policies, we illustrate an authorization protocol in our logic for accessing policy objects using threshold attribute certificates.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Accelerating Internet streaming media delivery using network-aware partial caching 使用网络感知部分缓存加速Internet流媒体传输
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022252
Shudong Jin, Azer Bestavros, A. Iyengar
Internet streaming applications are affected by adverse network conditions such as high packet loss rates and long delays. This paper aims at mitigating such effects by leveraging the availability of client-side caching proxies. We present a novel caching architecture and associated cache management algorithms that turn edge caches into accelerators of streaming media delivery. A salient feature of our caching algorithms is that they allow partial caching of streaming media objects and joint delivery of content from caches and origin servers. The caching algorithms we propose are both network-aware and stream-aware; they take into account the popularity of streaming media objects, their bit-rate requirements, and the available bandwidth between clients and servers. Using realistic models of Internet bandwidth derived from proxy cache logs and measured over real Internet paths, we have conducted simulations to evaluate the performance of various cache management alternatives. Our experiments demonstrate that network-aware caching algorithms can significantly reduce service delay and improve overall stream quality. Our experiments also show that partial caching is particularly effective when bandwidth variability is not very high.
Internet流媒体应用会受到高丢包率和长时延等不利网络条件的影响。本文旨在通过利用客户端缓存代理的可用性来减轻这种影响。我们提出了一种新的缓存架构和相关的缓存管理算法,将边缘缓存转变为流媒体传输的加速器。我们的缓存算法的一个显著特征是,它们允许部分缓存流媒体对象,以及从缓存和原始服务器联合交付内容。我们提出的缓存算法同时具有网络感知和流感知;它们考虑了流媒体对象的流行程度、它们的比特率要求以及客户机和服务器之间的可用带宽。使用来自代理缓存日志的真实的互联网带宽模型,并在真实的互联网路径上测量,我们进行了模拟,以评估各种缓存管理备选方案的性能。我们的实验表明,网络感知缓存算法可以显著降低服务延迟,提高整体流质量。我们的实验还表明,当带宽可变性不是很高时,部分缓存特别有效。
{"title":"Accelerating Internet streaming media delivery using network-aware partial caching","authors":"Shudong Jin, Azer Bestavros, A. Iyengar","doi":"10.1109/ICDCS.2002.1022252","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022252","url":null,"abstract":"Internet streaming applications are affected by adverse network conditions such as high packet loss rates and long delays. This paper aims at mitigating such effects by leveraging the availability of client-side caching proxies. We present a novel caching architecture and associated cache management algorithms that turn edge caches into accelerators of streaming media delivery. A salient feature of our caching algorithms is that they allow partial caching of streaming media objects and joint delivery of content from caches and origin servers. The caching algorithms we propose are both network-aware and stream-aware; they take into account the popularity of streaming media objects, their bit-rate requirements, and the available bandwidth between clients and servers. Using realistic models of Internet bandwidth derived from proxy cache logs and measured over real Internet paths, we have conducted simulations to evaluate the performance of various cache management alternatives. Our experiments demonstrate that network-aware caching algorithms can significantly reduce service delay and improve overall stream quality. Our experiments also show that partial caching is particularly effective when bandwidth variability is not very high.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131901168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Unification of replication and transaction processing in three-tier architectures 在三层架构中统一复制和事务处理
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022266
Wenbing Zhao, L. Moser, P. Melliar-Smith
In this paper we describe a software infrastructure that unifies replication and transaction processing in three-tier architectures and, thus, provides high availability and fault tolerance for enterprise applications. The infrastructure is based on the Fault Tolerant CORBA and CORBA Object Transaction Service standards, and works with commercial-off-the-shelf application servers and database systems. The infrastructure replicates the application servers to protect the business logic processing. In addition, it replicates the transaction coordinator which renders the two-phase commit protocol non-blocking and, thus, avoids potentially long service disruptions caused by coordinator failure. The infrastructure handles the interactions between the application servers and the database servers through replicated gateways that prevent duplicate requests from reaching the database servers. The infrastructure implements client-side automatic failover mechanisms, which guarantees that clients know the outcome of the requests that they have made. The infrastructure starts the transactions at the application servers, and retries aborted transactions, caused by process or communication failures, automatically on the behalf of the clients.
在本文中,我们描述了一个软件基础设施,它在三层体系结构中统一了复制和事务处理,从而为企业应用程序提供了高可用性和容错性。该基础设施基于容错CORBA和CORBA对象事务服务标准,并与商业现成的应用程序服务器和数据库系统一起工作。基础设施复制应用服务器以保护业务逻辑处理。此外,它复制事务协调器,使两阶段提交协议非阻塞,从而避免协调器故障造成的潜在的长时间服务中断。基础设施通过复制网关处理应用程序服务器和数据库服务器之间的交互,这些网关可以防止重复请求到达数据库服务器。基础设施实现了客户端自动故障转移机制,这保证了客户端知道它们发出的请求的结果。基础设施在应用程序服务器上启动事务,并代表客户端自动重试因流程或通信故障而中断的事务。
{"title":"Unification of replication and transaction processing in three-tier architectures","authors":"Wenbing Zhao, L. Moser, P. Melliar-Smith","doi":"10.1109/ICDCS.2002.1022266","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022266","url":null,"abstract":"In this paper we describe a software infrastructure that unifies replication and transaction processing in three-tier architectures and, thus, provides high availability and fault tolerance for enterprise applications. The infrastructure is based on the Fault Tolerant CORBA and CORBA Object Transaction Service standards, and works with commercial-off-the-shelf application servers and database systems. The infrastructure replicates the application servers to protect the business logic processing. In addition, it replicates the transaction coordinator which renders the two-phase commit protocol non-blocking and, thus, avoids potentially long service disruptions caused by coordinator failure. The infrastructure handles the interactions between the application servers and the database servers through replicated gateways that prevent duplicate requests from reaching the database servers. The infrastructure implements client-side automatic failover mechanisms, which guarantees that clients know the outcome of the requests that they have made. The infrastructure starts the transactions at the application servers, and retries aborted transactions, caused by process or communication failures, automatically on the behalf of the clients.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
Proceedings 22nd International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1