首页 > 最新文献

Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems最新文献

英文 中文
Generalized Sketch Families for Network Traffic Measurement 网络流量测量的广义草图族
You Zhou, Youlin Zhang, Chaoyi Ma, Shigang Chen, Olufemi O. Odegbile
Traffic measurement provides critical information for network management, resource allocation, traffic engineering, and attack detection. Most prior art has been geared towards specific application needs with specific performance objectives. To support diverse requirements with efficient and future-proof implementation, this paper takes a new approach to establish common frameworks, each for a family of traffic measurement solutions that share the same implementation structure, providing a high level of generality, for both size and spread measurements and for all flows. The designs support many options of performance-overhead tradeoff with as few as one memory update per packet and as little space as several bits per flow on average. Such a family-based approach will unify implementation by removing redundancy from different measurement tasks and support reconfigurability in a plug-n-play manner. We demonstrate the connection and difference in the design of these traffic measurement families and perform experimental comparisons on hardware/software platforms to find their tradeoff, which provide practical guidance for which solutions to use under given performance goals.
流量测量为网络管理、资源分配、流量工程、攻击检测等提供重要信息。大多数现有技术都是针对具有特定性能目标的特定应用需求。为了通过高效和面向未来的实现来支持不同的需求,本文采用了一种新的方法来建立通用框架,每个框架都适用于共享相同实现结构的一系列流量测量解决方案,为大小和分布测量以及所有流量提供高水平的通用性。这些设计支持许多性能开销权衡选项,每个数据包只需更新一次内存,平均每个流只需占用几个比特的空间。这种基于家族的方法将通过消除不同测量任务的冗余来统一实现,并以即插即用的方式支持可重构性。我们展示了这些流量测量家族设计中的联系和差异,并在硬件/软件平台上进行实验比较,以找到它们的权衡,这为在给定性能目标下使用哪种解决方案提供了实用指导。
{"title":"Generalized Sketch Families for Network Traffic Measurement","authors":"You Zhou, Youlin Zhang, Chaoyi Ma, Shigang Chen, Olufemi O. Odegbile","doi":"10.1145/3393691.3394191","DOIUrl":"https://doi.org/10.1145/3393691.3394191","url":null,"abstract":"Traffic measurement provides critical information for network management, resource allocation, traffic engineering, and attack detection. Most prior art has been geared towards specific application needs with specific performance objectives. To support diverse requirements with efficient and future-proof implementation, this paper takes a new approach to establish common frameworks, each for a family of traffic measurement solutions that share the same implementation structure, providing a high level of generality, for both size and spread measurements and for all flows. The designs support many options of performance-overhead tradeoff with as few as one memory update per packet and as little space as several bits per flow on average. Such a family-based approach will unify implementation by removing redundancy from different measurement tasks and support reconfigurability in a plug-n-play manner. We demonstrate the connection and difference in the design of these traffic measurement families and perform experimental comparisons on hardware/software platforms to find their tradeoff, which provide practical guidance for which solutions to use under given performance goals.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fundamental Limits of Volume-based Network DoS Attacks 基于卷的网络DoS攻击的基本限制
Xinzhe Fu, E. Modiano
Volume-based network denial-of-service (DoS) attacks refer to a class of cyber attacks where an adversary seeks to block user traffic from service by sending adversarial traffic that reduces the available user capacity. In this paper, we explore the fundamental limits of volume-based network DoS attacks by studying the minimum required rate of adversarial traffic and investigating optimal attack strategies. We start our analysis with single-hop networks where user traffic is routed to servers following the Join-the-Shortest-Queue (JSQ) rule. Given the service rates of servers and arrival rates of user traffic, we first characterize the feasibility region of the attack and show that the attack is feasible if and only if the rate of the adversarial traffic lies in the region. We then design an attack strategy that is (i).optimal: it guarantees the success of the attack whenever the adversarial traffic rate lies in the feasibility region and (ii).oblivious: it does not rely on knowledge of service rates or user traffic rates. Finally, we extend our results on the feasibility region of the attack and the optimal attack strategy to multi-hop networks that employ Back-pressure (Max-Weight) routing. At a higher level, this paper addresses a class of dual problems of stochastic network stability, i.e., how to optimally de-stabilize a network.
基于容量的网络拒绝服务(DoS)攻击是一类网络攻击,攻击者通过发送减少可用用户容量的对抗性流量来阻止用户访问服务。在本文中,我们通过研究对抗流量的最小要求率和研究最优攻击策略来探索基于容量的网络DoS攻击的基本限制。我们从单跳网络开始分析,其中用户流量按照最短队列连接(join -the- short - queue, JSQ)规则路由到服务器。给定服务器的服务率和用户流量的到达率,我们首先描述了攻击的可行性区域,并证明了当且仅当敌对流量的速率位于该区域时,攻击是可行的。然后,我们设计了一种攻击策略,它是(i).最优的:它保证攻击的成功,无论敌对流量率在可行性区域和(ii).无关的:它不依赖于服务费率或用户流量率的知识。最后,我们将攻击的可行性区域和最优攻击策略扩展到采用背压(Max-Weight)路由的多跳网络。在更高的层次上,本文讨论了一类随机网络稳定性的对偶问题,即如何最优解稳网络。
{"title":"Fundamental Limits of Volume-based Network DoS Attacks","authors":"Xinzhe Fu, E. Modiano","doi":"10.1145/3393691.3394190","DOIUrl":"https://doi.org/10.1145/3393691.3394190","url":null,"abstract":"Volume-based network denial-of-service (DoS) attacks refer to a class of cyber attacks where an adversary seeks to block user traffic from service by sending adversarial traffic that reduces the available user capacity. In this paper, we explore the fundamental limits of volume-based network DoS attacks by studying the minimum required rate of adversarial traffic and investigating optimal attack strategies. We start our analysis with single-hop networks where user traffic is routed to servers following the Join-the-Shortest-Queue (JSQ) rule. Given the service rates of servers and arrival rates of user traffic, we first characterize the feasibility region of the attack and show that the attack is feasible if and only if the rate of the adversarial traffic lies in the region. We then design an attack strategy that is (i).optimal: it guarantees the success of the attack whenever the adversarial traffic rate lies in the feasibility region and (ii).oblivious: it does not rely on knowledge of service rates or user traffic rates. Finally, we extend our results on the feasibility region of the attack and the optimal attack strategy to multi-hop networks that employ Back-pressure (Max-Weight) routing. At a higher level, this paper addresses a class of dual problems of stochastic network stability, i.e., how to optimally de-stabilize a network.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133037638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ludo Hashing: Compact, Fast, and Dynamic Key-value Lookups for Practical Network Systems Ludo哈希:实用网络系统的紧凑、快速和动态键值查找
Shouqian Shi, Chen Qian
Key-value lookup engines running in fast memory are crucial components of many networked and distributed systems such as packet forwarding, virtual network functions, content distribution networks, distributed storage, and cloud/edge computing. These lookup engines must be memory-efficient because fast memory is small and expensive. This work presents a new key-value lookup design, called Ludo Hashing, which costs the least space (3.76 + 1.05 ι bits per key-value item for ι-bit values) among known compact lookup solutions including the recently proposed partial-key Cuckoo and Bloomier perfect hashing. In addition to its space efficiency, Ludo Hashing works well with most practical systems by supporting fast lookups, fast updates, and concurrent writing/reading. We implement Ludo Hashing and evaluate it with both micro-benchmark and two network systems deployed in CloudLab. The results show that in practice Ludo Hashing saves 40% to 80%+ memory cost compared to existing dynamic solutions. It costs only a few GB memory for 1 billion key-value items and achieves high lookup throughput: over 65 million queries per second on a single node with multiple threads.
在快速内存中运行的键值查找引擎是许多网络和分布式系统(如数据包转发、虚拟网络功能、内容分发网络、分布式存储和云/边缘计算)的关键组件。这些查找引擎必须具有内存效率,因为快速内存体积小且价格昂贵。这项工作提出了一种新的键值查找设计,称为Ludo哈希,它在已知的紧凑查找解决方案(包括最近提出的部分键Cuckoo和Bloomier完美哈希)中花费最少的空间(对于ι-bit值,每个键值项3.76 + 1.05 ι比特)。除了空间效率之外,Ludo哈希通过支持快速查找、快速更新和并发写/读,在大多数实际系统中都能很好地工作。我们实现了Ludo哈希,并使用部署在CloudLab中的微基准测试和两个网络系统对其进行了评估。结果表明,在实践中,与现有的动态解决方案相比,Ludo哈希节省了40%到80%以上的内存成本。对于10亿个键值项,它只需要几GB的内存,并且实现了高查找吞吐量:在具有多个线程的单个节点上每秒超过6500万次查询。
{"title":"Ludo Hashing: Compact, Fast, and Dynamic Key-value Lookups for Practical Network Systems","authors":"Shouqian Shi, Chen Qian","doi":"10.1145/3393691.3394198","DOIUrl":"https://doi.org/10.1145/3393691.3394198","url":null,"abstract":"Key-value lookup engines running in fast memory are crucial components of many networked and distributed systems such as packet forwarding, virtual network functions, content distribution networks, distributed storage, and cloud/edge computing. These lookup engines must be memory-efficient because fast memory is small and expensive. This work presents a new key-value lookup design, called Ludo Hashing, which costs the least space (3.76 + 1.05 ι bits per key-value item for ι-bit values) among known compact lookup solutions including the recently proposed partial-key Cuckoo and Bloomier perfect hashing. In addition to its space efficiency, Ludo Hashing works well with most practical systems by supporting fast lookups, fast updates, and concurrent writing/reading. We implement Ludo Hashing and evaluate it with both micro-benchmark and two network systems deployed in CloudLab. The results show that in practice Ludo Hashing saves 40% to 80%+ memory cost compared to existing dynamic solutions. It costs only a few GB memory for 1 billion key-value items and achieves high lookup throughput: over 65 million queries per second on a single node with multiple threads.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Logarithmic Communication for Distributed Optimization in Multi-Agent Systems 多智能体系统分布式优化的对数通信
Palma London, Shai Vardi, A. Wierman
Classically, the design of multi-agent systems is approached using techniques from distributed optimization such as dual descent and consensus algorithms. Such algorithms depend on convergence to global consensus before any individual agent can determine its local action. This leads to challenges with respect to communication overhead and robustness, and improving algorithms with respect to these measures has been a focus of the community for decades. This paper presents a new approach for multi-agent system design based on ideas from the emerging field of local computation algorithms. The framework we develop, LOcal Convex Optimization (LOCO), is the first local computation algorithm for convex optimization problems and can be applied in a wide-variety of settings. We demonstrate the generality of the framework via applications to Network Utility Maximization (NUM) and the distributed training of Support Vector Machines (SVMs), providing numerical results illustrating the improvement compared to classical distributed optimization approaches in each case.
传统上,多智能体系统的设计使用分布式优化技术,如双下降算法和共识算法。这种算法依赖于在任何个体代理确定其局部行为之前收敛到全局共识。这导致了通信开销和鲁棒性方面的挑战,并且改进这些度量的算法已经成为社区几十年来关注的焦点。基于局部计算算法这一新兴领域的思想,提出了一种新的多智能体系统设计方法。我们开发的框架,局部凸优化(LOCO),是凸优化问题的第一个局部计算算法,可以应用于各种各样的设置。我们通过应用于网络效用最大化(NUM)和支持向量机(svm)的分布式训练来证明框架的通用性,并提供了数值结果,说明了在每种情况下与经典分布式优化方法相比的改进。
{"title":"Logarithmic Communication for Distributed Optimization in Multi-Agent Systems","authors":"Palma London, Shai Vardi, A. Wierman","doi":"10.1145/3393691.3394197","DOIUrl":"https://doi.org/10.1145/3393691.3394197","url":null,"abstract":"Classically, the design of multi-agent systems is approached using techniques from distributed optimization such as dual descent and consensus algorithms. Such algorithms depend on convergence to global consensus before any individual agent can determine its local action. This leads to challenges with respect to communication overhead and robustness, and improving algorithms with respect to these measures has been a focus of the community for decades. This paper presents a new approach for multi-agent system design based on ideas from the emerging field of local computation algorithms. The framework we develop, LOcal Convex Optimization (LOCO), is the first local computation algorithm for convex optimization problems and can be applied in a wide-variety of settings. We demonstrate the generality of the framework via applications to Network Utility Maximization (NUM) and the distributed training of Support Vector Machines (SVMs), providing numerical results illustrating the improvement compared to classical distributed optimization approaches in each case.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Learning in Multi Agent Multi Armed Bandits 多智能体多武装盗匪的社会学习
Abishek Sankararaman, A. Ganesh, S. Shakkottai
We introduce a novel decentralized, multi agent version of the classical Multi-Arm Bandit (MAB) problem, consisting of n agents, that collaboratively and simultaneously solve the same instance of K armed MAB to minimize individual regret. The agents can communicate and collaborate among each other only through a pairwise asynchronous gossip based protocol that exchange a limited number of bits. In our model, agents at each point decide on (i) which arm to play, (ii) whether to, and if so (iii) what and whom to communicate with. We develop a novel algorithm in which agents, whenever they choose, communicate only arm-ids and not samples, with another agent chosen uniformly and independently at random. The peragent regret achieved by our algorithm is O(⌈K/n⌉ + log(n)/Δ log(T)), where Δ is the difference between the mean of the best and second best arm. Furthermore, any agent in our algorithm communicates (arm-ids to an uniformly and independently chosen agent) only a total of Θ(log(T)) times over a time interval of T. We compare our results to two benchmarks - one where there is no communication among agents and one corresponding to complete interaction, where an agent has access to the entire system history of arms played and rewards obtained of all agents. We show both theoretically and empirically, that our algorithm experiences a significant reduction both in per-agent regret when compared to the case when agents do not collaborate and each agent is playing the standard MAB problem (where regret would scale linearly in K), and in communication complexity when compared to the full interaction setting which requires T communication attempts by an agent over T arm pulls. Our result thus demonstrates that even a minimal level of collaboration among the different agents enables a significant reduction in per-agent regret.
我们引入了经典的多臂强盗(MAB)问题的一种新的分散的多智能体版本,由n个智能体组成,这些智能体协作并同时解决相同的K臂强盗(MAB)实例以最小化个体后悔。代理之间只能通过基于对异步八卦的协议进行通信和协作,该协议交换有限数量的比特。在我们的模型中,智能体在每个点上决定(i)使用哪只手臂,(ii)是否使用,如果使用,(iii)与什么和谁通信。我们开发了一种新的算法,在这种算法中,智能体无论何时选择,都只与随机选择的另一个智能体进行臂id而不是样本的通信。peragent后悔通过我们的算法是O(⌈K / n⌉+ log (n) /Δ日志(T)),在Δ是最好的均值之间的差异和第二最好的手臂。此外,我们算法中的任何智能体(与统一且独立选择的智能体)在T的时间间隔内总共只通信Θ(log(T))次。我们将我们的结果与两个基准进行比较-一个是智能体之间没有通信,另一个对应于完整的交互,其中智能体可以访问所有智能体的整个武器历史和获得的奖励。我们在理论上和经验上都表明,与代理不协作并且每个代理都在玩标准MAB问题(其中遗憾将在K中线性扩展)的情况相比,我们的算法在每个代理的遗憾方面都经历了显着减少,并且与需要代理进行T次通信尝试的完整交互设置相比,在通信复杂性方面。因此,我们的结果表明,即使是不同代理之间最小程度的合作,也能显著减少每个代理的后悔。
{"title":"Social Learning in Multi Agent Multi Armed Bandits","authors":"Abishek Sankararaman, A. Ganesh, S. Shakkottai","doi":"10.1145/3393691.3394217","DOIUrl":"https://doi.org/10.1145/3393691.3394217","url":null,"abstract":"We introduce a novel decentralized, multi agent version of the classical Multi-Arm Bandit (MAB) problem, consisting of n agents, that collaboratively and simultaneously solve the same instance of K armed MAB to minimize individual regret. The agents can communicate and collaborate among each other only through a pairwise asynchronous gossip based protocol that exchange a limited number of bits. In our model, agents at each point decide on (i) which arm to play, (ii) whether to, and if so (iii) what and whom to communicate with. We develop a novel algorithm in which agents, whenever they choose, communicate only arm-ids and not samples, with another agent chosen uniformly and independently at random. The peragent regret achieved by our algorithm is O(⌈K/n⌉ + log(n)/Δ log(T)), where Δ is the difference between the mean of the best and second best arm. Furthermore, any agent in our algorithm communicates (arm-ids to an uniformly and independently chosen agent) only a total of Θ(log(T)) times over a time interval of T. We compare our results to two benchmarks - one where there is no communication among agents and one corresponding to complete interaction, where an agent has access to the entire system history of arms played and rewards obtained of all agents. We show both theoretically and empirically, that our algorithm experiences a significant reduction both in per-agent regret when compared to the case when agents do not collaborate and each agent is playing the standard MAB problem (where regret would scale linearly in K), and in communication complexity when compared to the full interaction setting which requires T communication attempts by an agent over T arm pulls. Our result thus demonstrates that even a minimal level of collaboration among the different agents enables a significant reduction in per-agent regret.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131672359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
vrfinder: Finding Outbound Addresses in Traceroute vrfinder:在Traceroute中查找出站地址
Alexander Marder, M. Luckie, B. Huffaker, K. Claffy
Current methods to analyze the Internet's router-level topology with paths collected using traceroute assume that the source address for each router in the path is either an inbound or off-path address on each router. In this work, we show that outbound addresses are common in our Internet-wide traceroute dataset collected by CAIDA's Ark vantage points in January 2020, accounting for 1.7% - 5.8% of the addresses seen at some point before the end of a traceroute. This phenomenon can lead to mistakes in Internet topology analysis, such as inferring router ownership and identifying interdomain links. We hypothesize that the primary contributor to outbound addresses is Layer 3 Virtual Private Networks (L3VPNs), and propose vrfinder, a technique for identifying L3VPN outbound addresses in traceroute collections. We validate vrfinder against ground truth from two large research and education networks, demonstrating high precision (100.0%) and recall (82.1% - 95.3%). We also show the benefit of accounting for L3VPNs in traceroute analysis through extensions to bdrmapIT, increasing the accuracy of its router ownership inferences for L3VPN outbound addresses from 61.5% - 79.4% to 88.9% - 95.5%.
使用traceroute收集的路径来分析互联网路由器级拓扑的当前方法假设路径中每个路由器的源地址是每个路由器的入站地址或离路地址。在这项工作中,我们表明,出站地址在2020年1月由CAIDA的Ark有利点收集的互联网范围的traceroute数据集中很常见,占在traceroute结束前某个时间点看到的地址的1.7% - 5.8%。这种现象会导致Internet拓扑分析中的错误,例如推断路由器所有权和识别域间链路。我们假设出站地址的主要贡献者是第3层虚拟专用网络(L3VPN),并提出vrfinder,一种在traceroute集合中识别L3VPN出站地址的技术。我们根据两个大型研究和教育网络的地面事实验证了vrfinder,显示出高精度(100.0%)和召回率(82.1% - 95.3%)。我们还展示了通过扩展到bdrmapIT在跟踪路由分析中考虑L3VPN的好处,将其对L3VPN出站地址的路由器所有权推断的准确性从61.5% - 79.4%提高到88.9% - 95.5%。
{"title":"vrfinder: Finding Outbound Addresses in Traceroute","authors":"Alexander Marder, M. Luckie, B. Huffaker, K. Claffy","doi":"10.1145/3393691.3394227","DOIUrl":"https://doi.org/10.1145/3393691.3394227","url":null,"abstract":"Current methods to analyze the Internet's router-level topology with paths collected using traceroute assume that the source address for each router in the path is either an inbound or off-path address on each router. In this work, we show that outbound addresses are common in our Internet-wide traceroute dataset collected by CAIDA's Ark vantage points in January 2020, accounting for 1.7% - 5.8% of the addresses seen at some point before the end of a traceroute. This phenomenon can lead to mistakes in Internet topology analysis, such as inferring router ownership and identifying interdomain links. We hypothesize that the primary contributor to outbound addresses is Layer 3 Virtual Private Networks (L3VPNs), and propose vrfinder, a technique for identifying L3VPN outbound addresses in traceroute collections. We validate vrfinder against ground truth from two large research and education networks, demonstrating high precision (100.0%) and recall (82.1% - 95.3%). We also show the benefit of accounting for L3VPNs in traceroute analysis through extensions to bdrmapIT, increasing the accuracy of its router ownership inferences for L3VPN outbound addresses from 61.5% - 79.4% to 88.9% - 95.5%.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Staleness Control for Edge Data Analytics 边缘数据分析的过期控制
Atakan Aral, M. Erol-Kantarci, I. Brandić
A new generation of cyber-physical systems has emerged with a large number of devices that continuously generate and consume massive amounts of data in a distributed and mobile manner. Accurate and near real-time decisions based on such streaming data are in high demand in many areas of optimization for such systems. Edge data analytics bring processing power in the proximity of data sources, reduce the network delay for data transmission, allow large-scale distributed training, and consequently help meeting real-time requirements. Nevertheless, the multiplicity of data sources leads to multiple distributed machine learning models that may suffer from sub-optimal performance due to the inconsistency in their states. In this work, we tackle the insularity, concept drift, and connectivity issues in edge data analytics to minimize its accuracy handicap without losing its timeliness benefits. Thus, we propose an efficient model synchronization mechanism for distributed and stateful data analytics. Staleness Control for Edge Data Analytics (SCEDA) ensures the high adaptability of synchronization frequency in the face of an unpredictable environment by addressing the trade-off between the generality and timeliness of the model.
新一代的网络物理系统已经出现,大量设备以分布式和移动的方式持续生成和消耗大量数据。基于这种流数据的准确和接近实时的决策在许多优化领域都有很高的需求。边缘数据分析在数据源附近带来处理能力,减少数据传输的网络延迟,允许大规模分布式训练,从而有助于满足实时需求。然而,数据源的多样性导致多个分布式机器学习模型由于其状态的不一致而可能遭受次优性能的影响。在这项工作中,我们解决了边缘数据分析中的孤立性、概念漂移和连通性问题,以尽量减少其准确性障碍,同时又不失去其及时性优势。因此,我们提出了一种有效的模型同步机制,用于分布式和有状态数据分析。边缘数据分析的陈旧控制(SCEDA)通过解决模型的通用性和及时性之间的权衡,确保了在面对不可预测的环境时同步频率的高适应性。
{"title":"Staleness Control for Edge Data Analytics","authors":"Atakan Aral, M. Erol-Kantarci, I. Brandić","doi":"10.1145/3393691.3394219","DOIUrl":"https://doi.org/10.1145/3393691.3394219","url":null,"abstract":"A new generation of cyber-physical systems has emerged with a large number of devices that continuously generate and consume massive amounts of data in a distributed and mobile manner. Accurate and near real-time decisions based on such streaming data are in high demand in many areas of optimization for such systems. Edge data analytics bring processing power in the proximity of data sources, reduce the network delay for data transmission, allow large-scale distributed training, and consequently help meeting real-time requirements. Nevertheless, the multiplicity of data sources leads to multiple distributed machine learning models that may suffer from sub-optimal performance due to the inconsistency in their states. In this work, we tackle the insularity, concept drift, and connectivity issues in edge data analytics to minimize its accuracy handicap without losing its timeliness benefits. Thus, we propose an efficient model synchronization mechanism for distributed and stateful data analytics. Staleness Control for Edge Data Analytics (SCEDA) ensures the high adaptability of synchronization frequency in the face of an unpredictable environment by addressing the trade-off between the generality and timeliness of the model.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115844459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Characterizing Transnational Internet Performance and the Great Bottleneck of China 跨国互联网绩效特征与中国的大瓶颈
Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. A. Halderman, Haixin Duan
Transnational Internet performance is an important indication of a country's level of infrastructure investment, globalization, and openness. We conduct a large-scale measurement study of transnational Internet performance in and out of 29 countries and regions,and find six countries that have surprisingly low performance. Five of them are African countries and the last is mainland China, a significant outlier with major discrepancies between down stream and upstream performance. We then conduct a comprehensive investigation of the unusual transnational Internet performance of mainland China, which we refer to as the "Great Bottleneck of China". Our results show that this bottleneck is widespread, affecting 79% of the receiver-sender pairs we measured. More than 70%of the pairs suffer from extremely slow speed (less than 1 Mbps)for more than 5 hours every day. In most tests the bottleneck appeared to be located deep inside China, suggesting poor network infrastructure to handle transnational traffic. The phenomenon has far-reaching implications for Chinese users' browsing habits as well as for the ability of foreign Internet services to reach Chinese customers.
跨国互联网绩效是衡量一个国家基础设施投资水平、全球化水平和开放程度的重要标志。我们对29个国家和地区的跨国互联网绩效进行了大规模的测量研究,发现有6个国家的绩效出奇地低。其中五个是非洲国家,最后一个是中国大陆,这是一个显著的异常值,上下游表现存在重大差异。然后,我们对中国大陆不寻常的跨国互联网表现进行了全面调查,我们称之为“中国的大瓶颈”。我们的结果表明,这种瓶颈是普遍存在的,影响了我们测量的79%的接收方-发送方对。超过70%的用户每天有超过5个小时的网速极慢(低于1mbps)。在大多数测试中,瓶颈似乎位于中国内陆深处,表明处理跨国流量的网络基础设施薄弱。这种现象对中国用户的浏览习惯以及外国互联网服务接触中国客户的能力都有着深远的影响。
{"title":"Characterizing Transnational Internet Performance and the Great Bottleneck of China","authors":"Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. A. Halderman, Haixin Duan","doi":"10.1145/3393691.3394180","DOIUrl":"https://doi.org/10.1145/3393691.3394180","url":null,"abstract":"Transnational Internet performance is an important indication of a country's level of infrastructure investment, globalization, and openness. We conduct a large-scale measurement study of transnational Internet performance in and out of 29 countries and regions,and find six countries that have surprisingly low performance. Five of them are African countries and the last is mainland China, a significant outlier with major discrepancies between down stream and upstream performance. We then conduct a comprehensive investigation of the unusual transnational Internet performance of mainland China, which we refer to as the \"Great Bottleneck of China\". Our results show that this bottleneck is widespread, affecting 79% of the receiver-sender pairs we measured. More than 70%of the pairs suffer from extremely slow speed (less than 1 Mbps)for more than 5 hours every day. In most tests the bottleneck appeared to be located deep inside China, suggesting poor network infrastructure to handle transnational traffic. The phenomenon has far-reaching implications for Chinese users' browsing habits as well as for the ability of foreign Internet services to reach Chinese customers.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124746148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mean Field Analysis of Join-Below-Threshold Load Balancing for Resource Sharing Servers 资源共享服务器连接低于阈值负载均衡的平均场分析
I. Horváth, Ziv Scully, B. Van Houdt
Load balancing plays a crucial role in many large scale computer systems. Much prior work has focused on systems with First-Come-First-Served (FCFS) servers. However, servers in practical systems are more complicated. They serve multiple jobs at once, and their service rate can depend on the number of jobs in service. Motivated by this, we study load balancing for systems using Limited-Processor-Sharing (LPS). Our model has heterogeneous servers, meaning the service rate curve and multiprogramming level (limit on the number of jobs sharing the processor) differs between servers. We focus on a specific load balancing policy: Join-Below-Threshold (JBT), which associates a threshold with each server and, whenever possible, dispatches to a server which has fewer jobs than its threshold. Given this setup, we ask: how should we configure the system to optimize objectives such as mean response time? Configuring the system means choosing both a load balancing threshold and a multiprogramming level for each server. To make this question tractable, we study the many-server mean field regime. In this paper we provide a comprehensive study of JBT in the mean field regime. We begin by developing a mean field model for the case of exponentially distributed job sizes. The evolution of our model is described by a differential inclusion, which complicates its analysis. We prove that the sequence of stationary measures of the finite systems converges to the fixed point of the differential inclusion, provided a unique fixed point exists. We derive simple conditions on the service rate curves to guarantee the existence of a unique fixed point. We demonstrate that when these conditions are not satisfied, there may be multiple fixed points, meaning metastability may occur. Finally, we give a simple method for determining the optimal system configuration to minimize the mean response time and related metrics. While our theoretical results are proven for the special case of exponentially distributed job sizes, we provide evidence from simulation that the system becomes insensitive to the job size distribution in the mean field regime, suggesting our results are more generally applicable.
负载平衡在许多大型计算机系统中起着至关重要的作用。许多先前的工作都集中在使用先到先服务(FCFS)服务器的系统上。然而,实际系统中的服务器要复杂得多。它们一次服务多个任务,其服务率取决于正在服务的任务的数量。基于此,我们研究了使用有限处理器共享(LPS)的系统的负载平衡。我们的模型具有异构服务器,这意味着服务器之间的服务速率曲线和多道编程级别(对共享处理器的作业数量的限制)不同。我们将重点关注一个特定的负载平衡策略:低于阈值的连接(Join-Below-Threshold, JBT),它将一个阈值与每台服务器关联起来,并在可能的情况下,将任务分派到作业少于其阈值的服务器。考虑到这种设置,我们会问:我们应该如何配置系统以优化平均响应时间等目标?配置系统意味着为每个服务器选择负载平衡阈值和多编程级别。为了使这个问题易于处理,我们研究了多服务器平均字段制度。在本文中,我们提供了一个全面的研究在平均场制度的JBT。我们首先为工作规模呈指数分布的情况建立一个平均场模型。我们的模型的演变是用微分包含来描述的,这使分析变得复杂。在存在唯一不动点的条件下,证明了有限系统的平稳测度序列收敛于微分包含的不动点。给出了服务率曲线存在唯一不动点的简单条件。我们证明当这些条件不满足时,可能存在多个不动点,这意味着可能发生亚稳态。最后,我们给出了一种确定最佳系统配置的简单方法,以最小化平均响应时间和相关指标。虽然我们的理论结果被证明适用于指数分布作业规模的特殊情况,但我们从模拟中提供的证据表明,系统对平均场制度下的作业规模分布不敏感,这表明我们的结果更普遍适用。
{"title":"Mean Field Analysis of Join-Below-Threshold Load Balancing for Resource Sharing Servers","authors":"I. Horváth, Ziv Scully, B. Van Houdt","doi":"10.1145/3393691.3394199","DOIUrl":"https://doi.org/10.1145/3393691.3394199","url":null,"abstract":"Load balancing plays a crucial role in many large scale computer systems. Much prior work has focused on systems with First-Come-First-Served (FCFS) servers. However, servers in practical systems are more complicated. They serve multiple jobs at once, and their service rate can depend on the number of jobs in service. Motivated by this, we study load balancing for systems using Limited-Processor-Sharing (LPS). Our model has heterogeneous servers, meaning the service rate curve and multiprogramming level (limit on the number of jobs sharing the processor) differs between servers. We focus on a specific load balancing policy: Join-Below-Threshold (JBT), which associates a threshold with each server and, whenever possible, dispatches to a server which has fewer jobs than its threshold. Given this setup, we ask: how should we configure the system to optimize objectives such as mean response time? Configuring the system means choosing both a load balancing threshold and a multiprogramming level for each server. To make this question tractable, we study the many-server mean field regime. In this paper we provide a comprehensive study of JBT in the mean field regime. We begin by developing a mean field model for the case of exponentially distributed job sizes. The evolution of our model is described by a differential inclusion, which complicates its analysis. We prove that the sequence of stationary measures of the finite systems converges to the fixed point of the differential inclusion, provided a unique fixed point exists. We derive simple conditions on the service rate curves to guarantee the existence of a unique fixed point. We demonstrate that when these conditions are not satisfied, there may be multiple fixed points, meaning metastability may occur. Finally, we give a simple method for determining the optimal system configuration to minimize the mean response time and related metrics. While our theoretical results are proven for the special case of exponentially distributed job sizes, we provide evidence from simulation that the system becomes insensitive to the job size distribution in the mean field regime, suggesting our results are more generally applicable.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121870246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Analysis of a Multipartite Entanglement Distribution Switch 多部缠结配电开关的分析
P. Nain, Gayane Vardoyan, S. Guha, D. Towsley
We study a quantum switch that distributes maximally entangled multipartite states to sets of users. The entanglement switching process requires two steps: first, each user attempts to generate bipartite entanglement between itself and the switch; and second, the switch performs local operations and a measurement to create multipartite entanglement for a set of users. In this work, we study a simple variant of this system, wherein the switch has infinite memory and the links that connect the users to the switch are identical. Further, we assume that all quantum states, if generated successfully, have perfect fidelity and that decoherence is negligible. This problem formulation is of interest to several distributed quantum applications, while the technical aspects of this work result in new contributions within queueing theory. Via extensive use of Lyapunov functions, we derive necessary and sufficient conditions for the stability of the system and closed-form expressions for the switch capacity and the expected number of qubits in memory.
研究了一种将最大纠缠态分配给用户集的量子交换机。纠缠切换过程需要两步:首先,每个用户尝试在自身与开关之间产生二部纠缠;其次,交换机执行本地操作和测量,为一组用户创建多方纠缠。在这项工作中,我们研究了该系统的一个简单变体,其中交换机具有无限内存,连接用户到交换机的链路是相同的。此外,我们假设所有的量子态,如果成功生成,具有完美的保真度,退相干可以忽略不计。这个问题的表述对几个分布式量子应用很感兴趣,而这项工作的技术方面在排队理论中产生了新的贡献。通过广泛使用Lyapunov函数,我们导出了系统稳定性的充分必要条件,以及开关容量和内存中期望量子比特数的封闭形式表达式。
{"title":"On the Analysis of a Multipartite Entanglement Distribution Switch","authors":"P. Nain, Gayane Vardoyan, S. Guha, D. Towsley","doi":"10.1145/3393691.3394203","DOIUrl":"https://doi.org/10.1145/3393691.3394203","url":null,"abstract":"We study a quantum switch that distributes maximally entangled multipartite states to sets of users. The entanglement switching process requires two steps: first, each user attempts to generate bipartite entanglement between itself and the switch; and second, the switch performs local operations and a measurement to create multipartite entanglement for a set of users. In this work, we study a simple variant of this system, wherein the switch has infinite memory and the links that connect the users to the switch are identical. Further, we assume that all quantum states, if generated successfully, have perfect fidelity and that decoherence is negligible. This problem formulation is of interest to several distributed quantum applications, while the technical aspects of this work result in new contributions within queueing theory. Via extensive use of Lyapunov functions, we derive necessary and sufficient conditions for the stability of the system and closed-form expressions for the switch capacity and the expected number of qubits in memory.","PeriodicalId":188517,"journal":{"name":"Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1