首页 > 最新文献

2010 IEEE 30th International Conference on Distributed Computing Systems最新文献

英文 中文
A Spinning Join That Does Not Get Dizzy 一个旋转的连接,不会让人头晕
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.23
P. Frey, R. Goncalves, M. Kersten, J. Teubner
As network infrastructures with 10 Gb/s bandwidth and beyond have become pervasive and as cost advantages of large commodity-machine clusters continue to increase, research and industry strive to exploit the available processing performance for large-scale database processing tasks. In this work we look at the use of high-speed networks for distributed join processing. We propose Data Roundabout as alight weight transport layer that uses Remote Direct Memory Access (RDMA) to gain access to the throughput opportunities in modern networks. The essence of Data Roundabout is a ring shaped network in which each host stores one portion of a large database instance. We leverage the available bandwidth to (continuously) pump data through the high-speed network. Based on Data Roundabout, we demonstrate cyclo-join, which exploits the cycling flow of data to execute distributed joins. The study uses different join algorithms (hash join and sort-merge join) to expose the pitfalls and the advantages of each algorithm in the data cycling arena. The experiments show the potential of a large distributed main-memory cache glued together with RDMA into a novel distributed database architecture.
随着10gb /s及以上带宽的网络基础设施的普及,以及大型商品机器集群的成本优势不断增加,研究和行业都在努力开发大规模数据库处理任务的可用处理性能。在本文中,我们将研究高速网络对分布式连接处理的使用。我们提出数据迂回作为轻量级传输层,它使用远程直接内存访问(RDMA)来访问现代网络中的吞吐量机会。Data Roundabout的本质是一个环形网络,其中每个主机存储一个大型数据库实例的一部分。我们利用可用带宽通过高速网络(连续)泵送数据。基于Data Roundabout,我们演示了循环连接,它利用数据循环流来执行分布式连接。本研究使用不同的连接算法(散列连接和排序合并连接)来揭示数据循环领域中每种算法的缺陷和优点。实验表明,将大型分布式主存缓存与RDMA结合在一起,可以形成一种新型的分布式数据库体系结构。
{"title":"A Spinning Join That Does Not Get Dizzy","authors":"P. Frey, R. Goncalves, M. Kersten, J. Teubner","doi":"10.1109/ICDCS.2010.23","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.23","url":null,"abstract":"As network infrastructures with 10 Gb/s bandwidth and beyond have become pervasive and as cost advantages of large commodity-machine clusters continue to increase, research and industry strive to exploit the available processing performance for large-scale database processing tasks. In this work we look at the use of high-speed networks for distributed join processing. We propose Data Roundabout as alight weight transport layer that uses Remote Direct Memory Access (RDMA) to gain access to the throughput opportunities in modern networks. The essence of Data Roundabout is a ring shaped network in which each host stores one portion of a large database instance. We leverage the available bandwidth to (continuously) pump data through the high-speed network. Based on Data Roundabout, we demonstrate cyclo-join, which exploits the cycling flow of data to execute distributed joins. The study uses different join algorithms (hash join and sort-merge join) to expose the pitfalls and the advantages of each algorithm in the data cycling arena. The experiments show the potential of a large distributed main-memory cache glued together with RDMA into a novel distributed database architecture.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing 无线充电技术如何影响传感器网络的部署和路由
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.61
Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang
As wireless power charging technology emerges, some basic principles in sensor network design are changed accordingly. Existing sensor node deployment and data routing strategies cannot exploit wireless charging technology to minimize overall energy consumption. Hence, in this paper, we (a) investigate the impact of wireless charging technology on sensor network deployment and routing arrangement, (b) formalize the deployment and routing problem, (c) prove it as NP-complete, (d) develop heuristic algorithms to solve the problem, and (e) evaluate the performance of the solutions through extensive simulations. To the best of our knowledge, this is the first effort on adapting sensor network design to leverage wireless charging technology.
随着无线充电技术的出现,传感器网络设计的一些基本原则也随之改变。现有的传感器节点部署和数据路由策略无法利用无线充电技术来最小化总体能耗。因此,在本文中,我们(a)研究无线充电技术对传感器网络部署和路由安排的影响,(b)形式化部署和路由问题,(c)证明它是np完备的,(d)开发启发式算法来解决问题,(e)通过广泛的仿真来评估解决方案的性能。据我们所知,这是首次将传感器网络设计用于无线充电技术。
{"title":"How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing","authors":"Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang","doi":"10.1109/ICDCS.2010.61","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.61","url":null,"abstract":"As wireless power charging technology emerges, some basic principles in sensor network design are changed accordingly. Existing sensor node deployment and data routing strategies cannot exploit wireless charging technology to minimize overall energy consumption. Hence, in this paper, we (a) investigate the impact of wireless charging technology on sensor network deployment and routing arrangement, (b) formalize the deployment and routing problem, (c) prove it as NP-complete, (d) develop heuristic algorithms to solve the problem, and (e) evaluate the performance of the solutions through extensive simulations. To the best of our knowledge, this is the first effort on adapting sensor network design to leverage wireless charging technology.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers CacheCast:消除单源多目的传输的冗余链路流量
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.29
Piotr Srebrny, T. Plagemann, V. Goebel, A. Mauthe
Due to the lack of multicast services in the Internet, applications based on single source multiple destinations transfers such as video conferencing, IP radio, IPTV must use unicast or application layer multicast. This in turn has several well-known drawbacks. A basic insight is that this type of traffic exhibits high redundancy with temporal clustering of duplicated packets. The redundancy originates from multiple transfers of the same data chunk over the same link. We propose CacheCast-a link layer caching mechanism-that eliminates the redundant data transmissions using small caches on links. CacheCast's underlying principles are simplicity and reliability. It is a fully distributed and incrementally deployable architecture. It consists of small caches on links that act independently. A single cache removes redundant data from a packet on the link entry and recovers the data on the link exit. Thus, link caches are transparent to routers. We show through analysis and simulation that CacheCast achieves near multicast efficiency for superposition of unicast connections. We implemented CacheCast in ns-2 and show that it does not violate the current understanding of "fairness" in the Internet.
由于Internet上缺少组播服务,视频会议、IP广播、IPTV等基于单源多目的传输的应用必须使用单播或应用层组播。这反过来又有几个众所周知的缺点。一个基本的见解是,这种类型的流量表现出高冗余与重复数据包的时间聚类。冗余源于同一数据块在同一链路上的多次传输。我们提出了cachecast——一种链路层缓存机制——它利用链路上的小缓存消除了冗余数据传输。CacheCast的基本原则是简单性和可靠性。它是一个完全分布式和增量可部署的体系结构。它由独立作用的链接上的小缓存组成。单缓存可以在链路入口处去除数据包中的冗余数据,并在链路出口处恢复数据。因此,链路缓存对路由器是透明的。通过分析和仿真表明,CacheCast对于单播连接的叠加达到了接近组播的效率。我们在ns-2中实现了CacheCast,并表明它没有违反当前对互联网“公平”的理解。
{"title":"CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers","authors":"Piotr Srebrny, T. Plagemann, V. Goebel, A. Mauthe","doi":"10.1109/ICDCS.2010.29","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.29","url":null,"abstract":"Due to the lack of multicast services in the Internet, applications based on single source multiple destinations transfers such as video conferencing, IP radio, IPTV must use unicast or application layer multicast. This in turn has several well-known drawbacks. A basic insight is that this type of traffic exhibits high redundancy with temporal clustering of duplicated packets. The redundancy originates from multiple transfers of the same data chunk over the same link. We propose CacheCast-a link layer caching mechanism-that eliminates the redundant data transmissions using small caches on links. CacheCast's underlying principles are simplicity and reliability. It is a fully distributed and incrementally deployable architecture. It consists of small caches on links that act independently. A single cache removes redundant data from a packet on the link entry and recovers the data on the link exit. Thus, link caches are transparent to routers. We show through analysis and simulation that CacheCast achieves near multicast efficiency for superposition of unicast connections. We implemented CacheCast in ns-2 and show that it does not violate the current understanding of \"fairness\" in the Internet.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122579728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
P2P Streaming Capacity under Node Degree Bound 节点度约束下的P2P流容量
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.39
Shao Liu, Minghua Chen, S. Sengupta, M. Chiang, Jin Li, P. Chou
Two of the fundamental problems in peer-to-peer (P2P) streaming are as follows: what is the maximum streaming rate that can be sustained for all receivers, and what peering algorithms can achieve close to this maximum? These problems of computing and approaching the P2P streaming capacity are often challenging because of the constraints imposed on overlay topology. In this paper, we focus on the limit of P2P streaming rate under node degree bound, i.e., the number of connections a node can maintain is upper bounded. We first show that the streaming capacity problem under node degree bound is NP Complete in general. Then, for the case of node out-degree bound, through the construction of a “Bubble algorithm”, we show that the streaming capacity is at least half of that of a much less restrictive and previously studied case, where we bound the node degree in each streaming tree but not the degree across all trees. Then, for the case of node total-degree bound, we develop a “Cluster-Tree algorithm” that provides probabilistic guarantee of achieving a rate close to the maximum rate achieved under no degree bound constraint, when the node degree bound is logarithmic in network size. The effectiveness of these algorithms in approaching the capacity limit is demonstrated in simulations using uplink bandwidth statistics of Internet hosts. Both analysis and numerical experiments show that peering in a locally dense and globally sparse manner achieves near-optimal streaming rate if the degree bound is at least logarithmic in network size.
点对点(P2P)流媒体的两个基本问题如下:所有接收方能够维持的最大流媒体速率是多少,以及哪些对等算法可以达到接近这个最大值?这些计算和接近P2P流容量的问题往往是具有挑战性的,因为强加于覆盖拓扑的约束。本文主要研究P2P流速率在节点度界下的极限,即节点所能维持的连接数是上界的。首先证明了节点度界下的流容量问题一般是NP完全的。然后,对于节点度外约束的情况,通过构造一个“气泡算法”,我们证明了流容量至少是之前研究过的限制少得多的情况的一半,在这种情况下,我们绑定了每个流树中的节点度,但没有跨所有树的度。然后,对于节点总度界的情况,我们开发了一种“聚类-树算法”,该算法提供了在无度界约束下,当节点度界为网络大小的对数时,达到接近最大速率的概率保证。这些算法在接近容量限制方面的有效性在利用互联网主机上行带宽统计的仿真中得到了验证。分析和数值实验表明,当网络大小的度界至少为对数时,以局部密集和全局稀疏的方式对等传输可以获得接近最优的流速率。
{"title":"P2P Streaming Capacity under Node Degree Bound","authors":"Shao Liu, Minghua Chen, S. Sengupta, M. Chiang, Jin Li, P. Chou","doi":"10.1109/ICDCS.2010.39","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.39","url":null,"abstract":"Two of the fundamental problems in peer-to-peer (P2P) streaming are as follows: what is the maximum streaming rate that can be sustained for all receivers, and what peering algorithms can achieve close to this maximum? These problems of computing and approaching the P2P streaming capacity are often challenging because of the constraints imposed on overlay topology. In this paper, we focus on the limit of P2P streaming rate under node degree bound, i.e., the number of connections a node can maintain is upper bounded. We first show that the streaming capacity problem under node degree bound is NP Complete in general. Then, for the case of node out-degree bound, through the construction of a “Bubble algorithm”, we show that the streaming capacity is at least half of that of a much less restrictive and previously studied case, where we bound the node degree in each streaming tree but not the degree across all trees. Then, for the case of node total-degree bound, we develop a “Cluster-Tree algorithm” that provides probabilistic guarantee of achieving a rate close to the maximum rate achieved under no degree bound constraint, when the node degree bound is logarithmic in network size. The effectiveness of these algorithms in approaching the capacity limit is demonstrated in simulations using uplink bandwidth statistics of Internet hosts. Both analysis and numerical experiments show that peering in a locally dense and globally sparse manner achieves near-optimal streaming rate if the degree bound is at least logarithmic in network size.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129823430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
A New Buffer Cache Design Exploiting Both Temporal and Content Localities 一种利用时间和内容位置的新缓存设计
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.26
Jin Ren, Qing Yang
This paper presents a Least Popularly Used buffer cache algorithm to exploit both temporal locality and content locality of I/O requests. Popular data blocks are selected as reference blocks that are not only accessed frequently but also identical or similar in content to other blocks that are being accessed. Fast delta compression and decompression are used to satisfy as many I/O requests as possible using the popular reference blocks together with small deltas inside the buffer cache. The popularity of a reference block is calculated based on the statistical analysis of data contents and access frequency. A prototype LPU has been implemented as a new cache layer for Kernel Virtual Machine (KVM) on Linux system. Experimental results show LPU is effective for a variety of workloads with the maximum speed up of over 300% compared with LRU.
本文提出了一种最不常用的缓存算法来同时利用I/O请求的时间局部性和内容局部性。选择流行的数据块作为参考块,这些数据块不仅经常被访问,而且在内容上与正在被访问的其他块相同或相似。快速增量压缩和解压缩用于使用流行的参考块以及缓冲区缓存内的小增量来满足尽可能多的I/O请求。参考块的流行度是通过对数据内容和访问频率的统计分析来计算的。在Linux系统上实现了一个原型LPU,作为内核虚拟机(KVM)的一种新的缓存层。实验结果表明,LPU在各种工作负载下都是有效的,与LRU相比,最大速度提高了300%以上。
{"title":"A New Buffer Cache Design Exploiting Both Temporal and Content Localities","authors":"Jin Ren, Qing Yang","doi":"10.1109/ICDCS.2010.26","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.26","url":null,"abstract":"This paper presents a Least Popularly Used buffer cache algorithm to exploit both temporal locality and content locality of I/O requests. Popular data blocks are selected as reference blocks that are not only accessed frequently but also identical or similar in content to other blocks that are being accessed. Fast delta compression and decompression are used to satisfy as many I/O requests as possible using the popular reference blocks together with small deltas inside the buffer cache. The popularity of a reference block is calculated based on the statistical analysis of data contents and access frequency. A prototype LPU has been implemented as a new cache layer for Kernel Virtual Machine (KVM) on Linux system. Experimental results show LPU is effective for a variety of workloads with the maximum speed up of over 300% compared with LRU.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120917022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage 网络保险覆盖下的网络安全自卫投资分析
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.79
R. Pal, L. Golubchik
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important decision for Internet users is their amount of investment in self-defense mechanisms when insurance solutions are offered. In this paper, we investigate the problem of self-defense investments in the Internet, under full and partial cyber-insurance coverage models. By the term ‘self-defense investment’, we mean the monetary-cum-precautionary cost that each user needs to invest in employing risk mitigating self-defense mechanisms, given that it is fully or partially insured by the Internet insurance agencies. We propose a general mathematical framework by which co-operative and non-co-operative Internet users can decide whether or not to invest in self-defense for ensuring both, individual and social welfare. Our results show that (1) co-operation amongst users results in more efficient self-defense investments than those in a non-cooperative setting, under a full insurance coverage model and (2) partial insurance coverage motivates non-cooperative Internet users to invest more efficiently in self-defense mechanisms when compared to full insurance coverage.
个人和组织等互联网用户面临着蠕虫、病毒、僵尸网络等不同类型的流行病风险。为了降低风险的可能性,互联网用户通常会购买防病毒和反垃圾邮件软件等自我防御机制。然而,这样的软件并不能完全消除风险。最近的工作通过提出网络保险的想法来考虑剩余风险消除的问题。因此,对于网民来说,一个重要的决定是,在提供保险解决方案时,他们对自卫机制的投资金额。本文研究了网络保险全覆盖和部分覆盖模式下的网络自我防卫投资问题。所谓“自我防卫投资”,我们指的是每个用户在使用降低风险的自我防卫机制时需要投资的货币和预防性成本,假设它是由互联网保险机构全部或部分投保的。我们提出了一个通用的数学框架,通过该框架,合作和非合作的互联网用户可以决定是否投资自卫,以确保个人和社会福利。我们的研究结果表明:(1)在全保险模式下,用户之间的合作比非合作模式下的用户更有效地投资于自卫机制;(2)与全保险相比,部分保险激励非合作互联网用户更有效地投资于自卫机制。
{"title":"Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage","authors":"R. Pal, L. Golubchik","doi":"10.1109/ICDCS.2010.79","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.79","url":null,"abstract":"Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important decision for Internet users is their amount of investment in self-defense mechanisms when insurance solutions are offered. In this paper, we investigate the problem of self-defense investments in the Internet, under full and partial cyber-insurance coverage models. By the term ‘self-defense investment’, we mean the monetary-cum-precautionary cost that each user needs to invest in employing risk mitigating self-defense mechanisms, given that it is fully or partially insured by the Internet insurance agencies. We propose a general mathematical framework by which co-operative and non-co-operative Internet users can decide whether or not to invest in self-defense for ensuring both, individual and social welfare. Our results show that (1) co-operation amongst users results in more efficient self-defense investments than those in a non-cooperative setting, under a full insurance coverage model and (2) partial insurance coverage motivates non-cooperative Internet users to invest more efficiently in self-defense mechanisms when compared to full insurance coverage.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Divide and Conquer Algorithms for Publish/Subscribe Overlay Design 发布/订阅覆盖设计的分而治之算法
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.87
Chen Chen, H. Jacobsen, R. Vitenberg
Overlay network design for topic-based publish/subscribe systems is of primary importance because the overlay directly impacts the system's performance. Determining a topic-connected overlay, in which for every topic the graph induced by nodes interested in the topic is connected, is a fundamental problem. Existing algorithms for this problem suffer from three key drawbacks: (1) prohibitively high running time cost, (2) requirement of full system knowledge and centralized operation, and (3) constructing overlay from scratch. From a practical point of view, these are all significant limitations. To address these concerns, in this paper, we develop novel algorithms that efficiently solve the problem of dynamically joining two or more topic-connected overlays. Inspired from the divide-and-conquer character of our approach, we derive an algorithm that solves the original problem at a fraction (up to 1.7%) of the running time cost of alternative solutions, but at the expense of an empirically insignificant increase in the average node degree.
基于主题的发布/订阅系统的覆盖网络设计至关重要,因为覆盖直接影响系统的性能。确定一个主题连接的覆盖是一个基本问题,在这个覆盖中,对每个主题感兴趣的节点所产生的图都是连接的。现有算法存在三个主要缺陷:(1)过高的运行时间成本;(2)要求完整的系统知识和集中操作;(3)从头构建覆盖层。从实际的角度来看,这些都是明显的限制。为了解决这些问题,在本文中,我们开发了新的算法,有效地解决了动态连接两个或多个主题连接覆盖的问题。受我们方法的分而治之特性的启发,我们推导出一种算法,该算法以替代解决方案的一小部分(高达1.7%)的运行时间成本来解决原始问题,但以平均节点度的经验微不足道的增加为代价。
{"title":"Divide and Conquer Algorithms for Publish/Subscribe Overlay Design","authors":"Chen Chen, H. Jacobsen, R. Vitenberg","doi":"10.1109/ICDCS.2010.87","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.87","url":null,"abstract":"Overlay network design for topic-based publish/subscribe systems is of primary importance because the overlay directly impacts the system's performance. Determining a topic-connected overlay, in which for every topic the graph induced by nodes interested in the topic is connected, is a fundamental problem. Existing algorithms for this problem suffer from three key drawbacks: (1) prohibitively high running time cost, (2) requirement of full system knowledge and centralized operation, and (3) constructing overlay from scratch. From a practical point of view, these are all significant limitations. To address these concerns, in this paper, we develop novel algorithms that efficiently solve the problem of dynamically joining two or more topic-connected overlays. Inspired from the divide-and-conquer character of our approach, we derive an algorithm that solves the original problem at a fraction (up to 1.7%) of the running time cost of alternative solutions, but at the expense of an empirically insignificant increase in the average node degree.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132976212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing 部分信道共享的自适应抗干扰广播系统
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.25
Qi Dong, Donggang Liu
Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know such spread pattern to invest much more effort to launch attacks. However, in broadcast systems, jammers can easily find out the spread pattern by compromising some receivers. Several group-based approaches have been proposed to deal with insider jammers who can compromise receivers in broadcast systems, they can tolerate t malicious receivers as long as the system can afford 2t additional copies for each broadcast message. This paper introduces a novel jamming-resistant broadcast system that organizes receivers into multiple channel-sharing broadcast groups and isolates malicious receivers using adaptive re-grouping. By letting receivers in different groups partially share their channels, this scheme reduces the extra communication cost from 2t to (2 − ρ)t copies, where ρ is the channel sharing factor (0
无线通信特别容易受到信号干扰攻击。扩频通过将正常的窄带信号传播到更宽的频带上,迫使不知道这种传播模式的干扰者投入更多的精力来发动攻击,从而缓解了这一问题。然而,在广播系统中,干扰者可以很容易地通过破坏某些接收器来发现传播模式。已经提出了几种基于组的方法来处理可以危害广播系统中的接收器的内部干扰者,只要系统能够为每个广播消息提供2t额外副本,他们就可以容忍恶意接收器。本文介绍了一种新的抗干扰广播系统,该系统将接收机组织成多个信道共享广播组,并利用自适应重分组隔离恶意接收机。通过让不同组中的接收器部分共享其信道,该方案将额外的通信成本从2t降低到(2−ρ)t拷贝,其中ρ为信道共享因子(0)
{"title":"Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing","authors":"Qi Dong, Donggang Liu","doi":"10.1109/ICDCS.2010.25","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.25","url":null,"abstract":"Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know such spread pattern to invest much more effort to launch attacks. However, in broadcast systems, jammers can easily find out the spread pattern by compromising some receivers. Several group-based approaches have been proposed to deal with insider jammers who can compromise receivers in broadcast systems, they can tolerate t malicious receivers as long as the system can afford 2t additional copies for each broadcast message. This paper introduces a novel jamming-resistant broadcast system that organizes receivers into multiple channel-sharing broadcast groups and isolates malicious receivers using adaptive re-grouping. By letting receivers in different groups partially share their channels, this scheme reduces the extra communication cost from 2t to (2 − ρ)t copies, where ρ is the channel sharing factor (0","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining Sentomist:通过症状挖掘揭示瞬态传感器网络漏洞
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.75
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchuan Liu
Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurrency model, which frequently introduces software bugs, in particular, transient bugs. Such buggy logics may only be triggered by some occasionally interleaved events that bear implicit dependency, but can lead to fatal system failures. Unfortunately, these deeply-hidden bugs or even their symptoms can hardly be identified by state-of-the-art debugging tools, and manual identification from massive running traces can be prohibitively expensive. In this paper, we present Sentomist (Sensor application anatomist), a novel tool for identifying potential transient bugs in WSN applications. The Sentomist design is based on a key observation that transient bugs make the behaviors of a WSN system deviate from the normal, and thus outliers (i.e., abnormal behaviors) are good indicators of potential bugs. Sentomist introduces the notion of event-handling interval to systematically anatomize the long-term execution history of an event-driven WSN system into groups of intervals. It then applies a customized outlier detection algorithm to quickly identify and rank abnormal intervals. This dramatically reduces the human efforts of inspection (otherwise, we have to manually check tremendous data samples, typically with brute force inspection) and thus greatly speeds up debugging. We have implemented Sentomist based on the concurrency model of TinyOS. We apply Sentomist to test a series of representative real-life WSN applications that contain transient bugs. These bugs, though caused by complicated interactions that can hardly be predicted during the programming stage, are successfully confined by Sentomist.
无线传感器网络(WSN)应用通常是事件驱动的。虽然这些应用程序的源代码可能看起来很简单,但它们是用复杂的并发模型执行的,这经常会引入软件错误,特别是瞬态错误。这种错误的逻辑可能仅由一些偶尔交错的事件触发,这些事件具有隐式依赖性,但可能导致致命的系统故障。不幸的是,这些隐藏得很深的bug甚至它们的症状都很难被最先进的调试工具识别出来,而且从大量运行轨迹中手动识别可能会非常昂贵。在本文中,我们提出了Sentomist (Sensor application anatomist),这是一种用于识别WSN应用中潜在瞬态错误的新工具。Sentomist设计基于一个关键的观察,即瞬态错误使WSN系统的行为偏离正常,因此异常值(即异常行为)是潜在错误的良好指标。Sentomist引入了事件处理间隔的概念,将事件驱动WSN系统的长期执行历史系统地剖析为间隔组。然后应用自定义的离群值检测算法快速识别异常区间并对其进行排序。这极大地减少了人工检查的工作量(否则,我们必须手动检查大量的数据样本,通常使用暴力检查),从而大大加快了调试速度。我们基于TinyOS的并发模型实现了Sentomist。我们使用Sentomist来测试一系列包含瞬时错误的具有代表性的现实WSN应用程序。这些错误虽然是由编程阶段难以预测的复杂交互引起的,但Sentomist成功地限制了这些错误。
{"title":"Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining","authors":"Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchuan Liu","doi":"10.1109/ICDCS.2010.75","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.75","url":null,"abstract":"Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurrency model, which frequently introduces software bugs, in particular, transient bugs. Such buggy logics may only be triggered by some occasionally interleaved events that bear implicit dependency, but can lead to fatal system failures. Unfortunately, these deeply-hidden bugs or even their symptoms can hardly be identified by state-of-the-art debugging tools, and manual identification from massive running traces can be prohibitively expensive. In this paper, we present Sentomist (Sensor application anatomist), a novel tool for identifying potential transient bugs in WSN applications. The Sentomist design is based on a key observation that transient bugs make the behaviors of a WSN system deviate from the normal, and thus outliers (i.e., abnormal behaviors) are good indicators of potential bugs. Sentomist introduces the notion of event-handling interval to systematically anatomize the long-term execution history of an event-driven WSN system into groups of intervals. It then applies a customized outlier detection algorithm to quickly identify and rank abnormal intervals. This dramatically reduces the human efforts of inspection (otherwise, we have to manually check tremendous data samples, typically with brute force inspection) and thus greatly speeds up debugging. We have implemented Sentomist based on the concurrency model of TinyOS. We apply Sentomist to test a series of representative real-life WSN applications that contain transient bugs. These bugs, though caused by complicated interactions that can hardly be predicted during the programming stage, are successfully confined by Sentomist.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources 具有连接约束和资源约束的加固骨干网的部署
Pub Date : 2010-06-21 DOI: 10.1109/ICDCS.2010.94
Peng Wei, Shan Chu, Xin Wang, Yu Zhou
In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop wireless network has a big potential in enabling ubiquitous computing. However, many wireless nodes have limited capabilities, for example, sensor nodes or small handheld devices. Also, the end-to-end capacity and delay degrade significantly as the path length increases with the number of network nodes. In these scenarios, the deployment of a backbone network could potentially facilitate higher performance network communications. In this paper, we study the novel Reinforcement Back-bone Network (RBN) deployment problem considering the practical limitation in the number of available backbone nodes and enforcing backbone network connectivity. We propose an iterative and adaptive (ITA) algorithm for efficient backbone network deployment. In addition, in order to provide the performance bound, we redefine and solve the problem by implementing the Generic Algorithm. Finally, we present our simulation results under various settings and compare the performance of the proposed ITA algorithm and the generic algorithm. Our study indicates that the proposed ITA algorithm is promising for deploying a connected RBN with a limited number of available backbone nodes.
近年来,我们看到人们对通过网状无线网络进行通信的兴趣激增。特别是,在多跳无线网络上支持点对点通信在实现无处不在的计算方面具有很大的潜力。然而,许多无线节点的功能有限,例如,传感器节点或小型手持设备。此外,端到端容量和延迟也会随着路径长度的增加而显著降低。在这些场景中,骨干网的部署可能会促进更高性能的网络通信。考虑到骨干网可用节点数量的实际限制和骨干网的连通性,研究了一种新型的增强骨干网(RBN)部署问题。我们提出了一种迭代和自适应(ITA)算法,用于高效的骨干网部署。此外,为了提供性能边界,我们通过实现通用算法对问题进行了重新定义和解决。最后,我们给出了不同设置下的仿真结果,并比较了本文提出的ITA算法与通用算法的性能。我们的研究表明,提出的ITA算法有望部署具有有限数量可用骨干节点的连接RBN。
{"title":"Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources","authors":"Peng Wei, Shan Chu, Xin Wang, Yu Zhou","doi":"10.1109/ICDCS.2010.94","DOIUrl":"https://doi.org/10.1109/ICDCS.2010.94","url":null,"abstract":"In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop wireless network has a big potential in enabling ubiquitous computing. However, many wireless nodes have limited capabilities, for example, sensor nodes or small handheld devices. Also, the end-to-end capacity and delay degrade significantly as the path length increases with the number of network nodes. In these scenarios, the deployment of a backbone network could potentially facilitate higher performance network communications. In this paper, we study the novel Reinforcement Back-bone Network (RBN) deployment problem considering the practical limitation in the number of available backbone nodes and enforcing backbone network connectivity. We propose an iterative and adaptive (ITA) algorithm for efficient backbone network deployment. In addition, in order to provide the performance bound, we redefine and solve the problem by implementing the Generic Algorithm. Finally, we present our simulation results under various settings and compare the performance of the proposed ITA algorithm and the generic algorithm. Our study indicates that the proposed ITA algorithm is promising for deploying a connected RBN with a limited number of available backbone nodes.","PeriodicalId":199931,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2010 IEEE 30th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1