首页 > 最新文献

2010 29th IEEE Symposium on Reliable Distributed Systems最新文献

英文 中文
A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation 安全容错系统评估的多步仿真方法
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.53
Ruchika Mehresh, S. Upadhyaya, K. Kwiat
As new techniques of fault tolerance and security emerge, so does the need for suitable tools to evaluate them. Generally, the security of a system can be estimated and verified via logical test cases, but the performance overhead of security algorithms on a system needs to be numerically analyzed. The diversity in security methods and design of fault tolerant systems make it impossible for researchers to come up with a standard, affordable and openly available simulation tool, evaluation framework or an experimental test-bed. Therefore, researchers choose from a wide range of available modeling-based, implementation-based or simulation-based approaches in order to evaluate their designs. All of these approaches have certain merits and several drawbacks. For instance, development of a system prototype provides a more accurate system analysis but unlike simulation, it is not highly scalable. This paper presents a multi-step, simulation-based performance evaluation methodology for secure fault tolerant systems. We use a divide-and-conquer approach to model the entire secure system in a way that allows the use of different analytical tools at different levels of granularity. This evaluation procedure tries to strike a balance between the efficiency, effort, cost and accuracy of a system’s performance analysis. We demonstrate this approach in a step-by-step manner by analyzing the performance of a secure and fault tolerant system using a JAVA implementation in conjunction with the ARENA simulation.
随着新的容错和安全技术的出现,也需要合适的工具来评估它们。通常,可以通过逻辑测试用例来估计和验证系统的安全性,但是需要对系统上安全算法的性能开销进行数值分析。安全方法和容错系统设计的多样性使得研究人员不可能提出一个标准的、负担得起的、公开可用的仿真工具、评估框架或实验测试平台。因此,研究人员从各种可用的基于建模、基于实现或基于仿真的方法中进行选择,以评估他们的设计。所有这些方法都有一定的优点和一些缺点。例如,系统原型的开发提供了更准确的系统分析,但与模拟不同,它不是高度可伸缩的。本文提出了一种多步骤、基于仿真的安全容错系统性能评估方法。我们使用分而治之的方法对整个安全系统建模,这种方法允许在不同的粒度级别上使用不同的分析工具。此评估程序试图在系统性能分析的效率、努力、成本和准确性之间取得平衡。我们通过使用JAVA实现结合ARENA模拟分析安全和容错系统的性能,逐步演示这种方法。
{"title":"A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation","authors":"Ruchika Mehresh, S. Upadhyaya, K. Kwiat","doi":"10.1109/SRDS.2010.53","DOIUrl":"https://doi.org/10.1109/SRDS.2010.53","url":null,"abstract":"As new techniques of fault tolerance and security emerge, so does the need for suitable tools to evaluate them. Generally, the security of a system can be estimated and verified via logical test cases, but the performance overhead of security algorithms on a system needs to be numerically analyzed. The diversity in security methods and design of fault tolerant systems make it impossible for researchers to come up with a standard, affordable and openly available simulation tool, evaluation framework or an experimental test-bed. Therefore, researchers choose from a wide range of available modeling-based, implementation-based or simulation-based approaches in order to evaluate their designs. All of these approaches have certain merits and several drawbacks. For instance, development of a system prototype provides a more accurate system analysis but unlike simulation, it is not highly scalable. This paper presents a multi-step, simulation-based performance evaluation methodology for secure fault tolerant systems. We use a divide-and-conquer approach to model the entire secure system in a way that allows the use of different analytical tools at different levels of granularity. This evaluation procedure tries to strike a balance between the efficiency, effort, cost and accuracy of a system’s performance analysis. We demonstrate this approach in a step-by-step manner by analyzing the performance of a secure and fault tolerant system using a JAVA implementation in conjunction with the ARENA simulation.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126405750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure, Dependable, and High Performance Cloud Storage 安全、可靠、高性能的云存储
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.30
Yunqi Ye, Liangliang Xiao, I. Yen, F. Bastani
There have been works considering protocols for accessing partitioned data. Most of these works assume the local cluster based environment and their designs target atomic semantics. However, when considering widely distributed cloud storage systems, these existing protocols may not scale well. In this paper, we analyze the requirements of access protocols for storage systems based on data partitioning schemes in widely distributed cloud environments. We consider the regular semantics instead of atomic semantics to improve access efficiency. Then, we develop an access protocol following the requirements to achieve correct and efficient data accesses. Various protocols are compared experimentally and the results show that our protocol yields much better performance than the existing ones.
已经有工作考虑访问分区数据的协议。这些工作大多假设基于本地集群的环境,它们的设计目标是原子语义。然而,当考虑广泛分布的云存储系统时,这些现有协议可能无法很好地扩展。本文分析了在广泛分布的云环境下,基于数据分区方案的存储系统对访问协议的要求。我们考虑正则语义而不是原子语义来提高访问效率。在此基础上,开发了符合要求的访问协议,实现了正确、高效的数据访问。实验比较了各种协议,结果表明我们的协议比现有协议的性能要好得多。
{"title":"Secure, Dependable, and High Performance Cloud Storage","authors":"Yunqi Ye, Liangliang Xiao, I. Yen, F. Bastani","doi":"10.1109/SRDS.2010.30","DOIUrl":"https://doi.org/10.1109/SRDS.2010.30","url":null,"abstract":"There have been works considering protocols for accessing partitioned data. Most of these works assume the local cluster based environment and their designs target atomic semantics. However, when considering widely distributed cloud storage systems, these existing protocols may not scale well. In this paper, we analyze the requirements of access protocols for storage systems based on data partitioning schemes in widely distributed cloud environments. We consider the regular semantics instead of atomic semantics to improve access efficiency. Then, we develop an access protocol following the requirements to achieve correct and efficient data accesses. Various protocols are compared experimentally and the results show that our protocol yields much better performance than the existing ones.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124801131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Optimization Based Topology Control for Wireless Ad Hoc Networks to Meet QoS Requirements 基于优化的无线Ad Hoc网络拓扑控制以满足QoS要求
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.12
K. YaduKishore, Ashish Tiwari, O. Kakde
This paper proposes a technique for topology control (TC) of wireless nodes to meet Quality of Service (QoS) requirements between source and destination node pairs. The nodes are assumed to use a TDMA (Time Division Multiple Access) based MAC (Medium Access Control) layer. Given a set of QoS requirements, a set of wireless nodes and their initial positions, the goal is to find a topology of the nodes by adjusting the transmitting power, which will meet the QoS requirements under the presence of interference and at the same time minimize the energy consumed. The problem of TC is treated like an optimization problem and techniques of Linear Programming (LP) and Genetic Algorithms (GA) are used to solve it. The solution obtained after solving the optimization problem is in the form of optimal routes to be followed between each source, destination node pair. This information is used to construct the optimal topology.
提出了一种无线节点的拓扑控制技术,以满足源节点对和目的节点对之间的服务质量要求。假设节点使用基于TDMA(时分多址)的MAC(介质访问控制)层。给定一组QoS要求,一组无线节点及其初始位置,目标是通过调整发射功率找到节点的拓扑结构,使其在存在干扰的情况下满足QoS要求,同时使能量消耗最小。将TC问题看作一个优化问题,利用线性规划(LP)和遗传算法(GA)等技术对其进行求解。求解优化问题后得到的解为每个源、目的节点对之间应遵循的最优路径。该信息用于构建最优拓扑。
{"title":"Optimization Based Topology Control for Wireless Ad Hoc Networks to Meet QoS Requirements","authors":"K. YaduKishore, Ashish Tiwari, O. Kakde","doi":"10.1109/SRDS.2010.12","DOIUrl":"https://doi.org/10.1109/SRDS.2010.12","url":null,"abstract":"This paper proposes a technique for topology control (TC) of wireless nodes to meet Quality of Service (QoS) requirements between source and destination node pairs. The nodes are assumed to use a TDMA (Time Division Multiple Access) based MAC (Medium Access Control) layer. Given a set of QoS requirements, a set of wireless nodes and their initial positions, the goal is to find a topology of the nodes by adjusting the transmitting power, which will meet the QoS requirements under the presence of interference and at the same time minimize the energy consumed. The problem of TC is treated like an optimization problem and techniques of Linear Programming (LP) and Genetic Algorithms (GA) are used to solve it. The solution obtained after solving the optimization problem is in the form of optimal routes to be followed between each source, destination node pair. This information is used to construct the optimal topology.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":" 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Optimizing Traffic Signal Phase Ordering in Road Networks 路网交通信号相位排序优化研究
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.42
J. Barnes, V. Paruchuri, S. Chellappan
Traffic signals are an elementary component of all urban road networks and play a critical role in controlling the flow of vehicles. However, current road transportation systems and traffic signal implementations are very inefficient. The objective of this research is to evaluate optimal phase ordering within a signal cycles to minimize the average waiting delay and thus in turn minimizing fuel consumption and greenhouse gas (GHG) emissions. Through extensive simulation analysis, we show that by choosing optimal phase ordering, the stopped delay can be reduced by 40% per car at each signal resulting in a saving of up to 100 gallons of fuel per traffic signal each day.
交通信号是所有城市道路网络的基本组成部分,在控制车辆流量方面起着至关重要的作用。然而,目前的道路交通系统和交通信号的实现效率非常低。本研究的目的是评估信号周期内的最佳相位排序,以最小化平均等待延迟,从而最小化燃料消耗和温室气体(GHG)排放。通过广泛的仿真分析,我们表明,通过选择最优相位排序,每辆车在每个信号处的停止延迟可以减少40%,从而每天每个交通信号节省高达100加仑的燃料。
{"title":"On Optimizing Traffic Signal Phase Ordering in Road Networks","authors":"J. Barnes, V. Paruchuri, S. Chellappan","doi":"10.1109/SRDS.2010.42","DOIUrl":"https://doi.org/10.1109/SRDS.2010.42","url":null,"abstract":"Traffic signals are an elementary component of all urban road networks and play a critical role in controlling the flow of vehicles. However, current road transportation systems and traffic signal implementations are very inefficient. The objective of this research is to evaluate optimal phase ordering within a signal cycles to minimize the average waiting delay and thus in turn minimizing fuel consumption and greenhouse gas (GHG) emissions. Through extensive simulation analysis, we show that by choosing optimal phase ordering, the stopped delay can be reduced by 40% per car at each signal resulting in a saving of up to 100 gallons of fuel per traffic signal each day.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer Networks 移动点对点网络中保护隐私的服务发现
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.9
Santhosh Muthyapu, S. Madria, M. Linderman
In mobile peer-to-peer networks, proposed service discovery protocols disregard the exposure of the participating peers’ privacy details (privileged information). In these methods, the participating peers must provide their identities during the service discovery process to be authorized to utilize services. However, a peer may not be willing to reveal its privileged information until it identifies the service providing peer. So these peers face a problem, should the service requesting or the service providing peer reveal the identity first. The protocol presented in [12] solves this problem to some extent and discover the services available in the service requester’s vicinity in a single-hop time sync peers only. In this paper, we propose a privacy-preserving model based on challenged/response idea to discover the services available in the mobile peer-to-peer network even when the moving service requester and the service provider are at a multi-hop distance away. The performance studies shows that our protocol does preserve the privacy in a communication efficient way with reduced false positives in comparison to one other recently proposed protocol.
在移动对等网络中,所提出的服务发现协议忽略了参与对等的隐私细节(特权信息)的暴露。在这些方法中,参与的对等体必须在服务发现过程中提供其身份,才能获得使用服务的授权。但是,在识别提供服务的对等方之前,对等方可能不愿意透露其特权信息。因此,这些对等体面临一个问题,即服务请求或服务提供对等体应该首先揭示身份。[12]中提出的协议在一定程度上解决了这一问题,仅在单跳时间同步对等体中发现服务请求者附近可用的服务。本文提出了一种基于挑战/响应思想的隐私保护模型,用于发现移动点对点网络中服务的可用性,即使移动服务请求者和服务提供者之间存在多跳距离。性能研究表明,与最近提出的其他协议相比,我们的协议以有效的通信方式保护了隐私,减少了误报。
{"title":"PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer Networks","authors":"Santhosh Muthyapu, S. Madria, M. Linderman","doi":"10.1109/SRDS.2010.9","DOIUrl":"https://doi.org/10.1109/SRDS.2010.9","url":null,"abstract":"In mobile peer-to-peer networks, proposed service discovery protocols disregard the exposure of the participating peers’ privacy details (privileged information). In these methods, the participating peers must provide their identities during the service discovery process to be authorized to utilize services. However, a peer may not be willing to reveal its privileged information until it identifies the service providing peer. So these peers face a problem, should the service requesting or the service providing peer reveal the identity first. The protocol presented in [12] solves this problem to some extent and discover the services available in the service requester’s vicinity in a single-hop time sync peers only. In this paper, we propose a privacy-preserving model based on challenged/response idea to discover the services available in the mobile peer-to-peer network even when the moving service requester and the service provider are at a multi-hop distance away. The performance studies shows that our protocol does preserve the privacy in a communication efficient way with reduced false positives in comparison to one other recently proposed protocol.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129130048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Routing Scheme for Emerging Wireless Ad Hoc Networks 新兴无线自组织网络的自适应路由方案
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.44
Behdis Eslamnour, S. Jagannathan
Node mobility causes fading wireless channels, which in turn renders topology changes in emerging wireless ad hoc networks. In this paper, on-line estimators and Markov models are utilized to estimate fading channel conditions. Using the estimated channel conditions as well as queue occupancy, available energy and link delay, approximate dynamic programming (ADP) techniques are utilized to find dynamic routes, while solving discrete-time Hamilton-Jacobi-Bellman (HJB) equation forward-in-time for route cost in multichannel multi-interface networks. The performance of the proposed load balancing method in the presence of fading channels and the performance of the optimal route selection approach for multi-channel multi-interface wireless ad hoc network is evaluated by extensive simulations and comparing it to AODV.
节点移动性导致无线信道衰落,进而导致新兴无线自组织网络的拓扑变化。本文利用在线估计器和马尔可夫模型对衰落信道条件进行估计。在多通道多接口网络中,利用估计的信道条件以及队列占用率、可用能量和链路延迟,利用近似动态规划(ADP)技术寻找动态路由,同时求解离散时间Hamilton-Jacobi-Bellman (HJB)方程求解路由开销。通过大量的仿真并与AODV进行比较,评价了负载均衡方法在衰落信道存在下的性能和多通道多接口无线自组网中最优选路方法的性能。
{"title":"Adaptive Routing Scheme for Emerging Wireless Ad Hoc Networks","authors":"Behdis Eslamnour, S. Jagannathan","doi":"10.1109/SRDS.2010.44","DOIUrl":"https://doi.org/10.1109/SRDS.2010.44","url":null,"abstract":"Node mobility causes fading wireless channels, which in turn renders topology changes in emerging wireless ad hoc networks. In this paper, on-line estimators and Markov models are utilized to estimate fading channel conditions. Using the estimated channel conditions as well as queue occupancy, available energy and link delay, approximate dynamic programming (ADP) techniques are utilized to find dynamic routes, while solving discrete-time Hamilton-Jacobi-Bellman (HJB) equation forward-in-time for route cost in multichannel multi-interface networks. The performance of the proposed load balancing method in the presence of fading channels and the performance of the optimal route selection approach for multi-channel multi-interface wireless ad hoc network is evaluated by extensive simulations and comparing it to AODV.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks 无线传感器网络容错无碰撞数据聚合调度
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.14
A. Jhumka
Data aggregation scheduling, or converge cast, is a fundamental pattern of communication in wireless sensor networks (WSNs), where sensor nodes aggregate and relay data to a sink node. For WSN applications that require fast response time, it is imperative that the data reaches the sink as fast as possible. For such timeliness guarantees, TDMA-based scheduling can be used to assign time slots to nodes in which they can transmit messages. However, any slot assignment approach needs to be cognisant of the fact that crash failures can occur (e.g., due to battery exhaustion, defective hardware). In this paper, we study the design of such data aggregation scheduling (converge cast) protocols. We make the following contributions: (i) we identify a necessary condition to solve the converge cast problem, (ii) we introduce two versions of the converge cast problem, namely (a) a strong version, and (b) a weak version , (iii) we show that the strong converge cast problem cannot be solved, (iv) we show that deterministic weak converge cast cannot be solved in presence of crash failures, (v) we show that there is no $1$-local algorithm that solves stabilising weak converge cast in presence of crash failures, (vi) we provide a modular $d$-local algorithm that solves stabilising weak converge cast in presence of crash failures where $d$ is the network radius, and (vii) we show how specific instantiations of parameters can lead to an $d$-local algorithm that achieves more efficient stabilization. Our contributions are novel: (i) the first contribution (necessary condition) provides the theoretical basis which explains the structure of existing converge cast algorithms, and (ii) the study of converge cast in presence of crash failures has not previously been studied.
数据聚合调度是无线传感器网络(WSNs)中的一种基本通信模式,其中传感器节点将数据聚合并中继到汇聚节点。对于需要快速响应时间的WSN应用程序,必须尽可能快地将数据到达接收器。对于这种时效性保证,可以使用基于tdma的调度来为节点分配可以传输消息的时隙。然而,任何插槽分配方法都需要认识到崩溃失败可能发生的事实(例如,由于电池耗尽,硬件缺陷)。本文研究了这种数据聚合调度协议的设计。我们的贡献如下:(我)我们识别要解决的一个必要条件的收敛问题,(2)我们介绍两个版本的收敛问题,即(一)一个强大的版本,和(b)弱版本,(3)我们表明,强大的收敛问题不能解决,我们(iv)表明,确定性弱收敛不能在事故的解决故障,(v)我们表明,没有1美元——算法,解决了稳定弱收敛在崩溃的失败,(vi)我们提供了一个模块化的$d$-local算法,该算法解决了在存在崩溃故障时的稳定弱收敛投射,其中$d$是网络半径;(vii)我们展示了参数的具体实例如何导致实现更有效稳定的$d$-local算法。我们的贡献是新颖的:(i)第一个贡献(必要条件)提供了解释现有收敛投射算法结构的理论基础,(ii)在崩溃失败的情况下收敛投射的研究以前没有研究过。
{"title":"Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks","authors":"A. Jhumka","doi":"10.1109/SRDS.2010.14","DOIUrl":"https://doi.org/10.1109/SRDS.2010.14","url":null,"abstract":"Data aggregation scheduling, or converge cast, is a fundamental pattern of communication in wireless sensor networks (WSNs), where sensor nodes aggregate and relay data to a sink node. For WSN applications that require fast response time, it is imperative that the data reaches the sink as fast as possible. For such timeliness guarantees, TDMA-based scheduling can be used to assign time slots to nodes in which they can transmit messages. However, any slot assignment approach needs to be cognisant of the fact that crash failures can occur (e.g., due to battery exhaustion, defective hardware). In this paper, we study the design of such data aggregation scheduling (converge cast) protocols. We make the following contributions: (i) we identify a necessary condition to solve the converge cast problem, (ii) we introduce two versions of the converge cast problem, namely (a) a strong version, and (b) a weak version , (iii) we show that the strong converge cast problem cannot be solved, (iv) we show that deterministic weak converge cast cannot be solved in presence of crash failures, (v) we show that there is no $1$-local algorithm that solves stabilising weak converge cast in presence of crash failures, (vi) we provide a modular $d$-local algorithm that solves stabilising weak converge cast in presence of crash failures where $d$ is the network radius, and (vii) we show how specific instantiations of parameters can lead to an $d$-local algorithm that achieves more efficient stabilization. Our contributions are novel: (i) the first contribution (necessary condition) provides the theoretical basis which explains the structure of existing converge cast algorithms, and (ii) the study of converge cast in presence of crash failures has not previously been studied.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Fault-Tolerant Aggregation for Dynamic Networks 动态网络的容错聚合
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.13
Paulo Jesus, Carlos Baquero, Paulo Sérgio Almeida
Data aggregation is a fundamental building block of modern distributed systems. Averaging based approaches, commonly designated gossip-based, are an important class of aggregation algorithms as they allow all nodes to produce a result, converge to any required accuracy, and work independently from the network topology. However, existing approaches exhibit many dependability issues when used in faulty and dynamic environments. This paper extends our own technique, Flow Updating, which is immune to message loss, to operate in dynamic networks, improving its fault tolerance characteristics. Experimental results show that the novel version of Flow Updating vastly outperforms previous averaging algorithms, it self adapts to churn without requiring any periodic restart, supporting node crashes and high levels of message loss.
数据聚合是现代分布式系统的基本组成部分。基于平均的方法,通常被称为基于八卦的方法,是一类重要的聚合算法,因为它们允许所有节点产生一个结果,收敛到任何所需的精度,并且独立于网络拓扑工作。然而,现有的方法在错误的和动态的环境中使用时表现出许多可靠性问题。本文将不受消息丢失影响的流更新技术扩展到动态网络中,提高了其容错特性。实验结果表明,新版本的流更新大大优于以前的平均算法,它自己适应混乱而不需要任何周期性重启,支持节点崩溃和高水平的消息丢失。
{"title":"Fault-Tolerant Aggregation for Dynamic Networks","authors":"Paulo Jesus, Carlos Baquero, Paulo Sérgio Almeida","doi":"10.1109/SRDS.2010.13","DOIUrl":"https://doi.org/10.1109/SRDS.2010.13","url":null,"abstract":"Data aggregation is a fundamental building block of modern distributed systems. Averaging based approaches, commonly designated gossip-based, are an important class of aggregation algorithms as they allow all nodes to produce a result, converge to any required accuracy, and work independently from the network topology. However, existing approaches exhibit many dependability issues when used in faulty and dynamic environments. This paper extends our own technique, Flow Updating, which is immune to message loss, to operate in dynamic networks, improving its fault tolerance characteristics. Experimental results show that the novel version of Flow Updating vastly outperforms previous averaging algorithms, it self adapts to churn without requiring any periodic restart, supporting node crashes and high levels of message loss.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133815252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
On-Demand Recovery in Middleware Storage Systems 中间件存储系统中的按需恢复
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.31
Lásaro J. Camargos, F. Pedone, A. Pilchin, M. Wieloch
This paper presents a recovery architecture for in-memory data management systems. Recovery in such systems boils down to solving two problems: retrieving and installing the last committed image of the crashed database on a new server and replaying the updates missing from the image. We improve recovery time with a novel technique called On-Demand Recovery, which removes the need to replay all missing updates before new transactions can be accepted. We have implemented and thoroughly evaluated the technique. We show in the paper that in some cases On-Demand Recovery can reduce recovery time by more than 50%.
本文提出了一种内存数据管理系统的恢复体系结构。这种系统中的恢复归结为解决两个问题:在新服务器上检索并安装崩溃数据库的最后提交映像,并重播映像中丢失的更新。我们使用一种称为按需恢复的新技术来缩短恢复时间,该技术在接受新事务之前不需要重播所有丢失的更新。我们已经实施并彻底评估了该技术。我们在论文中表明,在某些情况下,按需恢复可以减少50%以上的恢复时间。
{"title":"On-Demand Recovery in Middleware Storage Systems","authors":"Lásaro J. Camargos, F. Pedone, A. Pilchin, M. Wieloch","doi":"10.1109/SRDS.2010.31","DOIUrl":"https://doi.org/10.1109/SRDS.2010.31","url":null,"abstract":"This paper presents a recovery architecture for in-memory data management systems. Recovery in such systems boils down to solving two problems: retrieving and installing the last committed image of the crashed database on a new server and replaying the updates missing from the image. We improve recovery time with a novel technique called On-Demand Recovery, which removes the need to replay all missing updates before new transactions can be accepted. We have implemented and thoroughly evaluated the technique. We show in the paper that in some cases On-Demand Recovery can reduce recovery time by more than 50%.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
P-Store: Genuine Partial Replication in Wide Area Networks P-Store:广域网中真正的部分复制
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.32
Nicolas Schiper, P. Sutra, F. Pedone
Partial replication is a way to increase the scalability of replicated systems: updates only need to be applied to a subset of the system's sites, thus allowing replicas to handle independent parts of the workload in parallel. In this paper, we propose P-Store, a partially replicated key-value store for wide area networks. In P-Store, each transaction T optimistically executes on one or more sites and is then certified to guarantee serializability of the execution. The certification protocol is genuine, it only involves sites that replicate data items read or written by T, and incorporates a mechanism to minimize a convoy effect. P-Store makes a thrifty use of an atomic multicast service to guarantee correctness: no messages need to be multicast during T's execution and a single message is multicast to certify T. In case T is global, that is, T's execution is distributed at different geographical locations, an extra vote phase is required. Our approach may offer better scalability than previously proposed solutions that either require multiple atomic multicast messages to execute T or are non-genuine. Experimental evaluations reveal that the convoy effect plays an important role even when one percent of the transactions are global. We also compare the scalability of our approach to a fully replicated solution when the proportion of global transactions and the number of sites vary.
部分复制是一种增加复制系统可伸缩性的方法:只需要将更新应用于系统站点的子集,从而允许副本并行处理工作负载的独立部分。在本文中,我们提出了P-Store,一种用于广域网的部分复制键值存储。在P-Store中,每个事务都在一个或多个站点上乐观地执行,然后进行认证以保证执行的可序列化性。认证协议是真实的,它只涉及复制由T读取或写入的数据项的站点,并包含最小化护送效应的机制。P-Store节俭地使用原子多播服务来保证正确性:在T执行期间不需要多播消息,只需要多播一条消息来证明T。如果T是全局的,即T的执行分布在不同的地理位置,则需要额外的投票阶段。我们的方法可能比以前提出的解决方案提供更好的可伸缩性,这些解决方案要么需要多个原子多播消息来执行T,要么是非真实的。实验评估表明,即使只有1%的交易是全球性的,护送效应也会发挥重要作用。当全局事务的比例和站点的数量发生变化时,我们还比较了我们的方法与完全复制解决方案的可伸缩性。
{"title":"P-Store: Genuine Partial Replication in Wide Area Networks","authors":"Nicolas Schiper, P. Sutra, F. Pedone","doi":"10.1109/SRDS.2010.32","DOIUrl":"https://doi.org/10.1109/SRDS.2010.32","url":null,"abstract":"Partial replication is a way to increase the scalability of replicated systems: updates only need to be applied to a subset of the system's sites, thus allowing replicas to handle independent parts of the workload in parallel. In this paper, we propose P-Store, a partially replicated key-value store for wide area networks. In P-Store, each transaction T optimistically executes on one or more sites and is then certified to guarantee serializability of the execution. The certification protocol is genuine, it only involves sites that replicate data items read or written by T, and incorporates a mechanism to minimize a convoy effect. P-Store makes a thrifty use of an atomic multicast service to guarantee correctness: no messages need to be multicast during T's execution and a single message is multicast to certify T. In case T is global, that is, T's execution is distributed at different geographical locations, an extra vote phase is required. Our approach may offer better scalability than previously proposed solutions that either require multiple atomic multicast messages to execute T or are non-genuine. Experimental evaluations reveal that the convoy effect plays an important role even when one percent of the transactions are global. We also compare the scalability of our approach to a fully replicated solution when the proportion of global transactions and the number of sites vary.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115643065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
期刊
2010 29th IEEE Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1