首页 > 最新文献

2008 The 28th International Conference on Distributed Computing Systems最新文献

英文 中文
Strong WORM 强大的虫
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.20
R. Sion
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close data proximity. This is important because existing compliance storage products and research prototypes are fundamentally vulnerable to faulty or malicious behavior, as they rely on simple enforcement primitives ill-suited for their threat model. This is hard because tamper-proof processing elements are significantly constrained in both computation ability and memory capacity - as heat dissipation concerns under tamper-resistant requirements limit their maximum allowable spatial gate-density. We achieve efficiency by (i) ensuring the secure hardware is accessed sparsely, minimizing the associated overhead for expected transaction loads, and (ii) using adaptive overhead-amortized constructs to enforce WORM semantics at the throughput rate of the storage servers ordinary processors during burst periods. With a single secure co-processor, on single-CPU commodity x86 hardware, our architecture can support over 2500 transactions per second.
我们引入了一种Write-Once Read-Many (WORM)存储系统,通过在数据附近利用可信的安全硬件,为数据保留和兼容迁移提供强有力的保证。这一点很重要,因为现有的遵从性存储产品和研究原型从根本上容易受到错误或恶意行为的攻击,因为它们依赖于不适合其威胁模型的简单强制原语。这是困难的,因为防篡改处理元件在计算能力和存储容量方面都受到很大的限制,因为在防篡改要求下的散热问题限制了它们的最大允许空间门密度。我们通过(i)确保安全硬件被稀疏地访问,最小化预期事务负载的相关开销,以及(ii)使用自适应开销平销结构在突发期间以存储服务器普通处理器的吞吐量率强制执行WORM语义来实现效率。使用单个安全协处理器,在单cpu商用x86硬件上,我们的体系结构可以支持每秒超过2500个事务。
{"title":"Strong WORM","authors":"R. Sion","doi":"10.1109/ICDCS.2008.20","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.20","url":null,"abstract":"We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close data proximity. This is important because existing compliance storage products and research prototypes are fundamentally vulnerable to faulty or malicious behavior, as they rely on simple enforcement primitives ill-suited for their threat model. This is hard because tamper-proof processing elements are significantly constrained in both computation ability and memory capacity - as heat dissipation concerns under tamper-resistant requirements limit their maximum allowable spatial gate-density. We achieve efficiency by (i) ensuring the secure hardware is accessed sparsely, minimizing the associated overhead for expected transaction loads, and (ii) using adaptive overhead-amortized constructs to enforce WORM semantics at the throughput rate of the storage servers ordinary processors during burst periods. With a single secure co-processor, on single-CPU commodity x86 hardware, our architecture can support over 2500 transactions per second.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126618374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Decentralized Routing in Nonhomogeneous Poisson Networks 非齐次泊松网络中的分散路由
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.83
Chi Zhang, Pan Li, Yuguang Fang, P. Khargonekar
In his seminal work, Jon Kleinberg considers a small-world network model consisting of a k-dimensional lattice augmented with shortcuts. Under the assumption that the probability of a shortcut being present between two nodes u and v decays as a power, d(u,v) -alpha, of the distance d(u,v) between them, Kleinberg shows that decentralized routing scheme such as greedy geographic routing is efficient if alpha=k and that there is no efficient decentralized routing algorithm if alphaneq k. The results are extended to a continuum model recently, wherein the nodes are distributed as a homogeneous Poisson point process by Franceschetti and Meester, Draief and Ganesh. In our work, we extend the result further to a more realistic model constructed from a nonhomogeneous Poisson point process, wherein each node is connected to all its neighbors within some fixed radius, as well as possessing random shortcuts to more distant nodes. More importantly, we show that in nonhomogeneous cases, the necessary and sufficient condition for greedy geographic routing to be efficient is that the probability of a shortcut being present from node u to v should be inversely proportional to the number of nodes which are closer to u than v is. We also demonstrate some applications of our results to wireless networks.
在他的开创性工作中,Jon Kleinberg考虑了一个小世界网络模型,该模型由k维晶格扩展为快捷方式。Kleinberg在假设两个节点u和v之间存在捷径的概率以它们之间距离d(u,v)的幂d(u,v) - alpha衰减的情况下,证明了当α =k时,贪婪地理路由等分散路由方案是有效的,而当α neq k时,不存在有效的分散路由算法。其中,Franceschetti和Meester, Draief和Ganesh将节点分布为齐次泊松点过程。在我们的工作中,我们将结果进一步扩展到一个由非齐次泊松点过程构建的更现实的模型,其中每个节点在某个固定半径内连接到所有邻居,并且拥有到更远节点的随机捷径。更重要的是,我们证明了在非齐次情况下,贪婪地理路由有效的充分必要条件是,从节点u到v的捷径存在的概率应该与比v更接近u的节点数成反比。我们还演示了我们的结果在无线网络中的一些应用。
{"title":"Decentralized Routing in Nonhomogeneous Poisson Networks","authors":"Chi Zhang, Pan Li, Yuguang Fang, P. Khargonekar","doi":"10.1109/ICDCS.2008.83","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.83","url":null,"abstract":"In his seminal work, Jon Kleinberg considers a small-world network model consisting of a k-dimensional lattice augmented with shortcuts. Under the assumption that the probability of a shortcut being present between two nodes u and v decays as a power, d(u,v) -alpha, of the distance d(u,v) between them, Kleinberg shows that decentralized routing scheme such as greedy geographic routing is efficient if alpha=k and that there is no efficient decentralized routing algorithm if alphaneq k. The results are extended to a continuum model recently, wherein the nodes are distributed as a homogeneous Poisson point process by Franceschetti and Meester, Draief and Ganesh. In our work, we extend the result further to a more realistic model constructed from a nonhomogeneous Poisson point process, wherein each node is connected to all its neighbors within some fixed radius, as well as possessing random shortcuts to more distant nodes. More importantly, we show that in nonhomogeneous cases, the necessary and sufficient condition for greedy geographic routing to be efficient is that the probability of a shortcut being present from node u to v should be inversely proportional to the number of nodes which are closer to u than v is. We also demonstrate some applications of our results to wireless networks.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reconfigurable Real-Time Middleware for Distributed Cyber-Physical Systems with Aperiodic Events 具有非周期事件的分布式网络物理系统的可重构实时中间件
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.96
Yuanfang Zhang, C. Gill, Chenyang Lu
Different distributed cyber-physical systems must handle a periodic and periodic events with diverse requirements. While existing real-time middleware such as real-time CORBA has shown promise as a platform for distributed systems with time constraints, it lacks flexible configuration mechanisms needed to manage end-to-end timing easily for a wide range of different cyber-physical systems with both aperiodic and periodic events. The primary contribution of this work is the design, implementation and performance evaluation of the first configurable component middleware services for admission control and load balancing of a periodic and periodic event handling in distributed cyber-physical systems. Empirical results demonstrate the need for, and the effectiveness of, our configurable component middleware approach in supporting different applications with a periodic and periodic events, and providing a flexible software platform for distributed cyber-physical systems with end-to-end timing constraints.
不同的分布式网络物理系统必须处理具有不同需求的周期性和周期性事件。虽然现有的实时中间件(如实时CORBA)已经显示出作为具有时间限制的分布式系统平台的希望,但它缺乏灵活的配置机制,无法轻松管理具有非周期性和周期性事件的各种不同网络物理系统的端到端定时。本工作的主要贡献是为分布式网络物理系统中的周期性和周期性事件处理的准入控制和负载平衡设计、实现和性能评估第一个可配置组件中间件服务。实证结果证明了我们的可配置组件中间件方法在支持具有周期性和周期性事件的不同应用程序方面的必要性和有效性,并为具有端到端时间约束的分布式网络物理系统提供了灵活的软件平台。
{"title":"Reconfigurable Real-Time Middleware for Distributed Cyber-Physical Systems with Aperiodic Events","authors":"Yuanfang Zhang, C. Gill, Chenyang Lu","doi":"10.1109/ICDCS.2008.96","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.96","url":null,"abstract":"Different distributed cyber-physical systems must handle a periodic and periodic events with diverse requirements. While existing real-time middleware such as real-time CORBA has shown promise as a platform for distributed systems with time constraints, it lacks flexible configuration mechanisms needed to manage end-to-end timing easily for a wide range of different cyber-physical systems with both aperiodic and periodic events. The primary contribution of this work is the design, implementation and performance evaluation of the first configurable component middleware services for admission control and load balancing of a periodic and periodic event handling in distributed cyber-physical systems. Empirical results demonstrate the need for, and the effectiveness of, our configurable component middleware approach in supporting different applications with a periodic and periodic events, and providing a flexible software platform for distributed cyber-physical systems with end-to-end timing constraints.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124612905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree Graphs 分布式线形图:基于任意等度图构建dht的通用框架
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.35
Yiming Zhang, Ling Liu, Dongsheng Li, Xicheng Lu
Most proposed DHTs have their unique maintenance mechanisms specific to the static graphs on which they are based. In this paper we propose distributed line graphs (DLG), a universal framework for building DHTs based on arbitrary constant-degree graphs. We prove that in a DLG-enabled, N-node DHT, the out-degree is d, the in-degree is between 1 and 2d, and the diameter is less than 2(logdN-logdN0+D0+1), where d, D0 and N0 represent the degree, diameter and number of nodes of the initial graph, respectively. The maintenance cost of DLG-enabled DHTs is O(logdN). We show the power of DLG technique by applying it to Kautz graphs to propose a new DHT scheme.
大多数建议的dht都有其独特的维护机制,特定于它们所基于的静态图。本文提出了一种基于任意等度图构建dht的通用框架——分布式线形图(distributed line graphs, DLG)。我们证明了在支持dlg的n节点DHT中,输出度为d,输入度在1 ~ 2d之间,直径小于2(logdN-logdN0+D0+1),其中d、D0和N0分别表示初始图的度、直径和节点数。支持dlg的dht的维护成本为0 (logdN)。我们通过将DLG技术应用于Kautz图来展示其强大的功能,并提出了一种新的DHT方案。
{"title":"Distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree Graphs","authors":"Yiming Zhang, Ling Liu, Dongsheng Li, Xicheng Lu","doi":"10.1109/ICDCS.2008.35","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.35","url":null,"abstract":"Most proposed DHTs have their unique maintenance mechanisms specific to the static graphs on which they are based. In this paper we propose distributed line graphs (DLG), a universal framework for building DHTs based on arbitrary constant-degree graphs. We prove that in a DLG-enabled, N-node DHT, the out-degree is d, the in-degree is between 1 and 2d, and the diameter is less than 2(log<sub>d</sub>N-log<sub>d</sub>N<sub>0</sub>+D<sub>0</sub>+1), where d, D<sub>0</sub> and N<sub>0</sub> represent the degree, diameter and number of nodes of the initial graph, respectively. The maintenance cost of DLG-enabled DHTs is O(log<sub>d</sub>N). We show the power of DLG technique by applying it to Kautz graphs to propose a new DHT scheme.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"620 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116205576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Probing Queries in Wireless Sensor Networks 无线传感器网络中的探测查询
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.28
Liqiang Pan, Ji-zhou Luo, Jianzhong Li
For queries in wireless sensor networks, empty sets may be returned as query results which could confuse users a lot and users obtain no useful information about the monitored objects from the empty sets. To solve the problem, this paper proposes methods to provide users with approximate answer sets in the case where no sensing data satisfies the query conditions. The approximate answer sets can be used not only to answer the query approximately but also to guide users to modify their queries for further probing the monitored objects. The distance between sensing data and a query and the dominating relationship between sensing data are first defined. Then, three algorithms for processing probing queries are proposed, which compute the best approximate answer sets that consist of the sensing data with the smallest distance from given queries. All the algorithms utilize the dominating relationship to reduce the amount of data transmitted in sensor networks by filtering out the unnecessary data. Experimental results on real and synthetic data sets show that the proposed algorithms have high performance and energy efficiency.
对于无线传感器网络中的查询,可能会返回空集作为查询结果,这可能会使用户感到困惑,并且用户无法从空集中获得有关被监控对象的有用信息。为了解决这个问题,本文提出了在没有感知数据满足查询条件的情况下为用户提供近似答案集的方法。近似答案集不仅可以用来近似地回答查询,还可以用来指导用户修改查询,以便进一步探测被监视对象。首先定义了感知数据与查询之间的距离以及感知数据之间的支配关系。然后,提出了三种处理探测查询的算法,它们计算由与给定查询距离最小的感知数据组成的最佳近似答案集。所有算法都利用支配关系,通过过滤掉不必要的数据来减少传感器网络中的数据传输量。在真实数据集和合成数据集上的实验结果表明,该算法具有较高的性能和能效。
{"title":"Probing Queries in Wireless Sensor Networks","authors":"Liqiang Pan, Ji-zhou Luo, Jianzhong Li","doi":"10.1109/ICDCS.2008.28","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.28","url":null,"abstract":"For queries in wireless sensor networks, empty sets may be returned as query results which could confuse users a lot and users obtain no useful information about the monitored objects from the empty sets. To solve the problem, this paper proposes methods to provide users with approximate answer sets in the case where no sensing data satisfies the query conditions. The approximate answer sets can be used not only to answer the query approximately but also to guide users to modify their queries for further probing the monitored objects. The distance between sensing data and a query and the dominating relationship between sensing data are first defined. Then, three algorithms for processing probing queries are proposed, which compute the best approximate answer sets that consist of the sensing data with the smallest distance from given queries. All the algorithms utilize the dominating relationship to reduce the amount of data transmitted in sensor networks by filtering out the unnecessary data. Experimental results on real and synthetic data sets show that the proposed algorithms have high performance and energy efficiency.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Prospect and Challenges for Network Development 网络发展的前景与挑战
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.114
Hequan Wu
Summary form only given. The development situation of telecom services is firstly reviewed in this presentation. The evolution trends of network services with IP, broadband, streaming, P2P (peer to peer) and mobility features are described. The presentation introduces the evolution direction and prospect of networks technologies especially NGI (next generation Internet) and NGN (next generation network) as well as broadband mobile IP network. The presentation also gives a brief overview of representative projects within research activities on NGI including the CNGI (China's next Internet demonstration project). Finally, the challenges that network development faced are discussed such as scalability, QoS, pervasive computing and ubiquitous networking, security issue and shortage of frequency spectrum as well as dilemma whether to do evolution or revolution strategy of network development.
只提供摘要形式。本文首先回顾了电信业务的发展现状。描述了具有IP、宽带、流、P2P和移动性特征的网络业务的发展趋势。介绍了网络技术特别是下一代互联网(NGI)和下一代网络(NGN)以及宽带移动IP网络的发展方向和前景。报告还简要介绍了NGI研究活动中的代表性项目,包括CNGI(中国下一个互联网示范项目)。最后,讨论了网络发展面临的可扩展性、QoS、普适计算和泛在网络、安全问题和频谱短缺等挑战,以及网络发展策略是演进还是革命的困境。
{"title":"Prospect and Challenges for Network Development","authors":"Hequan Wu","doi":"10.1109/ICDCS.2008.114","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.114","url":null,"abstract":"Summary form only given. The development situation of telecom services is firstly reviewed in this presentation. The evolution trends of network services with IP, broadband, streaming, P2P (peer to peer) and mobility features are described. The presentation introduces the evolution direction and prospect of networks technologies especially NGI (next generation Internet) and NGN (next generation network) as well as broadband mobile IP network. The presentation also gives a brief overview of representative projects within research activities on NGI including the CNGI (China's next Internet demonstration project). Finally, the challenges that network development faced are discussed such as scalability, QoS, pervasive computing and ubiquitous networking, security issue and shortage of frequency spectrum as well as dilemma whether to do evolution or revolution strategy of network development.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124314462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Maximum Executable Length for Detecting Text-Based Malware 检测基于文本的恶意软件的最大可执行长度分析
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.70
P. K. Manna, S. Ranka, Shigang Chen
The possibility of using purely text stream (keyboard-enterable) as carrier of malware is under-researched and often under estimated. A text attack can happen at multiple levels, from code-injection attacks at the top level to host-compromising text-based machine code at the lowest level. Since a large number of protocols are text-based, at times the servers based on those protocols use ASCII filters to allow text input only. However, simply applying ASCII filters to weed out the binary data is not enough from the security viewpoint since the assumption that malware are always binary is false. We show that although text is a subset of binary, binary malware detectors cannot always detect text malware. We analyze the MEL (maximum executable length)-based detection schemes, and make two contributions by this analysis. First, although the concept of MEL has been used in various detection schemes earlier, we are the first to provide its underlying mathematical foundation. We show that the threshold value can be calculated from the input character frequencies and that it can be tuned to control the detection sensitivity. Second, we demonstrate the effectiveness of a MEL-based text malware detector by exploiting the specific properties of text streams.
使用纯文本流(键盘可输入)作为恶意软件载体的可能性研究不足,而且往往被低估。文本攻击可以发生在多个级别,从最高级别的代码注入攻击到最低级别的基于文本的危及主机的机器码。由于大量协议是基于文本的,因此基于这些协议的服务器有时使用ASCII过滤器只允许文本输入。然而,从安全的角度来看,仅仅应用ASCII过滤器来清除二进制数据是不够的,因为恶意软件总是二进制的假设是错误的。我们表明,虽然文本是二进制的子集,但二进制恶意软件检测器不能总是检测文本恶意软件。我们分析了基于MEL(最大可执行长度)的检测方案,并通过该分析做出了两个贡献。首先,尽管MEL的概念已经在早期的各种检测方案中使用,但我们是第一个提供其底层数学基础的人。我们表明,阈值可以从输入字符频率计算,并且可以调整以控制检测灵敏度。其次,我们通过利用文本流的特定属性证明了基于mel的文本恶意软件检测器的有效性。
{"title":"Analysis of Maximum Executable Length for Detecting Text-Based Malware","authors":"P. K. Manna, S. Ranka, Shigang Chen","doi":"10.1109/ICDCS.2008.70","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.70","url":null,"abstract":"The possibility of using purely text stream (keyboard-enterable) as carrier of malware is under-researched and often under estimated. A text attack can happen at multiple levels, from code-injection attacks at the top level to host-compromising text-based machine code at the lowest level. Since a large number of protocols are text-based, at times the servers based on those protocols use ASCII filters to allow text input only. However, simply applying ASCII filters to weed out the binary data is not enough from the security viewpoint since the assumption that malware are always binary is false. We show that although text is a subset of binary, binary malware detectors cannot always detect text malware. We analyze the MEL (maximum executable length)-based detection schemes, and make two contributions by this analysis. First, although the concept of MEL has been used in various detection schemes earlier, we are the first to provide its underlying mathematical foundation. We show that the threshold value can be calculated from the input character frequencies and that it can be tuned to control the detection sensitivity. Second, we demonstrate the effectiveness of a MEL-based text malware detector by exploiting the specific properties of text streams.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability SERvartuka:状态的动态分布,以提高SIP服务器的可伸缩性
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.42
V. Balasubramaniyan, A. Acharya, M. Ahamad, M. Srivatsa, Italo Dacosta, Charles P. Wright
A growing class of applications, including VoIP, IM and presence, are enabled by the session initiation protocol (SIP). Requests in SIP typically traverse through multiple proxies. The availability of multiple proxies offers the flexibility to distribute proxy functionality across several nodes. In particular, after experimentally demonstrating that the resource consumption of maintaining state is significant, we define the problem of state distribution across multiple nodes when the goal is to increase overall call throughput. We first formulate this as an optimization problem and then derive a distributed algorithm from it. This distributed algorithm leads to the design and evaluation of SERvartuka, a more scalable SIP server that dynamically determines the number of SIP requests for which the server is stateful while delegating state maintenance for the remainder of the requests to a server further downstream. This design is in contrast to existing SIP servers that are statically configured to either be stateless or stateful and therefore result in sub-optimal call throughput. We implement SERvartuka on top of OpenSER, a commercial SIP proxy server and measure performance benefits of different server configurations. An example of our results is a 20% percent increase in call throughput when using our algorithm for a configuration of two servers in series.
越来越多的应用程序,包括VoIP、IM和在线状态,都是通过会话发起协议(SIP)实现的。SIP中的请求通常遍历多个代理。多个代理的可用性提供了跨多个节点分发代理功能的灵活性。特别是,在实验证明维护状态的资源消耗是显著的之后,当目标是增加总体调用吞吐量时,我们定义了跨多个节点的状态分布问题。我们首先将其表述为一个优化问题,然后推导出一个分布式算法。这种分布式算法导致SERvartuka的设计和评估,SERvartuka是一种更具可扩展性的SIP服务器,它动态地确定服务器处于状态的SIP请求的数量,同时将其余请求的状态维护委托给下游的服务器。这种设计与现有的SIP服务器形成对比,现有的SIP服务器被静态配置为无状态或有状态,因此会导致次优的呼叫吞吐量。我们在OpenSER(一个商业SIP代理服务器)之上实现SERvartuka,并测量不同服务器配置的性能优势。我们的结果的一个例子是,当对串联两台服务器的配置使用我们的算法时,呼叫吞吐量增加了20%。
{"title":"SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability","authors":"V. Balasubramaniyan, A. Acharya, M. Ahamad, M. Srivatsa, Italo Dacosta, Charles P. Wright","doi":"10.1109/ICDCS.2008.42","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.42","url":null,"abstract":"A growing class of applications, including VoIP, IM and presence, are enabled by the session initiation protocol (SIP). Requests in SIP typically traverse through multiple proxies. The availability of multiple proxies offers the flexibility to distribute proxy functionality across several nodes. In particular, after experimentally demonstrating that the resource consumption of maintaining state is significant, we define the problem of state distribution across multiple nodes when the goal is to increase overall call throughput. We first formulate this as an optimization problem and then derive a distributed algorithm from it. This distributed algorithm leads to the design and evaluation of SERvartuka, a more scalable SIP server that dynamically determines the number of SIP requests for which the server is stateful while delegating state maintenance for the remainder of the requests to a server further downstream. This design is in contrast to existing SIP servers that are statically configured to either be stateless or stateful and therefore result in sub-optimal call throughput. We implement SERvartuka on top of OpenSER, a commercial SIP proxy server and measure performance benefits of different server configurations. An example of our results is a 20% percent increase in call throughput when using our algorithm for a configuration of two servers in series.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Connectivity-Driven Retransmission Scheme Based On Transport Layer Readdressing 一种基于传输层重编的连接驱动重传方案
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.101
Michio Honda, J. Nakazawa, Y. Nishida, M. Kozuka, H. Tokuda
Migration between different wireless access networks often involves disconnected period, which is caused by passing an area of bad wireless coverage and potential overhead to switch the network on the network interface to connect to. The disconnected period can cause extra transmission delay due to the timer-driven retransmission behavior in the transport protocols, such as TCP and SCTP. We propose a new retransmission scheme to achieve better migration performance in SCTP, which is a newer connection-oriented and reliable transport protocol that is becoming popular. Our scheme minimizes the extra transmission delay by leveraging address reconfiguration operation in SCTP without involving other layers. It decreases the delay more than 5 seconds compared to the original SCTP when migration involves approximately ten-second disconnected period. The implementation of our scheme is already imported in FreeBSD.
不同无线接入网络之间的迁移往往涉及到断网期,这是由于要经过一个无线覆盖不好的区域,以及在网络接口上切换要连接的网络的潜在开销造成的。由于传输协议(如TCP和SCTP)中定时器驱动的重传行为,断开连接的时间段可能会导致额外的传输延迟。我们提出了一种新的重传方案,以在SCTP中实现更好的迁移性能,SCTP是一种新的面向连接的可靠传输协议,正在流行。我们的方案通过利用SCTP中的地址重新配置操作来最小化额外的传输延迟,而不涉及其他层。当迁移涉及大约10秒的断开连接期间时,与原始SCTP相比,它将延迟减少了5秒以上。我们的方案的实现已经导入到FreeBSD中。
{"title":"A Connectivity-Driven Retransmission Scheme Based On Transport Layer Readdressing","authors":"Michio Honda, J. Nakazawa, Y. Nishida, M. Kozuka, H. Tokuda","doi":"10.1109/ICDCS.2008.101","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.101","url":null,"abstract":"Migration between different wireless access networks often involves disconnected period, which is caused by passing an area of bad wireless coverage and potential overhead to switch the network on the network interface to connect to. The disconnected period can cause extra transmission delay due to the timer-driven retransmission behavior in the transport protocols, such as TCP and SCTP. We propose a new retransmission scheme to achieve better migration performance in SCTP, which is a newer connection-oriented and reliable transport protocol that is becoming popular. Our scheme minimizes the extra transmission delay by leveraging address reconfiguration operation in SCTP without involving other layers. It decreases the delay more than 5 seconds compared to the original SCTP when migration involves approximately ten-second disconnected period. The implementation of our scheme is already imported in FreeBSD.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Challenges and Future Research Directions in Large-Scale Complex Systems 大型复杂系统的挑战与未来研究方向
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.116
T. Znati
Summary form only given. Advances in networking and wireless technologies, coupled with integration of information networks and social applications, bring about unprecedented challenges, technical and non-technical, underscoring the need for insight into the capabilities of our complex distributed and networked systems. As critical as these physical and cyber infrastructures are to our lives and diverse sectors of our society, we have little rigorous knowledge for understanding their structure and dynamics. The talk will discuss challenges and future directions in how to effectively design robust and secure large-scale complex systems, so that we can engineer them to have predictable behaviors.
只提供摘要形式。网络和无线技术的进步,加上信息网络和社会应用的集成,带来了前所未有的技术和非技术挑战,强调需要深入了解我们复杂的分布式和网络化系统的能力。尽管这些物理和网络基础设施对我们的生活和社会的各个部门至关重要,但我们对它们的结构和动态知之甚少。讲座将讨论如何有效地设计健壮和安全的大规模复杂系统的挑战和未来方向,以便我们可以设计它们具有可预测的行为。
{"title":"Challenges and Future Research Directions in Large-Scale Complex Systems","authors":"T. Znati","doi":"10.1109/ICDCS.2008.116","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.116","url":null,"abstract":"Summary form only given. Advances in networking and wireless technologies, coupled with integration of information networks and social applications, bring about unprecedented challenges, technical and non-technical, underscoring the need for insight into the capabilities of our complex distributed and networked systems. As critical as these physical and cyber infrastructures are to our lives and diverse sectors of our society, we have little rigorous knowledge for understanding their structure and dynamics. The talk will discuss challenges and future directions in how to effectively design robust and secure large-scale complex systems, so that we can engineer them to have predictable behaviors.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"30 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133708153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2008 The 28th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1