首页 > 最新文献

2008 The 28th International Conference on Distributed Computing Systems最新文献

英文 中文
Multi-Site Retrieval of Declustered Data 聚类数据的多站点检索
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.72
A. Tosun
Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Recently, replication based approaches were proposed to further reduce the response time. All of the replication based schemes assume that replication is done at a single site. In this paper, we consider replicated data stored at multiple sites. We formulate multi-site retrieval problem as a maximum flow problem and solve it using maximum flow techniques. We propose a low complexity online algorithm for the problem. We investigate the proposed scheme using various replication schemes, query types and query loads. Proposed scheme can easily be extended to nonuniform data and to any number of sites. Experimental results show that replication using orthogonal allocation performs the best under various settings.
集群技术通过在多个设备之间分布数据,从而通过并行I/O减少查询响应时间。最近提出了基于复制的方法来进一步缩短响应时间。所有基于复制的模式都假设复制是在单个站点上完成的。在本文中,我们考虑存储在多个站点的复制数据。我们将多站点检索问题表述为最大流量问题,并利用最大流量技术进行求解。我们提出了一种低复杂度的在线算法。我们使用各种复制方案、查询类型和查询负载来研究所提出的方案。该方案可以很容易地扩展到非均匀数据和任意数量的站点。实验结果表明,在不同的条件下,正交分配的复制效果最好。
{"title":"Multi-Site Retrieval of Declustered Data","authors":"A. Tosun","doi":"10.1109/ICDCS.2008.72","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.72","url":null,"abstract":"Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Recently, replication based approaches were proposed to further reduce the response time. All of the replication based schemes assume that replication is done at a single site. In this paper, we consider replicated data stored at multiple sites. We formulate multi-site retrieval problem as a maximum flow problem and solve it using maximum flow techniques. We propose a low complexity online algorithm for the problem. We investigate the proposed scheme using various replication schemes, query types and query loads. Proposed scheme can easily be extended to nonuniform data and to any number of sites. Experimental results show that replication using orthogonal allocation performs the best under various settings.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"62 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131038759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and Allocation 资源束:使用聚合进行统计广域资源发现和分配
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.37
Michael Cardosa, A. Chandra
Resource discovery is an important process for finding suitable nodes that satisfy application requirements in large loosely-coupled distributed systems. Besides inter-node heterogeneity, many of these systems also show a high degree of intra-node dynamism, so that selecting nodes based only on their recently observed resource capacities for scalability reasons can lead to poor deployment decisions resulting in application failures or migration overheads. In this paper, we propose the notion of a resource bundle - a representative resource usage distribution for a group of nodes with similar resource usage patterns - that employs two complementary techniques to overcome the limitations of existing techniques: resource usage histograms to provide statistical guarantees for resource capacities, and clustering-based resource aggregation to achieve scalability. Using trace-driven simulations and data analysis of a month-long Planet Lab trace, we show that resource bundles are able to provide high accuracy for statistical resource discovery (up to 56% better precision than using only recent values), while achieving high scalability (up to 55% fewer messages than a non-aggregation algorithm). We also show that resource bundles are ideally suited for identifying group-level characteristics such as finding load hot spots and estimating total group capacity (within 8% of actual values).
在大型松耦合分布式系统中,资源发现是寻找满足应用需求的合适节点的重要过程。除了节点间的异构性之外,许多这样的系统还显示出高度的节点内动态,因此,出于可伸缩性的原因,仅根据最近观察到的资源容量来选择节点,可能会导致糟糕的部署决策,从而导致应用程序失败或迁移开销。在本文中,我们提出了资源束的概念-具有相似资源使用模式的一组节点的代表性资源使用分布-它采用两种互补的技术来克服现有技术的局限性:资源使用直方图为资源容量提供统计保证,以及基于集群的资源聚合以实现可伸缩性。通过对Planet Lab长达一个月的跟踪进行跟踪驱动的模拟和数据分析,我们发现资源束能够为统计资源发现提供高精度(比仅使用最近的值提高56%的精度),同时实现高可伸缩性(比非聚合算法减少55%的消息)。我们还表明,资源包非常适合于识别组级别的特征,例如查找负载热点和估计总组容量(在实际值的8%以内)。
{"title":"Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and Allocation","authors":"Michael Cardosa, A. Chandra","doi":"10.1109/ICDCS.2008.37","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.37","url":null,"abstract":"Resource discovery is an important process for finding suitable nodes that satisfy application requirements in large loosely-coupled distributed systems. Besides inter-node heterogeneity, many of these systems also show a high degree of intra-node dynamism, so that selecting nodes based only on their recently observed resource capacities for scalability reasons can lead to poor deployment decisions resulting in application failures or migration overheads. In this paper, we propose the notion of a resource bundle - a representative resource usage distribution for a group of nodes with similar resource usage patterns - that employs two complementary techniques to overcome the limitations of existing techniques: resource usage histograms to provide statistical guarantees for resource capacities, and clustering-based resource aggregation to achieve scalability. Using trace-driven simulations and data analysis of a month-long Planet Lab trace, we show that resource bundles are able to provide high accuracy for statistical resource discovery (up to 56% better precision than using only recent values), while achieving high scalability (up to 55% fewer messages than a non-aggregation algorithm). We also show that resource bundles are ideally suited for identifying group-level characteristics such as finding load hot spots and estimating total group capacity (within 8% of actual values).","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Real-Time Detection of Clone Attacks in Wireless Sensor Networks 无线传感器网络克隆攻击的实时检测
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.55
Kai Xing, Fang Liu, Xiuzhen Cheng, D. Du
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. Previous works against clone attacks suffer from either a high communication/storage overhead or a poor detection accuracy. In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for each message by checking the enclosed fingerprint. The fingerprint generation is based on the superimposed s-disjunct code, which incurs a very light communication and computation overhead. The fingerprint verification is conducted at both the base station and the neighboring sensors, which ensures a high detection probability. The security and performance analysis indicate that our algorithm can identify clone attacks with a high detection probability at the cost of a low computation/communication/storage overhead. To our best knowledge, our scheme is the first to provide realtime detection of clone attacks in an effective and efficient way.
传感器网络安全的一个核心问题是传感器容易受到物理捕获攻击。一旦传感器被攻破,攻击者可以通过复制被攻破的节点,在整个网络中分发克隆,并开始各种内部攻击,轻松发起克隆攻击。以前针对克隆攻击的工作要么是通信/存储开销高,要么是检测精度差。在本文中,我们提出了一种检测传感器网络克隆攻击的新方案,该方案通过提取邻居特征为每个传感器计算一个社会指纹,并通过检查所包含的指纹来验证每个消息的发起者的合法性。指纹生成是基于叠加的s- disjunt代码,产生的通信和计算开销非常小。指纹验证在基站和相邻传感器上同时进行,保证了较高的检测概率。安全性和性能分析表明,该算法能够以较低的计算/通信/存储开销为代价,以较高的检测概率识别克隆攻击。据我们所知,我们的方案是第一个以有效和高效的方式提供克隆攻击的实时检测。
{"title":"Real-Time Detection of Clone Attacks in Wireless Sensor Networks","authors":"Kai Xing, Fang Liu, Xiuzhen Cheng, D. Du","doi":"10.1109/ICDCS.2008.55","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.55","url":null,"abstract":"A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. Previous works against clone attacks suffer from either a high communication/storage overhead or a poor detection accuracy. In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for each message by checking the enclosed fingerprint. The fingerprint generation is based on the superimposed s-disjunct code, which incurs a very light communication and computation overhead. The fingerprint verification is conducted at both the base station and the neighboring sensors, which ensures a high detection probability. The security and performance analysis indicate that our algorithm can identify clone attacks with a high detection probability at the cost of a low computation/communication/storage overhead. To our best knowledge, our scheme is the first to provide realtime detection of clone attacks in an effective and efficient way.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125630479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 191
Peer-to-Peer File Sharing Based on Network Coding 基于网络编码的对等文件共享
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.52
Min Yang, Yuanyuan Yang
Network coding is a promising enhancement of routing to improve network throughput and provide high reliability. It allows a node to generate output messages by encoding its received messages. Peer-to-peer networks are a perfect place to apply network coding due to two reasons: the topology of a peer-to-peer network is constructed arbitrarily, thus it is easy to tailor the topology to facilitate network coding; the nodes in a peer-to-peer network are end hosts which can perform more complex operations such as decoding and encoding than simply storing and forwarding messages. In this paper, we propose a scheme to apply network coding to peer-to-peer file sharing which employs a peer-to-peer network to distribute files resided in a web server or a file server. The scheme exploits a special type of network topology called combination network. It is proved that combination networks can achieve unbounded network coding gain measured by the ratio of network throughput with network coding to that without network coding. The scheme encodes a file into multiple messages and divides peers into multiple groups with each group responsible for relaying one of the messages. The encoding scheme is designed to satisfy the property that any subset of the messages can be used to decode the original file as long as the size of the subset is sufficiently large. To meet this requirement, we first define a deterministic linear network coding scheme which satisfies the desired property, then we connect peers in the same group to flood the corresponding message, and connect peers in different groups to distribute messages for decoding. Moreover, the scheme can be readily extended to support topology awareness to further improve system performance in terms of throughput, reliability and link stress. Our simulation results show that the new scheme can achieve 15%-20% higher throughput than Narada which does not employ network coding. In addition, it achieves good reliability and robustness to link failure or churn.
网络编码是一种很有前途的路由增强技术,可以提高网络吞吐量和提供高可靠性。它允许节点通过对接收到的消息进行编码来生成输出消息。点对点网络是应用网络编码的理想场所,原因有二:点对点网络的拓扑结构是任意构造的,因此易于调整拓扑结构以方便网络编码;点对点网络中的节点是终端主机,它可以执行更复杂的操作,如解码和编码,而不仅仅是存储和转发消息。本文提出了一种将网络编码应用于点对点文件共享的方案,该方案利用点对点网络来分发驻留在web服务器或文件服务器上的文件。该方案利用了一种称为组合网络的特殊网络拓扑类型。证明了组合网络可以实现无界的网络编码增益,用网络编码与非网络编码的网络吞吐量之比来衡量。该方案将一个文件编码成多个消息,并将对等体分成多个组,每个组负责转发其中一个消息。编码方案的设计是为了满足这样的属性:只要子集的大小足够大,消息的任何子集都可以用于解码原始文件。为了满足这一要求,我们首先定义了一种满足期望属性的确定性线性网络编码方案,然后将同一组中的对等体连接起来以淹没相应的消息,并将不同组中的对等体连接起来以分发消息进行解码。此外,该方案可以很容易地扩展到支持拓扑感知,从而进一步提高系统在吞吐量、可靠性和链路应力方面的性能。仿真结果表明,与不采用网络编码的Narada相比,该方案的吞吐量提高了15% ~ 20%。此外,该方法对链路故障或中断具有良好的可靠性和鲁棒性。
{"title":"Peer-to-Peer File Sharing Based on Network Coding","authors":"Min Yang, Yuanyuan Yang","doi":"10.1109/ICDCS.2008.52","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.52","url":null,"abstract":"Network coding is a promising enhancement of routing to improve network throughput and provide high reliability. It allows a node to generate output messages by encoding its received messages. Peer-to-peer networks are a perfect place to apply network coding due to two reasons: the topology of a peer-to-peer network is constructed arbitrarily, thus it is easy to tailor the topology to facilitate network coding; the nodes in a peer-to-peer network are end hosts which can perform more complex operations such as decoding and encoding than simply storing and forwarding messages. In this paper, we propose a scheme to apply network coding to peer-to-peer file sharing which employs a peer-to-peer network to distribute files resided in a web server or a file server. The scheme exploits a special type of network topology called combination network. It is proved that combination networks can achieve unbounded network coding gain measured by the ratio of network throughput with network coding to that without network coding. The scheme encodes a file into multiple messages and divides peers into multiple groups with each group responsible for relaying one of the messages. The encoding scheme is designed to satisfy the property that any subset of the messages can be used to decode the original file as long as the size of the subset is sufficiently large. To meet this requirement, we first define a deterministic linear network coding scheme which satisfies the desired property, then we connect peers in the same group to flood the corresponding message, and connect peers in different groups to distribute messages for decoding. Moreover, the scheme can be readily extended to support topology awareness to further improve system performance in terms of throughput, reliability and link stress. Our simulation results show that the new scheme can achieve 15%-20% higher throughput than Narada which does not employ network coding. In addition, it achieves good reliability and robustness to link failure or churn.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Deadlock-Free Fully Adaptive Routing in 2-Dimensional Tori Based on New Virtual Network Partitioning Scheme 基于虚拟网络分区新方案的二维环面无死锁全自适应路由
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.106
D. Xiang, Yi Pan, Qi Wang, Zhen Chen
A new deadlock-free fully adaptive routing algorithm is proposed for 2-dimensional tori with only two virtual channels. The deadlock avoidance technique is presented based on a new virtual network partitioning scheme. Unlike the previous virtual network partitioning schemes, the new method allows all virtual networks to share some common virtual channels. Two virtual channels should be the lower bound for fully adaptive deadlock-free routing in tori because the dimension order routing for 2-dimensional tori also needs two virtual channels. The proposed virtual network partitioning scheme can avoid all potential deadlocks and provides fully adaptive routing. Enough theoretical analyses on the proposed virtual network partitioning scheme are presented. Sufficient simulation results are presented to demonstrate the effectiveness of the proposed algorithm by comparing with the dimension-order routing, two partially adaptive routing schemes, Duato's protocol and the load-balanced routing algorithm GOAL.
针对只有两个虚拟通道的二维环面,提出了一种无死锁的全自适应路由算法。基于一种新的虚拟网络分区方案,提出了避免死锁的技术。与以往的虚拟网络分区方案不同,新方法允许所有虚拟网络共享一些公共虚拟通道。由于二维环面维序路由也需要两个虚拟通道,因此两个虚拟通道应该是环面中完全自适应无死锁路由的下界。提出的虚拟网络分区方案可以避免所有潜在的死锁,并提供完全自适应的路由。对提出的虚拟网络分区方案进行了充分的理论分析。通过与维序路由、两种部分自适应路由方案、Duato协议和负载均衡路由算法GOAL的比较,给出了充分的仿真结果,证明了该算法的有效性。
{"title":"Deadlock-Free Fully Adaptive Routing in 2-Dimensional Tori Based on New Virtual Network Partitioning Scheme","authors":"D. Xiang, Yi Pan, Qi Wang, Zhen Chen","doi":"10.1109/ICDCS.2008.106","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.106","url":null,"abstract":"A new deadlock-free fully adaptive routing algorithm is proposed for 2-dimensional tori with only two virtual channels. The deadlock avoidance technique is presented based on a new virtual network partitioning scheme. Unlike the previous virtual network partitioning schemes, the new method allows all virtual networks to share some common virtual channels. Two virtual channels should be the lower bound for fully adaptive deadlock-free routing in tori because the dimension order routing for 2-dimensional tori also needs two virtual channels. The proposed virtual network partitioning scheme can avoid all potential deadlocks and provides fully adaptive routing. Enough theoretical analyses on the proposed virtual network partitioning scheme are presented. Sufficient simulation results are presented to demonstrate the effectiveness of the proposed algorithm by comparing with the dimension-order routing, two partially adaptive routing schemes, Duato's protocol and the load-balanced routing algorithm GOAL.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121475048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Two-Phased Approximation Algorithms for Minimum CDS in Wireless Ad Hoc Networks 无线自组织网络中最小CDS的两阶段逼近算法
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.15
P. Wan, Lixin Wang, Frances F. Yao
Connected dominating set (CDS) has a wide range of applications in wireless ad hoc networks. A number of distributed algorithms for constructing a small CDS in wireless ad hoc networks have been proposed in the literature. The majority of these distributed algorithms follow a general two-phased approach. The first phase constructs a dominating set, and the second phase selects additional nodes to interconnect the nodes in the dominating set. In this paper, we prove that the approximation ratio of the two-phased algorithm in [10] is at most 7 1/3, improving upon the previous best-known approximation ratio of 7.6 due to [12]. We also propose a new two-phased approximation algorithm and prove that its approximation ratio is at most 6 7/18. Our analyses exploit an improved upper bound on the number independent points that can be packed in the neighborhood of a connected finite planar set.
连接支配集在无线自组织网络中有着广泛的应用。文献中已经提出了许多用于在无线自组织网络中构建小型CDS的分布式算法。这些分布式算法中的大多数都遵循一般的两阶段方法。第一阶段构建支配集,第二阶段选择额外的节点来连接支配集中的节点。在本文中,我们证明了[10]中两阶段算法的近似比不超过7 1/3,改进了之前最著名的近似比7.6,这是由于[12]。提出了一种新的两阶段逼近算法,并证明了其逼近比不超过6 7/18。我们的分析利用了在连通的有限平面集合的邻域中可以填充的独立点的数目的改进上界。
{"title":"Two-Phased Approximation Algorithms for Minimum CDS in Wireless Ad Hoc Networks","authors":"P. Wan, Lixin Wang, Frances F. Yao","doi":"10.1109/ICDCS.2008.15","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.15","url":null,"abstract":"Connected dominating set (CDS) has a wide range of applications in wireless ad hoc networks. A number of distributed algorithms for constructing a small CDS in wireless ad hoc networks have been proposed in the literature. The majority of these distributed algorithms follow a general two-phased approach. The first phase constructs a dominating set, and the second phase selects additional nodes to interconnect the nodes in the dominating set. In this paper, we prove that the approximation ratio of the two-phased algorithm in [10] is at most 7 1/3, improving upon the previous best-known approximation ratio of 7.6 due to [12]. We also propose a new two-phased approximation algorithm and prove that its approximation ratio is at most 6 7/18. Our analyses exploit an improved upper bound on the number independent points that can be packed in the neighborhood of a connected finite planar set.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126676974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Online Measurement of the Capacity of Multi-Tier Websites Using Hardware Performance Counters 基于硬件性能指标的多层网站容量在线测量
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.97
J. Rao, Chengzhong Xu
Understanding server capacity is crucial for system capacity planning, configuration, and QoS-aware resource management. Conventional stress testing approaches measure the server capacity in terms of application-level performance metrics like response time and throughput. They are limited in measurement accuracy and timeliness. In a multitier website, resource bottleneck often shifts between tiers as client access pattern changes. This makes the capacity measurement even more challenging. This paper presents a measurement approach based on hardware performance counter metrics. The approach uses machine learning techniques to infer application-level performance at each tier. A coordinated predictor is induced over individual tier models to estimate system-wide performance and identify the bottleneck when the system becomes overloaded. Experimental results demonstrate that this approach is able to achieve an overload prediction accuracy of higher than 90% for a priori known input traffic patterns and over 85% accuracy even for traffic causing frequent bottleneck shifting. It costs less than 0.5% runtime overhead for data collection and no more than 50 ms for each on-line decision.
了解服务器容量对于系统容量规划、配置和qos感知资源管理至关重要。传统的压力测试方法根据响应时间和吞吐量等应用程序级性能指标来测量服务器容量。它们在测量精度和及时性方面受到限制。在多层网站中,随着客户端访问模式的改变,资源瓶颈常常在层与层之间转移。这使得容量测量更具挑战性。本文提出了一种基于硬件性能指标的测量方法。该方法使用机器学习技术来推断每一层的应用程序级性能。在各个层模型上引入一个协调的预测器,以估计系统范围的性能,并在系统过载时识别瓶颈。实验结果表明,对于先验已知的输入交通模式,该方法能够实现超过90%的过载预测准确率,即使对于频繁发生瓶颈转移的交通,该方法也能够实现超过85%的过载预测准确率。数据收集的运行时开销小于0.5%,每个在线决策的开销不超过50 ms。
{"title":"Online Measurement of the Capacity of Multi-Tier Websites Using Hardware Performance Counters","authors":"J. Rao, Chengzhong Xu","doi":"10.1109/ICDCS.2008.97","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.97","url":null,"abstract":"Understanding server capacity is crucial for system capacity planning, configuration, and QoS-aware resource management. Conventional stress testing approaches measure the server capacity in terms of application-level performance metrics like response time and throughput. They are limited in measurement accuracy and timeliness. In a multitier website, resource bottleneck often shifts between tiers as client access pattern changes. This makes the capacity measurement even more challenging. This paper presents a measurement approach based on hardware performance counter metrics. The approach uses machine learning techniques to infer application-level performance at each tier. A coordinated predictor is induced over individual tier models to estimate system-wide performance and identify the bottleneck when the system becomes overloaded. Experimental results demonstrate that this approach is able to achieve an overload prediction accuracy of higher than 90% for a priori known input traffic patterns and over 85% accuracy even for traffic causing frequent bottleneck shifting. It costs less than 0.5% runtime overhead for data collection and no more than 50 ms for each on-line decision.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Quantum-Adaptive Scheduling for Multi-Core Network Processors 多核网络处理器的量子自适应调度
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.63
Yue Zhang, B. Liu, Lei Shi, Jingnan Yao, L. Bhuyan
Efficiency and effectiveness are always the emphases of a scheduler, for both link and processor scheduling. Well-known scheduling algorithms such as surplus round robin (SRR) and elastic round robin (ERR) suffer from two fold shortcomings: 1) additional pre-processing queuing delay and post-processing resequencing delay are incurred due to the lack of short-term load-balancing; 2) bursty scheduling is caused due to blind preservation of scheduling history under non-backlogged traffic. In this paper, we propose a quantum-adaptive scheduling (QAS) algorithm, which: 1) synchronizes all the quanta in a fine-grained manner and, 2) adjusts the quanta intelligently based on processor utilization. We theoretically prove that the queuing fairness bound (QFB) for QAS is one third tighter than SRR and ERR. This result approaches the optimal value as obtained in shortest queue first (SQF) algorithm, while still maintaining O(1) complexity. Trace-driven simulations show that QAS reduces average packet delay by 18%~24% while cutting down the resequencing buffer size by more than 40% compared to SRR and ERR.
无论是链路调度还是处理器调度,效率和有效性始终是调度程序的重点。众所周知的调度算法,如剩余轮询(SRR)和弹性轮询(ERR)存在两个缺点:1)由于缺乏短期负载均衡,导致预处理排队延迟和后处理重排序延迟;2)突发调度是在非积压情况下由于调度历史的盲目保存造成的。本文提出了一种量子自适应调度(QAS)算法:1)以细粒度方式同步所有量子;2)根据处理器利用率智能调整量子。我们从理论上证明了QAS的排队公平界(QFB)比SRR和ERR严格三分之一。该结果接近于最短队列优先(SQF)算法的最优值,同时仍然保持0(1)复杂度。跟踪驱动的仿真表明,与SRR和ERR相比,QAS减少了平均数据包延迟18%~24%,同时减少了40%以上的重排序缓冲区大小。
{"title":"Quantum-Adaptive Scheduling for Multi-Core Network Processors","authors":"Yue Zhang, B. Liu, Lei Shi, Jingnan Yao, L. Bhuyan","doi":"10.1109/ICDCS.2008.63","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.63","url":null,"abstract":"Efficiency and effectiveness are always the emphases of a scheduler, for both link and processor scheduling. Well-known scheduling algorithms such as surplus round robin (SRR) and elastic round robin (ERR) suffer from two fold shortcomings: 1) additional pre-processing queuing delay and post-processing resequencing delay are incurred due to the lack of short-term load-balancing; 2) bursty scheduling is caused due to blind preservation of scheduling history under non-backlogged traffic. In this paper, we propose a quantum-adaptive scheduling (QAS) algorithm, which: 1) synchronizes all the quanta in a fine-grained manner and, 2) adjusts the quanta intelligently based on processor utilization. We theoretically prove that the queuing fairness bound (QFB) for QAS is one third tighter than SRR and ERR. This result approaches the optimal value as obtained in shortest queue first (SQF) algorithm, while still maintaining O(1) complexity. Trace-driven simulations show that QAS reduces average packet delay by 18%~24% while cutting down the resequencing buffer size by more than 40% compared to SRR and ERR.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems 松耦合分布式系统中基于可访问性的资源选择
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.43
Jinoh Kim, A. Chandra, J. Weissman
Large-scale distributed systems provide an attractive scalable infrastructure for network applications. However,the loosely-coupled nature of this environment can make data access unpredictable, and in the limit, unavailable. We introduce the notion of accessibility to capture both availability and performance. An increasing number of data intensive applications require not only considerations of node computation power but also accessibility for adequate job allocations. For instance, selecting a node with intolerably slow connections can offset any benefit to running on a fast node. In this paper, we present accessibility-aware resource selection techniques by which it is possible to choose nodes that will have efficient data access to remote data sources. We show that the local data access observations collected from a node's neighbors are sufficient to characterize accessibility for that node. We then present resource selection heuristics guided by this principle, and show that they significantly out perform standard techniques. The suggested techniques are also shown to be stable even under churn despite the loss of prior observations.
大规模分布式系统为网络应用程序提供了具有吸引力的可扩展基础设施。然而,这种环境的松耦合特性可能会使数据访问不可预测,并且在一定情况下不可用。我们引入可访问性的概念来捕获可用性和性能。越来越多的数据密集型应用程序不仅需要考虑节点的计算能力,还需要考虑适当的作业分配的可访问性。例如,选择连接慢得令人难以忍受的节点可能会抵消在快速节点上运行的任何好处。在本文中,我们提出了可访问性感知资源选择技术,通过该技术可以选择对远程数据源具有有效数据访问的节点。我们表明,从节点的邻居收集的本地数据访问观察足以表征该节点的可访问性。然后,我们提出了由这一原则指导的资源选择启发式方法,并表明它们明显优于标准技术。所建议的技术也被证明是稳定的,即使在搅拌,尽管失去了先前的观察。
{"title":"Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems","authors":"Jinoh Kim, A. Chandra, J. Weissman","doi":"10.1109/ICDCS.2008.43","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.43","url":null,"abstract":"Large-scale distributed systems provide an attractive scalable infrastructure for network applications. However,the loosely-coupled nature of this environment can make data access unpredictable, and in the limit, unavailable. We introduce the notion of accessibility to capture both availability and performance. An increasing number of data intensive applications require not only considerations of node computation power but also accessibility for adequate job allocations. For instance, selecting a node with intolerably slow connections can offset any benefit to running on a fast node. In this paper, we present accessibility-aware resource selection techniques by which it is possible to choose nodes that will have efficient data access to remote data sources. We show that the local data access observations collected from a node's neighbors are sufficient to characterize accessibility for that node. We then present resource selection heuristics guided by this principle, and show that they significantly out perform standard techniques. The suggested techniques are also shown to be stable even under churn despite the loss of prior observations.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132042931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Controlled Information Sharing in Collaborative Distributed Query Processing 协同分布式查询处理中的受控信息共享
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.62
S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati
We present a simple, yet powerful, approach for the specification and enforcement of authorizations regulating data release among data holders collaborating in a distributed computation, to ensure that query processing discloses only data whose release has been explicitly authorized. Data disclosure is captured by means of profiles, associated with each data computation, that describe the information carried by the result. We also present an algorithm that, given a query plan, determines whether it can be safely executed and produces a safe execution strategy. The main advantage of our approach is its simplicity that, without impacting expressiveness, makes it nicely interoperable with current solutions for collaborative computations in distributed database systems.
我们提出了一种简单但功能强大的方法,用于规范和实施在分布式计算中协作的数据持有者之间发布数据的授权,以确保查询处理只公开已明确授权发布的数据。数据披露是通过与每个数据计算相关联的概要文件捕获的,这些概要文件描述了结果所携带的信息。我们还提出了一种算法,在给定查询计划的情况下,该算法确定查询计划是否可以安全执行,并生成安全的执行策略。我们的方法的主要优点是它的简单性,在不影响表现力的情况下,使其与分布式数据库系统中协作计算的当前解决方案很好地互操作。
{"title":"Controlled Information Sharing in Collaborative Distributed Query Processing","authors":"S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati","doi":"10.1109/ICDCS.2008.62","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.62","url":null,"abstract":"We present a simple, yet powerful, approach for the specification and enforcement of authorizations regulating data release among data holders collaborating in a distributed computation, to ensure that query processing discloses only data whose release has been explicitly authorized. Data disclosure is captured by means of profiles, associated with each data computation, that describe the information carried by the result. We also present an algorithm that, given a query plan, determines whether it can be safely executed and produces a safe execution strategy. The main advantage of our approach is its simplicity that, without impacting expressiveness, makes it nicely interoperable with current solutions for collaborative computations in distributed database systems.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
2008 The 28th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1