首页 > 最新文献

2008 The 28th International Conference on Distributed Computing Systems最新文献

英文 中文
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control 传感器网络中对称密钥与公钥安全方案的比较:以用户访问控制为例
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.77
Haodong Wang, Bo Sheng, C. C. Tan, Qun A. Li
While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public-key based schemes have simple and clean key management, but cost more computational time. The recent progress of elliptic curve cryptography (ECC) implementation on sensors motivates us to design a public-key scheme and compare its performance with the symmetric-key counterparts. This paper builds the user access control on commercial off-the-shelf sensor devices as a case study to show that the public-key scheme can be more advantageous in terms of the memory usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing public-key based security protocols for sensor networks.
虽然对称密钥方案在传感器网络的处理时间上是有效的,但它们通常需要复杂的密钥管理,这可能会带来巨大的内存和通信开销。相反,基于公钥的方案具有简单、清晰的密钥管理,但计算时间较长。基于传感器上椭圆曲线加密(ECC)实现的最新进展促使我们设计了一种公钥方案,并将其与对称密钥方案的性能进行了比较。本文以商用传感器设备的用户访问控制为例,说明了公钥方案在内存使用、消息复杂性和安全弹性方面具有更大的优势。同时,我们的工作也为传感器网络中基于公钥的安全协议的集成和设计提供了见解。
{"title":"Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control","authors":"Haodong Wang, Bo Sheng, C. C. Tan, Qun A. Li","doi":"10.1109/ICDCS.2008.77","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.77","url":null,"abstract":"While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public-key based schemes have simple and clean key management, but cost more computational time. The recent progress of elliptic curve cryptography (ECC) implementation on sensors motivates us to design a public-key scheme and compare its performance with the symmetric-key counterparts. This paper builds the user access control on commercial off-the-shelf sensor devices as a case study to show that the public-key scheme can be more advantageous in terms of the memory usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing public-key based security protocols for sensor networks.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115351366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 135
Toward Predictive Failure Management for Distributed Stream Processing Systems 分布式流处理系统的预测性故障管理
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.34
Xiaohui Gu, S. Papadimitriou, Philip S. Yu, Shu-Ping Chang
Distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is essential for DSPSs that often require highly-available system operations. In this paper, we explore a new predictive failure management approach that employs online failure prediction to achieve more efficient failure management than previous reactive or proactive failure management approaches. We employ light-weight stream-based classification methods to perform online failure forecast. Based on the prediction results, the system can take differentiated failure preventions on abnormal components only. Our failure prediction model is tunable, which can achieve a desired tradeoff between failure penalty reduction and prevention cost based on a user-defined reward function. To achieve low-overhead online learning, we propose adaptive data stream sampling schemes to adaptively adjust measurement sampling rates based on the states of monitored components, and maintain a limited size of historical training data using reservoir sampling. We have implemented an initial prototype of the predictive failure management framework within the IBM System S distributed stream processing system. Experiment results show that our system can achieve more efficient failure management than conventional reactive and proactive approaches, while imposing low overhead to the DSPS.
分布式流处理系统在传感器数据分析、网络安全、商业智能等方面有着重要的应用。故障管理对于通常需要高可用性系统操作的dsp是必不可少的。在本文中,我们探索了一种新的预测性故障管理方法,该方法采用在线故障预测来实现比以前的被动或主动故障管理方法更有效的故障管理。我们采用轻量级的基于流的分类方法来进行在线故障预测。根据预测结果,系统可对异常部件采取差异化的故障预防措施。我们的故障预测模型是可调的,它可以基于用户自定义的奖励函数在故障惩罚减少和预防成本之间实现理想的权衡。为了实现低开销的在线学习,我们提出了自适应数据流采样方案,根据被监测组件的状态自适应调整测量采样率,并使用储层采样保持有限规模的历史训练数据。我们已经在IBM System S分布式流处理系统中实现了预测故障管理框架的初始原型。实验结果表明,与传统的被动和主动方法相比,该系统可以实现更有效的故障管理,同时降低了dsp的开销。
{"title":"Toward Predictive Failure Management for Distributed Stream Processing Systems","authors":"Xiaohui Gu, S. Papadimitriou, Philip S. Yu, Shu-Ping Chang","doi":"10.1109/ICDCS.2008.34","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.34","url":null,"abstract":"Distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is essential for DSPSs that often require highly-available system operations. In this paper, we explore a new predictive failure management approach that employs online failure prediction to achieve more efficient failure management than previous reactive or proactive failure management approaches. We employ light-weight stream-based classification methods to perform online failure forecast. Based on the prediction results, the system can take differentiated failure preventions on abnormal components only. Our failure prediction model is tunable, which can achieve a desired tradeoff between failure penalty reduction and prevention cost based on a user-defined reward function. To achieve low-overhead online learning, we propose adaptive data stream sampling schemes to adaptively adjust measurement sampling rates based on the states of monitored components, and maintain a limited size of historical training data using reservoir sampling. We have implemented an initial prototype of the predictive failure management framework within the IBM System S distributed stream processing system. Experiment results show that our system can achieve more efficient failure management than conventional reactive and proactive approaches, while imposing low overhead to the DSPS.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124824944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Fast Path Session Creation on Network Processors 在网络处理器上创建快速路径会话
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.33
Bosheng Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Y. Xue, Jun Li
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malicious intrusions. Hence session creation rate plays a key role in determining the overall performance of stateful intrusion prevention systems. In this paper, we propose a high-speed session creation scheme optimized for network processors. Main contribution includes: a) A high-performance flow classification algorithm on network processors; b) An efficient TCP three-way handshake scheme designed for fast-path processing using a two-stage intelligent hashing. Experimental results show that: a) The presented parallel optimized flow classification algorithm, Parallel Search Cross-Producting, outperforms the original Cross-Producting and Binary Search Cross-Producting algorithms with 300% and 60% increase of classification speed; b) The proposed fast path three-way handshake scheme, IntelliHash, achieves a TCP connection creation rate over 2M connections per second.
现在的安全网关不仅需要通过验证包头来阻止未经授权的访问,还需要通过检查连接状态来防御恶意入侵。因此,会话创建率是决定有状态入侵防御系统整体性能的关键因素。本文提出了一种针对网络处理器优化的高速会话创建方案。主要贡献包括:a)基于网络处理器的高性能流分类算法;b)一种高效的TCP三次握手方案,设计用于使用两阶段智能哈希的快速路径处理。实验结果表明:a)本文提出的并行优化流分类算法——并行搜索交叉生成(parallel Search cross - production)比原有的交叉生成(cross - production)和二分搜索交叉生成(Binary Search cross - production)算法的分类速度分别提高300%和60%;b)提出的快速路径三次握手方案IntelliHash实现了每秒2M以上连接的TCP连接创建速率。
{"title":"Fast Path Session Creation on Network Processors","authors":"Bosheng Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Y. Xue, Jun Li","doi":"10.1109/ICDCS.2008.33","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.33","url":null,"abstract":"The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malicious intrusions. Hence session creation rate plays a key role in determining the overall performance of stateful intrusion prevention systems. In this paper, we propose a high-speed session creation scheme optimized for network processors. Main contribution includes: a) A high-performance flow classification algorithm on network processors; b) An efficient TCP three-way handshake scheme designed for fast-path processing using a two-stage intelligent hashing. Experimental results show that: a) The presented parallel optimized flow classification algorithm, Parallel Search Cross-Producting, outperforms the original Cross-Producting and Binary Search Cross-Producting algorithms with 300% and 60% increase of classification speed; b) The proposed fast path three-way handshake scheme, IntelliHash, achieves a TCP connection creation rate over 2M connections per second.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks 移动主机对点对点数据网络的影响
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.65
Zhenyun Zhuang, Sandeep Kakumanu, Yeonsik Jeong, Raghupathy Sivakumar, Aravind Velayutham
Peer-to-peer (P2P) data networks dominate Internet traffic. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on the performance issues as experienced by the mobile host, but also study the impact on other fixed peers. Using Bit Torrent as a key example, we identify several unique problems that arise due to the design aspects of P2P networks being incompatible with typical characteristics of wireless and mobile environments. We then present a wireless P2P (wP2P) client application that is backward compatible with existing fixed peer client applications, but when used on mobile hosts can significant improve performance.
点对点(P2P)数据网络主导着互联网流量。在这项工作中,我们研究了当移动主机参与P2P网络时出现的问题。我们主要关注移动主机所经历的性能问题,但也研究对其他固定主机的影响。以Bit Torrent为例,我们确定了由于P2P网络的设计方面与无线和移动环境的典型特征不兼容而产生的几个独特问题。然后,我们提出了一个无线P2P (wP2P)客户端应用程序,它与现有的固定对等客户端应用程序向后兼容,但在移动主机上使用时可以显著提高性能。
{"title":"On the Impact of Mobile Hosts in Peer-to-Peer Data Networks","authors":"Zhenyun Zhuang, Sandeep Kakumanu, Yeonsik Jeong, Raghupathy Sivakumar, Aravind Velayutham","doi":"10.1109/ICDCS.2008.65","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.65","url":null,"abstract":"Peer-to-peer (P2P) data networks dominate Internet traffic. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on the performance issues as experienced by the mobile host, but also study the impact on other fixed peers. Using Bit Torrent as a key example, we identify several unique problems that arise due to the design aspects of P2P networks being incompatible with typical characteristics of wireless and mobile environments. We then present a wireless P2P (wP2P) client application that is backward compatible with existing fixed peer client applications, but when used on mobile hosts can significant improve performance.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131824661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Is Random Scheduling Sufficient in P2P Video Streaming? 随机调度是足够的P2P视频流?
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.103
Chao Liang, Yang Guo, Yong Liu
Peer-to-peer (P2P) has recently been employed to deliver large scale video multicast services on the Internet. Considerable efforts have been made by both academia and industry on P2P streaming design. While academia mostly focus on exploring design space to approach the theoretical performance bounds, our recent measurement study on several commercial P2P streaming systems indicates that they are able to deliver good user quality of experience with seemingly simple designs. One intriguing question remains: how elaborate should a good P2P video streaming design be? Towards answering this question, we developed and implemented several representative P2P streaming designs, ranging from theoretically proved optimal designs to straight forward "naive" designs. Through an extensive comparison study on PlanetLab, we unveil several key factors contributing to the successes of simple P2P streaming designs, including system resource index, sever capacity and chunk scheduling rule, peer download buffering and peering degree. We also identify regions where naive designs are inadequate and more elaborate designs can improve things considerably. Our study not only brings us better understandings and more insights into the operation of existing systems, it also sheds lights on the design of future systems that can achieve a good balance between the performance and the complexity.
点对点(P2P)最近被用于在互联网上提供大规模的视频多播服务。学术界和业界在P2P流媒体设计方面都做了大量的工作。虽然学术界大多专注于探索设计空间以接近理论性能界限,但我们最近对几个商业P2P流媒体系统的测量研究表明,它们能够以看似简单的设计提供良好的用户体验质量。一个有趣的问题仍然存在:一个好的P2P视频流设计应该有多复杂?为了回答这个问题,我们开发并实现了几个有代表性的P2P流设计,从理论上证明的最佳设计到直接的“幼稚”设计。通过PlanetLab的广泛对比研究,我们揭示了影响简单P2P流设计成功的几个关键因素,包括系统资源索引、服务器容量和块调度规则、对等下载缓冲和对等程度。我们还指出,在一些地区,单纯的设计是不够的,而更精细的设计可以大大改善情况。我们的研究不仅使我们对现有系统的运行有了更好的理解和更多的见解,也为未来系统的设计提供了启示,这些系统可以在性能和复杂性之间取得良好的平衡。
{"title":"Is Random Scheduling Sufficient in P2P Video Streaming?","authors":"Chao Liang, Yang Guo, Yong Liu","doi":"10.1109/ICDCS.2008.103","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.103","url":null,"abstract":"Peer-to-peer (P2P) has recently been employed to deliver large scale video multicast services on the Internet. Considerable efforts have been made by both academia and industry on P2P streaming design. While academia mostly focus on exploring design space to approach the theoretical performance bounds, our recent measurement study on several commercial P2P streaming systems indicates that they are able to deliver good user quality of experience with seemingly simple designs. One intriguing question remains: how elaborate should a good P2P video streaming design be? Towards answering this question, we developed and implemented several representative P2P streaming designs, ranging from theoretically proved optimal designs to straight forward \"naive\" designs. Through an extensive comparison study on PlanetLab, we unveil several key factors contributing to the successes of simple P2P streaming designs, including system resource index, sever capacity and chunk scheduling rule, peer download buffering and peering degree. We also identify regions where naive designs are inadequate and more elaborate designs can improve things considerably. Our study not only brings us better understandings and more insights into the operation of existing systems, it also sheds lights on the design of future systems that can achieve a good balance between the performance and the complexity.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115050098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Mobile Filtering for Error-Bounded Data Collection in Sensor Networks 传感器网络中误差有界数据采集的移动滤波
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.41
Dan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang
In wireless sensor networks, filters, which suppress data update reports within predefined error bounds, effectively reduce the traffic volume for continuous data collection. All prior filter designs, however, are stationary in the sense that each filter is attached to a specific sensor node and remains stationary over its lifetime. In this paper, we propose mobile filter, a novel design that explores migration of filters to maximize overall traffic reduction. A mobile filter moves upstream along the data collection path, with its residual size being updated according to the collected data. Intuitively, this migration extracts and relays unused filters, leading to more proactive suppressing of update reports. We start by presenting an optimal filter migration algorithm for a chain topology. The algorithm is then extended to general multi-chain and tree topologies. Extensive simulations demonstrate that, for both synthetic and real data traces, the mobile filtering scheme significantly reduces data traffic and extends network lifetime against a state-of-the-art stationary filtering scheme.
在无线传感器网络中,滤波器在预定义的误差范围内抑制数据更新报告,有效地减少了连续数据采集的流量。然而,所有先前的滤波器设计都是平稳的,因为每个滤波器都连接到特定的传感器节点,并在其生命周期内保持平稳。在本文中,我们提出了移动滤波器,一种新颖的设计,探索滤波器的迁移,以最大限度地减少整体流量。移动过滤器沿着数据收集路径向上游移动,并根据收集到的数据更新其残差大小。直观地说,这种迁移提取和转发未使用的过滤器,导致更主动地抑制更新报告。我们首先提出了一个链拓扑的最优滤波器迁移算法。然后将该算法扩展到一般的多链拓扑和树拓扑。大量的仿真表明,对于合成和真实数据跟踪,移动过滤方案显著减少数据流量,并延长网络寿命相对于最先进的静态过滤方案。
{"title":"Mobile Filtering for Error-Bounded Data Collection in Sensor Networks","authors":"Dan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang","doi":"10.1109/ICDCS.2008.41","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.41","url":null,"abstract":"In wireless sensor networks, filters, which suppress data update reports within predefined error bounds, effectively reduce the traffic volume for continuous data collection. All prior filter designs, however, are stationary in the sense that each filter is attached to a specific sensor node and remains stationary over its lifetime. In this paper, we propose mobile filter, a novel design that explores migration of filters to maximize overall traffic reduction. A mobile filter moves upstream along the data collection path, with its residual size being updated according to the collected data. Intuitively, this migration extracts and relays unused filters, leading to more proactive suppressing of update reports. We start by presenting an optimal filter migration algorithm for a chain topology. The algorithm is then extended to general multi-chain and tree topologies. Extensive simulations demonstrate that, for both synthetic and real data traces, the mobile filtering scheme significantly reduces data traffic and extends network lifetime against a state-of-the-art stationary filtering scheme.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133811753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Inbound Traffic Load Balancing in BGP Multi-homed Stub Networks BGP多归属Stub网络入方向流量负载分担
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.112
Xiaomei Liu, Li Xiao
Multihoming load balancing improves network performance by leveraging the traffic among the access links in a multi-homed network. Currently, no effective load balancing system is available to handle the inbound traffic in a BGP multi-homed stub network, where the traffic volume is unknown to the network and the route of the traffic is hard to control. In this paper, we propose ILBO, an inbound traffic load balancing mechanism to effectively balance the inbound traffic in a BGP multi-homed stub network. ILBO predicts and schedules the inbound traffic based on outbound traffic. It also provides an inbound traffic control scheme that can guarantee the successful execution of the traffic scheduling.
多归属负载均衡通过利用多归属网络中访问链路之间的流量来提高网络性能。在BGP多归属stub网络中,由于流量未知,路由难以控制,目前还没有有效的负载分担系统来处理入方向的流量。本文提出了一种入站流量负载均衡机制ILBO,用于BGP多归属存根网络中入站流量的有效均衡。日报根据出站流量预测和调度入站流量。并提供了一种入站流量控制方案,保证了流量调度的成功执行。
{"title":"Inbound Traffic Load Balancing in BGP Multi-homed Stub Networks","authors":"Xiaomei Liu, Li Xiao","doi":"10.1109/ICDCS.2008.112","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.112","url":null,"abstract":"Multihoming load balancing improves network performance by leveraging the traffic among the access links in a multi-homed network. Currently, no effective load balancing system is available to handle the inbound traffic in a BGP multi-homed stub network, where the traffic volume is unknown to the network and the route of the traffic is hard to control. In this paper, we propose ILBO, an inbound traffic load balancing mechanism to effectively balance the inbound traffic in a BGP multi-homed stub network. ILBO predicts and schedules the inbound traffic based on outbound traffic. It also provides an inbound traffic control scheme that can guarantee the successful execution of the traffic scheduling.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132099347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Compiler-Assisted Application-Level Checkpointing for MPI Programs MPI程序的编译器辅助应用程序级检查点
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.25
Xuejun Yang, Panfeng Wang, Hongyi Fu, Yunfei Du, Zhiyuan Wang, Jia Jia
Application-level checkpointing can decrease the overhead of fault tolerance by minimizing the amount of checkpoint data. However this technique requires the programmer to manually choose the critical data that should be saved. In this paper, we firstly propose a live-variable analysis method for MPI programs. Then, we provide an optimization method of data saving for application-level checkpointing based on the analysis method. Based on the theoretical foundation, we implement a source-to-source precompiler (ALEC) to automate application-level checkpointing. Finally, we evaluate the performance of five FORTRAN/MPI programs which are transformed and integrated checkpointing features by ALEC on a 512-CPU cluster system. The experimental results show that i) the application-level checkpointing based on live-variable analysis for MPI programs can efficiently reduce the amount of checkpoint data, thereby decrease the overhead of checkpoint and restart; ii) ALEC is capable of automating application-level checkpointing correctly and effectively.
应用程序级检查点可以通过最小化检查点数据量来减少容错的开销。然而,这种技术要求程序员手动选择应该保存的关键数据。本文首先提出了一种MPI程序的活变量分析方法。然后,在分析方法的基础上,提出了一种应用级检查点数据保存的优化方法。在理论基础上,我们实现了一个源到源的预编译器(ALEC)来实现应用级检查点的自动化。最后,我们在一个512 cpu的集群系统上对5个FORTRAN/MPI程序进行了性能评估,这些程序经过ALEC的转换并集成了检查点特性。实验结果表明:1)基于活变量分析的MPI程序应用级检查点可以有效地减少检查点数据量,从而降低检查点和重启的开销;ii) ALEC能够正确有效地自动化应用程序级检查点。
{"title":"Compiler-Assisted Application-Level Checkpointing for MPI Programs","authors":"Xuejun Yang, Panfeng Wang, Hongyi Fu, Yunfei Du, Zhiyuan Wang, Jia Jia","doi":"10.1109/ICDCS.2008.25","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.25","url":null,"abstract":"Application-level checkpointing can decrease the overhead of fault tolerance by minimizing the amount of checkpoint data. However this technique requires the programmer to manually choose the critical data that should be saved. In this paper, we firstly propose a live-variable analysis method for MPI programs. Then, we provide an optimization method of data saving for application-level checkpointing based on the analysis method. Based on the theoretical foundation, we implement a source-to-source precompiler (ALEC) to automate application-level checkpointing. Finally, we evaluate the performance of five FORTRAN/MPI programs which are transformed and integrated checkpointing features by ALEC on a 512-CPU cluster system. The experimental results show that i) the application-level checkpointing based on live-variable analysis for MPI programs can efficiently reduce the amount of checkpoint data, thereby decrease the overhead of checkpoint and restart; ii) ALEC is capable of automating application-level checkpointing correctly and effectively.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enabling Accurate Node Control in Randomized Duty Cycling Networks 随机占空比网络中精确节点控制的实现
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.93
Kang-Won Lee, V. Pappas, A. Tantawi
In this paper, we propose a novel duty cycling algorithm for a large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the sense that individual node's sleep/wakeup decision is influenced by the state of its neighbors. We analyze the behavior of the proposed duty cycling algorithm using a stochastic spatial process. In particular, we consider a geometric form of neighborhood dependence and a reversible Markov chain, and apply this model to analyze the behavior of the duty cycling network. We then identify a set of parameters for the reversible spatial process model, and study the steady state of the network with respect to these parameters. We report that our algorithm is scalable to a large network, and can effectively control the active node density while achieving a small variance. We also report that the social behavior of nodes has interesting and non-obvious impacts on the performance of duty cycling. Finally, we present how to set the parameters of the algorithm to obtain a desirable duty cycling behavior.
本文提出了一种适用于大规模密集无线传感器网络的新型占空比算法。该算法基于节点的社会行为,即单个节点的睡眠/唤醒决策受其邻居状态的影响。我们使用随机空间过程分析了所提出的占空比算法的行为。特别地,我们考虑了一种几何形式的邻域依赖和可逆马尔可夫链,并应用该模型分析了占空循环网络的行为。然后,我们确定了可逆空间过程模型的一组参数,并研究了网络相对于这些参数的稳态。我们报告说,我们的算法可扩展到一个大的网络,并能有效地控制活动节点密度,同时实现一个小的方差。我们还报道了节点的社会行为对占空比的性能有有趣而不明显的影响。最后,我们介绍了如何设置算法的参数以获得理想的占空比行为。
{"title":"Enabling Accurate Node Control in Randomized Duty Cycling Networks","authors":"Kang-Won Lee, V. Pappas, A. Tantawi","doi":"10.1109/ICDCS.2008.93","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.93","url":null,"abstract":"In this paper, we propose a novel duty cycling algorithm for a large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the sense that individual node's sleep/wakeup decision is influenced by the state of its neighbors. We analyze the behavior of the proposed duty cycling algorithm using a stochastic spatial process. In particular, we consider a geometric form of neighborhood dependence and a reversible Markov chain, and apply this model to analyze the behavior of the duty cycling network. We then identify a set of parameters for the reversible spatial process model, and study the steady state of the network with respect to these parameters. We report that our algorithm is scalable to a large network, and can effectively control the active node density while achieving a small variance. We also report that the social behavior of nodes has interesting and non-obvious impacts on the performance of duty cycling. Finally, we present how to set the parameters of the algorithm to obtain a desirable duty cycling behavior.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Arbitrary Tree-Structured Replica Control Protocol 任意树状结构副本控制协议
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.51
J. Bahsoun, Robert Basmadjian, R. Guerraoui
Traditional replication protocols that arrange logically the replicas into a tree structure have reasonable availability, low communication costs but induce high system load. We propose in this paper the arbitrary protocol: a tree-based replica control protocol that can be configured based on the frequencies of read and write operations in order to provide lower system load than existing tree replication protocols, yet with comparable cost and availability. Our protocol enables the shifting from one configuration into another by just modifying the structure of the tree. There is no need to implement a new protocol whenever the frequencies of read and write operations change. At the heart of our protocol lies the new idea of logical and physical levels in a tree. In short, read operations are carried out on any physical node of every physical level of the tree whereas the write operation is performed on all physical nodes of a single physical level of the tree. We discuss optimal configurations, proving in particular a new lower bound, of independent interest, for the case of a binary tree.
传统的复制协议将副本逻辑地排列成树状结构,具有合理的可用性、较低的通信成本,但会导致较高的系统负载。我们在本文中提出了任意协议:一个基于树的副本控制协议,可以根据读写操作的频率进行配置,以提供比现有树复制协议更低的系统负载,但具有相当的成本和可用性。我们的协议允许从一种配置转换到另一种配置,只需修改树的结构。当读写操作的频率发生变化时,不需要实现新的协议。我们协议的核心是树中的逻辑和物理层的新思想。简而言之,读操作在树的每个物理层的任何物理节点上执行,而写操作在树的单个物理层的所有物理节点上执行。我们讨论了二叉树的最优构型,特别证明了一个新的下界。
{"title":"An Arbitrary Tree-Structured Replica Control Protocol","authors":"J. Bahsoun, Robert Basmadjian, R. Guerraoui","doi":"10.1109/ICDCS.2008.51","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.51","url":null,"abstract":"Traditional replication protocols that arrange logically the replicas into a tree structure have reasonable availability, low communication costs but induce high system load. We propose in this paper the arbitrary protocol: a tree-based replica control protocol that can be configured based on the frequencies of read and write operations in order to provide lower system load than existing tree replication protocols, yet with comparable cost and availability. Our protocol enables the shifting from one configuration into another by just modifying the structure of the tree. There is no need to implement a new protocol whenever the frequencies of read and write operations change. At the heart of our protocol lies the new idea of logical and physical levels in a tree. In short, read operations are carried out on any physical node of every physical level of the tree whereas the write operation is performed on all physical nodes of a single physical level of the tree. We discuss optimal configurations, proving in particular a new lower bound, of independent interest, for the case of a binary tree.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 The 28th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1