首页 > 最新文献

2010 IEEE Fifth International Conference on Networking, Architecture, and Storage最新文献

英文 中文
A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information 基于邻域信息的分布式隐藏虫洞检测方法
Yun Wang, Zhongke Zhang, Jie Wu
Ad hoc networks are promising but are vulnerable to selfish and malicious attacks. One kind of malicious attack, hidden wormhole attacks, can be mounted easily and be immune to cryptographic techniques. Wormholes distort network topology, and degrade the performance of applications such as localization and data collection. A wormhole attack is one of the most severe threats to an ad hoc network. Unfortunately, most state-of-the-art wormhole detection algorithms are not practicable. We observe and prove that, nodes attacked by the same wormhole are either 1-hopneighbors or 2-hop neighbors, and with a high probability, there are 3 nodes, which are non-1-hop neighbors, in the intersection of the two neighbor. However, such phenomena will not be present in normal topology. Thus a novel distributed algorithm is designed for wormhole detection and isolation with polynomial complexity. The detection probability is discussed. Simulation results show that the algorithm performs well regarding detection probability, as well as network overhead, false node alarms and miss detection.
自组织网络很有前途,但容易受到自私和恶意攻击。隐藏虫洞攻击是一种恶意攻击,它可以很容易地安装,并且不受密码技术的影响。虫洞会扭曲网络拓扑结构,降低定位和数据收集等应用的性能。虫洞攻击是对自组织网络最严重的威胁之一。不幸的是,大多数最先进的虫洞检测算法是不可行的。我们观察并证明,受到同一虫洞攻击的节点要么是1跳邻居,要么是2跳邻居,并且在这两个邻居的交点上有很大概率存在3个非1跳邻居。然而,这种现象不会出现在正常的拓扑结构中。为此,设计了一种具有多项式复杂度的虫洞检测与隔离分布式算法。对检测概率进行了讨论。仿真结果表明,该算法在检测概率、网络开销、假节点告警和漏检等方面都有较好的性能。
{"title":"A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information","authors":"Yun Wang, Zhongke Zhang, Jie Wu","doi":"10.1109/NAS.2010.22","DOIUrl":"https://doi.org/10.1109/NAS.2010.22","url":null,"abstract":"Ad hoc networks are promising but are vulnerable to selfish and malicious attacks. One kind of malicious attack, hidden wormhole attacks, can be mounted easily and be immune to cryptographic techniques. Wormholes distort network topology, and degrade the performance of applications such as localization and data collection. A wormhole attack is one of the most severe threats to an ad hoc network. Unfortunately, most state-of-the-art wormhole detection algorithms are not practicable. We observe and prove that, nodes attacked by the same wormhole are either 1-hopneighbors or 2-hop neighbors, and with a high probability, there are 3 nodes, which are non-1-hop neighbors, in the intersection of the two neighbor. However, such phenomena will not be present in normal topology. Thus a novel distributed algorithm is designed for wormhole detection and isolation with polynomial complexity. The detection probability is discussed. Simulation results show that the algorithm performs well regarding detection probability, as well as network overhead, false node alarms and miss detection.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127291249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Filtering Cache Pollution by Using Replacement Operation Based on Confidence Estimation 基于置信度估计的替换操作过滤缓存污染
Jun Zhang, K. Mei, Jizhong Zhao
Multi-Core architecture is the development trend of microprocessor architecture, and the “Memory Wall” is the chief obstacle to promote the processor performance. This paper analyzes the key factors affecting performance of memory system in shared L2 cache multi-core on a chip architecture, and believes that cache pollution caused by the speculative execution of memory reference instructions in predictive path may affect the performance of processor seriously. This paper proposes a cache pollution filtration technique based on confidence estimation, called FCPC. FCPC proceeds the dynamic appraisal using the confidence estimation mechanism to condition branch, and adds two tag bits CET (confidence estimation tag) and AHT(accessing hint tag) for each cache data line. According to the appraisal result, the memory accessing instructions in predictive path and their returned data in L2 cache are marked as high or low confidence separately. Then, when cache replacing operations are processed, the pollution data in shared L2 cache can be swept out preferentially according to CET and AHT tag. So, the efficiency of cache space is increased. Simulation result indicates that, in dual-core configuration, the FCPC strategy can promote the IPC performance effectively, ranges from 0.18%-4.86%, 1.91% averagely. Simultaneously, the miss rate of L2 Cache can be reduced, ranges from 0.65%-5.76%, average 2.57%.
多核架构是微处理器架构的发展趋势,而“内存墙”是处理器性能提升的主要障碍。分析了芯片架构下共享L2缓存多核内存系统性能的关键影响因素,认为在预测路径上,由于内存参考指令的推测性执行造成的缓存污染会严重影响处理器的性能。本文提出了一种基于置信度估计的缓存污染过滤技术,称为FCPC。FCPC利用置信度估计机制对分支条件进行动态评估,并为每条缓存数据线添加两个标签位CET(置信度估计标签)和AHT(访问提示标签)。根据评估结果,将预测路径中的内存访问指令及其返回到L2缓存中的数据分别标记为高置信度或低置信度。然后,在进行缓存替换操作时,可以根据CET和AHT标签优先清除共享L2缓存中的污染数据。因此,提高了缓存空间的效率。仿真结果表明,在双核配置下,FCPC策略可以有效提升IPC性能,提升幅度为0.18% ~ 4.86%,平均提升幅度为1.91%。同时,可以降低L2 Cache的丢失率,范围在0.65% ~ 5.76%之间,平均2.57%。
{"title":"Filtering Cache Pollution by Using Replacement Operation Based on Confidence Estimation","authors":"Jun Zhang, K. Mei, Jizhong Zhao","doi":"10.1109/NAS.2010.16","DOIUrl":"https://doi.org/10.1109/NAS.2010.16","url":null,"abstract":"Multi-Core architecture is the development trend of microprocessor architecture, and the “Memory Wall” is the chief obstacle to promote the processor performance. This paper analyzes the key factors affecting performance of memory system in shared L2 cache multi-core on a chip architecture, and believes that cache pollution caused by the speculative execution of memory reference instructions in predictive path may affect the performance of processor seriously. This paper proposes a cache pollution filtration technique based on confidence estimation, called FCPC. FCPC proceeds the dynamic appraisal using the confidence estimation mechanism to condition branch, and adds two tag bits CET (confidence estimation tag) and AHT(accessing hint tag) for each cache data line. According to the appraisal result, the memory accessing instructions in predictive path and their returned data in L2 cache are marked as high or low confidence separately. Then, when cache replacing operations are processed, the pollution data in shared L2 cache can be swept out preferentially according to CET and AHT tag. So, the efficiency of cache space is increased. Simulation result indicates that, in dual-core configuration, the FCPC strategy can promote the IPC performance effectively, ranges from 0.18%-4.86%, 1.91% averagely. Simultaneously, the miss rate of L2 Cache can be reduced, ranges from 0.65%-5.76%, average 2.57%.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Balanced Allocation Strategy for File Assignment in Parallel I/O Systems 并行I/O系统中文件分配的均衡分配策略
Yongqing Zhu, Yang Yu, Wilson Yonghong Wang, Sophia Sufui Tan, T. Low
In parallel I/O systems, fast response to disk access and load balancing are two important performance objectives pursued by end users and applications. These performances are largely determined by the data allocation strategies, or file assignment algorithms. However, most existing algorithms can only obtain one of the performance objectives, including the well-known algorithms like Greedy, Sort Partition (SP) and Hybrid Partition (HP). New algorithms that can achieve both objectives are very necessary for parallel I/O systems. In this paper, we have proposed two new allocation algorithms for file assignment in parallel I/O systems: an offline Balanced Allocation with Sort (BAS) algorithm and an online Balanced Allocation with Sort for Batch (BASB) algorithm. Both algorithms aim to achieve the optimal mean response time and load balancing at the same time. The experiment results have shown that the BAS algorithm can get the optimal performance on response time among all compared algorithms and better performance on load balancing than SP. For online BASB algorithm, it can achieve the optimal performances on both response time and load balancing among all algorithms for comparison.
在并行I/O系统中,对磁盘访问的快速响应和负载平衡是最终用户和应用程序追求的两个重要性能目标。这些性能在很大程度上取决于数据分配策略或文件分配算法。然而,现有的大多数算法只能获得其中一个性能目标,包括众所周知的Greedy、Sort Partition (SP)和Hybrid Partition (HP)等算法。对于并行I/O系统来说,能够实现这两个目标的新算法是非常必要的。本文提出了两种新的并行I/O系统文件分配算法:离线平衡分配与排序(BAS)算法和在线平衡分配与批处理排序(BASB)算法。两种算法的目标都是同时达到最优的平均响应时间和负载均衡。实验结果表明,在所有被比较算法中,BAS算法在响应时间上的性能最优,在负载均衡上的性能优于SP算法。对于在线BASB算法,它在响应时间和负载均衡上的性能都优于SP算法。
{"title":"A Balanced Allocation Strategy for File Assignment in Parallel I/O Systems","authors":"Yongqing Zhu, Yang Yu, Wilson Yonghong Wang, Sophia Sufui Tan, T. Low","doi":"10.1109/NAS.2010.10","DOIUrl":"https://doi.org/10.1109/NAS.2010.10","url":null,"abstract":"In parallel I/O systems, fast response to disk access and load balancing are two important performance objectives pursued by end users and applications. These performances are largely determined by the data allocation strategies, or file assignment algorithms. However, most existing algorithms can only obtain one of the performance objectives, including the well-known algorithms like Greedy, Sort Partition (SP) and Hybrid Partition (HP). New algorithms that can achieve both objectives are very necessary for parallel I/O systems. In this paper, we have proposed two new allocation algorithms for file assignment in parallel I/O systems: an offline Balanced Allocation with Sort (BAS) algorithm and an online Balanced Allocation with Sort for Batch (BASB) algorithm. Both algorithms aim to achieve the optimal mean response time and load balancing at the same time. The experiment results have shown that the BAS algorithm can get the optimal performance on response time among all compared algorithms and better performance on load balancing than SP. For online BASB algorithm, it can achieve the optimal performances on both response time and load balancing among all algorithms for comparison.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Probabilistic Routing Protocol for Heterogeneous Sensor Networks 异构传感器网络的概率路由协议
Yuefei Hu, Wenzhong Li, Xiao Chen, Xin Chen, Sanglu Lu, Jie Wu
The past five years witnessed a rapid development in wireless sensor networks, which have been widely used in military and civilian applications. Due to different requirements in their application environment, sensors with different capacities, power, and so on are deployed. Data routing in such heterogeneous sensor networks is a challenging task. On one hand, the heterogeneous features bring about the diversity in their transmission ranges, which subsequently lead to asymmetric links in the communication graph. As a result, conventional routing strategies based on undirected graphs become unsuitable. On the other hand, sensors communicate with each other through intermittent asymmetric links. It is important to provide assurable delivery rate for mission critical applications. In this paper, we propose ProHet: a Probabilistic routing protocol for Heterogeneous sensor networks, which can deal with asymmetric links well and work in a distributed manner with low overhead and assurable delivery rate. The ProHet protocol first produces a bidirectional routing abstraction by finding a reverse routing path for every asymmetric link. Then, it uses a probabilistic strategy to choose forwarding nodes based on historical statistics, which is shown to achieve assurable delivery rate by theoretical analysis. Extensive simulations are conducted to verify the efficiency of the proposed protocol.
近五年来,无线传感器网络发展迅速,在军事和民用领域得到了广泛的应用。由于应用环境的不同要求,需要部署不同容量、功率等的传感器。异构传感器网络中的数据路由是一项具有挑战性的任务。一方面,异构特性导致其传输范围的多样性,从而导致通信图中的链路不对称。因此,传统的基于无向图的路由策略变得不适合。另一方面,传感器之间通过间歇性的非对称链路进行通信。为关键任务应用程序提供可靠的交付率是很重要的。本文提出了一种用于异构传感器网络的概率路由协议ProHet,它可以很好地处理非对称链路,并且以分布式方式工作,开销低,传输速率可靠。ProHet协议首先通过为每个非对称链路找到反向路由路径来产生双向路由抽象。然后,采用基于历史统计的概率策略选择转发节点,理论分析表明,该策略可以实现可靠的投递率。通过大量的仿真验证了所提出协议的有效性。
{"title":"A Probabilistic Routing Protocol for Heterogeneous Sensor Networks","authors":"Yuefei Hu, Wenzhong Li, Xiao Chen, Xin Chen, Sanglu Lu, Jie Wu","doi":"10.1109/NAS.2010.42","DOIUrl":"https://doi.org/10.1109/NAS.2010.42","url":null,"abstract":"The past five years witnessed a rapid development in wireless sensor networks, which have been widely used in military and civilian applications. Due to different requirements in their application environment, sensors with different capacities, power, and so on are deployed. Data routing in such heterogeneous sensor networks is a challenging task. On one hand, the heterogeneous features bring about the diversity in their transmission ranges, which subsequently lead to asymmetric links in the communication graph. As a result, conventional routing strategies based on undirected graphs become unsuitable. On the other hand, sensors communicate with each other through intermittent asymmetric links. It is important to provide assurable delivery rate for mission critical applications. In this paper, we propose ProHet: a Probabilistic routing protocol for Heterogeneous sensor networks, which can deal with asymmetric links well and work in a distributed manner with low overhead and assurable delivery rate. The ProHet protocol first produces a bidirectional routing abstraction by finding a reverse routing path for every asymmetric link. Then, it uses a probabilistic strategy to choose forwarding nodes based on historical statistics, which is shown to achieve assurable delivery rate by theoretical analysis. Extensive simulations are conducted to verify the efficiency of the proposed protocol.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Inter-vehicular Communication Systems, Protocols and Middleware 车辆间通信系统、协议和中间件
I. Jawhar, N. Mohamed, Liren Zhang
Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as the growth of microprocessing capabilities inside today’s cars, and other moving vehicles. A good amount of research has been done to exploit the different services that can be provided to enhance the safety and comfort of the driver. Additional functions provide the car electronics and the passengers with access to the Internet and other core network resources. This paper provides a survey of the latest advances in the area of inter-vehicular communication (IVC) including vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) functions and services. In addition, the paper presents the most important projects and protocols that are involved in IVC systems as well as the different issues and challenges that exist at each layer of the networking model.
由于移动和无线通信技术的长足进步,以及当今汽车和其他移动车辆内部微处理能力的增长,车际通信是一个重要的研究领域,正在迅速发展。人们已经做了大量的研究来开发不同的服务,以提高司机的安全性和舒适性。附加功能为汽车电子设备和乘客提供访问互联网和其他核心网络资源的机会。本文综述了车际通信(IVC)领域的最新进展,包括车对车(V2V)和车对基础设施(V2I)的功能和服务。此外,本文还介绍了IVC系统中涉及的最重要的项目和协议,以及在网络模型的每一层存在的不同问题和挑战。
{"title":"Inter-vehicular Communication Systems, Protocols and Middleware","authors":"I. Jawhar, N. Mohamed, Liren Zhang","doi":"10.1109/NAS.2010.49","DOIUrl":"https://doi.org/10.1109/NAS.2010.49","url":null,"abstract":"Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as the growth of microprocessing capabilities inside today’s cars, and other moving vehicles. A good amount of research has been done to exploit the different services that can be provided to enhance the safety and comfort of the driver. Additional functions provide the car electronics and the passengers with access to the Internet and other core network resources. This paper provides a survey of the latest advances in the area of inter-vehicular communication (IVC) including vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) functions and services. In addition, the paper presents the most important projects and protocols that are involved in IVC systems as well as the different issues and challenges that exist at each layer of the networking model.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Interference-Aware Multicast in Wireless Mesh Networks with Directional Antennas 定向天线无线Mesh网络中的干扰感知组播
Jun Wang, Min Song, Yanxiao Zhao
Wireless mesh networks (WMNs) have recently emerged as a promising broadband access infrastructure for next-generation wireless networking. Several approaches that exploit directional antennas have been proposed in the literature to increase the performance of WMNs. In this paper, we study the interference optimization multicast problem in WMNs where nodes are equipped with directional antennas. Interference can make a significant impact on the performance of multi-hop wireless networks. Directional transmissions can greatly reduce radio interference, increase spatial reuse, and enable more efficient MAC designs. We first present the definition of interference with directional transmissions that are suitable for designing multicast algorithms, and formulate minimum interference multicast problems using a linear programming model. We then propose a heuristic algorithm to solve the problem. Our model and algorithm are good for both single multicast session and multiple multicast sessions. Multicast routing found by our interference-aware algorithm tends to have less channel collisions.
无线网状网络(WMNs)作为下一代无线网络的宽带接入基础设施已经崭露头角。文献中提出了几种利用定向天线的方法来提高WMNs的性能。本文研究了带定向天线的WMNs中干扰优化组播问题。干扰对多跳无线网络的性能影响很大。定向传输可以大大减少无线电干扰,增加空间重用,并实现更高效的MAC设计。我们首先提出了适合设计组播算法的定向传输干扰的定义,并利用线性规划模型提出了最小干扰组播问题。然后我们提出了一种启发式算法来解决这个问题。该模型和算法既适用于单组播会话,也适用于多组播会话。通过干扰感知算法得到的组播路由具有较少的信道冲突的趋势。
{"title":"Interference-Aware Multicast in Wireless Mesh Networks with Directional Antennas","authors":"Jun Wang, Min Song, Yanxiao Zhao","doi":"10.1109/NAS.2010.19","DOIUrl":"https://doi.org/10.1109/NAS.2010.19","url":null,"abstract":"Wireless mesh networks (WMNs) have recently emerged as a promising broadband access infrastructure for next-generation wireless networking. Several approaches that exploit directional antennas have been proposed in the literature to increase the performance of WMNs. In this paper, we study the interference optimization multicast problem in WMNs where nodes are equipped with directional antennas. Interference can make a significant impact on the performance of multi-hop wireless networks. Directional transmissions can greatly reduce radio interference, increase spatial reuse, and enable more efficient MAC designs. We first present the definition of interference with directional transmissions that are suitable for designing multicast algorithms, and formulate minimum interference multicast problems using a linear programming model. We then propose a heuristic algorithm to solve the problem. Our model and algorithm are good for both single multicast session and multiple multicast sessions. Multicast routing found by our interference-aware algorithm tends to have less channel collisions.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
VegaWarden: A Uniform User Management System for Cloud Applications VegaWarden:云应用的统一用户管理系统
Jian Lin, Xiaoyi Lu, Lingjing Yu, Yongqiang Zou, L. Zha
In a virtual cluster based Cloud Computing environment, the sharing of infrastructure introduces two problems on user management: usability and security. Meanwhile, we observe that most conventional user management frameworks in the network environment are not fit for the scale expansion and interconnection of dynamic virtualization environment. In this paper, we propose VegaWarden, a uniform user management system to solve these problems. VegaWarden supplies a global user space for different virtual infrastructures and application services in one Cloud, and allows user system interconnection among homogeneous Cloud instances. A uniform authentication model enables the security isolation of different administrative domains, and a decentralized architecture ensures its scalability. We have implemented VegaWarden in an experimental Cloud-oriented infrastructure and a production Grid Computing environment. The functionality and performance of VegaWarden have been demonstrated.
在基于虚拟集群的云计算环境中,基础设施的共享带来了两个用户管理问题:可用性和安全性。同时,我们发现大多数传统的网络环境下的用户管理框架不适合动态虚拟化环境的规模扩展和互联。本文提出了一个统一的用户管理系统VegaWarden来解决这些问题。VegaWarden为一个云中不同的虚拟基础设施和应用服务提供了一个全局的用户空间,并允许同构云实例之间的用户系统互连。统一的身份验证模型实现了不同管理域的安全隔离,分散的体系结构确保了其可伸缩性。我们已经在一个实验性的面向云的基础设施和生产网格计算环境中实现了vegwarden。已经演示了vegwarden的功能和性能。
{"title":"VegaWarden: A Uniform User Management System for Cloud Applications","authors":"Jian Lin, Xiaoyi Lu, Lingjing Yu, Yongqiang Zou, L. Zha","doi":"10.1109/NAS.2010.34","DOIUrl":"https://doi.org/10.1109/NAS.2010.34","url":null,"abstract":"In a virtual cluster based Cloud Computing environment, the sharing of infrastructure introduces two problems on user management: usability and security. Meanwhile, we observe that most conventional user management frameworks in the network environment are not fit for the scale expansion and interconnection of dynamic virtualization environment. In this paper, we propose VegaWarden, a uniform user management system to solve these problems. VegaWarden supplies a global user space for different virtual infrastructures and application services in one Cloud, and allows user system interconnection among homogeneous Cloud instances. A uniform authentication model enables the security isolation of different administrative domains, and a decentralized architecture ensures its scalability. We have implemented VegaWarden in an experimental Cloud-oriented infrastructure and a production Grid Computing environment. The functionality and performance of VegaWarden have been demonstrated.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Heterogeneous Multi-core Parallel SGEMM Performance Testing and Analysis on Cell/B.E Processor Cell/B上异构多核并行SGEMM性能测试与分析。E处理器
Yan Li, Yunquan Zhang, Ke Wang, Wenhua Guan
Matrix multiplication is one of the most common numerical operations in the field of scientific computing, which is the kernel routine of Level 3 BLAS. The STI CELL processor is a heterogeneous multiprocessor with a unique design to achieve high peak floating point performance. As matrix multiplication operation is essential for a wide range of numerical algorithms, so performance improvements to the GEMM routine immediately can benefit the entire algorithm. In this paper, we provide a new way to utilize the hardware features of Cell to achieve better performance on the Single Precision General Matrix Multiplication (SGEMM), through both heterogeneous PPEs and SPEs parallelization, our method gains speedup over the Cell SDK (2.5%). An extra speedup about 30% of performance is achieved via interleaved memory allocation, which improves memory access.
矩阵乘法是科学计算领域中最常见的数值运算之一,是三级BLAS的核心程序。STI CELL处理器是一种异构多处理器,具有独特的设计,可实现峰值浮点性能。由于矩阵乘法运算在许多数值算法中都是必不可少的,因此对GEMM例程的性能改进可以立即使整个算法受益。在本文中,我们提供了一种新的方法来利用Cell的硬件特性来实现更好的单精度通用矩阵乘法(SGEMM)性能,通过异构ppe和spe并行化,我们的方法比Cell SDK获得了2.5%的加速。通过交错内存分配,可以实现大约30%的性能提升,这改善了内存访问。
{"title":"Heterogeneous Multi-core Parallel SGEMM Performance Testing and Analysis on Cell/B.E Processor","authors":"Yan Li, Yunquan Zhang, Ke Wang, Wenhua Guan","doi":"10.1109/NAS.2010.48","DOIUrl":"https://doi.org/10.1109/NAS.2010.48","url":null,"abstract":"Matrix multiplication is one of the most common numerical operations in the field of scientific computing, which is the kernel routine of Level 3 BLAS. The STI CELL processor is a heterogeneous multiprocessor with a unique design to achieve high peak floating point performance. As matrix multiplication operation is essential for a wide range of numerical algorithms, so performance improvements to the GEMM routine immediately can benefit the entire algorithm. In this paper, we provide a new way to utilize the hardware features of Cell to achieve better performance on the Single Precision General Matrix Multiplication (SGEMM), through both heterogeneous PPEs and SPEs parallelization, our method gains speedup over the Cell SDK (2.5%). An extra speedup about 30% of performance is achieved via interleaved memory allocation, which improves memory access.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks 时延容忍网络中基于模糊贴近度的委托转发
Feng Li, Yinying Yang, Jie Wu, X. Zou
Delay tolerant networks (DTNs) are envisioned to provide promising applications and services. One critical issue in DTNs is efficiently forwarding the messages within the delay requirements while avoiding the cost associated with blind flooding. To guide the forwarding process, nodes can evaluate their relationships with each other, in terms of ``closeness'', which summarizes both temporal and spacial information, based on contact history. However, due to the uncertainty in nodal mobility, the contact history usually contains fuzziness and incomplete information. In this paper, we first define and utilize a fuzzy trust evaluation system for nodes to summarize their relationships to other nodes, in terms of closeness. We then propose the fuzzy clustering to organize nodes into overlapped fuzzy communities based on nodes' evaluations of closeness. On top of the fuzzy communities, a novel fuzzy-weight-based delegation forwarding scheme is proposed to propagate the messages into all communities while avoiding repeated forwarding in the same community. Extensive simulation results based on real traces are presented to support the effectiveness of our scheme.
容忍延迟网络(dtn)被设想为提供有前途的应用和服务。ddn中的一个关键问题是在延迟要求内有效地转发消息,同时避免与盲泛洪相关的成本。为了指导转发过程,节点可以根据接触历史,用“亲密度”来评价彼此之间的关系,“亲密度”概括了时间和空间信息。然而,由于节点迁移的不确定性,接触历史通常包含模糊性和不完全信息。在本文中,我们首先定义并利用节点的模糊信任评价系统来总结节点与其他节点之间的亲密关系。然后,我们提出了基于节点亲密度评价的模糊聚类,将节点组织成重叠的模糊社区。在模糊社区的基础上,提出了一种基于模糊权重的授权转发方案,将消息传播到所有社区,同时避免在同一社区中重复转发。基于真实轨迹的大量仿真结果证明了该方案的有效性。
{"title":"Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks","authors":"Feng Li, Yinying Yang, Jie Wu, X. Zou","doi":"10.1109/NAS.2010.65","DOIUrl":"https://doi.org/10.1109/NAS.2010.65","url":null,"abstract":"Delay tolerant networks (DTNs) are envisioned to provide promising applications and services. One critical issue in DTNs is efficiently forwarding the messages within the delay requirements while avoiding the cost associated with blind flooding. To guide the forwarding process, nodes can evaluate their relationships with each other, in terms of ``closeness'', which summarizes both temporal and spacial information, based on contact history. However, due to the uncertainty in nodal mobility, the contact history usually contains fuzziness and incomplete information. In this paper, we first define and utilize a fuzzy trust evaluation system for nodes to summarize their relationships to other nodes, in terms of closeness. We then propose the fuzzy clustering to organize nodes into overlapped fuzzy communities based on nodes' evaluations of closeness. On top of the fuzzy communities, a novel fuzzy-weight-based delegation forwarding scheme is proposed to propagate the messages into all communities while avoiding repeated forwarding in the same community. Extensive simulation results based on real traces are presented to support the effectiveness of our scheme.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122443981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
USP: A Lightweight File System Management Framework 轻量级文件系统管理框架
Zhan Shi, D. Feng, Heng Zhao, Lingfang Zeng
With data amount growing at an ever increasing rate, file system, as the basis of data management, its functionality and content are becoming more and more complex. Thus the file system is forced to be upgraded constantly, in order to satisfy the growing demands. However, the reinvention of new file systems is always a high-cost task. Although there are frameworks such as User-space File System that may help speeding up the development process, ease the pain of deploying new functions, they also bring in significant overhead, especially when file operation frequency is fairly high. We designed and implemented a lightweight file system management framework based on LD_PRELOAD in user-space referred to as User-Space Preload (USP), and tested several management tasks with it. According to the comparison with FUSE, USP-based file system management achieved an obvious performance improvement.
随着数据量的不断增长,文件系统作为数据管理的基础,其功能和内容也越来越复杂。因此,文件系统被迫不断升级,以满足日益增长的需求。然而,重新发明新的文件系统总是一项高成本的任务。尽管用户空间文件系统(User-space File System)等框架可能有助于加快开发过程,减轻部署新功能的痛苦,但它们也带来了巨大的开销,特别是在文件操作频率相当高的情况下。我们设计并实现了一个基于用户空间LD_PRELOAD的轻量级文件系统管理框架,即用户空间预加载(user-space Preload, USP),并用它测试了几个管理任务。通过与FUSE的比较,基于usp的文件系统管理实现了明显的性能提升。
{"title":"USP: A Lightweight File System Management Framework","authors":"Zhan Shi, D. Feng, Heng Zhao, Lingfang Zeng","doi":"10.1109/NAS.2010.47","DOIUrl":"https://doi.org/10.1109/NAS.2010.47","url":null,"abstract":"With data amount growing at an ever increasing rate, file system, as the basis of data management, its functionality and content are becoming more and more complex. Thus the file system is forced to be upgraded constantly, in order to satisfy the growing demands. However, the reinvention of new file systems is always a high-cost task. Although there are frameworks such as User-space File System that may help speeding up the development process, ease the pain of deploying new functions, they also bring in significant overhead, especially when file operation frequency is fairly high. We designed and implemented a lightweight file system management framework based on LD_PRELOAD in user-space referred to as User-Space Preload (USP), and tested several management tasks with it. According to the comparison with FUSE, USP-based file system management achieved an obvious performance improvement.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132408705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 IEEE Fifth International Conference on Networking, Architecture, and Storage
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1