首页 > 最新文献

EW 11最新文献

英文 中文
A step towards ubiquitous computing: an efficient flexible micro-ORB 迈向普适计算的一步:高效灵活的微型orb
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133580
F. Ogel, B. Folliot, Gaël Thomas
Smart devices, such as personal assistants, mobile phone or smart cards, continuously spread and thus challenge every aspect of our lives. However, such environments exhibit specific constraints, such as mobility, high-level of dynamism and most often restricted resources. Traditional middle-wares were not designed for such constraints and, because of their monolithic, static and rigid architectures, are not likely to become a fit.In response, we propose a flexible micro-ORB, called Flex-ORB, that supports on demand export of services as well as their dynamic deployment and reconfiguration. Flex-ORB supports mobile code through an intermediate code representation. It is built on top of NEVERMIND, a flexible minimal execution environment, which uses a reflexive dynamic compiler as a central common language substrate upon which to achieve interoperability.Preliminary performance measurements show that, while being relatively small (120 KB) and dynamically adaptable, FlexORB outperforms traditional middlewares such as RPC, CORBA and Java RMI.
智能设备,如个人助理,手机或智能卡,不断普及,从而挑战我们生活的方方面面。然而,这种环境表现出特定的限制,例如流动性、高水平的活力和最经常受到限制的资源。传统的中间件不是为这样的约束而设计的,而且由于它们的整体、静态和刚性架构,不太可能成为合适的。作为回应,我们提出了一个灵活的微orb,称为Flex-ORB,它支持按需导出服务以及动态部署和重新配置。Flex-ORB通过中间代码表示支持移动代码。它建立在NEVERMIND的基础上,NEVERMIND是一个灵活的最小执行环境,它使用自反式动态编译器作为实现互操作性的中心公共语言基板。初步的性能测量表明,虽然FlexORB相对较小(120 KB)并且具有动态适应性,但它优于传统的中间件,如RPC、CORBA和Java RMI。
{"title":"A step towards ubiquitous computing: an efficient flexible micro-ORB","authors":"F. Ogel, B. Folliot, Gaël Thomas","doi":"10.1145/1133572.1133580","DOIUrl":"https://doi.org/10.1145/1133572.1133580","url":null,"abstract":"Smart devices, such as personal assistants, mobile phone or smart cards, continuously spread and thus challenge every aspect of our lives. However, such environments exhibit specific constraints, such as mobility, high-level of dynamism and most often restricted resources. Traditional middle-wares were not designed for such constraints and, because of their monolithic, static and rigid architectures, are not likely to become a fit.In response, we propose a flexible micro-ORB, called Flex-ORB, that supports on demand export of services as well as their dynamic deployment and reconfiguration. Flex-ORB supports mobile code through an intermediate code representation. It is built on top of NEVERMIND, a flexible minimal execution environment, which uses a reflexive dynamic compiler as a central common language substrate upon which to achieve interoperability.Preliminary performance measurements show that, while being relatively small (120 KB) and dynamically adaptable, FlexORB outperforms traditional middlewares such as RPC, CORBA and Java RMI.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A component-based approach to distributed system management: a use case with self-manageable J2EE clusters 分布式系统管理的基于组件的方法:具有自管理J2EE集群的用例
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133574
S. Bouchenak, F. Boyer, E. Cecchet, Sébastien Jean, Alan Schmitt, J. Stefani
Clustering has become a de facto standard to scale distributed systems and applications. However, the administration and management of such systems still use ad-hoc techniques that partially fulfill the needs. The expertise needed to configure and tune these systems goes beyond the capacity of a single system administrator or software developer.We present a modular software infrastructure to build command and control loops to manage large scale distributed systems. Our approach uses a reflective component model in a systematic way for building a system model and every single stage in the supervision loop. This approach offers modularity, easy configuration, dynamic reconfiguration, as well as reusability. We illustrate how this architecture can be used to build self-manageable J2EE application server clusters.
集群已经成为扩展分布式系统和应用程序的事实上的标准。然而,这些系统的管理和管理仍然使用部分满足需求的特殊技术。配置和调优这些系统所需的专业知识超出了单个系统管理员或软件开发人员的能力。我们提出了一个模块化的软件基础设施来构建命令和控制回路来管理大规模的分布式系统。我们的方法以系统的方式使用反射组件模型来构建系统模型和监督循环中的每个阶段。这种方法提供了模块化、易于配置、动态重新配置以及可重用性。我们将说明如何使用此体系结构来构建自管理的J2EE应用程序服务器集群。
{"title":"A component-based approach to distributed system management: a use case with self-manageable J2EE clusters","authors":"S. Bouchenak, F. Boyer, E. Cecchet, Sébastien Jean, Alan Schmitt, J. Stefani","doi":"10.1145/1133572.1133574","DOIUrl":"https://doi.org/10.1145/1133572.1133574","url":null,"abstract":"Clustering has become a de facto standard to scale distributed systems and applications. However, the administration and management of such systems still use ad-hoc techniques that partially fulfill the needs. The expertise needed to configure and tune these systems goes beyond the capacity of a single system administrator or software developer.We present a modular software infrastructure to build command and control loops to manage large scale distributed systems. Our approach uses a reflective component model in a systematic way for building a system model and every single stage in the supervision loop. This approach offers modularity, easy configuration, dynamic reconfiguration, as well as reusability. We illustrate how this architecture can be used to build self-manageable J2EE application server clusters.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Self-migration of operating systems 操作系统的自迁移
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133616
J. Hansen, E. Jul
This paper is about on-the-fly migration of entire operating systems between physically different host computers. Resource allocation is often static; using migration allows applications to dynamically change bindings between programs and physical hosts as to improve utilisation. We first survey different approaches to migration and then present two prototypes that allow migration not only of an application but also of the operating system running the application. One of the prototypes includes a novel approach, self-migration, to operating system migration. Performance numbers show that migration can be done with merely subsecond suspension of the application.
本文是关于整个操作系统在物理上不同的主机之间的动态迁移。资源分配通常是静态的;使用迁移允许应用程序动态更改程序和物理主机之间的绑定,以提高利用率。我们首先调查了不同的迁移方法,然后给出了两种原型,它们不仅允许迁移应用程序,还允许迁移运行该应用程序的操作系统。其中一个原型包括一种新颖的方法,即自迁移到操作系统迁移。性能数据表明,只需将应用程序暂停几秒,就可以完成迁移。
{"title":"Self-migration of operating systems","authors":"J. Hansen, E. Jul","doi":"10.1145/1133572.1133616","DOIUrl":"https://doi.org/10.1145/1133572.1133616","url":null,"abstract":"This paper is about on-the-fly migration of entire operating systems between physically different host computers. Resource allocation is often static; using migration allows applications to dynamically change bindings between programs and physical hosts as to improve utilisation. We first survey different approaches to migration and then present two prototypes that allow migration not only of an application but also of the operating system running the application. One of the prototypes includes a novel approach, self-migration, to operating system migration. Performance numbers show that migration can be done with merely subsecond suspension of the application.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
An approach to benchmarking configuration complexity 一种对配置复杂性进行基准测试的方法
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133609
Aaron B. Brown, J. Hellerstein
Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity of configuration is a major impediment to deploying and managing computer systems. We describe an approach to quantifying configuration complexity, with the ultimate goal of producing a configuration complexity benchmark. Our belief is that such a benchmark can drive progress towards self-configuring systems. Unlike traditional workload-based performance benchmarks, our approach is process-based. It generates metrics that reflect the level of human involvement in the configuration process, quantified by interaction time and probability of successful configuration. It computes the metrics using a model of a standardized human operator, calibrated in advance by a user study that measures operator behavior on a set of parameterized canonical configuration actions. The model captures the human component of configuration complexity at low cost and provides representativeness and reproducibility.
配置是将组件组装或调整以产生在指定性能水平上运行的功能系统的过程。今天,配置的复杂性是部署和管理计算机系统的主要障碍。我们描述了一种量化配置复杂性的方法,其最终目标是生成配置复杂性基准。我们相信这样的基准可以推动自配置系统的发展。与传统的基于工作负载的性能基准测试不同,我们的方法是基于过程的。它生成反映配置过程中人类参与程度的度量,通过交互时间和成功配置的概率进行量化。它使用标准化的人类操作员模型来计算度量,并通过用户研究预先校准,该研究测量操作员在一组参数化规范配置操作上的行为。该模型以低成本捕获了配置复杂性的人为成分,并提供了代表性和可再现性。
{"title":"An approach to benchmarking configuration complexity","authors":"Aaron B. Brown, J. Hellerstein","doi":"10.1145/1133572.1133609","DOIUrl":"https://doi.org/10.1145/1133572.1133609","url":null,"abstract":"Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity of configuration is a major impediment to deploying and managing computer systems. We describe an approach to quantifying configuration complexity, with the ultimate goal of producing a configuration complexity benchmark. Our belief is that such a benchmark can drive progress towards self-configuring systems. Unlike traditional workload-based performance benchmarks, our approach is process-based. It generates metrics that reflect the level of human involvement in the configuration process, quantified by interaction time and probability of successful configuration. It computes the metrics using a model of a standardized human operator, calibrated in advance by a user study that measures operator behavior on a set of parameterized canonical configuration actions. The model captures the human component of configuration complexity at low cost and provides representativeness and reproducibility.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Using virtual markets to program global behavior in sensor networks 利用虚拟市场对传感器网络中的全局行为进行编程
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133587
G. Mainland, Laura Kang, Sébastien Lahaie, D. Parkes, M. Welsh
This paper presents market-based macroprogramming (MBM), a new paradigm for achieving globally efficient behavior in sensor networks. Rather than programming the individual, low-level behaviors of sensor nodes, MBM defines a virtual market where nodes sell "actions" (such as taking a sensor reading or aggregating data) in response to global price information. Nodes take actions to maximize their own utility, subject to energy budget constraints. The behavior of the network is determined by adjusting the price vectors for each action, rather than by directly specifying local node actions, resulting in a globally efficient allocation of network resources. We present the market-based macro-programming paradigm, as well as several experiments demonstrating its value for a sensor network vehicle tracking application.
本文提出了基于市场的宏规划(MBM),这是一种在传感器网络中实现全局高效行为的新范式。MBM定义了一个虚拟市场,节点根据全球价格信息出售“动作”(例如读取传感器或汇总数据),而不是对传感器节点的单个低级行为进行编程。在能源预算约束下,节点采取行动最大化自身效用。网络的行为是通过调整每个行为的价格向量来决定的,而不是通过直接指定局部节点的行为,从而实现网络资源的全局有效分配。我们提出了基于市场的宏观编程范例,以及几个实验,证明了它在传感器网络车辆跟踪应用中的价值。
{"title":"Using virtual markets to program global behavior in sensor networks","authors":"G. Mainland, Laura Kang, Sébastien Lahaie, D. Parkes, M. Welsh","doi":"10.1145/1133572.1133587","DOIUrl":"https://doi.org/10.1145/1133572.1133587","url":null,"abstract":"This paper presents market-based macroprogramming (MBM), a new paradigm for achieving globally efficient behavior in sensor networks. Rather than programming the individual, low-level behaviors of sensor nodes, MBM defines a virtual market where nodes sell \"actions\" (such as taking a sensor reading or aggregating data) in response to global price information. Nodes take actions to maximize their own utility, subject to energy budget constraints. The behavior of the network is determined by adjusting the price vectors for each action, rather than by directly specifying local node actions, resulting in a globally efficient allocation of network resources. We present the market-based macro-programming paradigm, as well as several experiments demonstrating its value for a sensor network vehicle tracking application.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Using time travel to diagnose computer problems 利用时间旅行诊断计算机问题
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133607
Andrew Whitaker, Richard S. Cox, S. Gribble
The solution to a number of modern computer problems takes the form of a manual, expert-guided search through a large space of computer configurations. For example, if a desktop computer is crashing or malfunctioning, a troubleshooter will use her knowledge of system features such as configuration files, registries, and dynamic library versions to apply a series of configuration changes until the system once again begins functioning. As another example, to obtain good performance from a complex system like a database or a web application, a specialized and highly paid administrator will explore the set of application and operating system parameters to find the optimal values.
许多现代计算机问题的解决方案采用手动的形式,在专家的指导下搜索大量的计算机配置。例如,如果一台桌面计算机正在崩溃或发生故障,故障排除程序将使用她对系统特性(如配置文件、注册表和动态库版本)的了解来应用一系列配置更改,直到系统再次开始运行。再例如,为了从数据库或web应用程序等复杂系统中获得良好的性能,高薪的专业管理员将探索应用程序和操作系统参数集,以找到最优值。
{"title":"Using time travel to diagnose computer problems","authors":"Andrew Whitaker, Richard S. Cox, S. Gribble","doi":"10.1145/1133572.1133607","DOIUrl":"https://doi.org/10.1145/1133572.1133607","url":null,"abstract":"The solution to a number of modern computer problems takes the form of a manual, expert-guided search through a large space of computer configurations. For example, if a desktop computer is crashing or malfunctioning, a troubleshooter will use her knowledge of system features such as configuration files, registries, and dynamic library versions to apply a series of configuration changes until the system once again begins functioning. As another example, to obtain good performance from a complex system like a database or a web application, a specialized and highly paid administrator will explore the set of application and operating system parameters to find the optimal values.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117087836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
AP3: cooperative, decentralized anonymous communication AP3:协作、分散的匿名通信
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133578
A. Mislove, Gaurav Oberoi, Ansley Post, C. Reis, P. Druschel, D. Wallach
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides clients with three primitives: (i) anonymous message delivery, (ii) anonymous channels, and (iii) secure pseudonyms. AP3 is designed to be lightweight, low-cost and provides "probable innocence" anonymity to participating users, even under a large-scale coordinated attack by a limited fraction of malicious overlay nodes. Additionally, we use AP3's primitives to build novel anonymous group communication facilities (multicast and anycast), which shield the identity of both publishers and subscribers.
本文描述了一种为参与用户提供匿名通信服务的协作覆盖网络。匿名点对点代理(AP3)系统为客户端提供了三个基本功能:(i)匿名消息传递,(ii)匿名通道,(iii)安全假名。AP3被设计为轻量级、低成本,并为参与的用户提供“可能无辜”的匿名性,即使在有限部分恶意覆盖节点的大规模协同攻击下也是如此。此外,我们使用AP3的原语来构建新的匿名组通信设施(多播和任意播),从而保护发布者和订阅者的身份。
{"title":"AP3: cooperative, decentralized anonymous communication","authors":"A. Mislove, Gaurav Oberoi, Ansley Post, C. Reis, P. Druschel, D. Wallach","doi":"10.1145/1133572.1133578","DOIUrl":"https://doi.org/10.1145/1133572.1133578","url":null,"abstract":"This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides clients with three primitives: (i) anonymous message delivery, (ii) anonymous channels, and (iii) secure pseudonyms. AP3 is designed to be lightweight, low-cost and provides \"probable innocence\" anonymity to participating users, even under a large-scale coordinated attack by a limited fraction of malicious overlay nodes. Additionally, we use AP3's primitives to build novel anonymous group communication facilities (multicast and anycast), which shield the identity of both publishers and subscribers.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134436750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
A sledgehammer approach to reuse of legacy device drivers 重用遗留设备驱动程序的大锤式方法
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133617
Joshua LeVasseur, Volkmar Uhlig
Device drivers account for the majority of an operating system's code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New operating systems should benefit from the existing device driver code base without demanding legacy support from the kernel.Instead of trying to directly integrate existing device drivers we propose a more radical approach. We run the unmodified device driver, with its complete original OS, isolated in a virtual machine. Our flexible approach, requiring only minimal support infrastructure, allows us to run any existing device driver, independently of the OS or driver vendor.
设备驱动程序占操作系统代码库的大部分,重用现有的驱动程序基础结构是任何新操作系统项目的实际需求。新的操作系统应该受益于现有的设备驱动程序代码库,而不需要内核的遗留支持。而不是试图直接集成现有的设备驱动程序,我们提出了一个更激进的方法。我们运行未修改的设备驱动程序,其完整的原始操作系统,隔离在虚拟机中。我们灵活的方法,只需要最少的支持基础设施,允许我们运行任何现有的设备驱动程序,独立于操作系统或驱动程序供应商。
{"title":"A sledgehammer approach to reuse of legacy device drivers","authors":"Joshua LeVasseur, Volkmar Uhlig","doi":"10.1145/1133572.1133617","DOIUrl":"https://doi.org/10.1145/1133572.1133617","url":null,"abstract":"Device drivers account for the majority of an operating system's code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New operating systems should benefit from the existing device driver code base without demanding legacy support from the kernel.Instead of trying to directly integrate existing device drivers we propose a more radical approach. We run the unmodified device driver, with its complete original OS, isolated in a virtual machine. Our flexible approach, requiring only minimal support infrastructure, allows us to run any existing device driver, independently of the OS or driver vendor.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121393838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Using AOP to develop architectural-neutral operating system components 使用AOP开发与体系结构无关的操作系统组件
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133582
O. Spinczyk, D. Lohmann
The architecture of an operating system, e.g. micro kernel or monolithic kernel, is usually seen as something static. Even during the long lasting evolution of operating system code it is extremely hard and, thus, expensive to change the architecture. However, our experience is that architectural evolution is often required and an architecture-neutral way to develop operating system components should be found. After analyzing why architectural flexibility is so difficult to achieve, we propose Aspect-Oriented Programming (AOP) as a solution. An example from the PURE OS family, which is implemented in an aspect-oriented programming language called AspectC++, will demonstrate the usefulness of the approach, which allows to separate the code that implements architectural properties from the core functionality.
操作系统的体系结构,例如微内核或单内核,通常被视为静态的东西。即使在操作系统代码的长期演变过程中,更改体系结构也是极其困难的,因此成本也很高。然而,我们的经验是体系结构的发展经常是必需的,并且应该找到一种与体系结构无关的方法来开发操作系统组件。在分析了为什么架构灵活性如此难以实现之后,我们提出了面向方面的编程(AOP)作为解决方案。PURE OS家族的一个例子是用一种名为aspectc++的面向方面编程语言实现的,它将展示这种方法的有用性,它允许将实现体系结构属性的代码与核心功能分开。
{"title":"Using AOP to develop architectural-neutral operating system components","authors":"O. Spinczyk, D. Lohmann","doi":"10.1145/1133572.1133582","DOIUrl":"https://doi.org/10.1145/1133572.1133582","url":null,"abstract":"The architecture of an operating system, e.g. micro kernel or monolithic kernel, is usually seen as something static. Even during the long lasting evolution of operating system code it is extremely hard and, thus, expensive to change the architecture. However, our experience is that architectural evolution is often required and an architecture-neutral way to develop operating system components should be found. After analyzing why architectural flexibility is so difficult to achieve, we propose Aspect-Oriented Programming (AOP) as a solution. An example from the PURE OS family, which is implemented in an aspect-oriented programming language called AspectC++, will demonstrate the usefulness of the approach, which allows to separate the code that implements architectural properties from the core functionality.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
QoS for internet services: done right 互联网服务的QoS:做得对
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133596
J. Blanquer, Antoni Batchelli, K. Schauser, R. Wolski
In this paper we argue that the best approach to providing Quality of Service (QoS) guarantees to current Internet services is to use admission control and traffic shaping techniques at the entrance points of Internet hosting sites. We propose a black-box approach that does not require knowledge, instrumentation, or modification of the system (hardware and software) that implements the services provided by the site.We maintain that such a non-intrusive QoS solution achieves better resource utilization, has lower cost, and is more flexible than the current approaches of physical partitioning and hardware over-provisioning. Furthermore, we contend that our solution is easier to deploy, less complex to implement, and easier to maintain than more intrusive approaches which embed the QoS logic into the operating system, distributed middleware, or application code. We demonstrate empirically that despite being decoupled from the internal mechanisms implementing the site, a black-box approach provides effective response times and capacity guarantees.
在本文中,我们认为为当前互联网服务提供服务质量(QoS)保证的最佳方法是在互联网托管站点的入口点使用准入控制和流量整形技术。我们提出一种黑盒方法,它不需要知识、仪器或对实现站点提供的服务的系统(硬件和软件)进行修改。我们认为,这种非侵入性的QoS解决方案实现了更好的资源利用率,成本更低,并且比当前的物理分区和硬件过度配置方法更灵活。此外,我们认为我们的解决方案更容易部署,实现起来不那么复杂,并且比那些将QoS逻辑嵌入到操作系统、分布式中间件或应用程序代码中的更具侵入性的方法更容易维护。我们的经验证明,尽管与实现站点的内部机制解耦,黑盒方法提供了有效的响应时间和容量保证。
{"title":"QoS for internet services: done right","authors":"J. Blanquer, Antoni Batchelli, K. Schauser, R. Wolski","doi":"10.1145/1133572.1133596","DOIUrl":"https://doi.org/10.1145/1133572.1133596","url":null,"abstract":"In this paper we argue that the best approach to providing Quality of Service (QoS) guarantees to current Internet services is to use admission control and traffic shaping techniques at the entrance points of Internet hosting sites. We propose a black-box approach that does not require knowledge, instrumentation, or modification of the system (hardware and software) that implements the services provided by the site.We maintain that such a non-intrusive QoS solution achieves better resource utilization, has lower cost, and is more flexible than the current approaches of physical partitioning and hardware over-provisioning. Furthermore, we contend that our solution is easier to deploy, less complex to implement, and easier to maintain than more intrusive approaches which embed the QoS logic into the operating system, distributed middleware, or application code. We demonstrate empirically that despite being decoupled from the internal mechanisms implementing the site, a black-box approach provides effective response times and capacity guarantees.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
EW 11
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1