首页 > 最新文献

Measurement and Modeling of Computer Systems最新文献

英文 中文
Queueing delays in buffered multistage interconnection networks 缓冲多级互连网络中的排队延迟
Pub Date : 2018-02-07 DOI: 10.1145/29903.29918
C. Bouras, J. Garofalakis, P. Spirakis, V. Triantafillou
Our work deals with the analysis of the queueing delays of buffered multistage Banyan networks of multiprocessors. We provide tight upper bounds on the mean delays of the second stage and beyond, in the case of infinite buffers. Our results are validated by simulations performed on a network simulator constructed by us. The analytic work for network stages beyond the first, provides a partial answer to open problems posed by previous research.
本文研究了多处理器多阶段Banyan网络的排队延迟问题。在无限缓冲区的情况下,我们提供了第二阶段及以后的平均延迟的紧上界。我们的研究结果在自己搭建的网络模拟器上得到了验证。对网络阶段的分析工作超越了第一阶段,为以前的研究提出的开放性问题提供了部分答案。
{"title":"Queueing delays in buffered multistage interconnection networks","authors":"C. Bouras, J. Garofalakis, P. Spirakis, V. Triantafillou","doi":"10.1145/29903.29918","DOIUrl":"https://doi.org/10.1145/29903.29918","url":null,"abstract":"Our work deals with the analysis of the queueing delays of buffered multistage Banyan networks of multiprocessors. We provide tight upper bounds on the mean delays of the second stage and beyond, in the case of infinite buffers. Our results are validated by simulations performed on a network simulator constructed by us. The analytic work for network stages beyond the first, provides a partial answer to open problems posed by previous research.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Data dissemination performance in large-scale sensor networks 大规模传感器网络中的数据传播性能
Pub Date : 2014-07-22 DOI: 10.1145/2637364.2591981
Thomas M. M. Meyfroyt, S. Borst, O. Boxma, D. Denteneer
As the use of wireless sensor networks increases, the need for (energy-)efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while keeping the number of transmissions low. In this paper we develop a model describing the message count in large-scale wireless sensor networks. We focus our attention on the popular Trickle algorithm, which has been proposed as a suitable communication protocol for code maintenance and propagation in wireless sensor networks. Besides providing a mathematical analysis of the algorithm, we propose a generalized version of Trickle, with an additional parameter defining the length of a listen-only period. This generalization proves to be useful for optimizing the design and usage of the algorithm. For single-cell networks we show how the message count increases with the size of the network and how this depends on the Trickle parameters. Furthermore, we derive distributions of inter-broadcasting times and investigate their asymptotic behavior. Our results prove conjectures made in the literature concerning the effect of a listen-only period. Additionally, we develop an approximation for the expected number of transmissions in multi-cell networks. All results are validated by simulations.
随着无线传感器网络使用的增加,对(能源)高效和可靠的广播算法的需求也在增长。理想情况下,广播算法应该能够快速传播数据,同时保持较低的传输次数。本文建立了一个描述大规模无线传感器网络中消息数的模型。我们将重点放在流行的涓流算法上,该算法已被提出作为一种适用于无线传感器网络中代码维护和传播的通信协议。除了提供该算法的数学分析之外,我们还提出了一个广义版本的涓流,并使用一个附加参数定义仅监听周期的长度。这种推广对优化算法的设计和使用是有用的。对于单细胞网络,我们展示了消息计数如何随着网络的大小而增加,以及这如何取决于涓滴参数。在此基础上,我们推导了广播时间的分布,并研究了它们的渐近行为。我们的研究结果证实了文献中关于纯听期影响的猜想。此外,我们开发了多小区网络中预期传输数的近似值。所有结果均通过仿真验证。
{"title":"Data dissemination performance in large-scale sensor networks","authors":"Thomas M. M. Meyfroyt, S. Borst, O. Boxma, D. Denteneer","doi":"10.1145/2637364.2591981","DOIUrl":"https://doi.org/10.1145/2637364.2591981","url":null,"abstract":"As the use of wireless sensor networks increases, the need for (energy-)efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while keeping the number of transmissions low. In this paper we develop a model describing the message count in large-scale wireless sensor networks. We focus our attention on the popular Trickle algorithm, which has been proposed as a suitable communication protocol for code maintenance and propagation in wireless sensor networks. Besides providing a mathematical analysis of the algorithm, we propose a generalized version of Trickle, with an additional parameter defining the length of a listen-only period. This generalization proves to be useful for optimizing the design and usage of the algorithm. For single-cell networks we show how the message count increases with the size of the network and how this depends on the Trickle parameters. Furthermore, we derive distributions of inter-broadcasting times and investigate their asymptotic behavior. Our results prove conjectures made in the literature concerning the effect of a listen-only period. Additionally, we develop an approximation for the expected number of transmissions in multi-cell networks. All results are validated by simulations.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127423843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FLOWR: a self-learning system for classifying mobileapplication traffic FLOWR:一个对移动应用流量进行分类的自学习系统
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592022
Qiang Xu, Thomas Andrews, Yong Liao, S. Miskovic, Z. Morley Mao, M. Baldi, A. Nucci
We aim to devise a method that can identify mobile apps related to each individual traffic flow in the wild. Mobile apps are becoming preferred means of Internet access for a growing user population. Such departure from browser based Internet poses a unique challenge to traffic management tools, still largely incapable of handling mobile apps. Consequently, enterprises and service providers become hindered by being unable to deploy effective mobile policies and security solutions. Traditionally, desktop applications and networking protocols were identified by signatures derived from transport-layer ports, ip addresses, or domain names [2, 5]. It is not suitable for mobile apps any more. The main reason is that most mobile apps communicate via generic HTTP/HTTPS traffic, thus being a priori indistinguishable from Internet browsing. State-of-the-art solutions attempted to develop signatures via user studies or app emulations [6, 4, 1]. Neither of the two approaches scales due to a number of key challenges: • Similarity. Besides using similar protocols (HTTP/HTTPS), mobiles apps communicate with largely similar IP-/domainlevel destinations, Content Delivery Networks (CDNs), and cloud services, which makes them difficult to distinguish. • Scalability. With hundreds of thousands of apps, the identification has to devise very efficient matching algorithms at line speeds. Moreover, the references for matching have to be obtained efficiently. One cannot assume running all
我们的目标是设计一种方法,可以识别与每个单独的交通流量相关的移动应用程序。移动应用程序正成为越来越多用户上网的首选方式。这种对基于浏览器的互联网的背离给流量管理工具带来了独特的挑战,这些工具在很大程度上仍然无法处理移动应用。因此,企业和服务提供商无法部署有效的移动策略和安全解决方案。传统上,桌面应用程序和网络协议是通过来自传输层端口、ip地址或域名的签名来识别的[2,5]。它不再适合移动应用程序。主要原因是,大多数移动应用程序通过通用的HTTP/HTTPS通信进行通信,因此与互联网浏览无法区分。最先进的解决方案试图通过用户研究或应用程序模拟来开发签名[6,4,1]。由于一些关键的挑战,这两种方法都不适用:•相似性。除了使用类似的协议(HTTP/HTTPS)外,移动应用程序与大部分相似的IP /域名级目的地、内容分发网络(cdn)和云服务进行通信,这使得它们很难区分。•可伸缩性。在成千上万的应用程序中,识别必须设计出非常高效的匹配算法。此外,还必须有效地获取匹配参考。我们不能假设一切都在运行
{"title":"FLOWR: a self-learning system for classifying mobileapplication traffic","authors":"Qiang Xu, Thomas Andrews, Yong Liao, S. Miskovic, Z. Morley Mao, M. Baldi, A. Nucci","doi":"10.1145/2591971.2592022","DOIUrl":"https://doi.org/10.1145/2591971.2592022","url":null,"abstract":"We aim to devise a method that can identify mobile apps related to each individual traffic flow in the wild. Mobile apps are becoming preferred means of Internet access for a growing user population. Such departure from browser based Internet poses a unique challenge to traffic management tools, still largely incapable of handling mobile apps. Consequently, enterprises and service providers become hindered by being unable to deploy effective mobile policies and security solutions. Traditionally, desktop applications and networking protocols were identified by signatures derived from transport-layer ports, ip addresses, or domain names [2, 5]. It is not suitable for mobile apps any more. The main reason is that most mobile apps communicate via generic HTTP/HTTPS traffic, thus being a priori indistinguishable from Internet browsing. State-of-the-art solutions attempted to develop signatures via user studies or app emulations [6, 4, 1]. Neither of the two approaches scales due to a number of key challenges: • Similarity. Besides using similar protocols (HTTP/HTTPS), mobiles apps communicate with largely similar IP-/domainlevel destinations, Content Delivery Networks (CDNs), and cloud services, which makes them difficult to distinguish. • Scalability. With hundreds of thousands of apps, the identification has to devise very efficient matching algorithms at line speeds. Moreover, the references for matching have to be obtained efficiently. One cannot assume running all","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115755682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud 非侵入式、带外和开箱即用的云系统监控
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592009
Sahil Suneja, C. Isci, Vasanth Bala, E. D. Lara, Todd W. Mummert
The dramatic proliferation of virtual machines (VMs) in datacenters and the highly-dynamic and transient nature of VM provisioning has revolutionized datacenter operations. However, the management of these environments is still carried out using re-purposed versions of traditional agents, originally developed for managing physical systems, or most recently via newer virtualization-aware alternatives that require guest cooperation and accessibility. We show that these existing approaches are a poor match for monitoring and managing (virtual) systems in the cloud due to their dependence on guest cooperation and operational health, and their growing lifecycle management overheads in the cloud. In this work, we first present Near Field Monitoring (NFM), our non-intrusive, out-of-band cloud monitoring and analytics approach that is designed based on cloud operation principles and to address the limitations of existing techniques. NFM decouples system execution from monitoring and analytics functions by pushing monitoring out of the targets systems' scope. By leveraging and extending VM introspection techniques, our framework provides simple, standard interfaces to monitor running systems in the cloud that require no guest cooperation or modification, and have minimal effect on guest execution. By decoupling monitoring and analytics from target system context, NFM provides ``always-on'' monitoring, even when the target system is unresponsive. NFM also works ``out-of-the-box'' for any cloud instance as it eliminates any need for installing and maintaining agents or hooks in the monitored systems. We describe the end-to-end implementation of our framework with two real-system prototypes based on two virtualization platforms. We discuss the new cloud analytics opportunities enabled by our decoupled execution, monitoring and analytics architecture. We present four applications that are built on top of our framework and show their use for across-time and across-system analytics.
数据中心中虚拟机(VM)的急剧增加以及VM供应的高度动态和瞬态特性已经彻底改变了数据中心的操作。然而,这些环境的管理仍然是使用传统代理的重新设计版本来执行的,这些代理最初是为管理物理系统而开发的,或者最近通过更新的虚拟化感知替代方案来执行,这些替代方案需要客户机的合作和可访问性。我们表明,这些现有的方法不适合监控和管理云中的(虚拟)系统,因为它们依赖于客户合作和运行状况,并且它们在云中不断增长的生命周期管理开销。在这项工作中,我们首先提出了近场监测(NFM),这是我们基于云操作原则设计的非侵入式带外云监测和分析方法,旨在解决现有技术的局限性。NFM通过将监视推到目标系统范围之外,将系统执行从监视和分析功能中分离出来。通过利用和扩展VM自省技术,我们的框架提供了简单、标准的接口来监视云中正在运行的系统,这些系统不需要客户机协作或修改,并且对客户机执行的影响最小。通过将监视和分析与目标系统上下文分离,NFM提供了“永远在线”的监视,即使在目标系统没有响应时也是如此。NFM还可以“开箱即用”地适用于任何云实例,因为它消除了在被监视系统中安装和维护代理或挂钩的需要。我们用基于两个虚拟化平台的两个真实系统原型描述了我们的框架的端到端实现。我们讨论了由我们解耦的执行、监控和分析架构带来的新的云分析机会。我们展示了构建在我们框架之上的四个应用程序,并展示了它们用于跨时间和跨系统分析的用途。
{"title":"Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud","authors":"Sahil Suneja, C. Isci, Vasanth Bala, E. D. Lara, Todd W. Mummert","doi":"10.1145/2591971.2592009","DOIUrl":"https://doi.org/10.1145/2591971.2592009","url":null,"abstract":"The dramatic proliferation of virtual machines (VMs) in datacenters and the highly-dynamic and transient nature of VM provisioning has revolutionized datacenter operations. However, the management of these environments is still carried out using re-purposed versions of traditional agents, originally developed for managing physical systems, or most recently via newer virtualization-aware alternatives that require guest cooperation and accessibility. We show that these existing approaches are a poor match for monitoring and managing (virtual) systems in the cloud due to their dependence on guest cooperation and operational health, and their growing lifecycle management overheads in the cloud.\u0000 In this work, we first present Near Field Monitoring (NFM), our non-intrusive, out-of-band cloud monitoring and analytics approach that is designed based on cloud operation principles and to address the limitations of existing techniques. NFM decouples system execution from monitoring and analytics functions by pushing monitoring out of the targets systems' scope. By leveraging and extending VM introspection techniques, our framework provides simple, standard interfaces to monitor running systems in the cloud that require no guest cooperation or modification, and have minimal effect on guest execution. By decoupling monitoring and analytics from target system context, NFM provides ``always-on'' monitoring, even when the target system is unresponsive. NFM also works ``out-of-the-box'' for any cloud instance as it eliminates any need for installing and maintaining agents or hooks in the monitored systems. We describe the end-to-end implementation of our framework with two real-system prototypes based on two virtualization platforms. We discuss the new cloud analytics opportunities enabled by our decoupled execution, monitoring and analytics architecture. We present four applications that are built on top of our framework and show their use for across-time and across-system analytics.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A measurement study of google play 对google play的测量研究
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592003
N. Viennot, Edward Garcia, Jason Nieh
Although millions of users download and use third-party Android applications from the Google Play store, little information is known on an aggregated level about these applications. We have built PlayDrone, the first scalable Google Play store crawler, and used it to index and analyze over 1,100,000 applications in the Google Play store on a daily basis, the largest such index of Android applications. PlayDrone leverages various hacking techniques to circumvent Google's roadblocks for indexing Google Play store content, and makes proprietary application sources available, including source code for over 880,000 free applications. We demonstrate the usefulness of PlayDrone in decompiling and analyzing application content by exploring four previously unaddressed issues: the characterization of Google Play application content at large scale and its evolution over time, library usage in applications and its impact on application portability, duplicative application content in Google Play, and the ineffectiveness of OAuth and related service authentication mechanisms resulting in malicious users being able to easily gain unauthorized access to user data and resources on Amazon Web Services and Facebook.
尽管数以百万计的用户从b谷歌Play商店下载和使用第三方Android应用程序,但我们对这些应用程序的总体信息知之甚少。我们已经创建了PlayDrone,这是第一个可扩展的谷歌Play商店爬虫,并使用它来索引和分析谷歌Play商店中每天超过110万个应用程序,这是Android应用程序中最大的索引。PlayDrone利用各种黑客技术绕过谷歌的路障,索引谷歌Play商店内容,并提供专有应用程序源代码,包括超过88万个免费应用程序的源代码。我们通过探索四个以前未解决的问题来展示PlayDrone在反编译和分析应用程序内容方面的有用性:谷歌Play应用程序内容的大规模特征及其随时间的演变,应用程序中的库使用及其对应用程序可移植性的影响,谷歌Play中重复的应用程序内容,以及OAuth和相关服务认证机制的无效,导致恶意用户能够轻松获得未经授权访问亚马逊Web服务和Facebook上的用户数据和资源。
{"title":"A measurement study of google play","authors":"N. Viennot, Edward Garcia, Jason Nieh","doi":"10.1145/2591971.2592003","DOIUrl":"https://doi.org/10.1145/2591971.2592003","url":null,"abstract":"Although millions of users download and use third-party Android applications from the Google Play store, little information is known on an aggregated level about these applications. We have built PlayDrone, the first scalable Google Play store crawler, and used it to index and analyze over 1,100,000 applications in the Google Play store on a daily basis, the largest such index of Android applications. PlayDrone leverages various hacking techniques to circumvent Google's roadblocks for indexing Google Play store content, and makes proprietary application sources available, including source code for over 880,000 free applications. We demonstrate the usefulness of PlayDrone in decompiling and analyzing application content by exploring four previously unaddressed issues: the characterization of Google Play application content at large scale and its evolution over time, library usage in applications and its impact on application portability, duplicative application content in Google Play, and the ineffectiveness of OAuth and related service authentication mechanisms resulting in malicious users being able to easily gain unauthorized access to user data and resources on Amazon Web Services and Facebook.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115252855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 353
Performance analysis of MAC for power-line communications 电力线通信MAC性能分析
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592033
C. Vlachou, A. Banchs, J. Herzen, Patrick Thiran
We investigate the IEEE 1901 MAC protocol, the dominant protocol for high data rate power-line communications. 1901 employs a CSMA/CA mechanism similar to - but much more complex than - the backoff mechanism of 802.11. Because of this extra complexity, and although this mechanism is the only widely used MAC layer for power-line networks, there are few analytical results on its performance. We propose a model for the 1901 MAC that comes in the form of a single fixed-point equation for the collision probability. We prove that this equation admits a unique solution, and we evaluate the accuracy of our model by using simulations.
我们研究了IEEE 1901 MAC协议,这是高数据速率电力线通信的主要协议。1901采用了一种CSMA/CA机制,类似于802.11的后退机制,但要复杂得多。由于这种额外的复杂性,尽管这种机制是电力线网络中唯一广泛使用的MAC层,但很少有关于其性能的分析结果。我们提出了一个1901年MAC的模型,该模型以单不动点方程的形式表示碰撞概率。我们证明了该方程有一个唯一解,并通过仿真对模型的准确性进行了评价。
{"title":"Performance analysis of MAC for power-line communications","authors":"C. Vlachou, A. Banchs, J. Herzen, Patrick Thiran","doi":"10.1145/2591971.2592033","DOIUrl":"https://doi.org/10.1145/2591971.2592033","url":null,"abstract":"We investigate the IEEE 1901 MAC protocol, the dominant protocol for high data rate power-line communications. 1901 employs a CSMA/CA mechanism similar to - but much more complex than - the backoff mechanism of 802.11. Because of this extra complexity, and although this mechanism is the only widely used MAC layer for power-line networks, there are few analytical results on its performance. We propose a model for the 1901 MAC that comes in the form of a single fixed-point equation for the collision probability. We prove that this equation admits a unique solution, and we evaluate the accuracy of our model by using simulations.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122408529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Balanced resource allocations across multiple dynamic MapReduce clusters 跨多个动态MapReduce集群均衡资源分配
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591998
Bogdan Ghit, N. Yigitbasi, A. Iosup, D. Epema
Running multiple instances of the MapReduce framework concurrently in a multicluster system or datacenter enables data, failure, and version isolation, which is attractive for many organizations. It may also provide some form of performance isolation, but in order to achieve this in the face of time-varying workloads submitted to the MapReduce instances, a mechanism for dynamic resource (re-)allocations to those instances is required. In this paper, we present such a mechanism called Fawkes that attempts to balance the allocations to MapReduce instances so that they experience similar service levels. Fawkes proposes a new abstraction for deploying MapReduce instances on physical resources, the MR-cluster, which represents a set of resources that can grow and shrink, and that has a core on which MapReduce is installed with the usual data locality assumptions but that relaxes those assumptions for nodes outside the core. Fawkes dynamically grows and shrinks the active MR-clusters based on a family of weighting policies with weights derived from monitoring their operation. We empirically evaluate Fawkes on a multicluster system and show that it can deliver good performance and balanced resource allocations, even when the workloads of the MR-clusters are very uneven and bursty, with workloads composed from both synthetic and real-world benchmarks.
在多集群系统或数据中心中并发运行MapReduce框架的多个实例可以实现数据隔离、故障隔离和版本隔离,这对许多组织都很有吸引力。它还可以提供某种形式的性能隔离,但是为了在提交给MapReduce实例的时变工作负载面前实现这一点,需要一种动态资源(重新)分配给这些实例的机制。在本文中,我们提出了一种叫做Fawkes的机制,它试图平衡MapReduce实例的分配,使它们体验到相似的服务水平。Fawkes提出了一个在物理资源上部署MapReduce实例的新抽象,MR-cluster,它代表了一组可以增长和收缩的资源,并且有一个核心,在这个核心上安装了MapReduce,并带有通常的数据位置假设,但对核心以外的节点放宽了这些假设。Fawkes基于一系列加权策略动态地增长和缩小活动mr集群,这些策略的权重来自于监控它们的操作。我们在多集群系统上对Fawkes进行了经验评估,并表明它可以提供良好的性能和平衡的资源分配,即使mr集群的工作负载非常不均匀和突发,工作负载由合成基准和实际基准组成。
{"title":"Balanced resource allocations across multiple dynamic MapReduce clusters","authors":"Bogdan Ghit, N. Yigitbasi, A. Iosup, D. Epema","doi":"10.1145/2591971.2591998","DOIUrl":"https://doi.org/10.1145/2591971.2591998","url":null,"abstract":"Running multiple instances of the MapReduce framework concurrently in a multicluster system or datacenter enables data, failure, and version isolation, which is attractive for many organizations. It may also provide some form of performance isolation, but in order to achieve this in the face of time-varying workloads submitted to the MapReduce instances, a mechanism for dynamic resource (re-)allocations to those instances is required. In this paper, we present such a mechanism called Fawkes that attempts to balance the allocations to MapReduce instances so that they experience similar service levels. Fawkes proposes a new abstraction for deploying MapReduce instances on physical resources, the MR-cluster, which represents a set of resources that can grow and shrink, and that has a core on which MapReduce is installed with the usual data locality assumptions but that relaxes those assumptions for nodes outside the core. Fawkes dynamically grows and shrinks the active MR-clusters based on a family of weighting policies with weights derived from monitoring their operation.\u0000 We empirically evaluate Fawkes on a multicluster system and show that it can deliver good performance and balanced resource allocations, even when the workloads of the MR-clusters are very uneven and bursty, with workloads composed from both synthetic and real-world benchmarks.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128758591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Understanding the impact of network dynamics on mobile video user engagement 了解网络动态对移动视频用户参与的影响
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591975
M. Shafiq, Jeffrey Erman, Lusheng Ji, A. Liu, Jeffrey Pang, Jia Wang
Mobile network operators have a significant interest in the performance of streaming video on their networks because network dynamics directly influence the Quality of Experience (QoE). However, unlike video service providers, network operators are not privy to the client- or server-side logs typically used to measure key video performance metrics, such as user engagement. To address this limitation, this paper presents the first large-scale study characterizing the impact of cellular network performance on mobile video user engagement from the perspective of a network operator. Our study on a month-long anonymized data set from a major cellular network makes two main contributions. First, we quantify the effect that 31 different network factors have on user behavior in mobile video. Our results provide network operators direct guidance on how to improve user engagement --- for example, improving mean signal-to-interference ratio by 1 dB reduces the likelihood of video abandonment by 2%. Second, we model the complex relationships between these factors and video abandonment, enabling operators to monitor mobile video user engagement in real-time. Our model can predict whether a user completely downloads a video with more than 87% accuracy by observing only the initial 10 seconds of video streaming sessions. Moreover, our model achieves significantly better accuracy than prior models that require client- or server-side logs, yet we only use standard radio network statistics and/or TCP/IP headers available to network operators.
移动网络运营商对其网络上流媒体视频的性能非常感兴趣,因为网络动态直接影响体验质量(QoE)。然而,与视频服务提供商不同,网络运营商并不了解客户端或服务器端日志,这些日志通常用于衡量关键视频性能指标,如用户参与度。为了解决这一限制,本文首次从网络运营商的角度对蜂窝网络性能对移动视频用户参与的影响进行了大规模研究。我们对一个主要蜂窝网络长达一个月的匿名数据集的研究有两个主要贡献。首先,我们量化了31种不同的网络因素对移动视频用户行为的影响。我们的研究结果为网络运营商提供了如何提高用户参与度的直接指导——例如,将平均信干扰比提高1 dB,可将视频放弃的可能性降低2%。其次,我们模拟了这些因素与视频放弃之间的复杂关系,使运营商能够实时监控移动视频用户的参与度。我们的模型可以通过观察视频流会话的最初10秒来预测用户是否完全下载视频,准确率超过87%。此外,我们的模型比之前需要客户端或服务器端日志的模型实现了更好的准确性,但我们只使用标准的无线网络统计数据和/或网络运营商可用的TCP/IP头。
{"title":"Understanding the impact of network dynamics on mobile video user engagement","authors":"M. Shafiq, Jeffrey Erman, Lusheng Ji, A. Liu, Jeffrey Pang, Jia Wang","doi":"10.1145/2591971.2591975","DOIUrl":"https://doi.org/10.1145/2591971.2591975","url":null,"abstract":"Mobile network operators have a significant interest in the performance of streaming video on their networks because network dynamics directly influence the Quality of Experience (QoE). However, unlike video service providers, network operators are not privy to the client- or server-side logs typically used to measure key video performance metrics, such as user engagement. To address this limitation, this paper presents the first large-scale study characterizing the impact of cellular network performance on mobile video user engagement from the perspective of a network operator. Our study on a month-long anonymized data set from a major cellular network makes two main contributions. First, we quantify the effect that 31 different network factors have on user behavior in mobile video. Our results provide network operators direct guidance on how to improve user engagement --- for example, improving mean signal-to-interference ratio by 1 dB reduces the likelihood of video abandonment by 2%. Second, we model the complex relationships between these factors and video abandonment, enabling operators to monitor mobile video user engagement in real-time. Our model can predict whether a user completely downloads a video with more than 87% accuracy by observing only the initial 10 seconds of video streaming sessions. Moreover, our model achieves significantly better accuracy than prior models that require client- or server-side logs, yet we only use standard radio network statistics and/or TCP/IP headers available to network operators.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 139
On the relevance of adversarial queueing theory in practice 论对抗性排队理论在实践中的应用
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592006
Daniel S. Berger, M. Karsten, J. Schmitt
Adversarial Queueing Theory (AQT) has shown that seemingly innocent traffic injection rates might lead to unbounded queues in packet-switched networks - depending on scheduling strategies as well as topological characteristics. Little attention has been given to quantifying these effects in realistic network configurations. In particular, the existing AQT literature makes two unrealistic assumptions: infinite buffers and perfect synchrony. Because finite buffers inherently limit queue sizes, adversarial effects ultimately lead to packet loss which we address in this work. In addition, we study the effect of imperfect network synchronization under the packet loss metric. Our results, using analysis and simulation, indicate that classical AQT examples appear harmless under realistic assumptions but for a novel class of adversaries considerably higher loss can be observed. We introduce this class by giving examples of two new AQT concepts to construct loss-efficient network adversaries. Our analysis proves the robustness of these new adversaries against randomized de-synchronization effects in terms of variable link delays and nodal processing.
对抗性排队理论(AQT)表明,在分组交换网络中,看似无害的流量注入率可能导致无界队列——这取决于调度策略和拓扑特征。很少有人注意在实际网络配置中对这些影响进行量化。特别是,现有的AQT文献提出了两个不切实际的假设:无限缓冲和完全同步。由于有限缓冲区固有地限制队列大小,对抗效应最终导致我们在本工作中解决的数据包丢失。此外,我们还研究了不完全网络同步在丢包度量下的影响。通过分析和仿真,我们的结果表明,在现实假设下,经典的AQT示例似乎是无害的,但对于一类新的对手,可以观察到相当高的损失。我们通过给出两个新的AQT概念的例子来介绍这类概念,以构建损失效率的网络对手。我们的分析证明了这些新对手在可变链路延迟和节点处理方面对随机去同步效应的鲁棒性。
{"title":"On the relevance of adversarial queueing theory in practice","authors":"Daniel S. Berger, M. Karsten, J. Schmitt","doi":"10.1145/2591971.2592006","DOIUrl":"https://doi.org/10.1145/2591971.2592006","url":null,"abstract":"Adversarial Queueing Theory (AQT) has shown that seemingly innocent traffic injection rates might lead to unbounded queues in packet-switched networks - depending on scheduling strategies as well as topological characteristics. Little attention has been given to quantifying these effects in realistic network configurations. In particular, the existing AQT literature makes two unrealistic assumptions: infinite buffers and perfect synchrony. Because finite buffers inherently limit queue sizes, adversarial effects ultimately lead to packet loss which we address in this work. In addition, we study the effect of imperfect network synchronization under the packet loss metric. Our results, using analysis and simulation, indicate that classical AQT examples appear harmless under realistic assumptions but for a novel class of adversaries considerably higher loss can be observed. We introduce this class by giving examples of two new AQT concepts to construct loss-efficient network adversaries. Our analysis proves the robustness of these new adversaries against randomized de-synchronization effects in terms of variable link delays and nodal processing.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132576960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Randomized auction design for electricity markets between grids and microgrids 电网和微电网之间电力市场的随机拍卖设计
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591999
Linquan Zhang, Zongpeng Li, Chuan Wu
This work studies electricity markets between power grids and microgrids, an emerging paradigm of electric power generation and supply. It is among the first that addresses the economic challenges arising from such grid integration, and represents the first power auction mechanism design that explicitly handles the Unit Commitment Problem (UCP), a key challenge in power grid optimization previously investigated only for centralized cooperative algorithms. The proposed solution leverages a recent result in theoretical computer science that can decompose an optimal fractional (infeasible) solution to NP-hard problems into a convex combination of integral (feasible) solutions. The end result includes randomized power auctions that are (approximately) truthful and computationally efficient, and achieve small approximation ratios for grid-wide social welfare under UCP constraints and temporal demand correlations. Both power markets with grid-to-microgrid and microgrid-to-grid energy sales are studied, with an auction designed for each, under the same randomized power auction framework. Trace driven simulations are conducted to verify the efficacy of the two proposed inter-grid power auctions.
这项工作研究了电网和微电网之间的电力市场,微电网是一种新兴的发电和供应范例。这是第一个解决这种电网整合带来的经济挑战的方案,也是第一个明确处理单元承诺问题(UCP)的电力拍卖机制设计,UCP是电网优化中的一个关键挑战,以前只针对集中式合作算法进行了研究。提出的解决方案利用了理论计算机科学的最新结果,该结果可以将np困难问题的最佳分数(不可行的)解决方案分解为积分(可行)解决方案的凸组合。最终结果包括随机电力拍卖(近似)真实且计算效率高,并在UCP约束和时间需求相关性下实现电网范围内社会福利的小近似比率。在相同的随机电力拍卖框架下,研究了电网对微网和微网对网能源销售两种电力市场,并分别设计了一种拍卖方式。通过轨迹驱动仿真验证了两种方案的有效性。
{"title":"Randomized auction design for electricity markets between grids and microgrids","authors":"Linquan Zhang, Zongpeng Li, Chuan Wu","doi":"10.1145/2591971.2591999","DOIUrl":"https://doi.org/10.1145/2591971.2591999","url":null,"abstract":"This work studies electricity markets between power grids and microgrids, an emerging paradigm of electric power generation and supply. It is among the first that addresses the economic challenges arising from such grid integration, and represents the first power auction mechanism design that explicitly handles the Unit Commitment Problem (UCP), a key challenge in power grid optimization previously investigated only for centralized cooperative algorithms. The proposed solution leverages a recent result in theoretical computer science that can decompose an optimal fractional (infeasible) solution to NP-hard problems into a convex combination of integral (feasible) solutions. The end result includes randomized power auctions that are (approximately) truthful and computationally efficient, and achieve small approximation ratios for grid-wide social welfare under UCP constraints and temporal demand correlations. Both power markets with grid-to-microgrid and microgrid-to-grid energy sales are studied, with an auction designed for each, under the same randomized power auction framework. Trace driven simulations are conducted to verify the efficacy of the two proposed inter-grid power auctions.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1