首页 > 最新文献

24th International Conference on Distributed Computing Systems, 2004. Proceedings.最新文献

英文 中文
Canon in G major: designing DHTs with hierarchical structure G大调经典:设计具有层次结构的dht
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281591
Prasanna Ganesan, K. Gummadi, H. Garcia-Molina
Distributed hash tables have been proposed as flat, nonhierarchical structures, in contrast to most scalable distributed systems of the past. We show how to construct hierarchical DHTs while retaining the homogeneity of load and functionality offered by flat designs. Our generic construction, Canon, offers the same routing state vs. routing hops trade-off provided by standard DHT designs. The advantages of Canon include (but are not limited to) (a) fault isolation, (b) efficient caching and effective bandwidth usage for multicast, (c) adaptation to the underlying physical network, (d) hierarchical storage of content, and (e) hierarchical access control. Canon can be applied to many different proposed DHTs to construct their Canonical versions. We show how four different DHTs - Chord, Symphony, CAN and Kademlia - can be converted into their Canonical versions that we call Crescendo, Cacophony, Can-Can and Kandy respectively.
与过去大多数可扩展的分布式系统相比,分布式哈希表被提出为扁平的、非分层结构。我们将展示如何构建分层dht,同时保持平面设计提供的负载和功能的同质性。我们的通用结构,佳能,提供相同的路由状态与路由跳之间的权衡提供标准DHT设计。Canon的优点包括(但不限于)(a)故障隔离,(b)高效缓存和有效的多播带宽使用,(c)适应底层物理网络,(d)内容分层存储,以及(e)分层访问控制。正典可以应用于许多不同的被提议的dht来构建它们的正典版本。我们展示了四种不同的dht -和弦,交响乐,CAN和卡德姆利亚-可以转换成他们的规范版本,我们分别称之为渐强,不和谐,CAN - CAN和康提。
{"title":"Canon in G major: designing DHTs with hierarchical structure","authors":"Prasanna Ganesan, K. Gummadi, H. Garcia-Molina","doi":"10.1109/ICDCS.2004.1281591","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281591","url":null,"abstract":"Distributed hash tables have been proposed as flat, nonhierarchical structures, in contrast to most scalable distributed systems of the past. We show how to construct hierarchical DHTs while retaining the homogeneity of load and functionality offered by flat designs. Our generic construction, Canon, offers the same routing state vs. routing hops trade-off provided by standard DHT designs. The advantages of Canon include (but are not limited to) (a) fault isolation, (b) efficient caching and effective bandwidth usage for multicast, (c) adaptation to the underlying physical network, (d) hierarchical storage of content, and (e) hierarchical access control. Canon can be applied to many different proposed DHTs to construct their Canonical versions. We show how four different DHTs - Chord, Symphony, CAN and Kademlia - can be converted into their Canonical versions that we call Crescendo, Cacophony, Can-Can and Kandy respectively.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124403849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 232
Analyzing the secure overlay services architecture under intelligent DDoS attacks 分析智能DDoS攻击下的安全覆盖业务架构
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281606
D. Xuan, S. Chellappan, Xun Wang, Shengquan Wang
Distributed denial of service (DDoS) attacks are currently major threats to communication in the Internet. A secure overlay services (SOS) architecture has been proposed to provide reliable communication between clients and a target under DDoS attacks. The SOS architecture employs a set of overlay nodes arranged in three hierarchical layers that controls access to the target. Although the architecture is novel and works well under simple congestion based attacks, we observe that it is vulnerable under more intelligent attacks. We generalize the SOS architecture by introducing more flexibility in layering to the original architecture. We define two intelligent DDoS attack models and develop an analytical approach to study the impacts of the number of layers, number of neighbors per node and the node distribution per layer on the system performance under these two attack models. Our data clearly demonstrate that performance is indeed sensitive to the design features and the different design features interact with each other to impact overall system performance.
分布式拒绝服务(DDoS)攻击是当前互联网通信的主要威胁。为了在DDoS攻击下提供客户端与目标之间可靠的通信,提出了一种安全覆盖服务(SOS)架构。SOS体系结构采用一组分布在三个层次结构层中的覆盖节点,这些节点控制对目标的访问。尽管该体系结构新颖,在简单的基于拥塞的攻击下工作良好,但我们观察到它在更智能的攻击下容易受到攻击。我们通过在原始体系结构中引入更多的分层灵活性来推广SOS体系结构。本文定义了两种智能DDoS攻击模型,并建立了一种分析方法,研究了在这两种攻击模型下,层数、每节点邻居数和每层节点分布对系统性能的影响。我们的数据清楚地表明,性能确实对设计特征很敏感,不同的设计特征相互作用,影响整体系统性能。
{"title":"Analyzing the secure overlay services architecture under intelligent DDoS attacks","authors":"D. Xuan, S. Chellappan, Xun Wang, Shengquan Wang","doi":"10.1109/ICDCS.2004.1281606","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281606","url":null,"abstract":"Distributed denial of service (DDoS) attacks are currently major threats to communication in the Internet. A secure overlay services (SOS) architecture has been proposed to provide reliable communication between clients and a target under DDoS attacks. The SOS architecture employs a set of overlay nodes arranged in three hierarchical layers that controls access to the target. Although the architecture is novel and works well under simple congestion based attacks, we observe that it is vulnerable under more intelligent attacks. We generalize the SOS architecture by introducing more flexibility in layering to the original architecture. We define two intelligent DDoS attack models and develop an analytical approach to study the impacts of the number of layers, number of neighbors per node and the node distribution per layer on the system performance under these two attack models. Our data clearly demonstrate that performance is indeed sensitive to the design features and the different design features interact with each other to impact overall system performance.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114603619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Choosing replica placement heuristics for wide-area systems 广域系统的副本放置启发式选择
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281600
M. Karlsson, C. Karamanolis
Data replication is used extensively in wide-area distributed systems to achieve low data-access latency. A large number of heuristics have been proposed to perform replica placement. Practical experience indicates that the choice of heuristic makes a big difference in terms of the cost of required infrastructure (e.g., storage capacity and network bandwidth), depending on system topology, workload and performance goals. We describe a method to assist system designers choose placement heuristics that meet their performance goals for the lowest possible infrastructure cost. Existing heuristics are classified according to a number of properties. The inherent cost (lower bound) for each class of heuristics is obtained for given system, workload and performance goals. The system designer compares different classes of heuristics on the basis of these lower bounds. Experimental results show that choosing a heuristic with the proposed methodology results in up to 7 times lower cost compared to using an "obvious " heuristic, such as caching.
数据复制广泛应用于广域分布式系统中,以实现较低的数据访问延迟。已经提出了大量的启发式方法来执行副本放置。实践经验表明,根据系统拓扑、工作负载和性能目标,启发式的选择在所需基础设施(例如,存储容量和网络带宽)的成本方面有很大的不同。我们描述了一种方法来帮助系统设计者选择放置启发式,以满足他们的性能目标,以尽可能低的基础设施成本。现有的启发式是根据一些属性进行分类的。针对给定的系统、工作负载和性能目标,得到了每一类启发式算法的固有代价(下界)。系统设计者在这些下界的基础上比较不同类型的启发式。实验结果表明,与使用“明显的”启发式方法(如缓存)相比,使用该方法选择启发式方法的成本可降低7倍。
{"title":"Choosing replica placement heuristics for wide-area systems","authors":"M. Karlsson, C. Karamanolis","doi":"10.1109/ICDCS.2004.1281600","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281600","url":null,"abstract":"Data replication is used extensively in wide-area distributed systems to achieve low data-access latency. A large number of heuristics have been proposed to perform replica placement. Practical experience indicates that the choice of heuristic makes a big difference in terms of the cost of required infrastructure (e.g., storage capacity and network bandwidth), depending on system topology, workload and performance goals. We describe a method to assist system designers choose placement heuristics that meet their performance goals for the lowest possible infrastructure cost. Existing heuristics are classified according to a number of properties. The inherent cost (lower bound) for each class of heuristics is obtained for given system, workload and performance goals. The system designer compares different classes of heuristics on the basis of these lower bounds. Experimental results show that choosing a heuristic with the proposed methodology results in up to 7 times lower cost compared to using an \"obvious \" heuristic, such as caching.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
Scalable self-stabilization via composition 可扩展的自稳定通过组合
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281563
William Leal, A. Arora
Objections to the practical use of stabilization have centered around problems of scale. Because of potential interferences between actions, global reasoning over the entire system is in general necessary. The complexity of this task increases dramatically as systems grow in size. Alternatives to dealing with this complexity focus on reset and composition. For reset, the problem is that any fault, no matter how minor, will cause a complete system reset with potentially significant lack of availability. For existing compositional alternatives, including compositional reset, severe restrictions on candidate systems are imposed. To address these issues, we give a framework for composition in which global reasoning and detailed system knowledge are not necessary, and which apply to a significantly wider range of systems than has hitherto been possible. We explicitly identify for each component which other components it can corrupt. Additionally, the correction of one component often depends on the prior correction of one or more other components, constraining the order in which correction can take place. Given appropriate component stabilizers such as detectors and correctors, we offer several ways to coordinate system correction, depending on what is actually known about the corruption and correction relations. By reducing the design of and reasoning about stabilization to local activities involving each component and the neighbors with which it interacts, the framework is scalable. Reset is generally avoided by using the correction relation to check and correct only where necessary. By including both correction and corruption relations, the framework subsumes and extends other compositional approaches. Though not directly a part of this work, we mention tools and techniques that can be used to help calculate the dependency and corruption relations and to help create the necessary stabilizers. To illustrate the theory, we show how this framework has been applied in our work in sensor networks.
对实际使用稳定化的反对主要集中在规模问题上。由于行动之间存在潜在的干扰,因此通常需要对整个系统进行全局推理。随着系统规模的增长,这项任务的复杂性也会急剧增加。处理这种复杂性的替代方法侧重于重置和组合。对于重置,问题是任何错误,无论多么小,都将导致整个系统重置,并且可能严重缺乏可用性。对于现有的组合选择,包括组合重置,对候选系统施加了严格的限制。为了解决这些问题,我们给出了一个组合框架,其中不需要全局推理和详细的系统知识,并且它适用于比迄今为止可能的更广泛的系统。我们显式地为每个组件标识它可能损坏的其他组件。此外,一个分量的校正通常依赖于一个或多个其他分量的先前校正,这限制了校正发生的顺序。给定适当的组件稳定器,如检测器和校正器,我们提供几种方法来校正坐标系,这取决于对损坏和校正关系的实际了解。通过将稳定性的设计和推理减少到涉及每个组件及其交互的邻居的本地活动,该框架具有可扩展性。通过使用校正关系,只在必要时进行检查和校正,一般可以避免复位。通过包括纠正和腐败关系,该框架包含并扩展了其他组合方法。虽然不直接属于这项工作的一部分,但我们提到了可用于帮助计算依赖关系和损坏关系并帮助创建必要的稳定器的工具和技术。为了说明该理论,我们展示了该框架如何应用于我们在传感器网络中的工作。
{"title":"Scalable self-stabilization via composition","authors":"William Leal, A. Arora","doi":"10.1109/ICDCS.2004.1281563","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281563","url":null,"abstract":"Objections to the practical use of stabilization have centered around problems of scale. Because of potential interferences between actions, global reasoning over the entire system is in general necessary. The complexity of this task increases dramatically as systems grow in size. Alternatives to dealing with this complexity focus on reset and composition. For reset, the problem is that any fault, no matter how minor, will cause a complete system reset with potentially significant lack of availability. For existing compositional alternatives, including compositional reset, severe restrictions on candidate systems are imposed. To address these issues, we give a framework for composition in which global reasoning and detailed system knowledge are not necessary, and which apply to a significantly wider range of systems than has hitherto been possible. We explicitly identify for each component which other components it can corrupt. Additionally, the correction of one component often depends on the prior correction of one or more other components, constraining the order in which correction can take place. Given appropriate component stabilizers such as detectors and correctors, we offer several ways to coordinate system correction, depending on what is actually known about the corruption and correction relations. By reducing the design of and reasoning about stabilization to local activities involving each component and the neighbors with which it interacts, the framework is scalable. Reset is generally avoided by using the correction relation to check and correct only where necessary. By including both correction and corruption relations, the framework subsumes and extends other compositional approaches. Though not directly a part of this work, we mention tools and techniques that can be used to help calculate the dependency and corruption relations and to help create the necessary stabilizers. To illustrate the theory, we show how this framework has been applied in our work in sensor networks.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"63 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134005619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
sFlow: towards resource-efficient and agile service federation in service overlay networks sFlow:在服务覆盖网络中实现资源高效和敏捷的服务联合
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281630
Mea Wang, Baochun Li, Zongpeng Li
Existing research work towards the composition of complex federated services has assumed that service requests and deliveries flow through a particular service path or tree. Here, we extend such a service model to a directed acyclic graph, allowing services to be delivered via parallel paths and interleaved with each other. Such an assumption of the service flow model has apparently introduced complexities towards the development of a distributed algorithm to federate existing services, as well as the provisioning of the required quality in the most resource-efficient fashion. To this end, we propose sFlow, a fully distributed algorithm to be executed on all service nodes, such that the federated service flow graph is resource efficient, performs well, and meets the demands of service consumers.
针对复杂联邦服务组合的现有研究工作假设服务请求和交付流经特定的服务路径或树。在这里,我们将这样的服务模型扩展为有向无环图,允许服务通过并行路径交付并相互交错。服务流模型的这种假设显然给分布式算法的开发带来了复杂性,该算法用于联合现有服务,以及以最有效的资源方式提供所需的质量。为此,我们提出了在所有服务节点上执行的全分布式算法sFlow,使联邦服务流图具有资源效率高、性能好、满足服务消费者需求的特点。
{"title":"sFlow: towards resource-efficient and agile service federation in service overlay networks","authors":"Mea Wang, Baochun Li, Zongpeng Li","doi":"10.1109/ICDCS.2004.1281630","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281630","url":null,"abstract":"Existing research work towards the composition of complex federated services has assumed that service requests and deliveries flow through a particular service path or tree. Here, we extend such a service model to a directed acyclic graph, allowing services to be delivered via parallel paths and interleaved with each other. Such an assumption of the service flow model has apparently introduced complexities towards the development of a distributed algorithm to federate existing services, as well as the provisioning of the required quality in the most resource-efficient fashion. To this end, we propose sFlow, a fully distributed algorithm to be executed on all service nodes, such that the federated service flow graph is resource efficient, performs well, and meets the demands of service consumers.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Firewall design: consistency, completeness, and compactness 防火墙设计:一致性、完整性和紧凑性
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281597
M. Gouda, A. Liu
A firewall is often placed at the entrance of each private network in the Internet. The function of a firewall is to examine each packet that passes through the entrance and decide whether to accept the packet and allow it to proceed or to discard the packet. A firewall is usually designed as a sequence of rules. To make a decision concerning some packets, the firewall rules are compared, one by one, with the packet until one rule is found to be satisfied by the packet: this rule determines the fate of the packet. We present the first ever method for designing the sequence of rules in a firewall to be consistent, complete, and compact. Consistency means that the rules are ordered correctly, completeness means that every packet satisfies at least one rule in the firewall, and compactness means that the firewall has no redundant rules. Our method starts by designing a firewall decision diagram (FDD, for short) whose consistency and completeness can be checked systematically (by an algorithm). We then apply a sequence of five algorithms to this FDD to generate, reduce and simplify the target firewall rules while maintaining the consistency and completeness of the original FDD.
防火墙通常位于Internet中每个专用网络的入口。防火墙的功能是检查通过入口的每个数据包,并决定是接受数据包并允许其继续进行还是丢弃数据包。防火墙通常被设计成一系列规则。为了对某些数据包做出决定,防火墙规则会与数据包逐一进行比较,直到找到一条符合该数据包的规则:该规则决定了数据包的命运。我们提出了有史以来第一个设计防火墙规则序列的方法,使其一致、完整和紧凑。一致性是指规则的顺序正确;完整性是指每个数据包至少满足防火墙中的一条规则;紧凑性是指防火墙中没有冗余规则。我们的方法从设计一个防火墙决策图(简称FDD)开始,它的一致性和完整性可以被系统地检查(通过算法)。然后,我们将五种算法的序列应用于该FDD,以生成,减少和简化目标防火墙规则,同时保持原始FDD的一致性和完整性。
{"title":"Firewall design: consistency, completeness, and compactness","authors":"M. Gouda, A. Liu","doi":"10.1109/ICDCS.2004.1281597","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281597","url":null,"abstract":"A firewall is often placed at the entrance of each private network in the Internet. The function of a firewall is to examine each packet that passes through the entrance and decide whether to accept the packet and allow it to proceed or to discard the packet. A firewall is usually designed as a sequence of rules. To make a decision concerning some packets, the firewall rules are compared, one by one, with the packet until one rule is found to be satisfied by the packet: this rule determines the fate of the packet. We present the first ever method for designing the sequence of rules in a firewall to be consistent, complete, and compact. Consistency means that the rules are ordered correctly, completeness means that every packet satisfies at least one rule in the firewall, and compactness means that the firewall has no redundant rules. Our method starts by designing a firewall decision diagram (FDD, for short) whose consistency and completeness can be checked systematically (by an algorithm). We then apply a sequence of five algorithms to this FDD to generate, reduce and simplify the target firewall rules while maintaining the consistency and completeness of the original FDD.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 223
ULC: a file block placement and replacement protocol to effectively exploit hierarchical locality in multi-level buffer caches ULC:一种文件块放置和替换协议,用于有效地利用多层次缓冲缓存中的分层局部性
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281581
Song Jiang, Xiaodong Zhang
In a large client/server cluster system, file blocks are cached in a multilevel storage hierarchy. Existing file block placement and replacement are either conducted on each level of the hierarchy independently, or by applying an LRU policy on more than one levels. One major limitation of these schemes is that hierarchical locality of file blocks with nonuniform strengths is ignored, resulting in many unnecessary block misses, or additional communication overhead. To address this issue, we propose a client-directed, coordinated file block placement and replacement protocol, where the nonuniform strengths of locality are dynamically identified on the client level to direct servers on placing or replacing file blocks accordingly on different levels of the buffer caches. In other words, the caching layout of the blocks in the hierarchy dynamically matches the locality of block accesses. The effectiveness of our proposed protocol comes from achieving the following three goals: (1) The multilevel cache retains the same hit rate as that of a single level cache whose size equals to the aggregate size of multilevel caches. (2) The nonuniform locality strengths of blocks are fully exploited and ranked to fit into the physical multilevel caches. (3) The communication overheads between caches are also reduced.
在大型客户机/服务器集群系统中,文件块缓存在多级存储层次结构中。现有文件块的放置和替换要么在层次结构的每个级别上独立进行,要么在多个级别上应用LRU策略。这些方案的一个主要限制是忽略了具有不均匀强度的文件块的分层局部性,从而导致许多不必要的块丢失或额外的通信开销。为了解决这个问题,我们提出了一个客户端导向的、协调的文件块放置和替换协议,其中在客户端级别动态识别局域性的不均匀强度,以指导服务器相应地在不同级别的缓冲缓存上放置或替换文件块。换句话说,层次结构中块的缓存布局动态匹配块访问的位置。我们提出的协议的有效性来自于以下三个目标的实现:(1)多级缓存与大小等于多级缓存总大小的单级缓存保持相同的命中率。(2)充分利用块的非均匀局部性强度,并对其进行排序,以适应物理多级缓存。(3)缓存之间的通信开销也减少了。
{"title":"ULC: a file block placement and replacement protocol to effectively exploit hierarchical locality in multi-level buffer caches","authors":"Song Jiang, Xiaodong Zhang","doi":"10.1109/ICDCS.2004.1281581","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281581","url":null,"abstract":"In a large client/server cluster system, file blocks are cached in a multilevel storage hierarchy. Existing file block placement and replacement are either conducted on each level of the hierarchy independently, or by applying an LRU policy on more than one levels. One major limitation of these schemes is that hierarchical locality of file blocks with nonuniform strengths is ignored, resulting in many unnecessary block misses, or additional communication overhead. To address this issue, we propose a client-directed, coordinated file block placement and replacement protocol, where the nonuniform strengths of locality are dynamically identified on the client level to direct servers on placing or replacing file blocks accordingly on different levels of the buffer caches. In other words, the caching layout of the blocks in the hierarchy dynamically matches the locality of block accesses. The effectiveness of our proposed protocol comes from achieving the following three goals: (1) The multilevel cache retains the same hit rate as that of a single level cache whose size equals to the aggregate size of multilevel caches. (2) The nonuniform locality strengths of blocks are fully exploited and ranked to fit into the physical multilevel caches. (3) The communication overheads between caches are also reduced.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"119 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Overlay multicast trees of minimal delay 覆盖多播树的最小延迟
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281633
A. Riabov, Zhen Liu, Li Zhang
Overlay multicast (or application-level multicast) has become an increasingly popular alternative to IP-supported multicast. End nodes participating in overlay multicast can form a directed tree rooted at the source using existing unicast links. For each receiving node there is always only one incoming link. Very often, nodes can support no more than a fixed number of outgoing links due to bandwidth constraints. Here, we describe an algorithm for constructing a multicast tree with the objective of minimizing the maximum communication delay (i.e. the longest path in the tree), while satisfying degree constraints at nodes. We show that the algorithm is a constant-factor approximation algorithm. We further prove that the algorithm is asymptotically optimal if the communicating nodes can be mapped into Euclidean space such that the nodes are uniformly distributed in a convex region. We evaluate the performance of the algorithm using randomly generated configurations of up to 5,000,000 nodes.
覆盖组播(或应用级组播)已成为ip支持的组播的一种日益流行的替代方案。参与覆盖组播的终端节点可以利用已有的单播链路形成以源为根的有向树。对于每个接收节点,总是只有一个传入链路。通常,由于带宽限制,节点只能支持固定数量的出站链路。在这里,我们描述了一种构造多播树的算法,其目标是最小化最大通信延迟(即树中最长的路径),同时满足节点的度约束。我们证明了该算法是一个常因子近似算法。进一步证明了该算法是渐近最优的,如果通信节点可以映射到欧几里得空间中,并且节点均匀分布在凸区域中。我们使用多达5,000,000个节点的随机生成配置来评估算法的性能。
{"title":"Overlay multicast trees of minimal delay","authors":"A. Riabov, Zhen Liu, Li Zhang","doi":"10.1109/ICDCS.2004.1281633","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281633","url":null,"abstract":"Overlay multicast (or application-level multicast) has become an increasingly popular alternative to IP-supported multicast. End nodes participating in overlay multicast can form a directed tree rooted at the source using existing unicast links. For each receiving node there is always only one incoming link. Very often, nodes can support no more than a fixed number of outgoing links due to bandwidth constraints. Here, we describe an algorithm for constructing a multicast tree with the objective of minimizing the maximum communication delay (i.e. the longest path in the tree), while satisfying degree constraints at nodes. We show that the algorithm is a constant-factor approximation algorithm. We further prove that the algorithm is asymptotically optimal if the communicating nodes can be mapped into Euclidean space such that the nodes are uniformly distributed in a convex region. We evaluate the performance of the algorithm using randomly generated configurations of up to 5,000,000 nodes.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123933016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
On the confidential auditing of distributed computing systems 分布式计算系统的保密审计研究
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281627
Yiping Shen, T. C. Lam, Jyh-Charn S. Liu, Wei Zhao
We propose a confidential logging and auditing service for distributed information systems. We propose a cluster-based TTP (trusted third party) architecture for the event log auditing services, so that no single TTP node can have the full knowledge of the logs, and thus no single node can misuse the log information without being detected. On the basis of a relaxed form of secure distributed computing paradigms, one can implement confidential auditing service so that the auditor can retrieve certain aggregated system information, e.g. the number of transactions, the total volume, the event traces, etc., without having to access the full log data. Similar to the peer relationship of routers to provide global network routing services, the mutually supported, mutually monitored cluster TTP architecture allows independent systems to collaborate in network-wide auditing without compromising their private information.
我们提出了一种分布式信息系统的机密日志和审计服务。我们提出了一种基于集群的事件日志审计服务的TTP(可信第三方)体系结构,这样就没有任何一个TTP节点可以完全了解日志,从而没有任何一个节点可以在不被发现的情况下滥用日志信息。在安全分布式计算范式的宽松形式的基础上,可以实现保密审计服务,这样审计人员就可以检索某些聚合的系统信息,例如事务数量、总量、事件跟踪等,而不必访问完整的日志数据。与提供全局网络路由服务的路由器的对等关系类似,相互支持、相互监视的集群TTP体系结构允许独立的系统在网络范围的审计中协作,而不会损害它们的私有信息。
{"title":"On the confidential auditing of distributed computing systems","authors":"Yiping Shen, T. C. Lam, Jyh-Charn S. Liu, Wei Zhao","doi":"10.1109/ICDCS.2004.1281627","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281627","url":null,"abstract":"We propose a confidential logging and auditing service for distributed information systems. We propose a cluster-based TTP (trusted third party) architecture for the event log auditing services, so that no single TTP node can have the full knowledge of the logs, and thus no single node can misuse the log information without being detected. On the basis of a relaxed form of secure distributed computing paradigms, one can implement confidential auditing service so that the auditor can retrieve certain aggregated system information, e.g. the number of transactions, the total volume, the event traces, etc., without having to access the full log data. Similar to the peer relationship of routers to provide global network routing services, the mutually supported, mutually monitored cluster TTP architecture allows independent systems to collaborate in network-wide auditing without compromising their private information.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An autonomous and decentralized protocol for delay sensitive overlay multicast tree 延迟敏感覆盖组播树的自治分散协议
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281634
H. Yamaguchi, Akihito Hiromori, T. Higashino, K. Taniguchi
Here, we present a protocol for dynamically maintaining a degree-bounded delay sensitive spanning tree in a decentralized way on overlay networks. The protocol aims at repairing the spanning tree autonomously even if multiple node's leave operations or failures (disappearances) occur simultaneously or continuously in a specified period. It also aims at maintaining the diameter (maximum delay) of the tree as small as possible. The simulation results using ns-2 have shown that the protocol could keep reasonable diameters compared with the existing centralized static algorithm even if many node's participations and disappearances occur frequently.
本文提出了一种在覆盖网络上以分散的方式动态维护度有界延迟敏感生成树的协议。该协议的目的是在一定时间内,即使多个节点同时或连续发生离开操作或故障(消失),也能自主修复生成树。它还旨在保持树的直径(最大延迟)尽可能小。ns-2仿真结果表明,与现有的集中式静态算法相比,即使频繁出现多个节点的参与和消失,该协议仍能保持合理的直径。
{"title":"An autonomous and decentralized protocol for delay sensitive overlay multicast tree","authors":"H. Yamaguchi, Akihito Hiromori, T. Higashino, K. Taniguchi","doi":"10.1109/ICDCS.2004.1281634","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281634","url":null,"abstract":"Here, we present a protocol for dynamically maintaining a degree-bounded delay sensitive spanning tree in a decentralized way on overlay networks. The protocol aims at repairing the spanning tree autonomously even if multiple node's leave operations or failures (disappearances) occur simultaneously or continuously in a specified period. It also aims at maintaining the diameter (maximum delay) of the tree as small as possible. The simulation results using ns-2 have shown that the protocol could keep reasonable diameters compared with the existing centralized static algorithm even if many node's participations and disappearances occur frequently.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
24th International Conference on Distributed Computing Systems, 2004. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1