首页 > 最新文献

24th International Conference on Distributed Computing Systems, 2004. Proceedings.最新文献

英文 中文
Spatial programming using smart messages: design and implementation 使用智能信息的空间规划:设计与实现
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281637
C. Borcea, C. Intanagonwiwat, P. Kang, U. Kremer, L. Iftode
Spatial programming (SP) is a space-aware programming model for outdoor distributed embedded systems. Central to SP are the concepts of space and spatial reference, which provide applications with a virtual resource naming in networks of embedded systems. A network resource is referenced using its expected physical location and properties. Together with other SP features, such as reference consistency and access timeout, they help programmers cope with highly dynamic network configurations in a network-transparent fashion. We present the SP design and its implementation using smart messages, a lightweight software architecture similar to mobile agents, that we developed for networks of embedded systems. We also describe the implementation and evaluation of a simple SP application over a testbed consisting of HP iPAQs running Linux and equipped with 802.11 cards for wireless communication. The experimental results indicate that SP is a viable programming model for outdoor distributed computing.
空间规划(SP)是一种面向户外分布式嵌入式系统的空间感知规划模型。SP的核心是空间和空间引用的概念,它们为嵌入式系统网络中的应用程序提供了虚拟资源命名。使用预期的物理位置和属性来引用网络资源。与其他SP特性(如引用一致性和访问超时)一起,它们帮助程序员以网络透明的方式处理高度动态的网络配置。我们介绍了SP设计及其使用智能消息的实现,智能消息是我们为嵌入式系统网络开发的一种类似于移动代理的轻量级软件架构。我们还描述了在一个测试平台上实现和评估一个简单的SP应用程序,该测试平台由运行Linux的HP ipaq组成,并配备了用于无线通信的802.11卡。实验结果表明,SP是一种可行的户外分布式计算规划模型。
{"title":"Spatial programming using smart messages: design and implementation","authors":"C. Borcea, C. Intanagonwiwat, P. Kang, U. Kremer, L. Iftode","doi":"10.1109/ICDCS.2004.1281637","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281637","url":null,"abstract":"Spatial programming (SP) is a space-aware programming model for outdoor distributed embedded systems. Central to SP are the concepts of space and spatial reference, which provide applications with a virtual resource naming in networks of embedded systems. A network resource is referenced using its expected physical location and properties. Together with other SP features, such as reference consistency and access timeout, they help programmers cope with highly dynamic network configurations in a network-transparent fashion. We present the SP design and its implementation using smart messages, a lightweight software architecture similar to mobile agents, that we developed for networks of embedded systems. We also describe the implementation and evaluation of a simple SP application over a testbed consisting of HP iPAQs running Linux and equipped with 802.11 cards for wireless communication. The experimental results indicate that SP is a viable programming model for outdoor distributed computing.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129354835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
PIC: practical Internet coordinates for distance estimation PIC:用于距离估计的实用Internet坐标
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281582
Manuel Costa, M. Castro, A. Rowstron, P. Key
We introduce PIC, a practical coordinate-based mechanism to estimate Internet network distance (i.e., round-trip delay or network hops). Network distance estimation is important in many applications; for example, network-aware overlay construction and server selection. There are several proposals for distance estimation in the Internet but they all suffer from problems that limit their benefit. Most rely on a small set of infrastructure nodes that are a single point of failure and limit scalability. Others use sets of peers to compute coordinates but these coordinates can be arbitrarily wrong if one of these peers is malicious. While it may be reasonable to secure a small set of infrastructure nodes, it is unreasonable to secure all peers. PIC addresses these problems: it does not rely on infrastructure nodes and it can compute accurate coordinates even when some peers are malicious. We present PIC's design, experimental evaluation, and an application to network-aware overlay construction and maintenance.
我们介绍PIC,一种实用的基于坐标的机制来估计Internet网络距离(即往返延迟或网络跳数)。网络距离估计在许多应用中都很重要;例如,网络感知覆盖结构和服务器选择。互联网上有几种距离估计的建议,但它们都存在限制其效益的问题。大多数依赖于一小组基础设施节点,这些节点是单点故障并且限制了可伸缩性。另一些则使用一组对等点来计算坐标,但如果其中一个对等点是恶意的,这些坐标可能会任意错误。虽然保护一小部分基础设施节点可能是合理的,但保护所有节点是不合理的。PIC解决了这些问题:它不依赖于基础设施节点,即使在一些对等节点恶意时,它也能计算出准确的坐标。本文介绍了PIC的设计、实验评估及其在网络感知覆盖层建设和维护中的应用。
{"title":"PIC: practical Internet coordinates for distance estimation","authors":"Manuel Costa, M. Castro, A. Rowstron, P. Key","doi":"10.1109/ICDCS.2004.1281582","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281582","url":null,"abstract":"We introduce PIC, a practical coordinate-based mechanism to estimate Internet network distance (i.e., round-trip delay or network hops). Network distance estimation is important in many applications; for example, network-aware overlay construction and server selection. There are several proposals for distance estimation in the Internet but they all suffer from problems that limit their benefit. Most rely on a small set of infrastructure nodes that are a single point of failure and limit scalability. Others use sets of peers to compute coordinates but these coordinates can be arbitrarily wrong if one of these peers is malicious. While it may be reasonable to secure a small set of infrastructure nodes, it is unreasonable to secure all peers. PIC addresses these problems: it does not rely on infrastructure nodes and it can compute accurate coordinates even when some peers are malicious. We present PIC's design, experimental evaluation, and an application to network-aware overlay construction and maintenance.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126570540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 351
Extended consistent hashing: an efficient framework for object location 扩展一致散列:一个有效的对象定位框架
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281590
Shan Lei, A. Grama
Content caching and location are key enabling technologies for achieving the high throughput needed to sustain current Internet infrastructure, both for peer-to-peer as well as client-server applications. An important aspect of distributed caching techniques is the mapping of data and requests to maximize system throughput while minimizing costs in the presence of network and cache failures. We describe a new cache protocol based on consistent hashing (CH) [D. Karger et al., (1997), (1999)]. Compared to consistent hashing, our protocol, called extended consistent hashing (ECH), can handle flash access to objects significantly better and yields better worst-case response times and lower load variance. Due to multiplicity of client views in a distributed hashing scheme, a single object (or its reference) may be cached at multiple locations. This is referred to as the spread of an object. Consistent hashing maps a request to a cache irrespective of the spread of the requested object. ECH, on the other hand, estimates the spread of an object and randomizes requests over expected spread. In doing so, it amortizes requests over a larger number of caches. While the expected load on target caches in ECH remains the same as consistent hashing (asymptotically optimal), load variance is significantly reduced. We present analytical results as well as simulations to demonstrate significant improvements for querying frequently accessed objects, up to 80% in worst-case response time and 30% in variance of server/target cache loads. We also show excellent correlation between expected and observed results. What makes ECH particularly attractive is that it can be integrated into existing infrastructure based on consistent hashing with minimal software overhead.
内容缓存和位置是实现维持当前Internet基础设施所需的高吞吐量的关键启用技术,包括点对点和客户机-服务器应用程序。分布式缓存技术的一个重要方面是数据和请求的映射,以最大化系统吞吐量,同时在网络和缓存故障的情况下最小化成本。我们描述了一种基于一致性哈希(CH)的缓存协议[D]。Karger等,(1997),(1999)。与一致性哈希相比,我们的协议,称为扩展一致性哈希(ECH),可以更好地处理对对象的闪存访问,并产生更好的最坏情况响应时间和更低的负载方差。由于分布式哈希方案中的客户端视图的多样性,单个对象(或其引用)可能被缓存在多个位置。这被称为物体的扩散。一致性散列将请求映射到缓存,而不考虑所请求对象的分布。另一方面,ECH估计对象的分布,并根据预期的分布随机化请求。在这样做时,它将请求分摊到更多的缓存上。虽然ECH中目标缓存上的预期负载与一致散列(渐近最优)保持相同,但负载方差显著减小。我们提供了分析结果和模拟,以展示查询频繁访问对象的显著改进,在最坏情况下的响应时间提高了80%,服务器/目标缓存负载的差异提高了30%。我们还显示了预期结果和观测结果之间的良好相关性。使ECH特别有吸引力的是,它可以以最小的软件开销集成到基于一致散列的现有基础设施中。
{"title":"Extended consistent hashing: an efficient framework for object location","authors":"Shan Lei, A. Grama","doi":"10.1109/ICDCS.2004.1281590","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281590","url":null,"abstract":"Content caching and location are key enabling technologies for achieving the high throughput needed to sustain current Internet infrastructure, both for peer-to-peer as well as client-server applications. An important aspect of distributed caching techniques is the mapping of data and requests to maximize system throughput while minimizing costs in the presence of network and cache failures. We describe a new cache protocol based on consistent hashing (CH) [D. Karger et al., (1997), (1999)]. Compared to consistent hashing, our protocol, called extended consistent hashing (ECH), can handle flash access to objects significantly better and yields better worst-case response times and lower load variance. Due to multiplicity of client views in a distributed hashing scheme, a single object (or its reference) may be cached at multiple locations. This is referred to as the spread of an object. Consistent hashing maps a request to a cache irrespective of the spread of the requested object. ECH, on the other hand, estimates the spread of an object and randomizes requests over expected spread. In doing so, it amortizes requests over a larger number of caches. While the expected load on target caches in ECH remains the same as consistent hashing (asymptotically optimal), load variance is significantly reduced. We present analytical results as well as simulations to demonstrate significant improvements for querying frequently accessed objects, up to 80% in worst-case response time and 30% in variance of server/target cache loads. We also show excellent correlation between expected and observed results. What makes ECH particularly attractive is that it can be integrated into existing infrastructure based on consistent hashing with minimal software overhead.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121672206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A proximity-based dynamic path shortening scheme for ubiquitous ad hoc networks 泛在自组网中基于邻近度的动态路径缩短方案
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281604
M. Saito, H. Aida, Y. Tobe, H. Tokuda
This paper describes the design, implementation, and evaluation of a proximity-based dynamic path shortening scheme, called DPS. In DPS, active route paths adapt dynamically to node mobility based on the "local" link quality estimation at each own node, without exchanging periodic control packets such as Hello packets. Each node monitors its own local link quality only when receiving packets and estimates whether to enter the "proximity "of the neighbor node to shorten active paths in a distributed manner. Simulation results of DPS in several scenarios of various node mobility and traffic flows reveal that adding DPS to DSR and AODV (conventional prominent on-demand ad hoc routing protocols) significantly reduces the end-to-end packet latency up to 50-percent and also the number of routing packets up to 70-percent over DSR, particularly in heavy traffic cases. We also demonstrate the more simulation results obtained by using our two novel mobility models which generate realistic node mobility: random orientation mobility and random escape mobility models. Finally, simple performance experiments using DPS implementation on FreeBSD OS demonstrate that DPS shortens active routes in the order of milliseconds (about 5 ms).
本文描述了一种基于邻近度的动态路径缩短方案(DPS)的设计、实现和评价。在DPS中,主动路由路径根据每个节点的“本地”链路质量估计动态适应节点移动,而不需要交换Hello报文等周期性控制报文。每个节点只有在接收到数据包时才监控自己的本地链路质量,并估计是否进入邻居节点的“邻近”,以分布式的方式缩短活动路径。DPS在各种节点移动和流量流的几种场景中的模拟结果表明,将DPS添加到DSR和AODV(传统的突出的按需自组织路由协议)中可以显着减少端到端数据包延迟高达50%,并且路由数据包数量高达70%,特别是在大流量情况下。我们还展示了两种新颖的移动模型:随机方向移动模型和随机逃逸移动模型所获得的仿真结果。最后,在FreeBSD操作系统上使用DPS实现的简单性能实验表明,DPS缩短活动路由的时间以毫秒为单位(约5毫秒)。
{"title":"A proximity-based dynamic path shortening scheme for ubiquitous ad hoc networks","authors":"M. Saito, H. Aida, Y. Tobe, H. Tokuda","doi":"10.1109/ICDCS.2004.1281604","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281604","url":null,"abstract":"This paper describes the design, implementation, and evaluation of a proximity-based dynamic path shortening scheme, called DPS. In DPS, active route paths adapt dynamically to node mobility based on the \"local\" link quality estimation at each own node, without exchanging periodic control packets such as Hello packets. Each node monitors its own local link quality only when receiving packets and estimates whether to enter the \"proximity \"of the neighbor node to shorten active paths in a distributed manner. Simulation results of DPS in several scenarios of various node mobility and traffic flows reveal that adding DPS to DSR and AODV (conventional prominent on-demand ad hoc routing protocols) significantly reduces the end-to-end packet latency up to 50-percent and also the number of routing packets up to 70-percent over DSR, particularly in heavy traffic cases. We also demonstrate the more simulation results obtained by using our two novel mobility models which generate realistic node mobility: random orientation mobility and random escape mobility models. Finally, simple performance experiments using DPS implementation on FreeBSD OS demonstrate that DPS shortens active routes in the order of milliseconds (about 5 ms).","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124760938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Evaluating GUESS and non-forwarding peer-to-peer search 评估GUESS和非转发点对点搜索
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281585
Beverly Yang, Patrick Vinograd, H. Garcia-Molina
Current search techniques over unstructured peer-to-peer networks rely on intelligent forwarding-based techniques to propagate queries to other peers in the network. Forwarding techniques are attractive because they typically require little state and offer robustness to peer failures; however they have inherent performance drawbacks due to the overhead of forwarding and lack of central control. We study GUESS, a nonforwarding search mechanism, as a viable alternative to currently popular forwarding-based mechanisms. We show how non-forwarding mechanisms can be over an order of magnitude more efficient than forwarding mechanisms; however, they must be deployed with care, as a naive implementation can result in highly suboptimal performance, and make them susceptible to hotspots and misbehaving peers.
当前在非结构化点对点网络上的搜索技术依赖于基于智能转发的技术来将查询传播到网络中的其他对等点。转发技术很有吸引力,因为它们通常需要很少的状态,并且对对等故障具有鲁棒性;然而,由于转发开销和缺乏中央控制,它们具有固有的性能缺陷。我们研究了GUESS,一种非转发搜索机制,作为目前流行的基于转发的机制的可行替代方案。我们展示了非转发机制如何比转发机制效率高出一个数量级;然而,它们必须谨慎部署,因为幼稚的实现可能导致性能极不理想,并使它们容易受到热点和行为不端的影响。
{"title":"Evaluating GUESS and non-forwarding peer-to-peer search","authors":"Beverly Yang, Patrick Vinograd, H. Garcia-Molina","doi":"10.1109/ICDCS.2004.1281585","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281585","url":null,"abstract":"Current search techniques over unstructured peer-to-peer networks rely on intelligent forwarding-based techniques to propagate queries to other peers in the network. Forwarding techniques are attractive because they typically require little state and offer robustness to peer failures; however they have inherent performance drawbacks due to the overhead of forwarding and lack of central control. We study GUESS, a nonforwarding search mechanism, as a viable alternative to currently popular forwarding-based mechanisms. We show how non-forwarding mechanisms can be over an order of magnitude more efficient than forwarding mechanisms; however, they must be deployed with care, as a naive implementation can result in highly suboptimal performance, and make them susceptible to hotspots and misbehaving peers.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A reliable mobile agent communication protocol 一个可靠的移动代理通信协议
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281613
Jiannong Cao, L. Zhang, Jin Yang, Sajal K. Das
We first propose a generic framework for the design of mobile agent communication protocols. The framework uses a flexible and adaptive mailbox-based scheme that associates each mobile agent with a mailbox while allowing the decoupling between them. This flexible approach allows us to design a variety of protocols which can be made adaptive to specific applications. Based on the framework, we derive a new protocol which possesses good characteristics such as efficiency and adaptability. To improve reliability, we implement the protocol with a fault tolerant architecture that consists of two levels of message passing primitives. Simulation results show that our protocol can effectively handle both network and host failures while keeping the communication cost low.
我们首先提出了一个通用的移动代理通信协议设计框架。该框架使用了一种灵活且自适应的基于邮箱的方案,该方案将每个移动代理与一个邮箱相关联,同时允许它们之间的解耦。这种灵活的方法允许我们设计各种协议,这些协议可以适应特定的应用程序。在此框架的基础上,我们推导出了一种新的协议,该协议具有良好的效率和适应性。为了提高可靠性,我们使用容错架构实现协议,该架构由两级消息传递原语组成。仿真结果表明,该协议可以有效地处理网络和主机故障,同时保持较低的通信成本。
{"title":"A reliable mobile agent communication protocol","authors":"Jiannong Cao, L. Zhang, Jin Yang, Sajal K. Das","doi":"10.1109/ICDCS.2004.1281613","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281613","url":null,"abstract":"We first propose a generic framework for the design of mobile agent communication protocols. The framework uses a flexible and adaptive mailbox-based scheme that associates each mobile agent with a mailbox while allowing the decoupling between them. This flexible approach allows us to design a variety of protocols which can be made adaptive to specific applications. Based on the framework, we derive a new protocol which possesses good characteristics such as efficiency and adaptability. To improve reliability, we implement the protocol with a fault tolerant architecture that consists of two levels of message passing primitives. Simulation results show that our protocol can effectively handle both network and host failures while keeping the communication cost low.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
DisCo: middleware for securely deploying decomposable services in partly trusted environments DisCo:用于在部分可信环境中安全部署可分解服务的中间件
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281616
E. Freudenthal, V. Karamcheti
The DisCo middleware infrastructure facilitates the construction and deployment of decomposable applications for environments with dynamic network connectivity properties and unstable trust relationships spanning multiple administrative domains. Consumers of these services, who are mutually anonymous, must be able to discover, securely acquire the code for, and install service components over the network with only minimal a priori knowledge of their locations. Once installed, these components must be able to intemperate securely and reliably across the network. Solutions exist that address individual challenges posed by such an environment, but they rely upon mutually incompatible authorization models that are frequently insufficiently expressive. The primary contributions of DisCo are (1) a middleware toolkit for constructing such applications, (2) a unifying authorization abstraction, and (3) a realization of this authorization well suited for expressing partial trust relationships typical of such environments. We focus on the first two of these contributions, [E. Freudenthal et al., (2002)] presents the third.
DisCo中间件基础设施有助于为具有动态网络连接属性和跨多个管理域的不稳定信任关系的环境构建和部署可分解应用程序。这些服务的消费者是相互匿名的,他们必须能够发现、安全地获取服务组件的代码,并在网络上安装服务组件,而只需要对其位置有最低限度的先验知识。安装后,这些组件必须能够安全可靠地跨网络传输。现有的解决方案可以解决这种环境所带来的单个挑战,但它们依赖于相互不兼容的授权模型,这些模型往往表现力不足。DisCo的主要贡献是(1)一个用于构造此类应用程序的中间件工具包,(2)一个统一的授权抽象,以及(3)这种授权的实现非常适合于表达此类环境中典型的部分信任关系。我们主要关注前两个贡献,[E。Freudenthal et al.,(2002)]提出了第三种。
{"title":"DisCo: middleware for securely deploying decomposable services in partly trusted environments","authors":"E. Freudenthal, V. Karamcheti","doi":"10.1109/ICDCS.2004.1281616","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281616","url":null,"abstract":"The DisCo middleware infrastructure facilitates the construction and deployment of decomposable applications for environments with dynamic network connectivity properties and unstable trust relationships spanning multiple administrative domains. Consumers of these services, who are mutually anonymous, must be able to discover, securely acquire the code for, and install service components over the network with only minimal a priori knowledge of their locations. Once installed, these components must be able to intemperate securely and reliably across the network. Solutions exist that address individual challenges posed by such an environment, but they rely upon mutually incompatible authorization models that are frequently insufficiently expressive. The primary contributions of DisCo are (1) a middleware toolkit for constructing such applications, (2) a unifying authorization abstraction, and (3) a realization of this authorization well suited for expressing partial trust relationships typical of such environments. We focus on the first two of these contributions, [E. Freudenthal et al., (2002)] presents the third.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129778821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SRB: shared running buffers in proxy to exploit memory locality of multiple streaming media sessions SRB:在代理中共享运行缓冲区,以利用多个流媒体会话的内存局部性
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281647
Songqing Chen, Bo Shen, Yong Yan, Sujoy Basu, Xiaodong Zhang
With the falling price of the memory, an increasing number of multimedia servers and proxies are now equipped with a large DRAM memory space. Caching media objects in the memory of a proxy helps to reduce network traffic, disk I/O bandwidth requirement, and data delivery latency. The running buffer approach and its alternatives are representative techniques to cache streaming data in the memory. However, there are two limits in the existing techniques. First, although multiple running buffers for the same media object co-exist in a given processing period, data sharing among the multiple buffers is not considered. Second, user access patterns are not insightfully considered in the buffer management. In this paper, we propose two techniques based on shared running buffers (SRB) in the proxy to address these limits. Considering user access patterns and characteristics of the requested media objects, our techniques adoptively allocate memory buffers to fully utilize the currently buffered data of streaming sessions, with the aim to reduce both the server load and the network traffic. Experimentally comparing with several existing techniques, we show that the proposed techniques have achieved significant performance improvement by effectively using the shared running buffers.
随着内存价格的下降,越来越多的多媒体服务器和代理服务器配备了大容量的DRAM内存。将介质对象缓存到代理的内存中,可以减少网络流量、磁盘I/O带宽需求和数据传输延迟。运行缓冲区方法及其替代方法是在内存中缓存流数据的代表性技术。然而,现有的技术有两个限制。首先,尽管在给定的处理周期内存在针对同一媒体对象的多个正在运行的缓冲区,但不考虑多个缓冲区之间的数据共享。其次,在缓冲区管理中没有深入考虑用户访问模式。在本文中,我们提出了两种基于代理中共享运行缓冲区(SRB)的技术来解决这些限制。考虑到用户访问模式和所请求媒体对象的特征,我们的技术采用了内存缓冲区的分配,以充分利用流会话的当前缓冲数据,目的是减少服务器负载和网络流量。与现有的几种技术进行了实验比较,结果表明,该技术通过有效地使用共享运行缓冲区,实现了显著的性能改进。
{"title":"SRB: shared running buffers in proxy to exploit memory locality of multiple streaming media sessions","authors":"Songqing Chen, Bo Shen, Yong Yan, Sujoy Basu, Xiaodong Zhang","doi":"10.1109/ICDCS.2004.1281647","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281647","url":null,"abstract":"With the falling price of the memory, an increasing number of multimedia servers and proxies are now equipped with a large DRAM memory space. Caching media objects in the memory of a proxy helps to reduce network traffic, disk I/O bandwidth requirement, and data delivery latency. The running buffer approach and its alternatives are representative techniques to cache streaming data in the memory. However, there are two limits in the existing techniques. First, although multiple running buffers for the same media object co-exist in a given processing period, data sharing among the multiple buffers is not considered. Second, user access patterns are not insightfully considered in the buffer management. In this paper, we propose two techniques based on shared running buffers (SRB) in the proxy to address these limits. Considering user access patterns and characteristics of the requested media objects, our techniques adoptively allocate memory buffers to fully utilize the currently buffered data of streaming sessions, with the aim to reduce both the server load and the network traffic. Experimentally comparing with several existing techniques, we show that the proposed techniques have achieved significant performance improvement by effectively using the shared running buffers.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"56 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Ensuring content and intention consistency in real-time group editors 确保实时组编辑的内容和意图的一致性
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281643
Du Li, Rui Li
Real-time group editors allow distributed users to work on local replicas of a shared document simultaneously to achieve high responsiveness and free interaction. Operational transformation (OT) is the standard method for consistency maintenance in state-of-the-art group editors. It is potentially able to achieve content consistency (convergence) as well as intention consistency (so that the converged content is what the users intend), while traditional concurrency control methods such as locking and serialization often cannot. However, existing OT algorithms are often not able to really guarantee consistency due to important algorithmic flaws that have been there for fourteen years. We present a novel state difference based transformation (SDT) algorithm to solve the problem. Our result also reveals that the standard priority schemes to break ties in distributed systems should be used with more caution.
实时组编辑器允许分布式用户同时处理共享文档的本地副本,从而实现高响应性和自由交互。操作转换(OT)是最先进的组编辑器中一致性维护的标准方法。它潜在地能够实现内容一致性(收敛)和意图一致性(这样,收敛的内容就是用户想要的),而传统的并发控制方法(如锁定和序列化)通常不能。然而,由于存在了14年的重要算法缺陷,现有的OT算法往往无法真正保证一致性。我们提出了一种新的基于状态差分的变换(SDT)算法来解决这个问题。我们的结果还表明,在分布式系统中使用标准的优先级方案来断开连接应该更加谨慎。
{"title":"Ensuring content and intention consistency in real-time group editors","authors":"Du Li, Rui Li","doi":"10.1109/ICDCS.2004.1281643","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281643","url":null,"abstract":"Real-time group editors allow distributed users to work on local replicas of a shared document simultaneously to achieve high responsiveness and free interaction. Operational transformation (OT) is the standard method for consistency maintenance in state-of-the-art group editors. It is potentially able to achieve content consistency (convergence) as well as intention consistency (so that the converged content is what the users intend), while traditional concurrency control methods such as locking and serialization often cannot. However, existing OT algorithms are often not able to really guarantee consistency due to important algorithmic flaws that have been there for fourteen years. We present a novel state difference based transformation (SDT) algorithm to solve the problem. Our result also reveals that the standard priority schemes to break ties in distributed systems should be used with more caution.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A distributed formation of a virtual backbone in MANETs using adjustable transmission ranges 在manet中使用可调传输范围的一种分布式虚拟主干网
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281602
Jie Wu, Fei Dai
Recently, the use of a virtual backbone (connected dominating set) in various applications in mobile ad hoc networks (MANETs) has become popular. These applications include topology management, point and area coverage, and routing protocol design. In a mobile environment such as a MANET, one challenging issue in constructing a virtual backbone is to accomplish a distributed and localized solution that aims at balancing several contradicting objectives: small approximation ratio, fast convergence, and low computation cost. Many existing distributed and localized algorithms select a virtual backbone without resorting to global or geographical information. However, these algorithms incur a high computation cost in a dense network. In this paper, we propose a distributed solution based on reducing the density of the network using two mechanisms: clustering and adjustable transmission range. By using adjustable transmission range, we also achieve another objective, energy-efficient design, as a by-product. As an application, we show an efficient broadcasting where nodes (and only nodes) in a virtual backbone are used to forward the broadcast message. The virtual backbone is constructed using Wu and Li's marking process [J. Wu et al., (1999)] and the proposed density reduction process. The application of the density reduction process to other localized algorithms is also discussed. The efficiency of our approach is confirmed through both analytic and simulation study.
近年来,虚拟骨干网(连接支配集)在移动自组网(manet)的各种应用中得到了广泛的应用。这些应用包括拓扑管理、点和区域覆盖以及路由协议设计。在移动环境(如MANET)中,构建虚拟骨干网的一个具有挑战性的问题是实现分布式和本地化的解决方案,该解决方案旨在平衡几个相互矛盾的目标:小近似比,快速收敛和低计算成本。许多现有的分布式和本地化算法在选择虚拟骨干网时不依赖全局或地理信息。但是,这些算法在密集的网络中计算成本很高。在本文中,我们提出了一种基于降低网络密度的分布式解决方案,采用两种机制:集群和可调传输范围。通过使用可调节的传动范围,我们还实现了另一个目标,节能设计,作为副产品。作为一个应用程序,我们展示了一种高效的广播,其中虚拟骨干中的节点(且仅节点)用于转发广播消息。虚拟骨干网是利用Wu和Li的标记过程构建的[J]。Wu et al.,(1999)]和提出的密度降低过程。本文还讨论了密度降低过程在其他局部算法中的应用。通过分析和仿真验证了该方法的有效性。
{"title":"A distributed formation of a virtual backbone in MANETs using adjustable transmission ranges","authors":"Jie Wu, Fei Dai","doi":"10.1109/ICDCS.2004.1281602","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281602","url":null,"abstract":"Recently, the use of a virtual backbone (connected dominating set) in various applications in mobile ad hoc networks (MANETs) has become popular. These applications include topology management, point and area coverage, and routing protocol design. In a mobile environment such as a MANET, one challenging issue in constructing a virtual backbone is to accomplish a distributed and localized solution that aims at balancing several contradicting objectives: small approximation ratio, fast convergence, and low computation cost. Many existing distributed and localized algorithms select a virtual backbone without resorting to global or geographical information. However, these algorithms incur a high computation cost in a dense network. In this paper, we propose a distributed solution based on reducing the density of the network using two mechanisms: clustering and adjustable transmission range. By using adjustable transmission range, we also achieve another objective, energy-efficient design, as a by-product. As an application, we show an efficient broadcasting where nodes (and only nodes) in a virtual backbone are used to forward the broadcast message. The virtual backbone is constructed using Wu and Li's marking process [J. Wu et al., (1999)] and the proposed density reduction process. The application of the density reduction process to other localized algorithms is also discussed. The efficiency of our approach is confirmed through both analytic and simulation study.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
期刊
24th International Conference on Distributed Computing Systems, 2004. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1