首页 > 最新文献

2010 IEEE 16th International Conference on Parallel and Distributed Systems最新文献

英文 中文
A Hierarchical DHT for Fault Tolerant Management in P2P-SIP Networks 用于P2P-SIP网络容错管理的分层DHT
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.43
Ibrahima Diane, I. Niang, B. Gueye
This paper focuses on fault tolerance of super-nodes in P2P-SIP systems. The large-scale environments such as P2P-SIP networks are characterized by high volatility (i.e. a high frequency of failures of super-nodes). Most fault-tolerant proposed solutions are only for physical defects. They do not take into account the timing faults that are very important for multimedia applications such as telephony. We propose HP2P-SIP which is a timing and physical fault tolerant approach based on a hierarchical approach for P2P-SIP systems. Using the Oversim simulator, we demonstrate the feasibility and the efficiency of HP2P-SIP. The obtained results show that our proposition reduces significantly the localization time of nodes, and increases the probability to find the called nodes. This optimization allows to improve the efficiency of applications that have a strong time constraints such as VoIP systems in dynamic P2P networks.
本文主要研究了P2P-SIP系统中超级节点的容错问题。P2P-SIP网络等大规模环境具有高波动性(即超级节点故障频率高)的特点。大多数提出的容错解决方案仅针对物理缺陷。它们没有考虑到定时故障,而定时故障对于电话等多媒体应用非常重要。我们提出了一种基于P2P-SIP系统分层方法的定时和物理容错方法HP2P-SIP。利用Oversim仿真器验证了HP2P-SIP协议的可行性和有效性。结果表明,该算法显著降低了节点的定位时间,提高了被调用节点的查找概率。这种优化可以提高具有较强时间限制的应用程序的效率,例如动态P2P网络中的VoIP系统。
{"title":"A Hierarchical DHT for Fault Tolerant Management in P2P-SIP Networks","authors":"Ibrahima Diane, I. Niang, B. Gueye","doi":"10.1109/ICPADS.2010.43","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.43","url":null,"abstract":"This paper focuses on fault tolerance of super-nodes in P2P-SIP systems. The large-scale environments such as P2P-SIP networks are characterized by high volatility (i.e. a high frequency of failures of super-nodes). Most fault-tolerant proposed solutions are only for physical defects. They do not take into account the timing faults that are very important for multimedia applications such as telephony. We propose HP2P-SIP which is a timing and physical fault tolerant approach based on a hierarchical approach for P2P-SIP systems. Using the Oversim simulator, we demonstrate the feasibility and the efficiency of HP2P-SIP. The obtained results show that our proposition reduces significantly the localization time of nodes, and increases the probability to find the called nodes. This optimization allows to improve the efficiency of applications that have a strong time constraints such as VoIP systems in dynamic P2P networks.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131038305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-consistency Data Replication 多一致性数据复制
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.67
Raihan Al-Ekram, R. Holt
Replication is a technique widely used in parallel and distributed systems to provide qualities such as performance, scalability, reliability and availability to their clients. These qualities comprise the non-functional requirements of the system. But the functional requirement consistency may also get affected as a side-effect of replication. Different replica control protocols provide different levels of consistency from the system. In this paper we present the middleware based McRep replication protocol that supports multiple consistency model in a distributed system with replicated data. Both correctness criteria and divergence aspects of a consistency model can be specified in the McRep configuration. Supported correctness criteria include linearizability, sequential consistency, serializability, snapshot isolation and causal consistency. Bounds on divergence can be specified in either version metric or delay metric. Our approach allows the same middleware to be used for applications requiring different consistency guarantees, eliminating the need for mastering a new replication middleware or framework for every application. We carried out experiments to compare the performance of various consistency requirements in terms of response time, concurrency conflict and bandwidth overhead. We demonstrate that in McRep workloads only pay for the consistency guarantees they actually need.
复制是一种在并行和分布式系统中广泛使用的技术,用于向客户端提供性能、可伸缩性、可靠性和可用性等质量。这些质量组成了系统的非功能需求。但是,作为复制的副作用,功能需求一致性也可能受到影响。不同的副本控制协议提供不同级别的系统一致性。本文提出了一种基于中间件的McRep复制协议,该协议支持具有复制数据的分布式系统中的多一致性模型。一致性模型的正确性标准和散度方面都可以在McRep配置中指定。支持的正确性标准包括线性一致性、顺序一致性、序列化性、快照隔离性和因果一致性。散度边界可以在版本度量或延迟度量中指定。我们的方法允许将相同的中间件用于需要不同一致性保证的应用程序,从而消除了为每个应用程序掌握一个新的复制中间件或框架的需要。我们进行了实验,从响应时间、并发冲突和带宽开销方面比较了各种一致性需求的性能。我们证明,在McRep工作负载中,只需为它们实际需要的一致性保证付费。
{"title":"Multi-consistency Data Replication","authors":"Raihan Al-Ekram, R. Holt","doi":"10.1109/ICPADS.2010.67","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.67","url":null,"abstract":"Replication is a technique widely used in parallel and distributed systems to provide qualities such as performance, scalability, reliability and availability to their clients. These qualities comprise the non-functional requirements of the system. But the functional requirement consistency may also get affected as a side-effect of replication. Different replica control protocols provide different levels of consistency from the system. In this paper we present the middleware based McRep replication protocol that supports multiple consistency model in a distributed system with replicated data. Both correctness criteria and divergence aspects of a consistency model can be specified in the McRep configuration. Supported correctness criteria include linearizability, sequential consistency, serializability, snapshot isolation and causal consistency. Bounds on divergence can be specified in either version metric or delay metric. Our approach allows the same middleware to be used for applications requiring different consistency guarantees, eliminating the need for mastering a new replication middleware or framework for every application. We carried out experiments to compare the performance of various consistency requirements in terms of response time, concurrency conflict and bandwidth overhead. We demonstrate that in McRep workloads only pay for the consistency guarantees they actually need.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127109236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Employing Multiple CUDA Devices to Accelerate LTL Model Checking 采用多CUDA设备加速LTL模型检查
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.82
J. Barnat, Petr Bauch, L. Brim, Milan Ceska
Recently, the CUDA technology has been used to accelerate many computation demanding tasks. For example, in our previous work we have shown how CUDA technology can be employed to accelerate the process of Linear Temporal Logic (LTL) Model Checking. While the raw computing power of a CUDA enabled device is tremendous, the applicability of the technology is quite often limited to small or middle-sized instances of the problems being solved. This is because the memory that a single device is equipped with, is simply not large enough to cope with large or realistic instances of the problem, which is also the case of our CUDA-aware LTL Model Checking solution. In this paper we suggest how to overcome this limitations by employing multiple (two in our case) CUDA devices for acceleration of our fine-grained communication-intensive parallel algorithm for LTL Model Checking.
近年来,CUDA技术已被用于加速许多计算要求高的任务。例如,在我们之前的工作中,我们已经展示了如何使用CUDA技术来加速线性时序逻辑(LTL)模型检查的过程。虽然支持CUDA的设备的原始计算能力是巨大的,但该技术的适用性通常仅限于正在解决的小型或中型问题实例。这是因为单个设备配备的内存根本不足以应对大的或现实的问题实例,这也是我们cuda感知LTL模型检查解决方案的情况。在本文中,我们建议如何通过使用多个(在我们的情况下是两个)CUDA设备来加速我们用于LTL模型检查的细粒度通信密集型并行算法来克服这一限制。
{"title":"Employing Multiple CUDA Devices to Accelerate LTL Model Checking","authors":"J. Barnat, Petr Bauch, L. Brim, Milan Ceska","doi":"10.1109/ICPADS.2010.82","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.82","url":null,"abstract":"Recently, the CUDA technology has been used to accelerate many computation demanding tasks. For example, in our previous work we have shown how CUDA technology can be employed to accelerate the process of Linear Temporal Logic (LTL) Model Checking. While the raw computing power of a CUDA enabled device is tremendous, the applicability of the technology is quite often limited to small or middle-sized instances of the problems being solved. This is because the memory that a single device is equipped with, is simply not large enough to cope with large or realistic instances of the problem, which is also the case of our CUDA-aware LTL Model Checking solution. In this paper we suggest how to overcome this limitations by employing multiple (two in our case) CUDA devices for acceleration of our fine-grained communication-intensive parallel algorithm for LTL Model Checking.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123586226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
4Sensing -- Decentralized Processing for Participatory Sensing Data
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.20
Heitor Ferreira, S. Duarte, Nuno M. Preguiça
Participatory Sensing is an emerging application paradigm that leverages the growing ubiquity of sensor-capable smart phones to allow communities carry out wide-area sensing tasks, as a side-effect of people's everyday lives and movements. This paper proposes a decentralized infrastructure for supporting Participatory Sensing applications. It describes an architecture and a domain specific programming language for modeling, prototyping and developing the distributed processing of participatory sensing data with the goal of allowing faster and easier development of these applications. Moreover, a case-study application is also presented as the basis for an experimental evaluation.
参与式传感是一种新兴的应用范例,它利用日益普及的具有传感器功能的智能手机,使社区能够执行广域传感任务,作为人们日常生活和活动的副作用。本文提出了一种支持参与式传感应用的分散式基础设施。它描述了一种架构和一种领域特定的编程语言,用于建模、原型设计和开发参与式传感数据的分布式处理,目标是允许更快、更容易地开发这些应用程序。此外,还提出了一个案例研究应用程序作为实验评估的基础。
{"title":"4Sensing -- Decentralized Processing for Participatory Sensing Data","authors":"Heitor Ferreira, S. Duarte, Nuno M. Preguiça","doi":"10.1109/ICPADS.2010.20","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.20","url":null,"abstract":"Participatory Sensing is an emerging application paradigm that leverages the growing ubiquity of sensor-capable smart phones to allow communities carry out wide-area sensing tasks, as a side-effect of people's everyday lives and movements. This paper proposes a decentralized infrastructure for supporting Participatory Sensing applications. It describes an architecture and a domain specific programming language for modeling, prototyping and developing the distributed processing of participatory sensing data with the goal of allowing faster and easier development of these applications. Moreover, a case-study application is also presented as the basis for an experimental evaluation.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128602658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed Spatial Analysis in Wireless Sensor Networks 无线传感器网络中的分布式空间分析
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.58
Farhana Jabeen, A. Fernandes
Environmental monitoring is an important application area for wireless sensor networks (WSNs). An important problem for environmental WSNs is the characterization of the dynamic behaviour of transient physical phenomena over space. In the case of mote-level WSNs, a solution that is computed inside the WSN is essential for energy efficiency. In this context, the main contributions of this paper to the literature on in network processing in WSNs are threefold. The paper further develops an algebraic framework with which one can express and evaluate complex topological relationships over geometrical representations of permanent features (e.g., buildings, or geographical features such as lakes and rivers) and of transient phenomena (e.g., areas of mist over a cultivated field). The paper then describes distributed implementations of spatial-algebraic operations over the regions represented by that framework, thereby enabling identification of topological relationships between regions. Finally, the paper presents experimental evidence that the techniques described lead to efficient runtime behaviour. Taken together, these contributions constitute a further step towards enabling the high-level specification of expressive spatial analyses for efficient execution inside a WSN.
环境监测是无线传感器网络的一个重要应用领域。环境无线传感器网络的一个重要问题是表征瞬态物理现象在空间上的动态行为。在移动级WSN的情况下,在WSN内部计算的解决方案对于能源效率至关重要。在此背景下,本文对无线传感器网络中网络处理的文献的主要贡献有三个方面。这篇论文进一步发展了一个代数框架,人们可以用它来表达和评估复杂的拓扑关系,而不是永久特征(例如,建筑物,或地理特征,如湖泊和河流)和瞬态现象(例如,耕地上的薄雾区域)的几何表示。然后,本文描述了由该框架表示的区域上的空间代数操作的分布式实现,从而能够识别区域之间的拓扑关系。最后,本文给出了实验证据,表明所描述的技术导致了高效的运行时行为。综上所述,这些贡献构成了进一步实现表达空间分析的高级规范,以便在WSN内有效执行。
{"title":"Distributed Spatial Analysis in Wireless Sensor Networks","authors":"Farhana Jabeen, A. Fernandes","doi":"10.1109/ICPADS.2010.58","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.58","url":null,"abstract":"Environmental monitoring is an important application area for wireless sensor networks (WSNs). An important problem for environmental WSNs is the characterization of the dynamic behaviour of transient physical phenomena over space. In the case of mote-level WSNs, a solution that is computed inside the WSN is essential for energy efficiency. In this context, the main contributions of this paper to the literature on in network processing in WSNs are threefold. The paper further develops an algebraic framework with which one can express and evaluate complex topological relationships over geometrical representations of permanent features (e.g., buildings, or geographical features such as lakes and rivers) and of transient phenomena (e.g., areas of mist over a cultivated field). The paper then describes distributed implementations of spatial-algebraic operations over the regions represented by that framework, thereby enabling identification of topological relationships between regions. Finally, the paper presents experimental evidence that the techniques described lead to efficient runtime behaviour. Taken together, these contributions constitute a further step towards enabling the high-level specification of expressive spatial analyses for efficient execution inside a WSN.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"70 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cooperative User Centric Information Dissemination in Human Content-Based Networks 基于内容的人类网络中以用户为中心的协同信息传播
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.77
M. Chuah, P. Yang, Pan Hui
Powerful wireless devices carried by humans can form human contact-based networks. Such networks often suffer from intermittent connectivity. Thus, providing an effective information dissemination feature in such networks is very important. In this paper, we explore a cooperative user centric information dissemination scheme which allows published data items to be delivered to interested nodes efficiently. Our scheme uses fewer relays and allows each node to operate distributedly using locally gathered information. Our scheme is more effective than the epidemic scheme since it achieves comparable success ratio with a 45-60% reduction in storage requirement and 47-53% reduction in transmissions. We also compare our scheme with an ideal scheme which assumes one can analyze contact traces apriori to determine their dominating sets, and show that our scheme can be more efficient than this ideal scheme.
人类携带的功能强大的无线设备可以形成基于人类接触的网络。这样的网络经常受到间歇性连接的困扰。因此,在此类网络中提供有效的信息传播功能是非常重要的。在本文中,我们探索了一种以用户为中心的协作式信息传播方案,该方案允许发布的数据项有效地传递到感兴趣的节点。我们的方案使用较少的中继,并允许每个节点使用本地收集的信息进行分布式操作。我们的方案比流行病方案更有效,存储需求减少45-60%,传输减少47-53%,成功率相当。我们还将该方案与一种理想方案进行了比较,该方案假定可以通过先验分析接触轨迹来确定其支配集,并表明我们的方案比该理想方案更有效。
{"title":"Cooperative User Centric Information Dissemination in Human Content-Based Networks","authors":"M. Chuah, P. Yang, Pan Hui","doi":"10.1109/ICPADS.2010.77","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.77","url":null,"abstract":"Powerful wireless devices carried by humans can form human contact-based networks. Such networks often suffer from intermittent connectivity. Thus, providing an effective information dissemination feature in such networks is very important. In this paper, we explore a cooperative user centric information dissemination scheme which allows published data items to be delivered to interested nodes efficiently. Our scheme uses fewer relays and allows each node to operate distributedly using locally gathered information. Our scheme is more effective than the epidemic scheme since it achieves comparable success ratio with a 45-60% reduction in storage requirement and 47-53% reduction in transmissions. We also compare our scheme with an ideal scheme which assumes one can analyze contact traces apriori to determine their dominating sets, and show that our scheme can be more efficient than this ideal scheme.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design and Practice on iVCE for Memory System 存储系统iVCE的设计与实践
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.62
Rui Chu, Tian Tian, Zhenli Lin
As one of the components in iVCE software platform, iVCE/M devotes to the performance improvement of the I/O-intensive and memory-intensive applications with efficient aggregation of distributed memory resources. To facilitate the deployment of iVCE/M, the data locating algorithm with balanced time and space cost, as well as the transparent interface for the legacy applications without code modification, are both significant in the implementation of iVCE/M. We propose the logarithmic search tree based client-side metadata structure to accelerate the data locating using moderate memory consumption, the implicit I/O redirection mechanism, and the implementation of iVCE/M based disk cache system. The experiments with cross domain emulation prove that the scheme is applicable to exploit the distributed memory resources for applications with small granularity I/O accesses.
iVCE/M作为iVCE软件平台的组成部分之一,通过对分布式内存资源的高效聚合,致力于I/ o密集型和内存密集型应用的性能提升。为了方便iVCE/M的部署,平衡时间和空间成本的数据定位算法以及无需修改代码即可为遗留应用程序提供透明的接口都是实现iVCE/M的重要因素。我们提出了基于对数搜索树的客户端元数据结构,利用适度的内存消耗、隐式I/O重定向机制和基于iVCE/M的磁盘缓存系统来加速数据定位。跨域仿真实验证明,该方案适用于小粒度I/O访问应用的分布式内存资源开发。
{"title":"Design and Practice on iVCE for Memory System","authors":"Rui Chu, Tian Tian, Zhenli Lin","doi":"10.1109/ICPADS.2010.62","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.62","url":null,"abstract":"As one of the components in iVCE software platform, iVCE/M devotes to the performance improvement of the I/O-intensive and memory-intensive applications with efficient aggregation of distributed memory resources. To facilitate the deployment of iVCE/M, the data locating algorithm with balanced time and space cost, as well as the transparent interface for the legacy applications without code modification, are both significant in the implementation of iVCE/M. We propose the logarithmic search tree based client-side metadata structure to accelerate the data locating using moderate memory consumption, the implicit I/O redirection mechanism, and the implementation of iVCE/M based disk cache system. The experiments with cross domain emulation prove that the scheme is applicable to exploit the distributed memory resources for applications with small granularity I/O accesses.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unifying Buffer Replacement and Prefetching with Data Migration for Heterogeneous Storage Devices 异构存储设备缓冲区替换和预取与数据迁移的统一
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.103
Sehwan Lee, K. Koh, H. Bahn
With the good properties of NAND flash memory such as small size, shock resistance, and low-power consumption, large capacity SSD (Solid State Disk) is anticipated to replace hard disk in high-end systems. However, the cost of NAND flash memory is still high to substitute for hard disk entirely. Using hard disk and NAND flash memory together as secondary storage is an alternative solution to provide relatively low response time, large capacity, and reasonable cost. In this paper, we present a new buffer cache management scheme with data migration that is optimized to use both NAND flash memory and hard disk together as secondary storage. The proposed scheme has three salient features. First, it detects I/O access patterns from each storage, and allocates the buffer cache space for each pattern by computing marginal gain adaptively considering the I/O cost of storage. Second, it prefetches data selectively according to their access pattern and storage devices. Third, it moves the evicted data from the buffer cache to hard disk or NAND flash memory considering the access patterns of block references on the reclamation. Trace-driven simulations show that the proposed scheme improves the I/O performance significantly. It enhances the buffer cache hit ratio by up to 29.9% and reduces the total I/O elapsed time by up to 49.5% compared to the well-acknowledged UBM scheme.
由于NAND闪存具有体积小、耐冲击、低功耗等优点,大容量SSD (Solid State Disk)有望在高端系统中取代硬盘。然而,NAND闪存的成本仍然很高,无法完全取代硬盘。使用硬盘和NAND闪存作为辅助存储是一种替代解决方案,可以提供相对较低的响应时间、较大的容量和合理的成本。在本文中,我们提出了一种新的缓冲区高速缓存管理方案,该方案优化了NAND闪存和硬盘作为辅助存储的使用。提出的方案有三个显著特点。首先,它从每个存储中检测I/O访问模式,并根据存储的I/O成本自适应计算边际增益,为每个模式分配缓冲缓存空间。其次,根据数据的访问方式和存储设备选择性地预取数据。第三,考虑回收时块引用的访问模式,将被驱逐的数据从缓冲缓存移动到硬盘或NAND闪存。跟踪驱动仿真表明,该方案显著提高了I/O性能。与公认的UBM方案相比,它将缓冲区缓存命中率提高了29.9%,并将总I/O消耗时间减少了49.5%。
{"title":"Unifying Buffer Replacement and Prefetching with Data Migration for Heterogeneous Storage Devices","authors":"Sehwan Lee, K. Koh, H. Bahn","doi":"10.1109/ICPADS.2010.103","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.103","url":null,"abstract":"With the good properties of NAND flash memory such as small size, shock resistance, and low-power consumption, large capacity SSD (Solid State Disk) is anticipated to replace hard disk in high-end systems. However, the cost of NAND flash memory is still high to substitute for hard disk entirely. Using hard disk and NAND flash memory together as secondary storage is an alternative solution to provide relatively low response time, large capacity, and reasonable cost. In this paper, we present a new buffer cache management scheme with data migration that is optimized to use both NAND flash memory and hard disk together as secondary storage. The proposed scheme has three salient features. First, it detects I/O access patterns from each storage, and allocates the buffer cache space for each pattern by computing marginal gain adaptively considering the I/O cost of storage. Second, it prefetches data selectively according to their access pattern and storage devices. Third, it moves the evicted data from the buffer cache to hard disk or NAND flash memory considering the access patterns of block references on the reclamation. Trace-driven simulations show that the proposed scheme improves the I/O performance significantly. It enhances the buffer cache hit ratio by up to 29.9% and reduces the total I/O elapsed time by up to 49.5% compared to the well-acknowledged UBM scheme.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131445985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VMGuard: An Integrity Monitoring System for Management Virtual Machines VMGuard:用于管理虚拟机的完整性监控系统
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.44
Haifeng Fang, Yiqiang Zhao, Hongyong Zang, H. H. Huang, Ying Song, Yuzhong Sun, Zhiyong Liu
A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardware and supports the guest VMs. The customers must trust the cloud providers to protect the confidentiality and integrity of their applications and data. However, as the VMs from different customers are running on the same host, an attack to the management virtual machine will easily lead to the compromise of the guest VMs. Therefore, it is critical for a cloud computing system to ensure the trustworthiness of management VMs. To this end, we propose VMGuard, an integrity monitoring and detecting system for management virtual machines in a distributed environment. VMGuard utilizes a special VM, Guard Domain, which runs on each physical node to monitor the co-resident management VMs. The integrity measurements collected by the Guard Domains are sent to the VMGuard server for safe store and independent analysis. The experimental evaluation of a Xen-based prototype shows that VMGuard can quickly detect the root kit attacks while the performance overhead is low.
云计算提供商可以根据客户的需求动态分配虚拟机(VM),同时保持对直接管理硬件并支持来宾虚拟机的管理虚拟机的特权访问。客户必须信任云提供商能够保护其应用程序和数据的机密性和完整性。但是,由于来自不同客户的虚拟机运行在同一台主机上,因此对管理虚拟机的攻击很容易导致客户虚拟机的入侵。因此,保证管理虚拟机的可信性对云计算系统至关重要。为此,我们提出了一种用于分布式环境下管理虚拟机的完整性监控和检测系统VMGuard。VMGuard使用一个特殊的虚拟机Guard Domain,它运行在每个物理节点上,监控共同驻留的管理虚拟机。Guard domain收集的完整性测量数据被发送到VMGuard服务器进行安全存储和独立分析。基于xen的原型机的实验评估表明,VMGuard可以快速检测到根工具包攻击,且性能开销低。
{"title":"VMGuard: An Integrity Monitoring System for Management Virtual Machines","authors":"Haifeng Fang, Yiqiang Zhao, Hongyong Zang, H. H. Huang, Ying Song, Yuzhong Sun, Zhiyong Liu","doi":"10.1109/ICPADS.2010.44","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.44","url":null,"abstract":"A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardware and supports the guest VMs. The customers must trust the cloud providers to protect the confidentiality and integrity of their applications and data. However, as the VMs from different customers are running on the same host, an attack to the management virtual machine will easily lead to the compromise of the guest VMs. Therefore, it is critical for a cloud computing system to ensure the trustworthiness of management VMs. To this end, we propose VMGuard, an integrity monitoring and detecting system for management virtual machines in a distributed environment. VMGuard utilizes a special VM, Guard Domain, which runs on each physical node to monitor the co-resident management VMs. The integrity measurements collected by the Guard Domains are sent to the VMGuard server for safe store and independent analysis. The experimental evaluation of a Xen-based prototype shows that VMGuard can quickly detect the root kit attacks while the performance overhead is low.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
VirtCFT: A Transparent VM-Level Fault-Tolerant System for Virtual Clusters VirtCFT:用于虚拟集群的透明vm级容错系统
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.125
Minjia Zhang, Hai Jin, Xuanhua Shi, Song Wu
A virtual cluster consists of a multitude of virtual machines and software components that are doomed to fail eventually. In many environments, such failures can result in unanticipated, potentially devastating failure behavior and in service unavailability. The ability of failover is essential to the virtual cluster’s availability, reliability, and manageability. Most of the existing methods have several common disadvantages: requiring modifications to the target processes or their OSes, which is usually error prone and sometimes impractical; only targeting at taking checkpoints of processes, not whole entire OS images, which limits the areas to be applied. In this paper we present VirtCFT, an innovative and practical system of fault tolerance for virtual cluster. VirtCFT is a system-level, coordinated distributed checkpointing fault tolerant system. It coordinates the distributed VMs to periodically reach the globally consistent state and take the checkpoint of the whole virtual cluster including states of CPU, memory, disk of each VM as well as the network communications. When faults occur, VirtCFT will automatically recover the entire virtual cluster to the correct state within a few seconds and keep it running. Superior to all the existing fault tolerance mechanisms, VirtCFT provides a simpler and totally transparent fault tolerant platform that allows existing, unmodified software and operating system (version unawareness) to be protected from the failure of the physical machine on which it runs. We have implemented this system based on the Xen virtualization platform. Our experiments with real-world benchmarks demonstrate the effectiveness and correctness of VirtCFT.
虚拟集群由许多虚拟机和软件组件组成,这些虚拟机和软件组件最终注定会失败。在许多环境中,此类故障可能导致意外的、潜在的破坏性故障行为和服务不可用。故障转移功能对于虚拟集群的可用性、可靠性和可管理性至关重要。大多数现有方法都有几个共同的缺点:需要修改目标进程或其操作系统,这通常容易出错,有时不切实际;仅针对进程的检查点,而不是整个操作系统映像,这限制了应用的区域。本文提出了一种新颖实用的虚拟集群容错系统VirtCFT。VirtCFT是一个系统级、协调的分布式检查点容错系统。它协调分布式虚拟机定期达到全局一致状态,并采取整个虚拟集群的检查点,包括每个虚拟机的CPU、内存、磁盘状态以及网络通信。当发生故障时,VirtCFT会在几秒钟内自动将整个虚拟集群恢复到正确的状态,并使其继续运行。优于所有现有的容错机制,VirtCFT提供了一个更简单和完全透明的容错平台,允许现有的,未修改的软件和操作系统(版本无意识)免受其运行的物理机器故障的影响。本系统是在Xen虚拟化平台上实现的。我们的实际基准测试实验证明了VirtCFT的有效性和正确性。
{"title":"VirtCFT: A Transparent VM-Level Fault-Tolerant System for Virtual Clusters","authors":"Minjia Zhang, Hai Jin, Xuanhua Shi, Song Wu","doi":"10.1109/ICPADS.2010.125","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.125","url":null,"abstract":"A virtual cluster consists of a multitude of virtual machines and software components that are doomed to fail eventually. In many environments, such failures can result in unanticipated, potentially devastating failure behavior and in service unavailability. The ability of failover is essential to the virtual cluster’s availability, reliability, and manageability. Most of the existing methods have several common disadvantages: requiring modifications to the target processes or their OSes, which is usually error prone and sometimes impractical; only targeting at taking checkpoints of processes, not whole entire OS images, which limits the areas to be applied. In this paper we present VirtCFT, an innovative and practical system of fault tolerance for virtual cluster. VirtCFT is a system-level, coordinated distributed checkpointing fault tolerant system. It coordinates the distributed VMs to periodically reach the globally consistent state and take the checkpoint of the whole virtual cluster including states of CPU, memory, disk of each VM as well as the network communications. When faults occur, VirtCFT will automatically recover the entire virtual cluster to the correct state within a few seconds and keep it running. Superior to all the existing fault tolerance mechanisms, VirtCFT provides a simpler and totally transparent fault tolerant platform that allows existing, unmodified software and operating system (version unawareness) to be protected from the failure of the physical machine on which it runs. We have implemented this system based on the Xen virtualization platform. Our experiments with real-world benchmarks demonstrate the effectiveness and correctness of VirtCFT.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
2010 IEEE 16th International Conference on Parallel and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1