首页 > 最新文献

2009 29th IEEE International Conference on Distributed Computing Systems最新文献

英文 中文
Characterization and Solution to a Stateful IDS Evasion 有状态IDS规避的表征与解决方案
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.65
I. Aib, Tung Tran, R. Boutaba
We identify a new type of stateful IDS evasion, named signature evasion. We formalize the signature evasion on those Stateful IDSs whose state can be modeled using Deterministic Finite State Automata (DFAs). We develop an efficient algorithm which operates on rule set DFAs and derives a minimal rectification of evasive paths. Finally, we evaluate our solution on Snort signatures, identify and rectify existing vulnerable flowbit rule sets
我们确定了一种新型的有状态IDS规避,称为签名规避。对状态可用确定性有限状态自动机(dfa)建模的有状态ids,形式化了签名规避。我们开发了一种有效的算法,该算法在规则集dfa上运行,并得到了最小的回避路径纠正。最后,我们评估了Snort签名的解决方案,识别并纠正了现有的易受攻击的流位规则集
{"title":"Characterization and Solution to a Stateful IDS Evasion","authors":"I. Aib, Tung Tran, R. Boutaba","doi":"10.1109/ICDCS.2009.65","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.65","url":null,"abstract":"We identify a new type of stateful IDS evasion, named signature evasion. We formalize the signature evasion on those Stateful IDSs whose state can be modeled using Deterministic Finite State Automata (DFAs). We develop an efficient algorithm which operates on rule set DFAs and derives a minimal rectification of evasive paths. Finally, we evaluate our solution on Snort signatures, identify and rectify existing vulnerable flowbit rule sets","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Optimization of Spectrum Handoff Scheduling and Routing in Multi-hop Multi-radio Cognitive Networks 多跳多无线电认知网络中频谱切换调度和路由的联合优化
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.64
W. Feng, Jiannong Cao, Chisheng Zhang, Chuda Liu
Spectrum handoff causes performance degradation of the cognitive network when the primary user reclaims its right to access the licensed spectrum. In a multi-hop cognitive network, this problem becomes even worse since multiple links are involved. Spectrum handoff of multiple links seriously affects the network connectivity and routing. In this paper, we describe a cross-layer optimization approach to solve the spectrum handoff problem with joint consideration of spectrum handoff scheduling and routing. We propose a protocol, called Joint Spectrum Handoff Scheduling and Routing Protocol (JSHRP). This paper makes the following major contributions. First, the concept "spectrum handoff of single link" is extended to "spectrum handoff of multiple links", termed as "multi-link spectrum handoff". Second, we define the problem of coordinating the spectrum handoff of multiple links to minimize the total spectrum handoff latency under the constraint of the network connectivity. This problem is proven to be NP-hard, and we propose both centralized and distributed greedy algorithms to minimize the total latency of spectrum handoff for multiple links in a multi-hop cognitive network. Moreover, we jointly design the rerouting mechanism with spectrum handoff scheduling algorithm to improve the network throughput. Different from previous works in which rerouting is performed after spectrum handoff, our rerouting mechanism is executed before the spectrum handoff really happens. Simulation results show that JSHRP improves the network performance by 50% and the higher degree of interference the cognitive network experiences, the more improvement our solution will bring to the network.
频谱切换会导致认知网络的性能下降,主要是由于主用户对授权频谱的回收。在多跳认知网络中,由于涉及多个链路,这个问题变得更加严重。多链路频谱切换严重影响网络连通性和路由。本文提出了一种结合频谱切换调度和路由的跨层优化方法来解决频谱切换问题。我们提出了一种联合频谱切换调度和路由协议(JSHRP)。本文的主要贡献如下:首先,将“单链路频谱切换”的概念扩展为“多链路频谱切换”,称为“多链路频谱切换”。其次,我们定义了在网络连通性约束下,多链路频谱切换协调问题,以最小化总频谱切换延迟。该问题被证明是np困难的,我们提出了集中式和分布式贪婪算法来最小化多跳认知网络中多链路频谱切换的总延迟。此外,我们还联合设计了重路由机制和频谱切换调度算法,以提高网络吞吐量。与以往在频谱切换后进行重路由不同的是,我们的重路由机制是在频谱切换真正发生之前执行的。仿真结果表明,JSHRP将网络性能提高了50%,认知网络受到的干扰程度越高,我们的解决方案对网络的改善越大。
{"title":"Joint Optimization of Spectrum Handoff Scheduling and Routing in Multi-hop Multi-radio Cognitive Networks","authors":"W. Feng, Jiannong Cao, Chisheng Zhang, Chuda Liu","doi":"10.1109/ICDCS.2009.64","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.64","url":null,"abstract":"Spectrum handoff causes performance degradation of the cognitive network when the primary user reclaims its right to access the licensed spectrum. In a multi-hop cognitive network, this problem becomes even worse since multiple links are involved. Spectrum handoff of multiple links seriously affects the network connectivity and routing. In this paper, we describe a cross-layer optimization approach to solve the spectrum handoff problem with joint consideration of spectrum handoff scheduling and routing. We propose a protocol, called Joint Spectrum Handoff Scheduling and Routing Protocol (JSHRP). This paper makes the following major contributions. First, the concept \"spectrum handoff of single link\" is extended to \"spectrum handoff of multiple links\", termed as \"multi-link spectrum handoff\". Second, we define the problem of coordinating the spectrum handoff of multiple links to minimize the total spectrum handoff latency under the constraint of the network connectivity. This problem is proven to be NP-hard, and we propose both centralized and distributed greedy algorithms to minimize the total latency of spectrum handoff for multiple links in a multi-hop cognitive network. Moreover, we jointly design the rerouting mechanism with spectrum handoff scheduling algorithm to improve the network throughput. Different from previous works in which rerouting is performed after spectrum handoff, our rerouting mechanism is executed before the spectrum handoff really happens. Simulation results show that JSHRP improves the network performance by 50% and the higher degree of interference the cognitive network experiences, the more improvement our solution will bring to the network.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124630109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
MOPS: Providing Content-Based Service in Disruption-Tolerant Networks MOPS:在容错网络中提供基于内容的服务
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.28
Feng Li, Jie Wu
Content-based service, which dynamically routes and delivers events from sources to interested users, is extremely important to network services. However, existing content-based protocols for static networks will incur unaffordable maintenance costs if they are applied directly to the highly mobile environment that is featured in disruption-tolerant networks (DTNs). In this paper, we propose a unique publish/subscribe scheme that utilizes the long-term social network properties, which are observed in many DTNs, to facilitate content-based services in DTNs. We distributively construct communities based on the neighboring relationships from nodes' encounter histories. Brokers are deployed to bridge the communities, and they adopt a locally prioritized pub/sub scheme which combines the structural importance with subscription interests, to decide what events they should collect, store, and propagate. Different trade-offs for content-based service can be achieved by tuning the closeness threshold in community formation or by adjusting the broker-to-broker communication scheme. Extensive real-trace and synthetic-trace driven simulation results are presented to support the effectiveness of our scheme.
基于内容的服务对网络服务非常重要,它动态地将事件从源路由并传递给感兴趣的用户。然而,现有的基于内容的静态网络协议,如果直接应用于容中断网络(ddn)的高度移动环境,将产生难以承受的维护成本。在本文中,我们提出了一种独特的发布/订阅方案,该方案利用在许多dtn中观察到的长期社交网络属性来促进dtn中基于内容的服务。我们基于节点遭遇历史中的相邻关系分布式地构建社区。代理被部署为连接社区,它们采用本地优先的发布/订阅模式,该模式结合了结构重要性和订阅兴趣,以决定它们应该收集、存储和传播哪些事件。对于基于内容的服务,可以通过调整社区形成中的亲密度阈值或调整代理到代理的通信方案来实现不同的权衡。大量的真实轨迹和合成轨迹驱动的仿真结果支持了该方案的有效性。
{"title":"MOPS: Providing Content-Based Service in Disruption-Tolerant Networks","authors":"Feng Li, Jie Wu","doi":"10.1109/ICDCS.2009.28","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.28","url":null,"abstract":"Content-based service, which dynamically routes and delivers events from sources to interested users, is extremely important to network services. However, existing content-based protocols for static networks will incur unaffordable maintenance costs if they are applied directly to the highly mobile environment that is featured in disruption-tolerant networks (DTNs). In this paper, we propose a unique publish/subscribe scheme that utilizes the long-term social network properties, which are observed in many DTNs, to facilitate content-based services in DTNs. We distributively construct communities based on the neighboring relationships from nodes' encounter histories. Brokers are deployed to bridge the communities, and they adopt a locally prioritized pub/sub scheme which combines the structural importance with subscription interests, to decide what events they should collect, store, and propagate. Different trade-offs for content-based service can be achieved by tuning the closeness threshold in community formation or by adjusting the broker-to-broker communication scheme. Extensive real-trace and synthetic-trace driven simulation results are presented to support the effectiveness of our scheme.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122216147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
CARP: Handling Silent Data Errors and Site Failures in an Integrated Program and Storage Replication Mechanism CARP:在集成程序和存储复制机制中处理静默数据错误和站点故障
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.58
Lanyue Lu, P. Sarkar, Dinesh Subhraveti, S. Sarkar, Mark Seaman, Reshu Jain, Ahmed Bashir
This paper presents CARP, an integrated program and storage replication solution. CARP extends program replication systems which do not currently address storage errors, builds upon a record-and-replay scheme that handles nondeterminism in program execution, and uses a scheme based on recorded program state and I/O logs to enable efficient detection of silent data errors and efficient recovery from such errors. CARP is designed to be transparent to applications with minimal run-time impact and is general enough to be implemented on commodity machines. We implemented CARP as a prototype on the Linux operating system and conducted extensive sensitivity analysis of its overhead with different application profiles and system parameters. In particular, we evaluated CARP with standard unmodified email, database, and web server benchmarks and showed that it imposes acceptable overhead while providing sub-second program state recovery times on detecting a silent data error.
本文介绍了一种集成程序和存储复制解决方案CARP。CARP扩展了目前不解决存储错误的程序复制系统,建立在处理程序执行中的不确定性的记录和重放方案的基础上,并使用基于记录的程序状态和I/O日志的方案来实现对静默数据错误的有效检测和从此类错误中有效恢复。CARP被设计为对应用程序透明,对运行时的影响最小,并且足够通用,可以在商用机器上实现。我们在Linux操作系统上将CARP作为原型实现,并使用不同的应用程序配置文件和系统参数对其开销进行了广泛的敏感性分析。特别是,我们使用标准的未修改的电子邮件、数据库和web服务器基准测试对CARP进行了评估,结果表明,在检测到静默数据错误时,它提供了亚秒级的程序状态恢复时间,同时施加了可接受的开销。
{"title":"CARP: Handling Silent Data Errors and Site Failures in an Integrated Program and Storage Replication Mechanism","authors":"Lanyue Lu, P. Sarkar, Dinesh Subhraveti, S. Sarkar, Mark Seaman, Reshu Jain, Ahmed Bashir","doi":"10.1109/ICDCS.2009.58","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.58","url":null,"abstract":"This paper presents CARP, an integrated program and storage replication solution. CARP extends program replication systems which do not currently address storage errors, builds upon a record-and-replay scheme that handles nondeterminism in program execution, and uses a scheme based on recorded program state and I/O logs to enable efficient detection of silent data errors and efficient recovery from such errors. CARP is designed to be transparent to applications with minimal run-time impact and is general enough to be implemented on commodity machines. We implemented CARP as a prototype on the Linux operating system and conducted extensive sensitivity analysis of its overhead with different application profiles and system parameters. In particular, we evaluated CARP with standard unmodified email, database, and web server benchmarks and showed that it imposes acceptable overhead while providing sub-second program state recovery times on detecting a silent data error.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116606924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Connected k-Coverage Problem in Heterogeneous Sensor Nets: The Curse of Randomness and Heterogeneity 异构传感器网络中的连通k-覆盖问题:随机性和异质性的诅咒
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.67
H. Ammari, John Giudici
Coverage is an essential task in sensor deployment for the design of wireless sensor networks. While most existing studies on coverage consider homogeneous sensors, the deployment of heterogeneous sensors represents more accurately the network design for real-world applications. In this paper, we focus on the problem of connected k-coverage in heterogeneous wireless sensor networks. Precisely, we distinguish two deployment strategies, where heterogeneous sensors are either randomly or pseudo-randomly distributed in a field. While the first deployment approach considers a single layer of heterogeneous sensors, the second one proposes a multi-tier architecture of heterogeneous sensors to better address the problems introduced by pure randomness and heterogeneity.
在无线传感器网络设计中,覆盖是传感器部署中的一项重要任务。虽然大多数现有的覆盖研究都考虑了同构传感器,但异构传感器的部署更准确地代表了现实世界应用的网络设计。本文主要研究异构无线传感器网络中的连通k覆盖问题。准确地说,我们区分了两种部署策略,其中异构传感器是随机或伪随机分布在一个领域。虽然第一种部署方法考虑的是单层异构传感器,但第二种部署方法提出了异构传感器的多层架构,以更好地解决纯随机性和异构性带来的问题。
{"title":"On the Connected k-Coverage Problem in Heterogeneous Sensor Nets: The Curse of Randomness and Heterogeneity","authors":"H. Ammari, John Giudici","doi":"10.1109/ICDCS.2009.67","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.67","url":null,"abstract":"Coverage is an essential task in sensor deployment for the design of wireless sensor networks. While most existing studies on coverage consider homogeneous sensors, the deployment of heterogeneous sensors represents more accurately the network design for real-world applications. In this paper, we focus on the problem of connected k-coverage in heterogeneous wireless sensor networks. Precisely, we distinguish two deployment strategies, where heterogeneous sensors are either randomly or pseudo-randomly distributed in a field. While the first deployment approach considers a single layer of heterogeneous sensors, the second one proposes a multi-tier architecture of heterogeneous sensors to better address the problems introduced by pure randomness and heterogeneity.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Minimizing the Hidden Cost of RDMA 最小化RDMA的隐性成本
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.32
P. Frey, G. Alonso
Remote Direct Memory Access (RDMA) is a mechanism whereby data is moved directly between the application memory of the local and remote computer. In bypassing the operating system, RDMA significantly reduces the CPU cost of large data transfers and eliminates intermediate copying across buffers, thereby making it very attractive for implementing distributed applications. With the advent of hardware implementations of RDMA over Ethernet (iWARP), its advantages have become even more obvious. In this paper we analyze the applicability of RDMA and identify hidden costs in the setup of its interactions that, if not handled carefully, remove any performance advantage, especially in hardware implementations. From an application point of view, the major difference to TCP/IP based communication is that the buffer management has to be done explicitly by the application. Without the proper optimizations, RDMA loses all its advantages. We discuss the problem in detail, analyze what applications can profit from RDMA, present a number of optimization strategies, and show through extensive performance experiments that these optimizations make a substantial difference in the overall performance of RDMA based applications.
远程直接内存访问(RDMA)是一种在本地和远程计算机的应用程序内存之间直接移动数据的机制。通过绕过操作系统,RDMA显著降低了大型数据传输的CPU成本,并消除了跨缓冲区的中间复制,因此对于实现分布式应用程序非常有吸引力。随着以太网上RDMA (iWARP)硬件实现的出现,其优势变得更加明显。在本文中,我们分析了RDMA的适用性,并确定了其交互设置中的隐藏成本,如果不小心处理,则会消除任何性能优势,特别是在硬件实现中。从应用程序的角度来看,与基于TCP/IP的通信的主要区别在于,缓冲区管理必须由应用程序显式地完成。如果没有适当的优化,RDMA将失去其所有优势。我们详细讨论了这个问题,分析了哪些应用程序可以从RDMA中获益,提出了一些优化策略,并通过广泛的性能实验表明,这些优化对基于RDMA的应用程序的整体性能产生了实质性的影响。
{"title":"Minimizing the Hidden Cost of RDMA","authors":"P. Frey, G. Alonso","doi":"10.1109/ICDCS.2009.32","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.32","url":null,"abstract":"Remote Direct Memory Access (RDMA) is a mechanism whereby data is moved directly between the application memory of the local and remote computer. In bypassing the operating system, RDMA significantly reduces the CPU cost of large data transfers and eliminates intermediate copying across buffers, thereby making it very attractive for implementing distributed applications. With the advent of hardware implementations of RDMA over Ethernet (iWARP), its advantages have become even more obvious. In this paper we analyze the applicability of RDMA and identify hidden costs in the setup of its interactions that, if not handled carefully, remove any performance advantage, especially in hardware implementations. From an application point of view, the major difference to TCP/IP based communication is that the buffer management has to be done explicitly by the application. Without the proper optimizations, RDMA loses all its advantages. We discuss the problem in detail, analyze what applications can profit from RDMA, present a number of optimization strategies, and show through extensive performance experiments that these optimizations make a substantial difference in the overall performance of RDMA based applications.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132848532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Distributed Processing of Spatial Alarms: A Safe Region-Based Approach 空间报警的分布式处理:基于安全区域的方法
Pub Date : 2009-06-01 DOI: 10.1109/ICDCS.2009.25
Bhuvan Bamba, Ling Liu, A. Iyengar, Philip S. Yu
Spatial alarms are considered as one of the basic capabilities in future mobile computing systems for enabling personalization of location-based services. In this paper, we propose a distributed architecture and a suite of safe region techniques for scalable processing of spatial alarms. We show that safe region-based processing enables resource optimal distribution of partial alarm processing tasks from the server to the mobile clients. We propose three different safe region computation algorithms to explore the impact of size and shape of the safe region on network bandwidth, server load and client energy consumption. Concretely, we show that the maximum weighted perimeter rectangular safe region approach outperforms previous techniques in terms of performance and accuracy. We further explore finer granularity safe regions by introducing grid-based and pyramid-based representation of rectilinear polygonal shapes using bitmap encoding. Our experimental evaluation shows that the distributed safe region-based architecture outperforms the two most popular server-centric approaches, periodic and safe period-based, for spatial alarm processing.
空间警报被认为是未来移动计算系统中实现基于位置的个性化服务的基本功能之一。在本文中,我们提出了一种分布式架构和一套安全区域技术,用于可扩展的空间报警处理。我们表明,基于安全区域的处理可以使部分告警处理任务从服务器到移动客户端的资源优化分配。我们提出了三种不同的安全区域计算算法,以探讨安全区域的大小和形状对网络带宽、服务器负载和客户端能耗的影响。具体而言,我们证明了最大加权周长矩形安全区域方法在性能和精度方面优于先前的技术。通过使用位图编码引入基于网格和基于金字塔的直线多边形表示,我们进一步探索了更细粒度的安全区域。我们的实验评估表明,分布式基于安全区域的体系结构优于两种最流行的以服务器为中心的方法,即基于周期性和基于安全周期的空间报警处理方法。
{"title":"Distributed Processing of Spatial Alarms: A Safe Region-Based Approach","authors":"Bhuvan Bamba, Ling Liu, A. Iyengar, Philip S. Yu","doi":"10.1109/ICDCS.2009.25","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.25","url":null,"abstract":"Spatial alarms are considered as one of the basic capabilities in future mobile computing systems for enabling personalization of location-based services. In this paper, we propose a distributed architecture and a suite of safe region techniques for scalable processing of spatial alarms. We show that safe region-based processing enables resource optimal distribution of partial alarm processing tasks from the server to the mobile clients. We propose three different safe region computation algorithms to explore the impact of size and shape of the safe region on network bandwidth, server load and client energy consumption. Concretely, we show that the maximum weighted perimeter rectangular safe region approach outperforms previous techniques in terms of performance and accuracy. We further explore finer granularity safe regions by introducing grid-based and pyramid-based representation of rectilinear polygonal shapes using bitmap encoding. Our experimental evaluation shows that the distributed safe region-based architecture outperforms the two most popular server-centric approaches, periodic and safe period-based, for spatial alarm processing.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Towards Optimal Resource Utilization in Heterogeneous P2P Streaming 异构P2P流的资源优化利用研究
Pub Date : 2009-06-01 DOI: 10.1109/ICDCS.2009.22
Dongyu Liu, Fei Li, Songqing Chen
Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by end-users, little has been known about the upper bounds of achievable performance with available resources so that different designs could compare against. On the other hand, the current practice has shown increasing demand of server capacities in P2P-assisted streaming systems in order to maintain high-quality streaming to end-users. Both research and practice call for a design that can optimally utilize available peer resources. In the paper, we first present a new design, aiming to reveal the best achievable throughput for heterogeneous P2P streaming systems. We measure the performance gaps between various designs and this optimal resource allocation. Through extensive simulations, we find out that several typical existing designs have not fully exploited the potential of system resources. However, the control overhead prohibits the adoption of this optimal approach. Then, we design a hybrid system in trading off the cost of assignment and utilization of resources. This hybrid approach has a proved theoretical bound on efficiency of utilization. Simulation results show that compared with the optimal resource allocation, our proposed hybrid design can achieve near-optimal (up to $90%$) utilization while only use much less (below $4%$) control overhead. Our results provide a basis for both server capacity planning in current P2P-assisted streaming practice and future protocol designs.
尽管已经进行了大量的研究来提高最终用户感知的互联网P2P流媒体质量,但很少有人知道可用资源可实现性能的上限,以便不同的设计可以进行比较。另一方面,目前的实践表明,为了向最终用户提供高质量的流媒体,p2p辅助流媒体系统对服务器容量的需求不断增加。研究和实践都需要一种能够最佳地利用现有对等资源的设计。在本文中,我们首先提出了一个新的设计,旨在揭示异构P2P流系统的最佳可实现吞吐量。我们测量各种设计之间的性能差距和最佳资源分配。通过大量的仿真,我们发现一些典型的现有设计并没有充分发挥系统资源的潜力。然而,控制开销阻碍了这种最佳方法的采用。然后,我们设计了一个混合系统来权衡资源分配和利用的成本。这种混合方法在利用效率上有一个已被证明的理论界限。仿真结果表明,与最优资源分配相比,我们提出的混合设计可以实现接近最优(高达90%美元)的利用率,而只使用更少(低于4%美元)的控制开销。我们的研究结果为当前p2p辅助流实践和未来协议设计中的服务器容量规划提供了基础。
{"title":"Towards Optimal Resource Utilization in Heterogeneous P2P Streaming","authors":"Dongyu Liu, Fei Li, Songqing Chen","doi":"10.1109/ICDCS.2009.22","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.22","url":null,"abstract":"Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by end-users, little has been known about the upper bounds of achievable performance with available resources so that different designs could compare against. On the other hand, the current practice has shown increasing demand of server capacities in P2P-assisted streaming systems in order to maintain high-quality streaming to end-users. Both research and practice call for a design that can optimally utilize available peer resources. In the paper, we first present a new design, aiming to reveal the best achievable throughput for heterogeneous P2P streaming systems. We measure the performance gaps between various designs and this optimal resource allocation. Through extensive simulations, we find out that several typical existing designs have not fully exploited the potential of system resources. However, the control overhead prohibits the adoption of this optimal approach. Then, we design a hybrid system in trading off the cost of assignment and utilization of resources. This hybrid approach has a proved theoretical bound on efficiency of utilization. Simulation results show that compared with the optimal resource allocation, our proposed hybrid design can achieve near-optimal (up to $90%$) utilization while only use much less (below $4%$) control overhead. Our results provide a basis for both server capacity planning in current P2P-assisted streaming practice and future protocol designs.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123524834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
m-LIGHT: Indexing Multi-Dimensional Data over DHTs m-LIGHT:在dht上索引多维数据
Pub Date : 2009-06-01 DOI: 10.1109/ICDCS.2009.30
Y. Tang, Jianliang Xu, Shuigeng Zhou, Wang-Chien Lee
In this paper, we study the problem of indexing multidimensional data in the P2P networks based on distributed hash tables (DHTs). We identify several design issues and propose a novel over-DHT indexing scheme called m- LIGHT. To preserve data locality, m-LIGHT employs a clever naming mechanism that gracefully maps the index tree into the underlying DHT so that it achieves efficient index maintenance and query processing. Moreover, m- LIGHT leverages a new data-aware index splitting strategy to achieve optimal load balance among peer nodes. We conduct an extensive performance evaluation for m-LIGHT. Compared to the state-of-the-art indexing schemes, m- LIGHT substantially saves the index maintenance overhead, achieves a more balanced load distribution, and improves the range query performance in both bandwidth consumption and response latency.
本文研究了基于分布式哈希表(dht)的P2P网络多维数据索引问题。我们确定了几个设计问题,并提出了一种新的称为m- LIGHT的over-DHT索引方案。为了保持数据局部性,m-LIGHT采用了一种巧妙的命名机制,将索引树优雅地映射到底层DHT,从而实现高效的索引维护和查询处理。此外,m- LIGHT利用一种新的数据感知索引拆分策略来实现对等节点之间的最佳负载平衡。我们对m-LIGHT进行了广泛的性能评估。与最先进的索引方案相比,m- LIGHT大大节省了索引维护开销,实现了更均衡的负载分布,并在带宽消耗和响应延迟方面提高了范围查询性能。
{"title":"m-LIGHT: Indexing Multi-Dimensional Data over DHTs","authors":"Y. Tang, Jianliang Xu, Shuigeng Zhou, Wang-Chien Lee","doi":"10.1109/ICDCS.2009.30","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.30","url":null,"abstract":"In this paper, we study the problem of indexing multidimensional data in the P2P networks based on distributed hash tables (DHTs). We identify several design issues and propose a novel over-DHT indexing scheme called m- LIGHT. To preserve data locality, m-LIGHT employs a clever naming mechanism that gracefully maps the index tree into the underlying DHT so that it achieves efficient index maintenance and query processing. Moreover, m- LIGHT leverages a new data-aware index splitting strategy to achieve optimal load balance among peer nodes. We conduct an extensive performance evaluation for m-LIGHT. Compared to the state-of-the-art indexing schemes, m- LIGHT substantially saves the index maintenance overhead, achieves a more balanced load distribution, and improves the range query performance in both bandwidth consumption and response latency.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130622575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Centaur: A Hybrid Approach for Reliable Policy-Based Routing 半人马:可靠的基于策略的路由的混合方法
Pub Date : 2009-06-01 DOI: 10.1109/ICDCS.2009.77
Xin Zhang, A. Perrig, Hui Zhang
In this paper, we consider the design of a policy-based routing system and the role that link state might play. Looking at the problem from a link-state perspective, we propose Centaur, a hybrid routing protocol combining the benefits of both link state and path vector. Through analytical and experimental studies, we demonstrate Centaur's potential in achieving rich policy expressiveness and high network availability. Our work shows that it is possible to combine link-state and path-vector approaches into a practical and efficient algorithm for policy-based routing.
在本文中,我们考虑了基于策略的路由系统的设计和链路状态可能发挥的作用。从链路状态的角度来看这个问题,我们提出了Centaur,这是一种混合路由协议,结合了链路状态和路径向量的优点。通过分析和实验研究,我们证明了Centaur在实现丰富的政策表达和高网络可用性方面的潜力。我们的工作表明,将链路状态和路径向量方法结合成一种实用而有效的基于策略的路由算法是可能的。
{"title":"Centaur: A Hybrid Approach for Reliable Policy-Based Routing","authors":"Xin Zhang, A. Perrig, Hui Zhang","doi":"10.1109/ICDCS.2009.77","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.77","url":null,"abstract":"In this paper, we consider the design of a policy-based routing system and the role that link state might play. Looking at the problem from a link-state perspective, we propose Centaur, a hybrid routing protocol combining the benefits of both link state and path vector. Through analytical and experimental studies, we demonstrate Centaur's potential in achieving rich policy expressiveness and high network availability. Our work shows that it is possible to combine link-state and path-vector approaches into a practical and efficient algorithm for policy-based routing.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2009 29th IEEE International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1