首页 > 最新文献

2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
A novel data streaming method detecting superpoints 一种新的数据流点检测方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928781
Weijiang Liu, W. Qu, G. Jian, Li Keqiu
Internet attacks such as distributed denial-of-service (DDoS) attacks and worm attacks are increasing in severity. Identifying realtime attack and mitigation of Internet traffic is an important and challenging problem for network administrators. A compromised host doing fast scanning for worm propagation can make a very high number of connections to distinct destinations within a short time. We call such a host a superpoint, which is the source that connect to a large number of distinct destinations. Detecting superpoints can be utilized for traffic engineering and anomaly detection. We propose a novel data streaming method for detecting superpoints and prove guarantees on their accuracy and memory requirements. The core of this method is a novel data structure called Vector Bloom Filter (VBF). A VBF is a variant of standard Bloom Filter (BF). The VBF consists of 6 hash functions, 4 hash functions of which projectively select some consecutive bits from original strings as function values. We obtain the information of superpoints using the overlapping of hash bit strings of the VBF. The theoretical analysis and experiment results show that our schemes can precisely and efficiently detect superpoints.
分布式拒绝服务(DDoS)攻击和蠕虫攻击等网络攻击日益严重。识别互联网流量的实时攻击和缓解是网络管理员面临的一个重要而具有挑战性的问题。受感染的主机对蠕虫传播进行快速扫描,可以在短时间内建立到不同目的地的大量连接。我们称这样的主机为superpoint,它是连接到大量不同目的地的源。检测叠加点可用于交通工程和异常检测。我们提出了一种新的数据流方法来检测叠加点,并证明了其准确性和内存要求的保证。该方法的核心是一种新的数据结构,称为矢量布隆滤波器(VBF)。VBF是标准布隆滤波器(BF)的一种变体。VBF由6个哈希函数组成,其中4个哈希函数投影地从原始字符串中选择一些连续的比特作为函数值。我们利用VBF的哈希位串的重叠来获得叠加点的信息。理论分析和实验结果表明,本文提出的方法能够准确有效地检测出叠加点。
{"title":"A novel data streaming method detecting superpoints","authors":"Weijiang Liu, W. Qu, G. Jian, Li Keqiu","doi":"10.1109/INFCOMW.2011.5928781","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928781","url":null,"abstract":"Internet attacks such as distributed denial-of-service (DDoS) attacks and worm attacks are increasing in severity. Identifying realtime attack and mitigation of Internet traffic is an important and challenging problem for network administrators. A compromised host doing fast scanning for worm propagation can make a very high number of connections to distinct destinations within a short time. We call such a host a superpoint, which is the source that connect to a large number of distinct destinations. Detecting superpoints can be utilized for traffic engineering and anomaly detection. We propose a novel data streaming method for detecting superpoints and prove guarantees on their accuracy and memory requirements. The core of this method is a novel data structure called Vector Bloom Filter (VBF). A VBF is a variant of standard Bloom Filter (BF). The VBF consists of 6 hash functions, 4 hash functions of which projectively select some consecutive bits from original strings as function values. We obtain the information of superpoints using the overlapping of hash bit strings of the VBF. The theoretical analysis and experiment results show that our schemes can precisely and efficiently detect superpoints.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel routing and data transmission method for stub network of internet of things based on percolation 一种基于渗透的物联网存根网络路由和数据传输新方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928809
Xiangming Li, Jihua Lu, Jie Yang, Jianping An
A new network architecture and routing method based on percolation for the Machine-to-Machine (M2M) stub network of Internet of things is proposed. The proposed network architecture is router-free, in which efficient routing can be operated with percolations based on the six degrees of separation or small world network. A file transmission will be divided into two phases: routing phase and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed based on small-world strategy. In the second phase, the file will be encoded and transmitted using the paths selected at the first phase. In such a way, an efficient routing and data transmission mechanism can be built, with which we can construct a low-cost, flexible, ubiquitous stub network.
针对物联网中机器对机器(M2M)存根网络,提出了一种新的基于渗透的网络架构和路由方法。所提出的网络结构是无路由器的,在这种结构中,基于六度分离或小世界网络的渗透可以有效地运行路由。文件传输将分为两个阶段:路由阶段和数据传输阶段。在路由阶段,探测数据包将在网络中传输和转发,因此基于小世界策略进行路径选择。在第二阶段,将使用第一阶段选择的路径对文件进行编码和传输。通过这种方式,可以建立一个高效的路由和数据传输机制,从而构建一个低成本、灵活、无处不在的存根网络。
{"title":"A novel routing and data transmission method for stub network of internet of things based on percolation","authors":"Xiangming Li, Jihua Lu, Jie Yang, Jianping An","doi":"10.1109/INFCOMW.2011.5928809","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928809","url":null,"abstract":"A new network architecture and routing method based on percolation for the Machine-to-Machine (M2M) stub network of Internet of things is proposed. The proposed network architecture is router-free, in which efficient routing can be operated with percolations based on the six degrees of separation or small world network. A file transmission will be divided into two phases: routing phase and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed based on small-world strategy. In the second phase, the file will be encoded and transmitted using the paths selected at the first phase. In such a way, an efficient routing and data transmission mechanism can be built, with which we can construct a low-cost, flexible, ubiquitous stub network.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125489007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A robust controller of dynamic networks and its verification by the simulation of the heat shock response network with reliable signal transmission 一种动态网络的鲁棒控制器,并通过信号可靠传输的热冲击响应网络仿真验证
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928864
Jian-Qin Liu
In this paper, a class of dynamic networks that widely exist in nature, such as signaling networks in cells, is modeled as a controller, in which the quantitative relation among principal factors is explicitly given. A reduction method with respect to the controller is proposed to transform a dynamic network into a minimum controller with only two variables and two units: a feedforward unit and a feedback unit. Here the feedforward unit is formulated as a combination of exponential functions, and the feedback unit as a polynomial function. The features of the robust controller on the aspects of non-smoothness and computational complexity are discussed. As an example to demonstrate the feasibility of the controller designed by the method proposed in this paper, the heat shock response (HSR) network of E. coli is simulated for its robustness to testify the effectiveness of the controller. The simulation result of the transmission process of the HSR network suggests that the designed controller is an efficient CAD (computer-aided design) tool for developing molecular communication systems using cells in vivo.
本文将自然界中广泛存在的一类动态网络,如细胞内的信号网络,建模为一个控制器,明确给出了控制器中各主要因素之间的定量关系。提出了一种针对控制器的约简方法,将动态网络转化为只有两个变量和两个单元的最小控制器:前馈单元和反馈单元。这里,前馈单元被表述为指数函数的组合,反馈单元被表述为多项式函数。讨论了鲁棒控制器在非光滑性和计算复杂度方面的特点。以大肠杆菌热冲击响应(HSR)网络为例,对其鲁棒性进行了仿真,验证了该控制器的有效性。高铁网络传输过程的仿真结果表明,所设计的控制器是一种有效的CAD(计算机辅助设计)工具,可用于在体内利用细胞开发分子通信系统。
{"title":"A robust controller of dynamic networks and its verification by the simulation of the heat shock response network with reliable signal transmission","authors":"Jian-Qin Liu","doi":"10.1109/INFCOMW.2011.5928864","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928864","url":null,"abstract":"In this paper, a class of dynamic networks that widely exist in nature, such as signaling networks in cells, is modeled as a controller, in which the quantitative relation among principal factors is explicitly given. A reduction method with respect to the controller is proposed to transform a dynamic network into a minimum controller with only two variables and two units: a feedforward unit and a feedback unit. Here the feedforward unit is formulated as a combination of exponential functions, and the feedback unit as a polynomial function. The features of the robust controller on the aspects of non-smoothness and computational complexity are discussed. As an example to demonstrate the feasibility of the controller designed by the method proposed in this paper, the heat shock response (HSR) network of E. coli is simulated for its robustness to testify the effectiveness of the controller. The simulation result of the transmission process of the HSR network suggests that the designed controller is an efficient CAD (computer-aided design) tool for developing molecular communication systems using cells in vivo.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"117 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-cost application image distribution on worldwide cloud front server 低成本的应用程序映像分布在全球云前端服务器上
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928895
Yang Liu, Shi Bai, Weiyi Zhang, Jun Zhang
Cloud computing opens a new area of supplement, consumption, and delivery framework for IT services. Customers could be able to order Virtual Applications through the cloud. To reduce the latency time, the cloud service providers implement some strategies (e.g., cloudfront service [1]) to speed up the applications delivery. However, these strategies do not consider the profit of application providers. In this paper we address the problem which is to maximize the profit of application providers based on the Original-Front server network model. We studied two different scenarios and proposed two efficient heuristic algorithms. Our simulation results show that our heuristic algorithms can increase the profit of application providers significantly.
云计算为IT服务的补充、消费和交付框架开辟了一个新的领域。客户可以通过云订购虚拟应用程序。为了减少延迟时间,云服务提供商实施了一些策略(例如,云前端服务[1])来加快应用程序的交付。然而,这些策略并没有考虑到应用程序提供商的利润。本文在Original-Front服务器网络模型的基础上,解决了应用程序提供商利润最大化的问题。我们研究了两种不同的场景,并提出了两种高效的启发式算法。仿真结果表明,启发式算法可以显著提高应用程序提供商的利润。
{"title":"Low-cost application image distribution on worldwide cloud front server","authors":"Yang Liu, Shi Bai, Weiyi Zhang, Jun Zhang","doi":"10.1109/INFCOMW.2011.5928895","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928895","url":null,"abstract":"Cloud computing opens a new area of supplement, consumption, and delivery framework for IT services. Customers could be able to order Virtual Applications through the cloud. To reduce the latency time, the cloud service providers implement some strategies (e.g., cloudfront service [1]) to speed up the applications delivery. However, these strategies do not consider the profit of application providers. In this paper we address the problem which is to maximize the profit of application providers based on the Original-Front server network model. We studied two different scenarios and proposed two efficient heuristic algorithms. Our simulation results show that our heuristic algorithms can increase the profit of application providers significantly.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121980270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding BGP next-hop diversity 了解BGP下一跳多样性
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928930
Jaeyoung Choi, Jong Han Park, Pei-chun Cheng, D. Kim, Lixia Zhang
The Internet topological connectivity becomes denser over time. However the de facto routing protocol of the global Internet, BGP, lets each BGP router select and propagate only a single best path to each destination network. This leads to a common concern that the rich connectivity is not fully utilized and the lack of alternative paths can reduce a network's robustness to failures as well as flexibility in traffic engineering, and can lead to slow adaptation to topological changes. Yet there have been few quantitative measurement studies on path diversity in today's operational Internet. In this paper we use iBGP routing data collected from a Tier1 ISP, ISPA, over a 2-year time period to quantify BGP next-hop diversity for all destinations. Our results show that ISPA reaches the majority of prefixes through multiple next-hop routers. We use several case studies of prefixes with different diversity degrees to identify two major factors that impact the number of observed next-hops: the ISP's path preference and the number of peering routers between large ISPs. This observation provides operational input to the current efforts on augmenting BGP to increase path diversity.
随着时间的推移,互联网拓扑连接变得更加密集。然而,全球互联网事实上的路由协议BGP允许每个BGP路由器选择并传播到每个目的网络的唯一最佳路径。这导致了一个普遍的担忧,即丰富的连通性没有得到充分利用,缺乏可选路径会降低网络对故障的鲁棒性和流量工程的灵活性,并可能导致对拓扑变化的适应缓慢。然而,在当今的互联网运营中,很少有关于路径多样性的定量测量研究。在本文中,我们使用从一级ISP ISPA收集的iBGP路由数据,超过2年的时间周期来量化所有目的地的BGP下一跳分集。结果表明,ISPA通过多个下一跳路由器到达大多数前缀。我们使用几个具有不同分集度的前缀的案例研究来确定影响观察到的下一跳数量的两个主要因素:ISP的路径偏好和大型ISP之间的对等路由器数量。这一观察结果为当前增加BGP以增加路径多样性的努力提供了操作输入。
{"title":"Understanding BGP next-hop diversity","authors":"Jaeyoung Choi, Jong Han Park, Pei-chun Cheng, D. Kim, Lixia Zhang","doi":"10.1109/INFCOMW.2011.5928930","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928930","url":null,"abstract":"The Internet topological connectivity becomes denser over time. However the de facto routing protocol of the global Internet, BGP, lets each BGP router select and propagate only a single best path to each destination network. This leads to a common concern that the rich connectivity is not fully utilized and the lack of alternative paths can reduce a network's robustness to failures as well as flexibility in traffic engineering, and can lead to slow adaptation to topological changes. Yet there have been few quantitative measurement studies on path diversity in today's operational Internet. In this paper we use iBGP routing data collected from a Tier1 ISP, ISPA, over a 2-year time period to quantify BGP next-hop diversity for all destinations. Our results show that ISPA reaches the majority of prefixes through multiple next-hop routers. We use several case studies of prefixes with different diversity degrees to identify two major factors that impact the number of observed next-hops: the ISP's path preference and the number of peering routers between large ISPs. This observation provides operational input to the current efforts on augmenting BGP to increase path diversity.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A decentralized MAC protocol for cognitive radio networks 认知无线网络的去中心化MAC协议
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928818
Shuhua Jiang, Li Chao, Hsi-Lu Chao
One of the most challenging issues in cognitive radio networks is efficient channel sensing and channel accessing. In this paper, an analytical queueing model is used to derive the probability of successful transmission, channel sensing time, and transmission quota, for each data channel. Each CR node records the derived statistics in a channel preference matrix. A CR pair selects a data channel for sensing and accessing based on the successful transmission probability. According to the derivations, we design a media access control protocol, which utilizes the powerful computation capability of cloud servers to estimate the behavior of PUs, for infrastructure-based cognitive radio networks. We validate the analytical model with simulation results. Besides, the proposed MAC protocol is compared with other approaches via simulation. The simulation results showed that our protocol performs well in both utilization of channel idle time and the average tries of channel search.
认知无线网络中最具挑战性的问题之一是有效的信道感知和信道接入。本文采用解析排队模型,推导出每个数据信道的传输成功率、信道感知时间和传输配额。每个CR节点在通道偏好矩阵中记录派生的统计信息。CR对根据传输成功的概率选择一个数据通道进行感知和访问。根据推导,我们设计了一种基于基础设施的认知无线网络的媒体访问控制协议,该协议利用云服务器强大的计算能力来估计pu的行为。用仿真结果验证了分析模型的正确性。此外,还通过仿真对所提出的MAC协议与其他方法进行了比较。仿真结果表明,该协议在信道空闲时间利用率和信道平均搜索次数方面都有较好的表现。
{"title":"A decentralized MAC protocol for cognitive radio networks","authors":"Shuhua Jiang, Li Chao, Hsi-Lu Chao","doi":"10.1109/INFCOMW.2011.5928818","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928818","url":null,"abstract":"One of the most challenging issues in cognitive radio networks is efficient channel sensing and channel accessing. In this paper, an analytical queueing model is used to derive the probability of successful transmission, channel sensing time, and transmission quota, for each data channel. Each CR node records the derived statistics in a channel preference matrix. A CR pair selects a data channel for sensing and accessing based on the successful transmission probability. According to the derivations, we design a media access control protocol, which utilizes the powerful computation capability of cloud servers to estimate the behavior of PUs, for infrastructure-based cognitive radio networks. We validate the analytical model with simulation results. Besides, the proposed MAC protocol is compared with other approaches via simulation. The simulation results showed that our protocol performs well in both utilization of channel idle time and the average tries of channel search.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"596 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123145668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An energy-aware distributed approach for content and network management 用于内容和网络管理的能源感知分布式方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928834
L. Chiaraviglio, I. Matta
We propose a distributed approach in which an Internet Service Provider (ISP) and a Content Provider (CP) cooperate to minimize total power consumption. Our solution is distributed between the ISP and the CP to limit shared information, such as network topology and servers' load. In particular, we adopt a dual decomposition technique. We investigate the performance of the proposed solution on realistic case-studies.We compare our algorithms with a centralized model, whose aim is to minimize total power consumption. We consider different power models for devices. Results show that the distributed algorithm is close to the optimal solution, with a power efficiency loss less than 17%.
我们提出了一种分布式方法,其中互联网服务提供商(ISP)和内容提供商(CP)合作以最小化总功耗。我们的解决方案在ISP和CP之间分布,以限制共享信息,例如网络拓扑和服务器负载。特别地,我们采用了对偶分解技术。我们在实际案例研究中研究了所提出的解决方案的性能。我们将我们的算法与以最小化总功耗为目标的集中式模型进行比较。我们为设备考虑了不同的功率模型。结果表明,分布式算法接近最优解,功率效率损失小于17%。
{"title":"An energy-aware distributed approach for content and network management","authors":"L. Chiaraviglio, I. Matta","doi":"10.1109/INFCOMW.2011.5928834","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928834","url":null,"abstract":"We propose a distributed approach in which an Internet Service Provider (ISP) and a Content Provider (CP) cooperate to minimize total power consumption. Our solution is distributed between the ISP and the CP to limit shared information, such as network topology and servers' load. In particular, we adopt a dual decomposition technique. We investigate the performance of the proposed solution on realistic case-studies.We compare our algorithms with a centralized model, whose aim is to minimize total power consumption. We consider different power models for devices. Results show that the distributed algorithm is close to the optimal solution, with a power efficiency loss less than 17%.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
AVMM: Virtualize network client with a bare-metal and asymmetric partitioning approach AVMM:使用裸机和非对称分区方法虚拟化网络客户端
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928892
Yuezhi Zhou, Yaoxue Zhang, Hao Liu, N. Xiong
This paper presents the design, implementation, and evaluation of AVMM, a symmetric partition-based bare-metal client virtualization approach that tries to achieve maximum near-native performance for end-users while supporting new out-of-OS mechanism for value-added services for network system administration. To achieve these goals, AVMM divides the underlying network client platform into two asymmetric partitions: user and service partitions. The user partition runs a commodity OS, which is assigned to most portions of the CPU and memory resources and a set of peripheral devices to retain the end-user experience. The service partition runs a specialized OS, which consumes only the essential resources for its tasks. By letting user OS possess the most part of resources and access some peripheral devices directly, the AVMM overhead is reduced greatly, improving the whole network system performance. We have implemented a preliminary network prototype that can supportWindows and Linux. Our experimental evaluation results show that AVMM has achieved its designed goals and provides a feasible and efficient approach for client virtualization.
本文介绍了AVMM的设计、实现和评估,AVMM是一种基于对称分区的裸机客户机虚拟化方法,它试图为最终用户实现最大的接近本机的性能,同时支持用于网络系统管理的增值服务的新的os外机制。为了实现这些目标,AVMM将底层网络客户机平台划分为两个非对称分区:用户分区和服务分区。用户分区运行一个商品操作系统,它被分配给大部分CPU和内存资源以及一组外围设备,以保留最终用户体验。服务分区运行专门的操作系统,该操作系统仅为其任务消耗必要的资源。通过让用户操作系统占有大部分资源,直接访问部分外围设备,大大降低了AVMM的开销,提高了整个网络系统的性能。我们已经实现了一个可以支持windows和Linux的初步网络原型。实验评估结果表明,AVMM达到了设计目标,为客户端虚拟化提供了一种可行、高效的方法。
{"title":"AVMM: Virtualize network client with a bare-metal and asymmetric partitioning approach","authors":"Yuezhi Zhou, Yaoxue Zhang, Hao Liu, N. Xiong","doi":"10.1109/INFCOMW.2011.5928892","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928892","url":null,"abstract":"This paper presents the design, implementation, and evaluation of AVMM, a symmetric partition-based bare-metal client virtualization approach that tries to achieve maximum near-native performance for end-users while supporting new out-of-OS mechanism for value-added services for network system administration. To achieve these goals, AVMM divides the underlying network client platform into two asymmetric partitions: user and service partitions. The user partition runs a commodity OS, which is assigned to most portions of the CPU and memory resources and a set of peripheral devices to retain the end-user experience. The service partition runs a specialized OS, which consumes only the essential resources for its tasks. By letting user OS possess the most part of resources and access some peripheral devices directly, the AVMM overhead is reduced greatly, improving the whole network system performance. We have implemented a preliminary network prototype that can supportWindows and Linux. Our experimental evaluation results show that AVMM has achieved its designed goals and provides a feasible and efficient approach for client virtualization.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic scheduling for workflow applications over virtualized optical networks 虚拟化光网络上工作流应用的动态调度
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928793
Jingyu Ding, Yan Wang, Jiajin Le, Yaohui Jin
Joint scheduling of both computation and communication resources for workflow based distributed computing application over optical networks has been studied recently. Most algorithms proposed in previous work are mainly based on static scheduling strategies with assumption that detail resource information and accurate performance prediction is available. In this paper, we propose to employ shared virtualized optical network (VON) for the task scheduling problem. Both customers and carriers can benefit from such architecture with better flexibility and scalability. Based on a new Scheduled Result Graph (SRG) concept, we propose a computation and communication delay aware rescheduling (C2DAR) scheme to deal with the dynamics from shared VON resources. We evaluate the performance of dynamic scheduling scheme over shared VON in comparison to the static scheduling over dedicated VON and entire optical network respectively. Simulation results also show that C2DAR scheme outperforms traditional computation delay aware rescheduling (CDAR) scheme under shared VON scenario.
基于工作流的光网络分布式计算应用中计算资源和通信资源的联合调度问题是目前研究的热点。以往提出的算法主要基于静态调度策略,并假设有详细的资源信息和准确的性能预测。在本文中,我们提出使用共享虚拟化光网络(VON)来解决任务调度问题。客户和运营商都可以从这种架构中受益,具有更好的灵活性和可扩展性。基于新的调度结果图(SRG)概念,提出了一种计算和通信延迟感知的重调度(C2DAR)方案来处理共享VON资源带来的动态影响。我们分别比较了共享VON上动态调度方案与专用VON上静态调度方案和全光网络上静态调度方案的性能。仿真结果表明,在共享VON场景下,C2DAR方案优于传统的计算延迟感知重调度(CDAR)方案。
{"title":"Dynamic scheduling for workflow applications over virtualized optical networks","authors":"Jingyu Ding, Yan Wang, Jiajin Le, Yaohui Jin","doi":"10.1109/INFCOMW.2011.5928793","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928793","url":null,"abstract":"Joint scheduling of both computation and communication resources for workflow based distributed computing application over optical networks has been studied recently. Most algorithms proposed in previous work are mainly based on static scheduling strategies with assumption that detail resource information and accurate performance prediction is available. In this paper, we propose to employ shared virtualized optical network (VON) for the task scheduling problem. Both customers and carriers can benefit from such architecture with better flexibility and scalability. Based on a new Scheduled Result Graph (SRG) concept, we propose a computation and communication delay aware rescheduling (C2DAR) scheme to deal with the dynamics from shared VON resources. We evaluate the performance of dynamic scheduling scheme over shared VON in comparison to the static scheduling over dedicated VON and entire optical network respectively. Simulation results also show that C2DAR scheme outperforms traditional computation delay aware rescheduling (CDAR) scheme under shared VON scenario.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Contextual role-based security enhancement mechanism for 2G-RFID systems 基于上下文角色的2G-RFID系统安全增强机制
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928948
Wan Tang, Jin Ni, Min Chen, Ximin Yang
This paper investigates the use of second-generation radio frequency identification (2G-RFID) technology to enable better quality of service in future networks. With encoded rules as mobile codes stored in radio frequency identification (RFID) tags, the system extendibility and practicability can be effectively improved. However, due to the openness of the mobile codes, the realization of conveying intelligence brings a critical issue, i.e., how to prevent mobile codes from being misused or abused to avoid malicious attacks, which cause the disruption of back-end systems. We address this issue by the use of role-based access control (RBAC) through introducing context-aware computing. Then, we propose a two-level security enhancement mechanism (2L-SEM), i.e., joint contextual-authentication-based and role-analysis-based secure middleware design. According to the given contextual restrictions in terms of time and location, the proposed mechanism filtrates illegal and invalid mobile codes contained in the RFID tags. Finally, a typical case study is given to illustrate the deployment of the proposed 2L-SEM within a 2G-RFID system. The experimental results show the effectiveness of guaranteeing the safe execution of mobile codes in the 2G-RFID system.
本文研究了在未来网络中使用第二代射频识别(2G-RFID)技术以实现更好的服务质量。将编码规则作为移动代码存储在射频识别(RFID)标签中,可以有效提高系统的可扩展性和实用性。然而,由于移动码的开放性,智能传递的实现带来了一个关键问题,即如何防止移动码被误用或滥用,避免恶意攻击,从而导致后端系统的中断。我们通过引入上下文感知计算,使用基于角色的访问控制(RBAC)来解决这个问题。然后,我们提出了一种两级安全增强机制(2L-SEM),即基于上下文认证和基于角色分析的联合安全中间件设计。根据给定的时间和地点上下文限制,该机制过滤RFID标签中包含的非法和无效移动代码。最后,给出了一个典型的案例研究来说明在2G-RFID系统中部署所提出的2L-SEM。实验结果表明,该方法有效地保证了2G-RFID系统中移动码的安全执行。
{"title":"Contextual role-based security enhancement mechanism for 2G-RFID systems","authors":"Wan Tang, Jin Ni, Min Chen, Ximin Yang","doi":"10.1109/INFCOMW.2011.5928948","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928948","url":null,"abstract":"This paper investigates the use of second-generation radio frequency identification (2G-RFID) technology to enable better quality of service in future networks. With encoded rules as mobile codes stored in radio frequency identification (RFID) tags, the system extendibility and practicability can be effectively improved. However, due to the openness of the mobile codes, the realization of conveying intelligence brings a critical issue, i.e., how to prevent mobile codes from being misused or abused to avoid malicious attacks, which cause the disruption of back-end systems. We address this issue by the use of role-based access control (RBAC) through introducing context-aware computing. Then, we propose a two-level security enhancement mechanism (2L-SEM), i.e., joint contextual-authentication-based and role-analysis-based secure middleware design. According to the given contextual restrictions in terms of time and location, the proposed mechanism filtrates illegal and invalid mobile codes contained in the RFID tags. Finally, a typical case study is given to illustrate the deployment of the proposed 2L-SEM within a 2G-RFID system. The experimental results show the effectiveness of guaranteeing the safe execution of mobile codes in the 2G-RFID system.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1