首页 > 最新文献

2010 39th International Conference on Parallel Processing Workshops最新文献

英文 中文
Improvement for vTPM Access Control on Xen Xen上vTPM访问控制的改进
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.44
Morikawa Hiroaki, H. Ebara, Onishi Katsumi, Nakano Hideo
Nowadays, computing resources have taken tens percent of utilization at busy time for increasing computing power. However, the virtual machine (VM) technology is effective to the use of computing resources. Besides, the vulnerable services in VM prevent the affect of the other VM attacks. For example, Amazon has applied the VM method to run in real machine (Host OS) independently but attackers can retrieve data by CPU and memory dump software. Therefore this study suggests a method to improve the access virtual Trusted Platform Module (vTPM) implemented in Xen software to keep the server system safely. Furthermore, we implement and evaluate this method.
如今,为了提高计算能力,计算资源在繁忙时间占用了10%的利用率。然而,虚拟机(VM)技术可以有效地利用计算资源。同时,虚拟机中的脆弱业务可以防止其他虚拟机受到攻击。例如,Amazon采用了VM方法在真实机(Host OS)中独立运行,但攻击者可以通过CPU和内存转储软件检索数据。因此,本文提出了一种改进Xen软件中实现的访问虚拟可信平台模块(vTPM)的方法,以保证服务器系统的安全。并对该方法进行了实现和评价。
{"title":"Improvement for vTPM Access Control on Xen","authors":"Morikawa Hiroaki, H. Ebara, Onishi Katsumi, Nakano Hideo","doi":"10.1109/ICPPW.2010.44","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.44","url":null,"abstract":"Nowadays, computing resources have taken tens percent of utilization at busy time for increasing computing power. However, the virtual machine (VM) technology is effective to the use of computing resources. Besides, the vulnerable services in VM prevent the affect of the other VM attacks. For example, Amazon has applied the VM method to run in real machine (Host OS) independently but attackers can retrieve data by CPU and memory dump software. Therefore this study suggests a method to improve the access virtual Trusted Platform Module (vTPM) implemented in Xen software to keep the server system safely. Furthermore, we implement and evaluate this method.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"15 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131574168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Server Provisioning and Frequency Adjustment in Server Clusters 服务器集群的最优分配和频率调整
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.74
Xinying Zheng, Yu Cai
Green computing is a hot topic that received a great amount of interest in the past few years. This paper explores the benefits of Dynamic Voltage/Frequency Scaling (DV/FS) and server number controlling Vary-On Vary-Off (VOVF) for power management in a server cluster. Previous work mostly addressed the DV/FS and VOVF separately. In this paper, an optimization problem is formulated to achieve energy savings while ensure performance. DV/FS and VOVF mechanisms are combined to obtain an optimal power management tactics. The presented optimization model provides controllable and predictable quantitative control of power consumption with theoretically guaranteed service performance. We further study overhead of the proposed scheme and provide a Double Control Periods (DCP) model to compensate the transition overhead. The power optimization model and DCP model are evaluated via extensive simulations, they are also justified by the real workload data trace. The results prove the effectiveness and efficiency of the proposed models.
绿色计算是近年来引起人们极大兴趣的一个热门话题。本文探讨了动态电压/频率缩放(DV/FS)和服务器数量控制变开变关(VOVF)对服务器集群电源管理的好处。以前的工作主要是分别处理DV/FS和VOVF。本文提出了在保证性能的同时实现节能的优化问题。将DV/FS和VOVF机制相结合,获得最佳的电源管理策略。所提出的优化模型在理论上保证服务性能的前提下,提供了可控制、可预测的电量定量控制。我们进一步研究了该方案的开销,并提供了一个双控制周期(DCP)模型来补偿转换开销。通过大量的仿真对功率优化模型和DCP模型进行了评估,并通过实际工作负载数据跟踪对其进行了验证。结果证明了所提模型的有效性和有效性。
{"title":"Optimal Server Provisioning and Frequency Adjustment in Server Clusters","authors":"Xinying Zheng, Yu Cai","doi":"10.1109/ICPPW.2010.74","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.74","url":null,"abstract":"Green computing is a hot topic that received a great amount of interest in the past few years. This paper explores the benefits of Dynamic Voltage/Frequency Scaling (DV/FS) and server number controlling Vary-On Vary-Off (VOVF) for power management in a server cluster. Previous work mostly addressed the DV/FS and VOVF separately. In this paper, an optimization problem is formulated to achieve energy savings while ensure performance. DV/FS and VOVF mechanisms are combined to obtain an optimal power management tactics. The presented optimization model provides controllable and predictable quantitative control of power consumption with theoretically guaranteed service performance. We further study overhead of the proposed scheme and provide a Double Control Periods (DCP) model to compensate the transition overhead. The power optimization model and DCP model are evaluated via extensive simulations, they are also justified by the real workload data trace. The results prove the effectiveness and efficiency of the proposed models.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Power Optimization with Performance Assurance for Multi-tier Applications in Virtualized Data Centers 虚拟化数据中心中多层应用的电源优化和性能保证
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.75
Yefu Wang, Xiaorui Wang
Modern data centers must provide performance assurance for complex system software such as multi-tier web applications. In addition, the power consumption of data centers needs to be minimized to reduce operating costs and avoid system overheating. Various power-efficient performance management strategies have been proposed based on dynamic voltage and frequency scaling (DVFS). Virtualization technologies have also made it possible to consolidate multiple virtual machines (VMs) onto a smaller number of active physical servers for even greater power savings, but at the cost of a higher overhead. This paper proposes a performance-controlled power optimization solution for virtualized data centers with multi-tier applications. While existing work relies on either DVFS or server consolidation in a separate manner, our solution utilizes both strategies for maximized power savings by integrating feedback control with optimization strategies. At the application level, a multi-input-multi-output controller is designed to achieve the desired performance for applications spanning multiple VMs, on a short time scale, by reallocating the CPU resources and DVFS. At the data center level, a power optimizer is proposed to incrementally consolidate VMs onto the most power-efficient servers on a longer time scale. Empirical results on a hardware testbed demonstrate that our solution can effectively achieve performance-assured power savings. Extensive simulation results, based on a trace file of 5,415 real servers, demonstrate the efficacy of our solution in large-scale data centers.
现代数据中心必须为多层web应用等复杂系统软件提供性能保证。此外,为了降低运营成本和避免系统过热,需要将数据中心的功耗降至最低。基于动态电压和频率缩放(DVFS)的各种节能性能管理策略已经被提出。虚拟化技术还使将多个虚拟机(vm)合并到数量较少的活动物理服务器上成为可能,从而实现更大的节能,但代价是更高的开销。针对具有多层应用的虚拟化数据中心,提出了一种性能可控的电源优化方案。虽然现有的工作以不同的方式依赖于DVFS或服务器整合,但我们的解决方案通过集成反馈控制和优化策略,利用这两种策略来最大限度地节省电力。在应用程序级别,设计一个多输入多输出控制器,通过重新分配CPU资源和DVFS,在短时间内为跨多个vm的应用程序实现所需的性能。在数据中心级别,建议使用一个电源优化器,以便在较长的时间范围内逐步将vm整合到最节能的服务器上。在硬件测试平台上的经验结果表明,我们的解决方案可以有效地实现性能保证的节能。基于5,415个真实服务器的跟踪文件的广泛仿真结果证明了我们的解决方案在大型数据中心中的有效性。
{"title":"Power Optimization with Performance Assurance for Multi-tier Applications in Virtualized Data Centers","authors":"Yefu Wang, Xiaorui Wang","doi":"10.1109/ICPPW.2010.75","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.75","url":null,"abstract":"Modern data centers must provide performance assurance for complex system software such as multi-tier web applications. In addition, the power consumption of data centers needs to be minimized to reduce operating costs and avoid system overheating. Various power-efficient performance management strategies have been proposed based on dynamic voltage and frequency scaling (DVFS). Virtualization technologies have also made it possible to consolidate multiple virtual machines (VMs) onto a smaller number of active physical servers for even greater power savings, but at the cost of a higher overhead. This paper proposes a performance-controlled power optimization solution for virtualized data centers with multi-tier applications. While existing work relies on either DVFS or server consolidation in a separate manner, our solution utilizes both strategies for maximized power savings by integrating feedback control with optimization strategies. At the application level, a multi-input-multi-output controller is designed to achieve the desired performance for applications spanning multiple VMs, on a short time scale, by reallocating the CPU resources and DVFS. At the data center level, a power optimizer is proposed to incrementally consolidate VMs onto the most power-efficient servers on a longer time scale. Empirical results on a hardware testbed demonstrate that our solution can effectively achieve performance-assured power savings. Extensive simulation results, based on a trace file of 5,415 real servers, demonstrate the efficacy of our solution in large-scale data centers.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122101973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms 云数据存储平台完整性漏洞分析及不可抵赖协议
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.42
Jun Feng, Yu Chen, Wei-Shinn Ku, Pu Liu
Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration from server-attached storage to network-based distributed storage. Along with variant advantages, distributed storage also poses new challenges in creating a secure and reliable data storage and access facility. The data security in cloud is one of the challenges to be addressed before the novel pay-as-you-go business model can be accepted and applied widely. Concerns are raised from both insecure/unreliable service providers and potential malicious users. In this article, we analyze the integrity vulnerability existing in the current cloud storage platforms and show the problem of repudiation. A novel non-repudiation (NR) protocol specifically designed in the context of cloud computing environment is proposed. We have also discussed the robustness of the NR protocol against typical attacks in the network environments.
数据存储技术与网络基础设施和应用程序一起被认为是信息管理的主要方面之一。云计算的繁荣需要从附加服务器的存储迁移到基于网络的分布式存储。分布式存储在具有各种优势的同时,也对创建安全可靠的数据存储和访问设施提出了新的挑战。云中的数据安全是在这种新型的现收现付业务模式被广泛接受和应用之前需要解决的挑战之一。不安全/不可靠的服务提供者和潜在的恶意用户都提出了担忧。本文分析了当前云存储平台存在的完整性漏洞,并提出了可抵赖性问题。提出了一种针对云计算环境设计的新型不可抵赖协议。我们还讨论了NR协议对网络环境中典型攻击的鲁棒性。
{"title":"Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms","authors":"Jun Feng, Yu Chen, Wei-Shinn Ku, Pu Liu","doi":"10.1109/ICPPW.2010.42","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.42","url":null,"abstract":"Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration from server-attached storage to network-based distributed storage. Along with variant advantages, distributed storage also poses new challenges in creating a secure and reliable data storage and access facility. The data security in cloud is one of the challenges to be addressed before the novel pay-as-you-go business model can be accepted and applied widely. Concerns are raised from both insecure/unreliable service providers and potential malicious users. In this article, we analyze the integrity vulnerability existing in the current cloud storage platforms and show the problem of repudiation. A novel non-repudiation (NR) protocol specifically designed in the context of cloud computing environment is proposed. We have also discussed the robustness of the NR protocol against typical attacks in the network environments.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129839327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
A Case for Secure Virtual Append-Only Storage for Virtual Machines 为虚拟机提供安全虚拟追加存储的案例
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.15
Zhao Lin, Kartik Gopalan, Ping Yang
Traditional operating systems and applications use logs extensively to monitor system activity and perform intrusion detection. Consequently, logs have also become prime targets for intruders. When a malware or intruder obtains root privileges in a system, one of its first actions is to hide its footprint by deleting or modifying system logs, especially the log entry recording the intrusion activity (such as unauthorized root login). A key weakness of most current logging mechanisms is that logs are stored on a storage device over which the system being logged has complete control, including the ability to delete/modify the logs arbitrarily. Once the root privileges of such a system are compromised, so are the logs. Virtualization offers a unique opportunity to eliminate this point of weakness. In this paper, we propose a new virtual storage abstraction for virtual machines (VMs) called Virtual Append-only Storage (VAS) that secures and preserves all system and/or application logs in a VM and can prevent an intruder from deleting/modifying past logs even after the root privileges of a VM are compromised. Our VAS-based logging complements existing intrusion detection techniques which mainly monitor the in-memory execution state and data, but do not protect the storage device on which logs are stored. Since logs can become voluminous over time, VAS also provides administrators the ability to secure either system-wide or application-specific logs, rather than blindly logging all system activity.
传统的操作系统和应用程序广泛使用日志来监视系统活动和执行入侵检测。因此,日志也成为入侵者的主要目标。当恶意软件或入侵者获得系统中的根权限时,其首先采取的行动之一是通过删除或修改系统日志来隐藏其足迹,特别是记录入侵活动(如未经授权的根登录)的日志条目。当前大多数日志记录机制的一个关键弱点是,日志存储在存储设备上,被记录日志的系统对存储设备有完全的控制,包括任意删除/修改日志的能力。一旦这样一个系统的根权限被泄露,日志也会被泄露。虚拟化提供了一个独特的机会来消除这个弱点。在本文中,我们为虚拟机(VM)提出了一种新的虚拟存储抽象,称为虚拟追加存储(virtual add -only storage, VAS),它保护和保存虚拟机中的所有系统和/或应用程序日志,并且可以防止入侵者删除/修改过去的日志,即使在虚拟机的根权限受到损害之后。我们基于vas的日志记录补充了现有的入侵检测技术,这些技术主要监视内存中的执行状态和数据,但不保护存储日志的存储设备。由于随着时间的推移,日志可能会变得非常庞大,因此VAS还为管理员提供了保护系统范围或特定于应用程序的日志的能力,而不是盲目地记录所有系统活动。
{"title":"A Case for Secure Virtual Append-Only Storage for Virtual Machines","authors":"Zhao Lin, Kartik Gopalan, Ping Yang","doi":"10.1109/ICPPW.2010.15","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.15","url":null,"abstract":"Traditional operating systems and applications use logs extensively to monitor system activity and perform intrusion detection. Consequently, logs have also become prime targets for intruders. When a malware or intruder obtains root privileges in a system, one of its first actions is to hide its footprint by deleting or modifying system logs, especially the log entry recording the intrusion activity (such as unauthorized root login). A key weakness of most current logging mechanisms is that logs are stored on a storage device over which the system being logged has complete control, including the ability to delete/modify the logs arbitrarily. Once the root privileges of such a system are compromised, so are the logs. Virtualization offers a unique opportunity to eliminate this point of weakness. In this paper, we propose a new virtual storage abstraction for virtual machines (VMs) called Virtual Append-only Storage (VAS) that secures and preserves all system and/or application logs in a VM and can prevent an intruder from deleting/modifying past logs even after the root privileges of a VM are compromised. Our VAS-based logging complements existing intrusion detection techniques which mainly monitor the in-memory execution state and data, but do not protect the storage device on which logs are stored. Since logs can become voluminous over time, VAS also provides administrators the ability to secure either system-wide or application-specific logs, rather than blindly logging all system activity.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Pattern Based I/O Analysis of Parallel Programs 基于高效模式的并行程序I/O分析
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.31
Michael Kluge, A. Knüpfer, W. Nagel
Modern HPC systems are constructed by placing more and more cores in a single machine. To utilize this kind of machines efficiently, many parallel processes have to be used. The performance analysis of massively parallel program runs becomes more and more complicated as the number of events that are generated while the program is traced grows linearly with the number of processes. In order to utilize large HPC systems efficiently, parallel applications have to execute I/O requests in parallel. Analyzing these I/O requests and optimizing this part of a parallel program requires a deep knowledge of all issued requests and the dependencies between these requests. Traditional tracing facilities record all necessary information, including all synchronization events. We present a novel approach to reduce the amount of information needed for an I/O analysis in program traces significantly. This reduction enables a further analysis of the reduced data set in other tools that for example detect request patterns. Our approach is based on a specialized graph that is constructed from an event trace. This paper describes a systematic methodology to reduce the initial graph by merging adjacent vertices. As an extension we also describe how this merging step can be combined with the graph construction which significantly reduces the runtime of the algorithm in practice. An example that demonstrates the practical application of the methodology to real world use cases concludes the paper. After applying the reduction operation to application traces in the example the amount of synchronization events remaining is in the order of the number of I/O events.
现代高性能计算系统是通过在单个机器中放置越来越多的核心来构建的。为了有效地利用这种机器,必须使用许多并行过程。随着跟踪程序时产生的事件数量与进程数量呈线性增长,大规模并行程序运行的性能分析变得越来越复杂。为了有效地利用大型HPC系统,并行应用程序必须并行执行I/O请求。分析这些I/O请求并优化并行程序的这一部分需要深入了解所有发出的请求以及这些请求之间的依赖关系。传统的跟踪工具记录所有必要的信息,包括所有同步事件。我们提出了一种新的方法来显著减少程序跟踪中I/O分析所需的信息量。这种简化允许在其他工具中进一步分析简化后的数据集,例如检测请求模式。我们的方法是基于从事件跟踪构造的专门图。本文描述了一种通过合并相邻顶点来减少初始图的系统方法。作为扩展,我们还描述了如何将合并步骤与图构造相结合,从而在实践中显着减少算法的运行时间。本文最后给出了一个示例,演示了该方法在现实世界用例中的实际应用。在对示例中的应用程序跟踪应用缩减操作之后,剩余的同步事件数量与I/O事件数量相同。
{"title":"Efficient Pattern Based I/O Analysis of Parallel Programs","authors":"Michael Kluge, A. Knüpfer, W. Nagel","doi":"10.1109/ICPPW.2010.31","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.31","url":null,"abstract":"Modern HPC systems are constructed by placing more and more cores in a single machine. To utilize this kind of machines efficiently, many parallel processes have to be used. The performance analysis of massively parallel program runs becomes more and more complicated as the number of events that are generated while the program is traced grows linearly with the number of processes. In order to utilize large HPC systems efficiently, parallel applications have to execute I/O requests in parallel. Analyzing these I/O requests and optimizing this part of a parallel program requires a deep knowledge of all issued requests and the dependencies between these requests. Traditional tracing facilities record all necessary information, including all synchronization events. We present a novel approach to reduce the amount of information needed for an I/O analysis in program traces significantly. This reduction enables a further analysis of the reduced data set in other tools that for example detect request patterns. Our approach is based on a specialized graph that is constructed from an event trace. This paper describes a systematic methodology to reduce the initial graph by merging adjacent vertices. As an extension we also describe how this merging step can be combined with the graph construction which significantly reduces the runtime of the algorithm in practice. An example that demonstrates the practical application of the methodology to real world use cases concludes the paper. After applying the reduction operation to application traces in the example the amount of synchronization events remaining is in the order of the number of I/O events.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132638641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying P2P Strategies to Scheduling in Decentralized Grid Computing Infrastructures P2P策略在分散网格计算基础设施调度中的应用
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.47
C. Grimme, Joachim Lepping, Jonathan Moreno Picon, A. Papaspyrou
In this paper, we propose a new algorithm for job interchange in Computational Grids that consist of autonomous and equitable HPC sites, called Shaking-G. Originally developed for balancing the sharing of video files in P2P networks, we conceptually transfer and adapt the algorithm to the domain of job scheduling in Grids, building an integrated, load-adaptive two-tier job exchange strategy. We evaluate the performance of Shaking-G with real workload data in different experimental scenarios and show that it outperforms traditional non-Grid aware algorithms in setups without job interchange, fostering the benefits of collaboration between large HPC centers.
在本文中,我们提出了一种新的算法,用于由自治和公平的HPC站点组成的计算网格中的工作交换,称为shake - g。最初是为了平衡P2P网络中的视频文件共享而开发的,我们在概念上将该算法转移并适应网格中的作业调度领域,构建了一个集成的,负载自适应的两层作业交换策略。我们在不同的实验场景中使用真实工作负载数据评估了shake - g的性能,并表明它在没有工作交换的设置中优于传统的非网格感知算法,从而促进了大型HPC中心之间协作的好处。
{"title":"Applying P2P Strategies to Scheduling in Decentralized Grid Computing Infrastructures","authors":"C. Grimme, Joachim Lepping, Jonathan Moreno Picon, A. Papaspyrou","doi":"10.1109/ICPPW.2010.47","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.47","url":null,"abstract":"In this paper, we propose a new algorithm for job interchange in Computational Grids that consist of autonomous and equitable HPC sites, called Shaking-G. Originally developed for balancing the sharing of video files in P2P networks, we conceptually transfer and adapt the algorithm to the domain of job scheduling in Grids, building an integrated, load-adaptive two-tier job exchange strategy. We evaluate the performance of Shaking-G with real workload data in different experimental scenarios and show that it outperforms traditional non-Grid aware algorithms in setups without job interchange, fostering the benefits of collaboration between large HPC centers.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple Trees with Network Coding for Efficient and Reliable Multicast in MANETs 基于多树网络编码的多播多播网络
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.85
Yu-Hsun Chen, Gen-Huey Chen, E. Wu
The innovative exploitation of network coding technology could bring great design advantages to MANETs. First, wireless links are inherently lossy due to channel fading or interference. Second, the delivery condition of the route from the source to each receiver in a multicast transmission might be significantly distinct. Trying to satisfy the reliability requirement for the poorly-connected receivers may affect the performance of the rest of the receivers. In this paper, we present a tree-based multicast protocol, which exploits the characteristics of network coding to provide efficient and reliable multicast. A metric, named Receiving Probability (RP), is proposed to represent the probability for a node in a multicast tree to successfully receive a packet sent by the multicast source. To mitigate the distinctions among the receivers, the proposed multicast protocol aims to construct multiple trees such that the RP of each receiver satisfies a predefined threshold. Besides, since seldom redundant packets are generated with random network coding, by applying random network coding to these constructed multiple trees, differently coded packets can be transmitted on multiple trees, and the throughput of the reliable multicast can be improved. Simulation results show that the average throughput can be enhanced 30% and the throughput of the poorly-connected receivers can be enhanced 100% with our protocol, compared to a recent work.
网络编码技术的创新开发可以为manet带来巨大的设计优势。首先,由于信道衰落或干扰,无线链路本身就有损耗。其次,在组播传输中,从源到每个接收方的路由传递条件可能显著不同。试图满足连接不良的接收机的可靠性要求可能会影响其他接收机的性能。本文提出了一种基于树的组播协议,利用网络编码的特性提供高效可靠的组播。提出了一种度量,称为接收概率(RP),用来表示组播树节点成功接收组播源发送的数据包的概率。为了消除接收方之间的差异,提出的组播协议旨在构建多个树,使每个接收方的RP满足预定义的阈值。另外,由于随机网络编码很少产生冗余数据包,因此对这些构建的多树进行随机网络编码,可以在多棵树上传输不同编码的数据包,从而提高可靠组播的吞吐量。仿真结果表明,与现有协议相比,该协议的平均吞吐量可提高30%,连接不良的接收端吞吐量可提高100%。
{"title":"Multiple Trees with Network Coding for Efficient and Reliable Multicast in MANETs","authors":"Yu-Hsun Chen, Gen-Huey Chen, E. Wu","doi":"10.1109/ICPPW.2010.85","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.85","url":null,"abstract":"The innovative exploitation of network coding technology could bring great design advantages to MANETs. First, wireless links are inherently lossy due to channel fading or interference. Second, the delivery condition of the route from the source to each receiver in a multicast transmission might be significantly distinct. Trying to satisfy the reliability requirement for the poorly-connected receivers may affect the performance of the rest of the receivers. In this paper, we present a tree-based multicast protocol, which exploits the characteristics of network coding to provide efficient and reliable multicast. A metric, named Receiving Probability (RP), is proposed to represent the probability for a node in a multicast tree to successfully receive a packet sent by the multicast source. To mitigate the distinctions among the receivers, the proposed multicast protocol aims to construct multiple trees such that the RP of each receiver satisfies a predefined threshold. Besides, since seldom redundant packets are generated with random network coding, by applying random network coding to these constructed multiple trees, differently coded packets can be transmitted on multiple trees, and the throughput of the reliable multicast can be improved. Simulation results show that the average throughput can be enhanced 30% and the throughput of the poorly-connected receivers can be enhanced 100% with our protocol, compared to a recent work.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Performance and Energy Management in High Performance Computing Systems 高性能计算系统中的性能与能量管理
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.66
Jeffrey J. Evans
Large-scale High Performance Computing (HPC) systems continue to be designed and constructed to extend performance beyond Petascales using monolithic, cluster, and distributed architectures and emerging multi-core Central Processing Unit (CPU) technologies. As these machines grow so too does the size and variety of applications that run on them. Yet power management and interconnection performance are of great and mounting concern, and to date, the understanding of HPC subsystem interactions and their relationships to power efficiency remains less than desirable. Furthermore, Executive Order 13423 was issued in January of 2007 in an effort to ensure that Federal agencies operate in an environmentally, economically, and fiscally sound manner. It mandates a 30% reduction in energy intensity (MBTUs per square foot) of government facilities in the FY06-15 timeframe using FY03 as a baseline. Two major drawbacks hinder their ability to sustain consistent run time and energy efficient performance: (1) major subsystems interact with each other, often at the expense of unpredictable application run time and energy consumption, and (2) increased power density of these machines complicates the space, power, and cooling problem, resulting in partial or full system down time, further exacerbating run time unpredictability. We believe that one fundamental reason for the above limitations is the operational isolation of loosely coupled subsystems. While the development of subsystems in isolation has been the dominant model for decades, it is inherently unsuitable for ensuring consistent and sustainable systemic performance. We propose that the collection of HPC sub-systems, including the set of running applications must be collaborative in nature, and as such the HPC systems full potential is limited by subsystem isolation and autonomous actions to improve their individual subsystem performance. This paper describes an approach for using “Application-Level Behavioral Attribute Driven Techniques” to characterize HPC subsystem interactions into meaningful metrics and correlates that can be used as inputs to algorithms to control large-scale behaviors (job schedulers, routers, and HVAC systems) as well as smaller-scale behaviors such as CPU frequency and voltage scaling to achieve improved run time and energy efficiency to help satisfy Executive Order 13423.
大规模高性能计算(HPC)系统继续被设计和构建,以使用单片、集群和分布式架构以及新兴的多核中央处理单元(CPU)技术来扩展超出千兆级的性能。随着这些机器的增长,在其上运行的应用程序的大小和种类也在增长。然而,电源管理和互连性能是人们越来越关注的问题,到目前为止,对高性能计算子系统相互作用及其与电源效率的关系的理解仍然不够理想。此外,2007年1月颁布了13423号行政命令,以确保联邦机构在环境、经济和财政方面运作良好。它要求以03财年为基准,在06-15财年期间将政府设施的能源强度(每平方英尺mbtu)降低30%。两个主要缺点阻碍了它们维持一致的运行时间和节能性能的能力:(1)主要子系统相互交互,通常以不可预测的应用程序运行时间和能源消耗为代价;(2)这些机器的功率密度增加使空间、电源和冷却问题复杂化,导致部分或全部系统停机,进一步加剧了运行时间的不可预测性。我们认为,造成上述限制的一个根本原因是松散耦合子系统的操作隔离。虽然孤立的子系统开发几十年来一直是主导模式,但它本质上不适合确保一致和可持续的系统性能。我们建议HPC子系统的集合,包括运行的应用程序集,在本质上必须是协作的,因此HPC系统的全部潜力受到子系统隔离和自主行动的限制,以提高其单个子系统的性能。本文描述了一种使用“应用级行为属性驱动技术”的方法,将HPC子系统交互特征化为有意义的度量和相关性,这些度量和相关性可以用作算法的输入,以控制大规模行为(作业调度器、路由器和HVAC系统),以及较小规模的行为,如CPU频率和电压缩放,以实现改进的运行时间和能源效率,以帮助满足13423号行政命令。
{"title":"On Performance and Energy Management in High Performance Computing Systems","authors":"Jeffrey J. Evans","doi":"10.1109/ICPPW.2010.66","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.66","url":null,"abstract":"Large-scale High Performance Computing (HPC) systems continue to be designed and constructed to extend performance beyond Petascales using monolithic, cluster, and distributed architectures and emerging multi-core Central Processing Unit (CPU) technologies. As these machines grow so too does the size and variety of applications that run on them. Yet power management and interconnection performance are of great and mounting concern, and to date, the understanding of HPC subsystem interactions and their relationships to power efficiency remains less than desirable. Furthermore, Executive Order 13423 was issued in January of 2007 in an effort to ensure that Federal agencies operate in an environmentally, economically, and fiscally sound manner. It mandates a 30% reduction in energy intensity (MBTUs per square foot) of government facilities in the FY06-15 timeframe using FY03 as a baseline. Two major drawbacks hinder their ability to sustain consistent run time and energy efficient performance: (1) major subsystems interact with each other, often at the expense of unpredictable application run time and energy consumption, and (2) increased power density of these machines complicates the space, power, and cooling problem, resulting in partial or full system down time, further exacerbating run time unpredictability. We believe that one fundamental reason for the above limitations is the operational isolation of loosely coupled subsystems. While the development of subsystems in isolation has been the dominant model for decades, it is inherently unsuitable for ensuring consistent and sustainable systemic performance. We propose that the collection of HPC sub-systems, including the set of running applications must be collaborative in nature, and as such the HPC systems full potential is limited by subsystem isolation and autonomous actions to improve their individual subsystem performance. This paper describes an approach for using “Application-Level Behavioral Attribute Driven Techniques” to characterize HPC subsystem interactions into meaningful metrics and correlates that can be used as inputs to algorithms to control large-scale behaviors (job schedulers, routers, and HVAC systems) as well as smaller-scale behaviors such as CPU frequency and voltage scaling to achieve improved run time and energy efficiency to help satisfy Executive Order 13423.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient Algorithm and Embedded Multicore Implementation of ECG Analysis in Multi-lead Electrocardiogram Records 一种高效的多导联心电分析算法及嵌入式多核实现
Pub Date : 2010-09-13 DOI: 10.1109/ICPPW.2010.25
B. Abderazek, Y. Haga, Kenichi Kuroda
Electrocardiography (ECG) is an interpretation of the electrical activity of the heart over time captured and externally recorded by electrodes. An effective approach to speed up this and other biomedical operations is to integrate a very high number of processing elements in a single chip so that the massive scale of fine-grain parallelism inherent in several biomedical applications can be exploited efficiently. In this paper, we exploit parallel processing techniques to process electrocardiography computation kernels in parallel. We present an efficient ECG analysis algorithm based on Period-Peak Detection (PPD) approach. The system is implemented in a multicore System-on-Chip. System architecture and evaluation results are given in detail.
心电图(ECG)是对一段时间内心脏电活动的解释,由电极捕获和外部记录。加快这种和其他生物医学操作的有效方法是在单个芯片中集成非常多的处理元素,以便有效地利用生物医学应用中固有的大规模细粒度并行性。在本文中,我们利用并行处理技术来并行处理心电图计算核。提出了一种基于周期峰值检测(PPD)的高效心电分析算法。该系统采用多核片上系统实现。详细给出了系统架构和评估结果。
{"title":"An Efficient Algorithm and Embedded Multicore Implementation of ECG Analysis in Multi-lead Electrocardiogram Records","authors":"B. Abderazek, Y. Haga, Kenichi Kuroda","doi":"10.1109/ICPPW.2010.25","DOIUrl":"https://doi.org/10.1109/ICPPW.2010.25","url":null,"abstract":"Electrocardiography (ECG) is an interpretation of the electrical activity of the heart over time captured and externally recorded by electrodes. An effective approach to speed up this and other biomedical operations is to integrate a very high number of processing elements in a single chip so that the massive scale of fine-grain parallelism inherent in several biomedical applications can be exploited efficiently. In this paper, we exploit parallel processing techniques to process electrocardiography computation kernels in parallel. We present an efficient ECG analysis algorithm based on Period-Peak Detection (PPD) approach. The system is implemented in a multicore System-on-Chip. System architecture and evaluation results are given in detail.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129814154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2010 39th International Conference on Parallel Processing Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1