首页 > 最新文献

International Conference on Dependable Systems and Networks, 2004最新文献

英文 中文
Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast 暴露和消除基于八卦的安全组播中拒绝服务攻击的漏洞
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311892
Gal Badishi, I. Keidar, Amir Sasson
We propose a framework and methodology for quantifying the effect of denial of service (DoS) attacks on a distributed system. We present a systematic study of the resistance of gossip-based multicast protocols to DoS attacks. We show that even distributed and randomized gossip-based protocols, which eliminate single points of failure, do not necessarily eliminate vulnerabilities to DoS attacks. We propose Drum - a simple gossip-based multicast protocol that eliminates such vulnerabilities. Drum was implemented in Java and tested on a large cluster. We show, using closed-form mathematical analysis, simulations, and empirical tests, that Drum survives severe DoS attacks.
我们提出了一个框架和方法来量化拒绝服务(DoS)攻击对分布式系统的影响。我们提出了一个系统的研究基于八卦的多播协议抵抗DoS攻击。我们表明,即使是消除单点故障的分布式和随机的基于流言的协议,也不一定消除DoS攻击的漏洞。我们提出Drum——一个简单的基于八卦的多播协议,它消除了这些漏洞。Drum是用Java实现的,并在一个大型集群上进行了测试。我们使用封闭形式的数学分析、模拟和经验测试表明,Drum能够经受住严重的DoS攻击。
{"title":"Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast","authors":"Gal Badishi, I. Keidar, Amir Sasson","doi":"10.1109/DSN.2004.1311892","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311892","url":null,"abstract":"We propose a framework and methodology for quantifying the effect of denial of service (DoS) attacks on a distributed system. We present a systematic study of the resistance of gossip-based multicast protocols to DoS attacks. We show that even distributed and randomized gossip-based protocols, which eliminate single points of failure, do not necessarily eliminate vulnerabilities to DoS attacks. We propose Drum - a simple gossip-based multicast protocol that eliminates such vulnerabilities. Drum was implemented in Java and tested on a large cluster. We show, using closed-form mathematical analysis, simulations, and empirical tests, that Drum survives severe DoS attacks.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130358024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Discovering 1-FT routes in mobile ad hoc networks 移动ad hoc网络中1-FT路由的发现
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311933
Rajesh Venkatasubramanian, J. Hayes
Transmitting messages in mobile wireless networks typically involves on-demand route discovery implemented via network-wide broadcast. Due to the dynamic nature of the network topology the life-time of a route is very short, so a source frequently requires a new route to an old destination. Simultaneous discovery of multiple routes can reduce the overhead due to repeated route discovery broadcasts. Previously proposed multipath protocols do not guarantee discovery of alternative paths if they exist. We propose a multiple route discovery algorithm (ALTDSR) that finds a (multihop) primary path between a source and a destination, and a set of alternative paths. We introduce dominator relationships between primary and non-primary path nodes. Using dominators, we characterize alternative paths that bypass an intermediate node on the primary path. We develop algorithms that guarantee finding a set of alternative paths to tolerate any single node fault on the primary path, if such a set of alternative paths exists. We present simulation results which show that under high mobility conditions, ALTDSR delivers substantially more packets (around 75% more) than dynamic source routing (DSR) with moderate increase in routing overhead.
在移动无线网络中传输消息通常涉及通过全网广播实现的按需路由发现。由于网络拓扑的动态特性,路由的生命周期很短,因此一个源经常需要一条新的路由到达旧的目的地。同时发现多条路由可以减少由于重复的路由发现广播所带来的开销。以前提出的多路径协议不能保证发现备选路径(如果存在的话)。我们提出了一种多路由发现算法(ALTDSR),它可以在源和目的之间找到一条(多跳)主路径,以及一组备选路径。我们引入主路径节点和非主路径节点之间的支配关系。使用支配子,我们描述了绕过主路径上的中间节点的替代路径。我们开发了一种算法,保证找到一组替代路径来容忍主路径上的任何单个节点故障,如果这样一组替代路径存在的话。我们提出的仿真结果表明,在高移动性条件下,ALTDSR比动态源路由(DSR)提供更多的数据包(约75%以上),路由开销适度增加。
{"title":"Discovering 1-FT routes in mobile ad hoc networks","authors":"Rajesh Venkatasubramanian, J. Hayes","doi":"10.1109/DSN.2004.1311933","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311933","url":null,"abstract":"Transmitting messages in mobile wireless networks typically involves on-demand route discovery implemented via network-wide broadcast. Due to the dynamic nature of the network topology the life-time of a route is very short, so a source frequently requires a new route to an old destination. Simultaneous discovery of multiple routes can reduce the overhead due to repeated route discovery broadcasts. Previously proposed multipath protocols do not guarantee discovery of alternative paths if they exist. We propose a multiple route discovery algorithm (ALTDSR) that finds a (multihop) primary path between a source and a destination, and a set of alternative paths. We introduce dominator relationships between primary and non-primary path nodes. Using dominators, we characterize alternative paths that bypass an intermediate node on the primary path. We develop algorithms that guarantee finding a set of alternative paths to tolerate any single node fault on the primary path, if such a set of alternative paths exists. We present simulation results which show that under high mobility conditions, ALTDSR delivers substantially more packets (around 75% more) than dynamic source routing (DSR) with moderate increase in routing overhead.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Characterization of the impact of faulty drivers on the robustness of the Linux kernel 描述故障驱动程序对Linux内核鲁棒性的影响
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311957
A. Albinet, J. Arlat, J. Fabre
Drivers are becoming the larger part of operating systems kernels. Previous studies have shown that device drivers seem to be one of the most important sources of operating systems misbehavior. Their failure can have significant impact on the kernel and cause significant damages to the system as a whole. To objectively characterize the impact of faulty drivers, we have carried out a series of fault injection experiments. To conduct these experiments we have targeted the DPI (Driver Programming Interface) that implements the way device drivers interact with the kernel. Faults are injected on the parameters of these kernel core Junctions. This allows for the derivation of useful results about the failure modes induced and thus characterization of the robustness of a target kernel with respect to faulty drivers. The information gathered also enables to improve these interaction facilities.
驱动程序正在成为操作系统内核中更大的一部分。先前的研究表明,设备驱动程序似乎是操作系统行为不正常的最重要来源之一。它们的故障会对内核产生重大影响,并对整个系统造成重大损害。为了客观表征故障驱动的影响,我们进行了一系列故障注入实验。为了进行这些实验,我们将DPI(驱动程序编程接口)作为目标,它实现了设备驱动程序与内核交互的方式。将故障注入到这些核核结点的参数上。这允许推导关于诱导的故障模式的有用结果,从而表征相对于故障驱动的目标内核的鲁棒性。收集到的信息还可以改进这些交互设施。
{"title":"Characterization of the impact of faulty drivers on the robustness of the Linux kernel","authors":"A. Albinet, J. Arlat, J. Fabre","doi":"10.1109/DSN.2004.1311957","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311957","url":null,"abstract":"Drivers are becoming the larger part of operating systems kernels. Previous studies have shown that device drivers seem to be one of the most important sources of operating systems misbehavior. Their failure can have significant impact on the kernel and cause significant damages to the system as a whole. To objectively characterize the impact of faulty drivers, we have carried out a series of fault injection experiments. To conduct these experiments we have targeted the DPI (Driver Programming Interface) that implements the way device drivers interact with the kernel. Faults are injected on the parameters of these kernel core Junctions. This allows for the derivation of useful results about the failure modes induced and thus characterization of the robustness of a target kernel with respect to faulty drivers. The information gathered also enables to improve these interaction facilities.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Evaluating the impact of limited resource on the performance of flooding in wireless sensor networks 评估有限资源对无线传感器网络中泛洪性能的影响
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311949
Patrick Downey, R. Cardell-Oliver
Wireless sensor networks (WSNs) are large collections of resource limited nodes, densely deployed over a landscape. They gather and disseminate local data using multi-hop broadcasting. WSN design and deployment is hampered by currently limited knowledge of the performance characteristics of network nodes and protocols. Their systematic development, thus, requires a flexible simulation environment in which new models of specific node or network behaviours can be integrated easily. This paper introduces a loosely coupled, object oriented simulation environment for this task. The simulator is used to investigate the efficiency of flooding protocols in WSNs. For dense networks with noisy transmission, we show that using low transmission power maximizes time and resource efficiency and that the scalability of flooding for large networks is excellent. We demonstrate ways of improving flooding performance given specific deployment constraints.
无线传感器网络(wsn)是资源有限的节点的大型集合,密集地部署在一个景观上。它们使用多跳广播收集和传播本地数据。无线传感器网络的设计和部署受到目前有限的网络节点和协议的性能特征知识的阻碍。因此,它们的系统开发需要一个灵活的仿真环境,在这个环境中,特定节点或网络行为的新模型可以很容易地集成。本文介绍了一个松耦合的、面向对象的仿真环境。该模拟器用于研究WSNs中泛洪协议的效率。对于具有噪声传输的密集网络,我们表明使用低传输功率可以最大限度地提高时间和资源效率,并且对于大型网络,泛洪的可扩展性非常好。我们演示了在特定部署约束下改善驱油性能的方法。
{"title":"Evaluating the impact of limited resource on the performance of flooding in wireless sensor networks","authors":"Patrick Downey, R. Cardell-Oliver","doi":"10.1109/DSN.2004.1311949","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311949","url":null,"abstract":"Wireless sensor networks (WSNs) are large collections of resource limited nodes, densely deployed over a landscape. They gather and disseminate local data using multi-hop broadcasting. WSN design and deployment is hampered by currently limited knowledge of the performance characteristics of network nodes and protocols. Their systematic development, thus, requires a flexible simulation environment in which new models of specific node or network behaviours can be integrated easily. This paper introduces a loosely coupled, object oriented simulation environment for this task. The simulator is used to investigate the efficiency of flooding protocols in WSNs. For dense networks with noisy transmission, we show that using low transmission power maximizes time and resource efficiency and that the scalability of flooding for large networks is excellent. We demonstrate ways of improving flooding performance given specific deployment constraints.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126871109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Availability measurement and modeling for an application server 应用服务器的可用性度量和建模
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311937
D. Tang, Dileep Kumar, Sreeram Duvur, Øystein Torbjørnsen
Application server is a standard middleware platform for deploying Web-based business applications which typically require the underlying platform to deliver high system availability and to minimize loss of transactions. This paper presents a measurement-based availability modeling and analysis for a fault tolerant application server system - Sun Java System Application Server, Enterprise Edition 7. The study applies hierarchical Markov reward modeling techniques on the target software system. The model parameters are conservatively estimated from lab or field measurements. The uncertainty analysis method is used on the model to obtain average system availability and confidence intervals by randomly sampling from possible ranges of parameters that cannot be accurately measured in limited time frames or may vary widely in customer sites. As demonstrated in this paper, the combined use of lab measurement, analytical modeling, and uncertainty analysis is a useful evaluation approach which can provide a conservative availability assessment at stated confidence levels for a new software product.
应用服务器是一个标准的中间件平台,用于部署基于web的业务应用程序,这些应用程序通常需要底层平台来提供高系统可用性和最小化事务损失。本文针对一个容错应用服务器系统——Sun Java system application server, Enterprise Edition 7,提出了一种基于度量的可用性建模和分析方法。本研究将层次马尔可夫奖励建模技术应用于目标软件系统。模型参数是根据实验室或现场测量保守估计的。该模型采用不确定性分析方法,从有限时间内无法精确测量或在客户现场可能变化很大的参数可能范围内随机抽样,获得平均系统可用性和置信区间。如本文所示,实验室测量、分析建模和不确定性分析的结合使用是一种有用的评估方法,它可以在规定的置信度水平上为新软件产品提供保守的可用性评估。
{"title":"Availability measurement and modeling for an application server","authors":"D. Tang, Dileep Kumar, Sreeram Duvur, Øystein Torbjørnsen","doi":"10.1109/DSN.2004.1311937","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311937","url":null,"abstract":"Application server is a standard middleware platform for deploying Web-based business applications which typically require the underlying platform to deliver high system availability and to minimize loss of transactions. This paper presents a measurement-based availability modeling and analysis for a fault tolerant application server system - Sun Java System Application Server, Enterprise Edition 7. The study applies hierarchical Markov reward modeling techniques on the target software system. The model parameters are conservatively estimated from lab or field measurements. The uncertainty analysis method is used on the model to obtain average system availability and confidence intervals by randomly sampling from possible ranges of parameters that cannot be accurately measured in limited time frames or may vary widely in customer sites. As demonstrated in this paper, the combined use of lab measurement, analytical modeling, and uncertainty analysis is a useful evaluation approach which can provide a conservative availability assessment at stated confidence levels for a new software product.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132078694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cyclic redundancy code (CRC) polynomial selection for embedded networks 嵌入式网络的循环冗余码(CRC)多项式选择
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311885
P. Koopman, T. Chakravarty
Cyclic redundancy codes (CRCs) provide a first line of defense against data corruption in many networks. Unfortunately, many commonly used CRC polynomials provide significantly less error detection capability than they might. An exhaustive exploration reveals that most previously published CRC polynomials are either inferior to alternatives or are only good choices for particular message lengths. Unfortunately these shortcomings and limitations often seem to be overlooked. This paper describes a polynomial selection process for embedded network applications and proposes a set of good general-purpose polynomials. A set of 35 new polynomials in addition to 13 previously published polynomials provides good performance for 3- to 16-bit CRCs for data word lengths up to 2048 bits.
在许多网络中,循环冗余码(crc)提供了防止数据损坏的第一道防线。不幸的是,许多常用的CRC多项式提供的错误检测能力比它们可能提供的要少得多。详尽的研究表明,大多数以前发布的CRC多项式要么不如替代方案,要么只是特定消息长度的好选择。不幸的是,这些缺点和限制似乎经常被忽视。本文描述了一种用于嵌入式网络应用的多项式选择过程,并提出了一套良好的通用多项式。除了13个先前发布的多项式之外,一组35个新多项式为数据字长高达2048位的3至16位crc提供了良好的性能。
{"title":"Cyclic redundancy code (CRC) polynomial selection for embedded networks","authors":"P. Koopman, T. Chakravarty","doi":"10.1109/DSN.2004.1311885","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311885","url":null,"abstract":"Cyclic redundancy codes (CRCs) provide a first line of defense against data corruption in many networks. Unfortunately, many commonly used CRC polynomials provide significantly less error detection capability than they might. An exhaustive exploration reveals that most previously published CRC polynomials are either inferior to alternatives or are only good choices for particular message lengths. Unfortunately these shortcomings and limitations often seem to be overlooked. This paper describes a polynomial selection process for embedded network applications and proposes a set of good general-purpose polynomials. A set of 35 new polynomials in addition to 13 previously published polynomials provides good performance for 3- to 16-bit CRCs for data word lengths up to 2048 bits.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 379
Fault tolerant energy aware data dissemination protocol in sensor networks 传感器网络中的容错能量感知数据传播协议
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311950
G. Khanna, S. Bagchi, Yu-Sung Wu
In this paper we present a data dissemination protocol for efficiently distributing data through a sensor network in the face of node and link failures. Our work is motivated by the SPIN protocol which uses metadata negotiation to minimize data transmissions. We propose a protocol called shortest path minded SPIN (SPMS) in which every node has a zone defined by its maximum transmission radius. A data source node advertises the availability of data to all the nodes in its zone. Any interested node requests the data and gets sent the data using multi-hop communication via the shortest path. The failure of any node in the path is detected and recovered using backup routes. We build simulation models to compare SPMS against SPIN. The simulation results show that SPMS reduces the delay over 10 times and consumes 30% less energy in the static failure free scenario. Even with the addition of mobility, SPMS outperforms SPIN by energy gains between 5% and 21%. An analytical model is also constructed to compare the two protocols under a simplified topology.
在本文中,我们提出了一种数据分发协议,用于在节点和链路故障时通过传感器网络有效地分发数据。我们的工作是由SPIN协议推动的,该协议使用元数据协商来最小化数据传输。我们提出了一种最短路径自旋(SPMS)协议,其中每个节点都有一个由其最大传输半径定义的区域。数据源节点向其区域内的所有节点发布数据的可用性。任何感兴趣的节点请求数据并通过最短路径使用多跳通信发送数据。检测路径中任意节点的故障,并通过备份路由进行恢复。我们建立了仿真模型来比较SPMS和SPIN。仿真结果表明,在静态无故障情况下,SPMS的延迟降低了10倍以上,能耗降低了30%。即使增加了迁移率,SPMS的能量增益也比SPIN高出5%到21%。在简化的拓扑结构下,建立了两种协议的比较分析模型。
{"title":"Fault tolerant energy aware data dissemination protocol in sensor networks","authors":"G. Khanna, S. Bagchi, Yu-Sung Wu","doi":"10.1109/DSN.2004.1311950","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311950","url":null,"abstract":"In this paper we present a data dissemination protocol for efficiently distributing data through a sensor network in the face of node and link failures. Our work is motivated by the SPIN protocol which uses metadata negotiation to minimize data transmissions. We propose a protocol called shortest path minded SPIN (SPMS) in which every node has a zone defined by its maximum transmission radius. A data source node advertises the availability of data to all the nodes in its zone. Any interested node requests the data and gets sent the data using multi-hop communication via the shortest path. The failure of any node in the path is detected and recovered using backup routes. We build simulation models to compare SPMS against SPIN. The simulation results show that SPMS reduces the delay over 10 times and consumes 30% less energy in the static failure free scenario. Even with the addition of mobility, SPMS outperforms SPIN by energy gains between 5% and 21%. An analytical model is also constructed to compare the two protocols under a simplified topology.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122045076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Proactive recovery in distributed CORBA applications 分布式CORBA应用程序中的主动恢复
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311905
Soila M. Pertet, P. Narasimhan
Unanticipated runtime events, such as faults, can lead to missed deadlines in real-time systems. While it is not always possible to know when a fault will occur, we can sometimes exploit pre-fault "symptoms" to initiate proactive (rather than reactive) fault-recovery. In this paper, we describe the design and implementation of a proactive recovery strategy for distributed CORBA applications in the presence of resource-exhaustion faults. We analyze the effect of different proactive recovery schemes on client/server response times, and we demonstrate a significant reduction, both in jitter and in the number of client-side failures.
意外的运行时事件(如故障)可能导致实时系统错过最后期限。虽然不可能总是知道什么时候会发生故障,但我们有时可以利用故障前的“症状”来启动主动的(而不是被动的)故障恢复。在本文中,我们描述了在存在资源耗尽故障的情况下,分布式CORBA应用程序的主动恢复策略的设计和实现。我们分析了不同的主动恢复方案对客户端/服务器响应时间的影响,并证明了抖动和客户端故障数量的显著减少。
{"title":"Proactive recovery in distributed CORBA applications","authors":"Soila M. Pertet, P. Narasimhan","doi":"10.1109/DSN.2004.1311905","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311905","url":null,"abstract":"Unanticipated runtime events, such as faults, can lead to missed deadlines in real-time systems. While it is not always possible to know when a fault will occur, we can sometimes exploit pre-fault \"symptoms\" to initiate proactive (rather than reactive) fault-recovery. In this paper, we describe the design and implementation of a proactive recovery strategy for distributed CORBA applications in the presence of resource-exhaustion faults. We analyze the effect of different proactive recovery schemes on client/server response times, and we demonstrate a significant reduction, both in jitter and in the number of client-side failures.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131414283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
The effect of testing on reliability of fault-tolerant software 测试对容错软件可靠性的影响
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311896
P. Popov, B. Littlewood
Previous models have investigated the impact upon diversity - and hence upon the reliability of fault-tolerant software built from 'diverse' versions - of the variation in 'difficulty' of demands over the demand space. These models are essentially static, taking a single snapshot view of the system. In this paper, we consider a generalisation in which the individual versions are allowed to evolve - and their reliability to grow - through debugging. In particular, we examine the trade-off that occurs in testing between, on the one hand, the increasing reliability of individual versions, and on the other hand the possible diminution of diversity.
以前的模型已经研究了需求空间中需求的“难度”变化对多样性的影响——从而对由“不同”版本构建的容错软件的可靠性的影响。这些模型本质上是静态的,采用系统的单个快照视图。在本文中,我们考虑了一种一般化的方法,在这种方法中,单个版本可以通过调试来进化——并且它们的可靠性也可以提高。特别是,我们研究了在测试中发生的权衡,一方面,个体版本的可靠性增加,另一方面,多样性可能减少。
{"title":"The effect of testing on reliability of fault-tolerant software","authors":"P. Popov, B. Littlewood","doi":"10.1109/DSN.2004.1311896","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311896","url":null,"abstract":"Previous models have investigated the impact upon diversity - and hence upon the reliability of fault-tolerant software built from 'diverse' versions - of the variation in 'difficulty' of demands over the demand space. These models are essentially static, taking a single snapshot view of the system. In this paper, we consider a generalisation in which the individual versions are allowed to evolve - and their reliability to grow - through debugging. In particular, we examine the trade-off that occurs in testing between, on the one hand, the increasing reliability of individual versions, and on the other hand the possible diminution of diversity.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
FRTR: a scalable mechanism for global routing table consistency FRTR:全局路由表一致性的可扩展机制
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311916
Lan Wang, D. Massey, K. Patel, Lixia Zhang
This paper presents a scalable mechanism, fast routing table recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of today's global routing table makes the conventional periodic update approach, used by most routing protocols, infeasible. FRTR lets neighboring routers periodically exchange Bloom filter digests of their routing state. The digest exchanges not only enable the detection of potential inconsistencies during normal operations, but also speed up recovery after a BGP session reset. FRTR achieves low bandwidth overhead by using small digests, and it achieves strong consistency by "salting" the digests with random seeds to remove false-positives. Our analysis and simulation results show that, with one round of message exchanges, FRTR can detect and recover over 91% of random errors that the current BGP would have missed with an overhead as low as 1.3% of a full routing table exchange. With salted digests FRTR can detect and recover all the errors with a probability close to 100% after a few rounds of message exchanges.
本文提出了一种可扩展的机制——快速路由表恢复(FRTR),用于检测和纠正相邻BGP路由器之间的路由不一致。当今全球路由表的庞大规模使得大多数路由协议使用的常规定期更新方法变得不可行。FRTR允许相邻路由器定期交换其路由状态的布隆过滤器摘要。摘要交换不仅可以在正常操作中发现潜在的不一致,还可以在BGP会话复位后加快恢复速度。FRTR通过使用小型摘要来实现低带宽开销,并且通过使用随机种子“盐化”摘要以消除误报来实现强一致性。我们的分析和仿真结果表明,在一轮消息交换中,FRTR可以检测和恢复当前BGP可能错过的91%以上的随机错误,开销低至全路由表交换的1.3%。使用咸摘要,FRTR可以在几轮消息交换后以接近100%的概率检测和恢复所有错误。
{"title":"FRTR: a scalable mechanism for global routing table consistency","authors":"Lan Wang, D. Massey, K. Patel, Lixia Zhang","doi":"10.1109/DSN.2004.1311916","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311916","url":null,"abstract":"This paper presents a scalable mechanism, fast routing table recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of today's global routing table makes the conventional periodic update approach, used by most routing protocols, infeasible. FRTR lets neighboring routers periodically exchange Bloom filter digests of their routing state. The digest exchanges not only enable the detection of potential inconsistencies during normal operations, but also speed up recovery after a BGP session reset. FRTR achieves low bandwidth overhead by using small digests, and it achieves strong consistency by \"salting\" the digests with random seeds to remove false-positives. Our analysis and simulation results show that, with one round of message exchanges, FRTR can detect and recover over 91% of random errors that the current BGP would have missed with an overhead as low as 1.3% of a full routing table exchange. With salted digests FRTR can detect and recover all the errors with a probability close to 100% after a few rounds of message exchanges.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116588192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
International Conference on Dependable Systems and Networks, 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1