首页 > 最新文献

Proceedings 20th IEEE Symposium on Reliable Distributed Systems最新文献

英文 中文
Why is it so hard to predict software system trustworthiness from software component trustworthiness? 为什么很难从软件组件的可信度来预测软件系统的可信度?
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969773
J. Voas
When software is built from components, nonfunctional properties such as security, reliability, fault-tolerance, performance, availability, safety, etc. are not necessarily composed. The problem stems from our inability to know a priori, for example, that the security of a system composed of two components can be determined from knowledge about the security of each. This is because the security of the composite is based on more than just the security of the individual components. There are numerous reasons for this. The article considers only the factors of component performance and calendar time. It is concluded that no properties are easy to compose and some are much harder than others.
当软件由组件构建时,非功能属性(如安全性、可靠性、容错性、性能、可用性、安全性等)并不一定是组成的。这个问题源于我们无法先验地知道,例如,由两个组件组成的系统的安全性可以通过对每个组件的安全性的了解来确定。这是因为组合的安全性不仅仅基于单个组件的安全性。这有很多原因。本文只考虑组件性能和日历时间的因素。得出的结论是,没有一种性质是容易合成的,有些性质比其他性质更难合成。
{"title":"Why is it so hard to predict software system trustworthiness from software component trustworthiness?","authors":"J. Voas","doi":"10.1109/RELDIS.2001.969773","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969773","url":null,"abstract":"When software is built from components, nonfunctional properties such as security, reliability, fault-tolerance, performance, availability, safety, etc. are not necessarily composed. The problem stems from our inability to know a priori, for example, that the security of a system composed of two components can be determined from knowledge about the security of each. This is because the security of the composite is based on more than just the security of the individual components. There are numerous reasons for this. The article considers only the factors of component performance and calendar time. It is concluded that no properties are easy to compose and some are much harder than others.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reducing noise in gossip-based reliable broadcast 减少基于流言蜚语的可靠广播中的噪音
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969775
P. Kuznetsov, R. Guerraoui, S. Handurukande, Anne-Marie Kermarrec
We present in this paper a general garbage collection scheme that reduces the "noise" in gossip-based broadcast algorithms. In short, our garbage collection scheme uses a simple heuristic to trade "useless" messages with "useful" ones. Used with a given gossip-based broadcast algorithm, a given size of buffers, and a given number of disseminated messages (e.g., per gossip round), our garbage collection scheme provides higher overall reliability than more conventional schemes. We illustrate our approach through two algorithms: bimodal multicast (pbcast) and lightweight probabilistic broadcast (lpbcast). Our scheme is based on the intuitive idea of discarding messages according to their "age". The "age" of a message represents the number of times the message has been retransmitted.
在本文中,我们提出了一种通用的垃圾收集方案,以减少基于八卦的广播算法中的“噪声”。简而言之,我们的垃圾收集方案使用一个简单的启发式方法来用“有用”的消息交换“无用”的消息。与给定的基于八卦的广播算法、给定大小的缓冲区和给定数量的传播消息(例如,每个八卦轮)一起使用,我们的垃圾收集方案比更传统的方案提供更高的总体可靠性。我们通过两种算法来说明我们的方法:双峰组播(pbcast)和轻量级概率广播(lpbcast)。我们的方案基于根据“年龄”丢弃消息的直观想法。消息的“年龄”表示消息被重传的次数。
{"title":"Reducing noise in gossip-based reliable broadcast","authors":"P. Kuznetsov, R. Guerraoui, S. Handurukande, Anne-Marie Kermarrec","doi":"10.1109/RELDIS.2001.969775","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969775","url":null,"abstract":"We present in this paper a general garbage collection scheme that reduces the \"noise\" in gossip-based broadcast algorithms. In short, our garbage collection scheme uses a simple heuristic to trade \"useless\" messages with \"useful\" ones. Used with a given gossip-based broadcast algorithm, a given size of buffers, and a given number of disseminated messages (e.g., per gossip round), our garbage collection scheme provides higher overall reliability than more conventional schemes. We illustrate our approach through two algorithms: bimodal multicast (pbcast) and lightweight probabilistic broadcast (lpbcast). Our scheme is based on the intuitive idea of discarding messages according to their \"age\". The \"age\" of a message represents the number of times the message has been retransmitted.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131659641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An analytical framework for reasoning about intrusions 对入侵进行推理的分析框架
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969760
S. Upadhyaya, R. Chinchani, K. Kwiat
Local and wide area network information assurance analysts need current and precise knowledge about their system activities in order to address the challenges of critical infrastructure protection. In particular, the analyst needs to know in real-time that an intrusion has occurred so that an active response and recovery thread can be created rapidly. Existing intrusion detection solutions are basically after-the-fact, thereby offering very little in terms of damage confinement and restoration of service. Quick recovery is only possible if the assessment scheme has low latency and it occurs in real-time. The objective of the paper is to develop a reasoning framework to aid in the real-time detection and assessment task that is based on a novel idea of encapsulation of owner's intent. The theoretical framework developed here will help resolve dubious circumstances that may arise while inferring the premises of operations (encapsulated from owner's intent) by way of examining the observed conclusions resulting from the actual operations of the owner. This reasoning is significant in view of the fact that intrusion signaling is not a binary decision unlike error detection in traditional fault tolerance. Our reasoning framework has been developed by leveraging the concepts of cost analysis and pricing under uncertainty found in economics and finance. Our main result is the modeling of user activity on a computing system as a martingale and the subsequent quantification of the cost of performing a job to enable decision making.
局域网和广域网信息保障分析人员需要关于其系统活动的最新和精确的知识,以便解决关键基础设施保护的挑战。特别是,分析人员需要实时地知道入侵已经发生,以便能够快速地创建活动响应和恢复线程。现有的入侵检测解决方案基本上是事后处理的,因此在限制损害和恢复服务方面提供的服务很少。只有当评估方案具有低延迟并且实时发生时,才能实现快速恢复。本文的目的是开发一个推理框架,以帮助实时检测和评估任务,该框架基于对所有者意图的封装的新思想。这里发展的理论框架将有助于解决可能出现的可疑情况,而通过检查从业主的实际操作中得出的观察结论,推断经营的前提(从业主的意图中封装)。考虑到入侵信令不像传统容错中的错误检测那样是一个二元决策,这一推理具有重要意义。我们的推理框架是通过利用经济学和金融学中不确定性下的成本分析和定价概念而开发的。我们的主要成果是将计算系统上的用户活动建模为鞅,并随后量化执行工作的成本,以支持决策制定。
{"title":"An analytical framework for reasoning about intrusions","authors":"S. Upadhyaya, R. Chinchani, K. Kwiat","doi":"10.1109/RELDIS.2001.969760","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969760","url":null,"abstract":"Local and wide area network information assurance analysts need current and precise knowledge about their system activities in order to address the challenges of critical infrastructure protection. In particular, the analyst needs to know in real-time that an intrusion has occurred so that an active response and recovery thread can be created rapidly. Existing intrusion detection solutions are basically after-the-fact, thereby offering very little in terms of damage confinement and restoration of service. Quick recovery is only possible if the assessment scheme has low latency and it occurs in real-time. The objective of the paper is to develop a reasoning framework to aid in the real-time detection and assessment task that is based on a novel idea of encapsulation of owner's intent. The theoretical framework developed here will help resolve dubious circumstances that may arise while inferring the premises of operations (encapsulated from owner's intent) by way of examining the observed conclusions resulting from the actual operations of the owner. This reasoning is significant in view of the fact that intrusion signaling is not a binary decision unlike error detection in traditional fault tolerance. Our reasoning framework has been developed by leveraging the concepts of cost analysis and pricing under uncertainty found in economics and finance. Our main result is the modeling of user activity on a computing system as a martingale and the subsequent quantification of the cost of performing a job to enable decision making.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127599301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Reliable real-time cooperation of mobile autonomous systems 移动自主系统的可靠实时协作
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.970774
S. Schemmer, E. Nett, M. Mock
Autonomous systems are expected to provide increasingly complex and safety-critical services that will, sooner or later, require the cooperation of several autonomous systems for their fulfillment. In particular, coordinating the access to shared physical and information technological resources will become a general problem. Scheduling these resources is subject to strong real-time and reliability requirements. In this paper, we present an architecture that allows autonomous mobile systems to schedule shared resources in real-time using their own wireless distributed infrastructure. In our architecture, there is a clear separation between the application-specific scheduling part that is modeled as a function of the global state and the communication part that is used to provide the global state. By isolating the more error-prone communication part within a communication hardcore, the reliability of the overall system is increased and the locally executed scheduling function can be designed with primary focus on the application-specific real-time requirements.
预计自动系统将提供越来越复杂和安全关键的服务,这些服务迟早需要多个自动系统的合作才能实现。特别是,协调获取共享的物质和信息技术资源将成为一个普遍问题。调度这些资源有很强的实时性和可靠性要求。在本文中,我们提出了一种架构,允许自主移动系统使用自己的无线分布式基础设施实时调度共享资源。在我们的体系结构中,特定于应用程序的调度部分(建模为全局状态的函数)与用于提供全局状态的通信部分之间存在明确的分离。通过在通信核心中隔离更容易出错的通信部分,可以提高整个系统的可靠性,并且可以设计本地执行的调度功能,主要关注特定于应用程序的实时需求。
{"title":"Reliable real-time cooperation of mobile autonomous systems","authors":"S. Schemmer, E. Nett, M. Mock","doi":"10.1109/RELDIS.2001.970774","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.970774","url":null,"abstract":"Autonomous systems are expected to provide increasingly complex and safety-critical services that will, sooner or later, require the cooperation of several autonomous systems for their fulfillment. In particular, coordinating the access to shared physical and information technological resources will become a general problem. Scheduling these resources is subject to strong real-time and reliability requirements. In this paper, we present an architecture that allows autonomous mobile systems to schedule shared resources in real-time using their own wireless distributed infrastructure. In our architecture, there is a clear separation between the application-specific scheduling part that is modeled as a function of the global state and the communication part that is used to provide the global state. By isolating the more error-prone communication part within a communication hardcore, the reliability of the overall system is increased and the locally executed scheduling function can be designed with primary focus on the application-specific real-time requirements.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125110258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Incorporation of security and fault tolerance mechanisms into real-time component-based distributed computing systems 将安全和容错机制整合到基于实时组件的分布式计算系统中
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969752
K. Kim
The volume and size of real-time (RT) distributed computing (DC) applications are now growing faster than in the last century. The mixture of application tasks running on such systems is growing as well as the shared use of computing and communication resources for multiple applications including RT and non-RT applications. The increase in use of shared resources accompanies with it the need for effective security enforcement. More specifically, the needs are to prevent unauthorized users: (1) from accessing protected information; and (2) from disturbing bona-fide users in getting services from server components. Such disturbances are also called denial-of-service attacks.
实时(RT)分布式计算(DC)应用程序的数量和规模现在比上个世纪增长得更快。在这样的系统上运行的应用程序任务的混合正在增长,多个应用程序(包括RT和非RT应用程序)的计算和通信资源的共享使用也在增长。随着共享资源使用的增加,需要有效的安全执行。更具体地说,需要防止未经授权的用户:(1)访问受保护的信息;(2)从服务器组件获取服务时干扰真正的用户。这种干扰也被称为拒绝服务攻击。
{"title":"Incorporation of security and fault tolerance mechanisms into real-time component-based distributed computing systems","authors":"K. Kim","doi":"10.1109/RELDIS.2001.969752","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969752","url":null,"abstract":"The volume and size of real-time (RT) distributed computing (DC) applications are now growing faster than in the last century. The mixture of application tasks running on such systems is growing as well as the shared use of computing and communication resources for multiple applications including RT and non-RT applications. The increase in use of shared resources accompanies with it the need for effective security enforcement. More specifically, the needs are to prevent unauthorized users: (1) from accessing protected information; and (2) from disturbing bona-fide users in getting services from server components. Such disturbances are also called denial-of-service attacks.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131328755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Primary-backup replication: from a time-free protocol to a time-based implementation 主备复制:从无时间协议到基于时间的实现
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969730
R. Oliveira, J. Pereira, A. Schiper
Fault-tolerant control systems can be built by replicating critical components. However replication raises the issue of inconsistency. Multiple protocols for ensuring consistency have been described in the literature. PADRE (Protocol for Asymmetric Duplex REdundancy) is such a protocol, and an interesting case study of a complex and sensitive problem: the management of replicated traffic controllers in a railway system. However, the low level at which the protocol has been developed embodies system details, namely timeliness assumptions, that make it difficult to understand and may narrow its applicability. We argue that, when designing a protocol, it is preferable to consider first a general solution that does not include any timeliness assumptions; then, by taking into account an additional hypothesis, one can easily design a time-based solution tailored to a specific environment. This paper illustrates the benefit of a top-down protocol design approach and shows that PADRE can be seen as an instance of a standard primary-backup replication protocol based on view-synchronous communication (VSC).
可以通过复制关键组件来构建容错控制系统。然而,复制引起了不一致的问题。确保一致性的多种协议已在文献中描述。PADRE (Protocol for Asymmetric Duplex REdundancy,非对称双工冗余协议)就是这样一个协议,也是一个复杂而敏感问题的有趣案例研究:铁路系统中复制交通控制器的管理。然而,协议开发的低层次体现了系统细节,即时效性假设,这使得它难以理解,并可能缩小其适用性。我们认为,在设计协议时,最好首先考虑不包含任何时效性假设的通用解决方案;然后,通过考虑额外的假设,可以轻松地设计针对特定环境的基于时间的解决方案。本文说明了自顶向下协议设计方法的好处,并表明PADRE可以被视为基于视图同步通信(VSC)的标准主备份复制协议的一个实例。
{"title":"Primary-backup replication: from a time-free protocol to a time-based implementation","authors":"R. Oliveira, J. Pereira, A. Schiper","doi":"10.1109/RELDIS.2001.969730","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969730","url":null,"abstract":"Fault-tolerant control systems can be built by replicating critical components. However replication raises the issue of inconsistency. Multiple protocols for ensuring consistency have been described in the literature. PADRE (Protocol for Asymmetric Duplex REdundancy) is such a protocol, and an interesting case study of a complex and sensitive problem: the management of replicated traffic controllers in a railway system. However, the low level at which the protocol has been developed embodies system details, namely timeliness assumptions, that make it difficult to understand and may narrow its applicability. We argue that, when designing a protocol, it is preferable to consider first a general solution that does not include any timeliness assumptions; then, by taking into account an additional hypothesis, one can easily design a time-based solution tailored to a specific environment. This paper illustrates the benefit of a top-down protocol design approach and shows that PADRE can be seen as an instance of a standard primary-backup replication protocol based on view-synchronous communication (VSC).","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128989501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Quantifying rollback propagation in distributed checkpointing 分布式检查点中回滚传播的量化
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969737
A. Agbaria, H. Attiya, R. Friedman, R. Vitenberg
Proposes a new classification of executions with checkpoints that is based on the notion of k-rollback, indicating the maximal number of checkpoints that may need to be rolled back during recovery. The relation between known execution classes is explored, and it is shown that coordinated checkpointing, SZPF (strictly Z-path free) and ZPF (Z-path free) are 1-rollback mechanisms, while ZCF (Z-cycle free) is (n-1)-rollback, where n is the number of participants in an execution. A new class of executions, called d-BC (d-bounded cycles), is introduced, and is shown to be an [(n-1)/spl middot/d]-rollback mechanism (ZCF is a special case of d-BC for d=1). Finally, a d-BC protocol is presented. This protocol has the nice property that it does not impose any control information overhead on an application's messages, yet it only sends a few control messages of its own. Moreover, the protocol maintains information about recovery lines, which enables very efficient discovery of the most recent recovery line that existed a short time before the failure.
提出基于k-rollback概念的检查点执行的新分类,该分类指示在恢复期间可能需要回滚的检查点的最大数量。探讨了已知执行类之间的关系,表明协调检查点、SZPF(严格无z路径)和ZPF(无z路径)是1-回滚机制,而ZCF(无z循环)是(n-1)-回滚机制,其中n是执行中参与者的数量。引入了一类新的执行,称为d- bc (d-有界循环),并被证明是一种[(n-1)/spl middot/d]-回滚机制(ZCF是d=1时d- bc的特殊情况)。最后,提出了一种d-BC协议。该协议有一个很好的特性,即它不会对应用程序的消息施加任何控制信息开销,但它只发送自己的几个控制消息。此外,协议维护有关恢复线路的信息,这使得能够非常有效地发现在故障发生前很短时间内存在的最近的恢复线路。
{"title":"Quantifying rollback propagation in distributed checkpointing","authors":"A. Agbaria, H. Attiya, R. Friedman, R. Vitenberg","doi":"10.1109/RELDIS.2001.969737","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969737","url":null,"abstract":"Proposes a new classification of executions with checkpoints that is based on the notion of k-rollback, indicating the maximal number of checkpoints that may need to be rolled back during recovery. The relation between known execution classes is explored, and it is shown that coordinated checkpointing, SZPF (strictly Z-path free) and ZPF (Z-path free) are 1-rollback mechanisms, while ZCF (Z-cycle free) is (n-1)-rollback, where n is the number of participants in an execution. A new class of executions, called d-BC (d-bounded cycles), is introduced, and is shown to be an [(n-1)/spl middot/d]-rollback mechanism (ZCF is a special case of d-BC for d=1). Finally, a d-BC protocol is presented. This protocol has the nice property that it does not impose any control information overhead on an application's messages, yet it only sends a few control messages of its own. Moreover, the protocol maintains information about recovery lines, which enables very efficient discovery of the most recent recovery line that existed a short time before the failure.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"37 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114042990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Efficient TDMA synchronization for distributed embedded systems 分布式嵌入式系统的高效TDMA同步
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.970769
Vilgot Claesson, Henrik Lönn, N. Suri
A desired attribute in safety critical embedded real-time systems is a system time/event synchronization capability on which predictable communication can be established. Focusing on bus-based communication protocols in TDMA environments, we present a novel, efficient, and low-cost synchronization approach with bounded start-up time. This approach utilizes information about each node's unique message lengths to achieve synchronization. The protocol avoids start-up collisions by postponing retries after a collision. We also present a re-synchronization strategy that incorporates recovering nodes into synchronization.
在安全关键型嵌入式实时系统中,一个期望的属性是系统时间/事件同步能力,在此基础上可以建立可预测的通信。针对TDMA环境下基于总线的通信协议,我们提出了一种新颖、高效、低成本、启动时间有限的同步方法。这种方法利用关于每个节点唯一消息长度的信息来实现同步。该协议通过延迟碰撞后的重试来避免启动冲突。我们还提出了一种将恢复节点合并到同步中的重新同步策略。
{"title":"Efficient TDMA synchronization for distributed embedded systems","authors":"Vilgot Claesson, Henrik Lönn, N. Suri","doi":"10.1109/RELDIS.2001.970769","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.970769","url":null,"abstract":"A desired attribute in safety critical embedded real-time systems is a system time/event synchronization capability on which predictable communication can be established. Focusing on bus-based communication protocols in TDMA environments, we present a novel, efficient, and low-cost synchronization approach with bounded start-up time. This approach utilizes information about each node's unique message lengths to achieve synchronization. The protocol avoids start-up collisions by postponing retries after a collision. We also present a re-synchronization strategy that incorporates recovering nodes into synchronization.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Can reliability and security be joined reliably and securely? 可靠性和安全性能否可靠、安全地结合起来?
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969750
K. Kwiat
The combined topics of reliability and security are briefly traced in relation to the past and present endeavors of the Air Force Research Laboratory's Information Directorate. It is concluded that in the realm of information assurance, system features created to tolerate benign failures and to respond to attack must be stressed and tested beforehand and their effectiveness predicted, otherwise they might inadvertently magnify the attacker's power. With the explosive growth of distributed and mobile systems and the need for information assurance to address the accompanying vulnerabilities, one history lesson comes to mind: although ancient Rome was not built in a day, it did not take very long for it to fall once the barbarians took hold.
可靠性和安全性的组合主题简要地追溯到空军研究实验室信息理事会过去和现在的努力。结论是,在信息保障领域,为容忍良性故障和响应攻击而创建的系统特性必须事先强调和测试,并预测其有效性,否则它们可能会无意中放大攻击者的力量。随着分布式和移动系统的爆炸式增长,以及对信息保障的需求,以解决随之而来的漏洞,一个历史教训浮现在我们的头脑中:尽管古罗马不是一天建成的,但一旦野蛮人占领,它很快就会灭亡。
{"title":"Can reliability and security be joined reliably and securely?","authors":"K. Kwiat","doi":"10.1109/RELDIS.2001.969750","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969750","url":null,"abstract":"The combined topics of reliability and security are briefly traced in relation to the past and present endeavors of the Air Force Research Laboratory's Information Directorate. It is concluded that in the realm of information assurance, system features created to tolerate benign failures and to respond to attack must be stressed and tested beforehand and their effectiveness predicted, otherwise they might inadvertently magnify the attacker's power. With the explosive growth of distributed and mobile systems and the need for information assurance to address the accompanying vulnerabilities, one history lesson comes to mind: although ancient Rome was not built in a day, it did not take very long for it to fall once the barbarians took hold.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122093987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A consensus protocol based on a weak failure detector and a sliding round window 基于弱故障检测器和滑动圆窗口的共识协议
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969766
M. Hurfin, A. Mostéfaoui, M. Raynal, R. Macêdo
The paper revisits the "sliding window" notion commonly encountered in communication protocols and applies it to the round numbers of round-based asynchronous protocols. This approach is novel. To illustrate its benefits, the paper presents an original weak failure detector-based consensus protocol that allows each process to be simultaneously involved in several rounds. The rounds in which a process is simultaneously involved defines "sliding round window". The proposed approach has several advantages. It fits better to the uncertainty created by the asynchrony and failures, and consequently permits one to design efficient round-based asynchronous protocols. Maybe more important, it also provides a better understanding of the global synchronization that manages the protocol progress from round to round. This appears clearly in the proposed failure detector-based consensus protocol, where the "sliding round window" allows one to dynamically define the message exchange pattern for each round separately.
本文重新研究了通信协议中常见的“滑动窗口”概念,并将其应用于基于轮的异步协议的整数。这种方法很新颖。为了说明它的好处,本文提出了一个原始的基于弱故障检测器的共识协议,该协议允许每个进程同时参与几轮。同时涉及进程的回合定义为“滑动圆形窗口”。所提出的方法有几个优点。它更适合异步和故障造成的不确定性,因此允许设计高效的基于轮的异步协议。也许更重要的是,它还提供了对管理协议进程的全局同步的更好理解。这在提议的基于故障检测器的共识协议中表现得很清楚,其中的“滑动圆形窗口”允许为每个轮分别动态定义消息交换模式。
{"title":"A consensus protocol based on a weak failure detector and a sliding round window","authors":"M. Hurfin, A. Mostéfaoui, M. Raynal, R. Macêdo","doi":"10.1109/RELDIS.2001.969766","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969766","url":null,"abstract":"The paper revisits the \"sliding window\" notion commonly encountered in communication protocols and applies it to the round numbers of round-based asynchronous protocols. This approach is novel. To illustrate its benefits, the paper presents an original weak failure detector-based consensus protocol that allows each process to be simultaneously involved in several rounds. The rounds in which a process is simultaneously involved defines \"sliding round window\". The proposed approach has several advantages. It fits better to the uncertainty created by the asynchrony and failures, and consequently permits one to design efficient round-based asynchronous protocols. Maybe more important, it also provides a better understanding of the global synchronization that manages the protocol progress from round to round. This appears clearly in the proposed failure detector-based consensus protocol, where the \"sliding round window\" allows one to dynamically define the message exchange pattern for each round separately.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings 20th IEEE Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1