首页 > 最新文献

Proceedings 20th IEEE Symposium on Reliable Distributed Systems最新文献

英文 中文
Optimistic validation of electronic tickets 电子机票的乐观验证
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969763
F. Pedone
Electronic tickets, or e-tickets, give evidence that their holders have permission to enter a place of entertainment, use a means of transportation, or have access to some Internet services. E-tickets can be stored in desktop computers or personal digital assistants for future use. Before being used, e-tickets have to be validated to prevent duplication, and ensure authenticity and integrity. The paper discusses e-ticket validation in contexts in which users cannot be trusted and validation servers may fail by crashing. The paper considers formal definitions for the e-ticket problem and proposes an optimistic protocol for validation of e-tickets. The protocol is optimistic in the sense that its best performance is achieved when e-tickets are validated only once.
电子票,或电子票,提供证据,证明其持有人获准进入娱乐场所,使用交通工具,或访问一些互联网服务。电子机票可以存储在台式电脑或个人数字助理中,以备将来使用。在使用之前,必须对电子机票进行验证,以防止重复,并确保真实性和完整性。本文讨论了在用户不可信任和验证服务器可能崩溃的情况下的电子票证验证。本文考虑了电子票证问题的形式化定义,并提出了一种用于电子票证验证的乐观协议。该协议是乐观的,因为当电子票只验证一次时,它的最佳性能就会实现。
{"title":"Optimistic validation of electronic tickets","authors":"F. Pedone","doi":"10.1109/RELDIS.2001.969763","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969763","url":null,"abstract":"Electronic tickets, or e-tickets, give evidence that their holders have permission to enter a place of entertainment, use a means of transportation, or have access to some Internet services. E-tickets can be stored in desktop computers or personal digital assistants for future use. Before being used, e-tickets have to be validated to prevent duplication, and ensure authenticity and integrity. The paper discusses e-ticket validation in contexts in which users cannot be trusted and validation servers may fail by crashing. The paper considers formal definitions for the e-ticket problem and proposes an optimistic protocol for validation of e-tickets. The protocol is optimistic in the sense that its best performance is achieved when e-tickets are validated only once.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
High-quality customizable embedded software from COTS components 来自COTS组件的高质量可定制嵌入式软件
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969771
F. Bastani
Dramatic advances in computer and communication technologies have greatly promoted the growth of embedded telecommunication systems. More and more critical applications, such as banking and financial services, remote patient monitoring systems, transportation, etc., are being developed. The software for these applications is becoming increasingly sophisticated and complex and this trend will accelerate over the next few years with the development of "software-defined telephony". To support these critical applications, it is necessary to achieve high quality and rigorously demonstrate that high quality has in fact been achieved. In today's highly competitive environment; it is also essential to have accelerated development schedules and the capability to quickly customize and adapt products for niche markets and to satisfy diverse regional standards and procedures. To meet all these challenges, software development technology is rapidly shifting away from low-level programming issues to automated code generation and integration of systems from components, either Commercial-Off-The-Shelf (COTS) components or specially developed in-house components. This is made possible by numerous recent breakthroughs in software technology, including web-based cooperative software development, in-process; monitoring, agents, Java, scripting languages, and, especially, industry-driven standardization efforts, such as CORBA, TINA, TL 9000, and XDAIS. The use of COTS components can significantly reduce software development time and cost.
计算机和通信技术的巨大进步极大地促进了嵌入式电信系统的发展。越来越多的关键应用,如银行和金融服务、远程病人监护系统、运输等,正在开发中。用于这些应用程序的软件正变得越来越精密和复杂,随着“软件定义电话”的发展,这种趋势将在未来几年内加速发展。为了支持这些关键的应用程序,有必要实现高质量,并严格证明实际上已经实现了高质量。在当今竞争激烈的环境中;加快开发进度和迅速为利基市场定制和调整产品并满足不同区域标准和程序的能力也是至关重要的。为了应对所有这些挑战,软件开发技术正在迅速地从低级编程问题转移到自动化代码生成和组件系统集成,无论是商用现货(COTS)组件还是专门开发的内部组件。最近软件技术的许多突破使这成为可能,包括基于网络的协作软件开发,在过程中;监视、代理、Java、脚本语言,特别是行业驱动的标准化工作,如CORBA、TINA、TL 9000和XDAIS。使用COTS组件可以显著减少软件开发时间和成本。
{"title":"High-quality customizable embedded software from COTS components","authors":"F. Bastani","doi":"10.1109/RELDIS.2001.969771","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969771","url":null,"abstract":"Dramatic advances in computer and communication technologies have greatly promoted the growth of embedded telecommunication systems. More and more critical applications, such as banking and financial services, remote patient monitoring systems, transportation, etc., are being developed. The software for these applications is becoming increasingly sophisticated and complex and this trend will accelerate over the next few years with the development of \"software-defined telephony\". To support these critical applications, it is necessary to achieve high quality and rigorously demonstrate that high quality has in fact been achieved. In today's highly competitive environment; it is also essential to have accelerated development schedules and the capability to quickly customize and adapt products for niche markets and to satisfy diverse regional standards and procedures. To meet all these challenges, software development technology is rapidly shifting away from low-level programming issues to automated code generation and integration of systems from components, either Commercial-Off-The-Shelf (COTS) components or specially developed in-house components. This is made possible by numerous recent breakthroughs in software technology, including web-based cooperative software development, in-process; monitoring, agents, Java, scripting languages, and, especially, industry-driven standardization efforts, such as CORBA, TINA, TL 9000, and XDAIS. The use of COTS components can significantly reduce software development time and cost.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient recovery information management schemes for the fault tolerant mobile computing systems 面向容错移动计算系统的高效恢复信息管理方案
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.970770
T. Park, Namyoon Woo, H. Yeom
This paper presents region-based storage management schemes, which support the efficient implementation of checkpointing and message logging for fault tolerant mobile computing systems. In the proposed schemes, a recovery manager assigned for a group of cells takes care of the recovery for the mobile hosts within the region. As a result, the recovery information of a mobile host, which may be dispersed over the network due to the mobility of the host, can efficiently be handled.
提出了一种基于区域的存储管理方案,该方案支持容错移动计算系统中检查点和消息日志的高效实现。在建议的方案中,为一组单元分配一个恢复管理器,负责区域内移动主机的恢复。因此,可以有效地处理由于主机的移动性而分散在网络中的移动主机的恢复信息。
{"title":"Efficient recovery information management schemes for the fault tolerant mobile computing systems","authors":"T. Park, Namyoon Woo, H. Yeom","doi":"10.1109/RELDIS.2001.970770","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.970770","url":null,"abstract":"This paper presents region-based storage management schemes, which support the efficient implementation of checkpointing and message logging for fault tolerant mobile computing systems. In the proposed schemes, a recovery manager assigned for a group of cells takes care of the recovery for the mobile hosts within the region. As a result, the recovery information of a mobile host, which may be dispersed over the network due to the mobility of the host, can efficiently be handled.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121723599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How to select a replication protocol according to scalability, availability and communication overhead 如何根据可伸缩性、可用性和通信开销选择复制协议
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969732
R. Jiménez-Peris, M. Patiño-Martínez, Bettina Kemme, G. Alonso
Data replication is playing an increasingly important role in the design of parallel information systems. In particular, the widespread use of cluster architectures in high-performance computing has created many opportunities for applying data replication techniques in new areas. For instance, as part of work related to cluster computing in bioinformatics, we have been confronted with the problem of having to choose an optimal replication strategy in terms of scalability, availability and communication overhead. Thus, we have evaluated several representative replication protocols in order to better understand their behavior in practice. The results obtained are surprising in that they challenge many of the assumptions behind existing protocols. Our evaluation indicates that the conventional read-one/write-all approach is the best choice for a large range of applications requiring data replication. We believe this is an important result for anybody developing code for computing clusters as the read-one/write-all strategy is much simpler to implement and more flexible than quorum-based approaches. In this paper we show that, in addition, it is also the best choice using a number of other selection criteria.
数据复制在并行信息系统设计中发挥着越来越重要的作用。特别是,集群体系结构在高性能计算中的广泛使用为在新领域应用数据复制技术创造了许多机会。例如,作为生物信息学中集群计算相关工作的一部分,我们面临着必须在可伸缩性、可用性和通信开销方面选择最佳复制策略的问题。因此,我们评估了几个代表性的复制协议,以便更好地理解它们在实践中的行为。获得的结果令人惊讶,因为它们挑战了现有协议背后的许多假设。我们的评估表明,对于需要数据复制的大范围应用程序来说,传统的读一/写全部方法是最佳选择。我们相信这对于任何为计算集群开发代码的人来说都是一个重要的结果,因为读一/写全策略比基于群体的方法更容易实现,也更灵活。在本文中,我们表明,此外,它也是使用一些其他选择标准的最佳选择。
{"title":"How to select a replication protocol according to scalability, availability and communication overhead","authors":"R. Jiménez-Peris, M. Patiño-Martínez, Bettina Kemme, G. Alonso","doi":"10.1109/RELDIS.2001.969732","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969732","url":null,"abstract":"Data replication is playing an increasingly important role in the design of parallel information systems. In particular, the widespread use of cluster architectures in high-performance computing has created many opportunities for applying data replication techniques in new areas. For instance, as part of work related to cluster computing in bioinformatics, we have been confronted with the problem of having to choose an optimal replication strategy in terms of scalability, availability and communication overhead. Thus, we have evaluated several representative replication protocols in order to better understand their behavior in practice. The results obtained are surprising in that they challenge many of the assumptions behind existing protocols. Our evaluation indicates that the conventional read-one/write-all approach is the best choice for a large range of applications requiring data replication. We believe this is an important result for anybody developing code for computing clusters as the read-one/write-all strategy is much simpler to implement and more flexible than quorum-based approaches. In this paper we show that, in addition, it is also the best choice using a number of other selection criteria.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129297812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Message logging optimization for wireless networks 无线网络的消息记录优化
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969774
Bin Yao, W. Fuchs
This paper describes a message logging optimization that improves performance for failure recovery protocols where messages exchanged between mobile hosts are logged at base stations. The algorithm described and evaluated in this paper does not generate orphan processes in spite of base station failures and achieves run-time performance similar to that of asynchronous logging.
本文描述了一种消息记录优化方法,它可以提高故障恢复协议的性能,其中移动主机之间交换的消息在基站上进行记录。本文所描述和评估的算法在基站故障的情况下不会产生孤立进程,并且实现了与异步日志相似的运行时性能。
{"title":"Message logging optimization for wireless networks","authors":"Bin Yao, W. Fuchs","doi":"10.1109/RELDIS.2001.969774","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969774","url":null,"abstract":"This paper describes a message logging optimization that improves performance for failure recovery protocols where messages exchanged between mobile hosts are logged at base stations. The algorithm described and evaluated in this paper does not generate orphan processes in spite of base station failures and achieves run-time performance similar to that of asynchronous logging.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the effectiveness of a counter-based cache invalidation scheme and its resiliency to failures in mobile environments 基于计数器的缓存失效方案的有效性及其在移动环境中对故障的弹性
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.970775
G. Cao, C. Das
Caching frequently accessed data items on the client side is an effective technique to improve the performance of data dissemination in mobile environments. Classical cache invalidation strategies are not suitable for mobile environments due to the disconnection and mobility of the mobile clients. One attractive cache invalidation technique is based on invalidation reports (IRs). However, IR-based approach suffers from long query latency and it cannot efficiently utilize the broadcast bandwidth. In this paper, we propose techniques to address these problems. We first extend the UIR-based approach to reduce the query latency. Then, we propose techniques to efficiently utilize the broadcast bandwidth based on counters associated with each data item. Novel techniques are designed to maintain the accuracy of the counter in case of server failures, client failures, and disconnections. Extensive simulations are provided and used to evaluate the proposed methodology. Compared to previous IR-based algorithms, the proposed solution can significantly reduce the query latency, improve the bandwidth utilization, and effectively deal with disconnections and failures.
在客户端缓存频繁访问的数据项是提高移动环境中数据传播性能的一种有效技术。由于移动客户端的断开连接和移动性,传统的缓存失效策略不适合移动环境。一种有吸引力的缓存失效技术是基于失效报告(invalidation report, IRs)的。然而,基于ir的方法存在查询延迟长、不能有效利用广播带宽等问题。在本文中,我们提出了解决这些问题的技术。我们首先扩展基于uri的方法以减少查询延迟。然后,我们提出了基于与每个数据项相关联的计数器有效利用广播带宽的技术。设计了一些新技术,以便在服务器故障、客户端故障和断开连接的情况下保持计数器的准确性。广泛的模拟提供并用于评估所提出的方法。与以往的基于ir的算法相比,该方案可以显著降低查询延迟,提高带宽利用率,并有效地处理断开和故障。
{"title":"On the effectiveness of a counter-based cache invalidation scheme and its resiliency to failures in mobile environments","authors":"G. Cao, C. Das","doi":"10.1109/RELDIS.2001.970775","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.970775","url":null,"abstract":"Caching frequently accessed data items on the client side is an effective technique to improve the performance of data dissemination in mobile environments. Classical cache invalidation strategies are not suitable for mobile environments due to the disconnection and mobility of the mobile clients. One attractive cache invalidation technique is based on invalidation reports (IRs). However, IR-based approach suffers from long query latency and it cannot efficiently utilize the broadcast bandwidth. In this paper, we propose techniques to address these problems. We first extend the UIR-based approach to reduce the query latency. Then, we propose techniques to efficiently utilize the broadcast bandwidth based on counters associated with each data item. Novel techniques are designed to maintain the accuracy of the counter in case of server failures, client failures, and disconnections. Extensive simulations are provided and used to evaluate the proposed methodology. Compared to previous IR-based algorithms, the proposed solution can significantly reduce the query latency, improve the bandwidth utilization, and effectively deal with disconnections and failures.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115807825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Compiler-assisted heterogeneous checkpointing 编译器辅助的异构检查点
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969743
Feras Karablieh, R. Bazzi, Margaret Hicks
We consider the problem of heterogeneous checkpointing in distributed systems. We propose a new solution to the problem that is truly heterogeneous in that it can support new architectures without any information about the architecture. The ability to support new architectures without additional knowledge or custom configuration is an important contribution of this work. This ability is particularly useful in mobile settings in which there is no a priori knowledge of the potential machines on which the application might execute. Our solution supports execution in unknown settings as long as there is compiler support for the high-level language in which the application is written. We precisely define what it means for a particular solution to be heterogeneous and discuss the heterogeneity of our solution and other solutions. We use code instrumentation at the source code level to provide heterogeneous checkpointing and recovery.
研究了分布式系统中的异构检查点问题。我们提出了一个新的解决方案来解决这个真正异构的问题,因为它可以支持新的体系结构,而不需要任何关于体系结构的信息。无需额外知识或自定义配置即可支持新架构的能力是这项工作的重要贡献。这种能力在移动设置中特别有用,因为在移动设置中,对于应用程序可能在哪些机器上执行没有先验知识。我们的解决方案支持在未知设置中执行,只要编译器支持编写应用程序所用的高级语言。我们精确地定义了特定解决方案的异构性,并讨论了我们的解决方案和其他解决方案的异构性。我们在源代码级别使用代码插装来提供异构检查点和恢复。
{"title":"Compiler-assisted heterogeneous checkpointing","authors":"Feras Karablieh, R. Bazzi, Margaret Hicks","doi":"10.1109/RELDIS.2001.969743","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969743","url":null,"abstract":"We consider the problem of heterogeneous checkpointing in distributed systems. We propose a new solution to the problem that is truly heterogeneous in that it can support new architectures without any information about the architecture. The ability to support new architectures without additional knowledge or custom configuration is an important contribution of this work. This ability is particularly useful in mobile settings in which there is no a priori knowledge of the potential machines on which the application might execute. Our solution supports execution in unknown settings as long as there is compiler support for the high-level language in which the application is written. We precisely define what it means for a particular solution to be heterogeneous and discuss the heterogeneity of our solution and other solutions. We use code instrumentation at the source code level to provide heterogeneous checkpointing and recovery.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133018197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Optimizing file availability in a secure serverless distributed file system 优化安全无服务器分布式文件系统中的文件可用性
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969727
John R. Douceur, Roger Wattenhofer
Farsite is a secure, scalable, distributed file system that logically functions as a centralized file server but that is physically realized on a set of client desktop computers. Farsite provides security, reliability and availability by storing replicas of each file on multiple machines. It continuously monitors machine availability and relocates replicas as necessary to maximize the effective availability of the system. We evaluate several replica placement methods using large-scale simulation with machine availability data from over 50,000 desktop computers. We find that initially placing replicas in an availability-sensitive fashion yields pathological results, whereas very good results are obtained by random initial placement followed by incremental improvement using a scalable, distributed, fault-tolerant and attack-resistant hill-climbing algorithm. The algorithm is resilient to severe restrictions on communication and replica placement, and it does not excessively co-locate replicas of different files on the same set of machines.
Farsite是一个安全的、可扩展的分布式文件系统,它在逻辑上充当集中式文件服务器,但在物理上是在一组客户机桌面计算机上实现的。Farsite通过在多台机器上存储每个文件的副本来提供安全性、可靠性和可用性。它持续监视机器可用性,并根据需要重新定位副本,以最大限度地提高系统的有效可用性。我们使用来自50,000多台台式计算机的机器可用性数据进行大规模模拟,评估了几种副本放置方法。我们发现,最初以可用性敏感的方式放置副本会产生病态的结果,而通过随机初始放置,然后使用可扩展、分布式、容错和抗攻击的爬坡算法进行增量改进,可以获得非常好的结果。该算法对通信和副本放置的严格限制具有弹性,并且不会在同一组机器上过多地放置不同文件的副本。
{"title":"Optimizing file availability in a secure serverless distributed file system","authors":"John R. Douceur, Roger Wattenhofer","doi":"10.1109/RELDIS.2001.969727","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969727","url":null,"abstract":"Farsite is a secure, scalable, distributed file system that logically functions as a centralized file server but that is physically realized on a set of client desktop computers. Farsite provides security, reliability and availability by storing replicas of each file on multiple machines. It continuously monitors machine availability and relocates replicas as necessary to maximize the effective availability of the system. We evaluate several replica placement methods using large-scale simulation with machine availability data from over 50,000 desktop computers. We find that initially placing replicas in an availability-sensitive fashion yields pathological results, whereas very good results are obtained by random initial placement followed by incremental improvement using a scalable, distributed, fault-tolerant and attack-resistant hill-climbing algorithm. The algorithm is resilient to severe restrictions on communication and replica placement, and it does not excessively co-locate replicas of different files on the same set of machines.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Chasing the FLP impossibility result in a LAN: or, How robust can a fault tolerant server be? 追求FLP不可能导致LAN:或者,容错服务器有多健壮?
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.970767
P. Urbán, X. Défago, A. Schiper
Fault tolerance can be achieved in distributed systems by replication. However Fischer, Lynch and Paterson (1985) have proven an impossibility result about consensus in the asynchronous system model, and similar impossibility results exist for atomic broadcast and group membership. We investigate, with the aid of an experiment conducted in a LAN, whether these impossibility results set limits to the robustness of a replicated server exposed to extremely high loads. The experiment consists of client processes that send requests to a replicated server (three replicas) using an atomic broadcast primitive. It has parameters that allow us to control the load on the hosts and the network, as well as the timeout value used by our heartbeat failure detection mechanism. Our main observation is that the atomic broadcast algorithm never stops delivering messages, not even under arbitrarily high load and very small timeout values (1 ms). So, by trying to illustrate the practical impact of impossibility results, we discovered that we had implemented a very robust replicated service.
在分布式系统中,可以通过复制实现容错。然而Fischer, Lynch和Paterson(1985)证明了异步系统模型中共识的不可能结果,原子广播和组成员也存在类似的不可能结果。通过在局域网中进行的实验,我们调查了这些不可能的结果是否限制了暴露在极高负载下的复制服务器的鲁棒性。该实验包括使用原子广播原语向复制服务器(三个副本)发送请求的客户端进程。它的参数允许我们控制主机和网络上的负载,以及心跳故障检测机制使用的超时值。我们的主要观察是,原子广播算法永远不会停止传递消息,即使在任意高负载和非常小的超时值(1毫秒)下也是如此。因此,通过尝试说明不可能结果的实际影响,我们发现我们实现了一个非常健壮的复制服务。
{"title":"Chasing the FLP impossibility result in a LAN: or, How robust can a fault tolerant server be?","authors":"P. Urbán, X. Défago, A. Schiper","doi":"10.1109/RELDIS.2001.970767","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.970767","url":null,"abstract":"Fault tolerance can be achieved in distributed systems by replication. However Fischer, Lynch and Paterson (1985) have proven an impossibility result about consensus in the asynchronous system model, and similar impossibility results exist for atomic broadcast and group membership. We investigate, with the aid of an experiment conducted in a LAN, whether these impossibility results set limits to the robustness of a replicated server exposed to extremely high loads. The experiment consists of client processes that send requests to a replicated server (three replicas) using an atomic broadcast primitive. It has parameters that allow us to control the load on the hosts and the network, as well as the timeout value used by our heartbeat failure detection mechanism. Our main observation is that the atomic broadcast algorithm never stops delivering messages, not even under arbitrarily high load and very small timeout values (1 ms). So, by trying to illustrate the practical impact of impossibility results, we discovered that we had implemented a very robust replicated service.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Detecting heap smashing attacks through fault containment wrappers 通过故障包容包装检测堆粉碎攻击
Pub Date : 2001-10-28 DOI: 10.1109/RELDIS.2001.969756
C. Fetzer, Zhen Xiao
Buffer overflow attacks are a major cause of security breaches in modern operating systems. Not only are overflows of buffers on the stack a security threat, overflows of buffers kept on the heap can be too. A malicious user might be able to hijack the control flow of a root-privileged program if the user can initiate an overflow of a buffer on the heap when this overflow overwrites a function pointer stored on the heap. The paper presents a fault-containment wrapper which provides effective and efficient protection against heap buffer overflows caused by C library functions. The wrapper intercepts every function call to the C library that can write to the heap and performs careful boundary checks before it calls the original function. This method is transparent to existing programs and does not require source code modification or recompilation. Experimental results on Linux machines indicate that the performance overhead is small.
缓冲区溢出攻击是现代操作系统中安全漏洞的主要原因。不仅堆栈上的缓冲区溢出会带来安全威胁,堆上的缓冲区溢出也会带来安全威胁。如果用户可以在堆上的缓冲区溢出覆盖存储在堆上的函数指针时启动缓冲区溢出,那么恶意用户可能能够劫持具有root特权的程序的控制流。本文提出了一种容错包装器,它可以有效地防止C库函数引起的堆缓冲区溢出。包装器拦截对可以写入堆的C库的每个函数调用,并在调用原始函数之前执行仔细的边界检查。此方法对现有程序是透明的,不需要修改源代码或重新编译。在Linux机器上的实验结果表明,性能开销很小。
{"title":"Detecting heap smashing attacks through fault containment wrappers","authors":"C. Fetzer, Zhen Xiao","doi":"10.1109/RELDIS.2001.969756","DOIUrl":"https://doi.org/10.1109/RELDIS.2001.969756","url":null,"abstract":"Buffer overflow attacks are a major cause of security breaches in modern operating systems. Not only are overflows of buffers on the stack a security threat, overflows of buffers kept on the heap can be too. A malicious user might be able to hijack the control flow of a root-privileged program if the user can initiate an overflow of a buffer on the heap when this overflow overwrites a function pointer stored on the heap. The paper presents a fault-containment wrapper which provides effective and efficient protection against heap buffer overflows caused by C library functions. The wrapper intercepts every function call to the C library that can write to the heap and performs careful boundary checks before it calls the original function. This method is transparent to existing programs and does not require source code modification or recompilation. Experimental results on Linux machines indicate that the performance overhead is small.","PeriodicalId":440881,"journal":{"name":"Proceedings 20th IEEE Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
Proceedings 20th IEEE Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1