首页 > 最新文献

2012 IEEE 31st Symposium on Reliable Distributed Systems最新文献

英文 中文
Anonymous On-Demand Routing and Secure Checking of Traffic Forwarding for Mobile Ad Hoc Networks 移动Ad Hoc网络的匿名按需路由及流量转发安全检测
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.6
R. Jiang, Yuan Xing
Anonymous communications in mobile ad hoc networks is an important and effective way against malicious traffic analysis. Various anonymous routing schemes have been proposed for MANETs. However, most works failed to resist the global tracker, and always ignored the reliability of data delivery. In this paper, a comprehensive anonymous communication protocol, called ARSC, is proposed. The ARSC consists of anonymous routing, which is based on identity-based encryption pseudonym and single-round onion, and secure checking of traffic forwarding in data transmission phase, to achieve strong route anonymity and improve reliability of packet delivery in the data transmission phase. From the security analysis, our protocol ARSC is more secure than other schemes such as ANODR, SDAR, AnonDSR, CAR and MASK. Moreover, simulation experiments show that the ARSC has better performance than any other onion-structured anonymous routing protocols.
移动自组网中的匿名通信是抵御恶意流量分析的重要而有效的手段。针对manet,已经提出了各种匿名路由方案。然而,大多数作品未能抵抗全局跟踪器,往往忽略了数据传递的可靠性。本文提出了一种综合的匿名通信协议——ARSC。ARSC由基于身份加密假名和单轮洋葱的匿名路由和数据传输阶段流量转发的安全检查两部分组成,以实现强路由匿名性,提高数据传输阶段报文发送的可靠性。从安全性分析来看,我们的协议ARSC比其他方案如ANODR、SDAR、AnonDSR、CAR和MASK更安全。仿真实验表明,ARSC具有比其他洋葱结构匿名路由协议更好的性能。
{"title":"Anonymous On-Demand Routing and Secure Checking of Traffic Forwarding for Mobile Ad Hoc Networks","authors":"R. Jiang, Yuan Xing","doi":"10.1109/SRDS.2012.6","DOIUrl":"https://doi.org/10.1109/SRDS.2012.6","url":null,"abstract":"Anonymous communications in mobile ad hoc networks is an important and effective way against malicious traffic analysis. Various anonymous routing schemes have been proposed for MANETs. However, most works failed to resist the global tracker, and always ignored the reliability of data delivery. In this paper, a comprehensive anonymous communication protocol, called ARSC, is proposed. The ARSC consists of anonymous routing, which is based on identity-based encryption pseudonym and single-round onion, and secure checking of traffic forwarding in data transmission phase, to achieve strong route anonymity and improve reliability of packet delivery in the data transmission phase. From the security analysis, our protocol ARSC is more secure than other schemes such as ANODR, SDAR, AnonDSR, CAR and MASK. Moreover, simulation experiments show that the ARSC has better performance than any other onion-structured anonymous routing protocols.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132909937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliable On-Chip Memory Design for CMPs 可靠的cmp片上存储器设计
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.60
Abbas BanaiyanMofrad
Aggressive technology scaling in deep sub micron regime makes chips more susceptible to failures. This causes multiple realibility challenges in the design of modern chips, including manufacturing defects, wear-out, and parametric variations. With increasing area occupied by different on-chip memories in modern computing platforms such as Chip Multi-Processors (CMPs), memory reliability becomes a challenging issue. Traditional on-chip memory reliability techniques (e.g., ECC) incur significant power and performance overheads. To tackle such challenges, my research introduces several designs for fault-tolerance of both L1 and L2 cache memories in uni-core processors [1], Last-level Cache (LLC) in CMPs [3][4], and LLC in Networks-on-Chip (NoCs) [2].
在深亚微米范围内的激进技术缩放使芯片更容易发生故障。这给现代芯片的设计带来了多重可靠性挑战,包括制造缺陷、损耗和参数变化。随着芯片多处理器(cmp)等现代计算平台中不同的片上存储器所占的空间越来越大,存储器的可靠性成为一个具有挑战性的问题。传统的片上存储器可靠性技术(例如,ECC)会产生显著的功耗和性能开销。为了应对这些挑战,我的研究介绍了单核处理器[1]中L1和L2缓存存储器的容错设计,cmp[3][4]中的最后一级缓存(LLC),以及片上网络(noc)[2]中的LLC。
{"title":"Reliable On-Chip Memory Design for CMPs","authors":"Abbas BanaiyanMofrad","doi":"10.1109/SRDS.2012.60","DOIUrl":"https://doi.org/10.1109/SRDS.2012.60","url":null,"abstract":"Aggressive technology scaling in deep sub micron regime makes chips more susceptible to failures. This causes multiple realibility challenges in the design of modern chips, including manufacturing defects, wear-out, and parametric variations. With increasing area occupied by different on-chip memories in modern computing platforms such as Chip Multi-Processors (CMPs), memory reliability becomes a challenging issue. Traditional on-chip memory reliability techniques (e.g., ECC) incur significant power and performance overheads. To tackle such challenges, my research introduces several designs for fault-tolerance of both L1 and L2 cache memories in uni-core processors [1], Last-level Cache (LLC) in CMPs [3][4], and LLC in Networks-on-Chip (NoCs) [2].","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AAD: Adaptive Anomaly Detection System for Cloud Computing Infrastructures 面向云计算基础设施的自适应异常检测系统
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.3
H. Pannu, Jianguo Liu, Song Fu
Cloud computing has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructure. However, due to their inherent complexity and large scale, production cloud computing systems are prone to various runtime problems caused by hardware and software failures. Autonomic failure detection is a crucial technique for understanding emergent, cloudwide phenomena and self-managing cloud resources for system-level dependability assurance. To detect failures, we need to monitor the cloud execution and collect runtime performance data. These data are usually unlabeled, and thus a prior failure history is not always available in production clouds, especially for newly managed or deployed systems. In this paper, we present an Adaptive Anomaly Detection (AAD) framework for cloud dependability assurance. It employs data description using hypersphere for adaptive failure detection. Based on the cloud performance data, AAD detects possible failures, which are verified by the cloud operators. They are confirmed as either true failures with failure types or normal states. The algorithm adapts itself by recursively learning from these newly verified detection results to refine future detections. Meanwhile, it exploits the observed but undetected failure records reported by the cloud operators to identify new types of failures. We have implemented a prototype of the algorithm and conducted experiments in an on-campus cloud computing environment. Our experimental results show that AAD can achieve more efficient and accurate failure detection than other existing scheme.
由于用户无需拥有和维护复杂的计算基础设施,云计算变得越来越流行。然而,生产云计算系统由于其固有的复杂性和庞大的规模,容易出现各种硬件和软件故障导致的运行时问题。自主故障检测是一项关键技术,用于理解突发的、云范围现象和自管理云资源,以保证系统级的可靠性。为了检测故障,我们需要监视云执行并收集运行时性能数据。这些数据通常是未标记的,因此以前的故障历史记录在生产云中并不总是可用的,特别是对于新管理或部署的系统。本文提出了一种用于云可靠性保证的自适应异常检测(AAD)框架。采用超球数据描述进行自适应故障检测。AAD根据云性能数据检测可能出现的故障,并由云运营商进行验证。它们被确认为具有故障类型或正常状态的真故障。该算法通过递归学习这些新验证的检测结果来改进未来的检测。同时,它利用云运营商报告的观察到但未检测到的故障记录来识别新的故障类型。我们已经实现了该算法的原型,并在校园云计算环境中进行了实验。实验结果表明,与现有的故障检测方案相比,AAD能够实现更高效、更准确的故障检测。
{"title":"AAD: Adaptive Anomaly Detection System for Cloud Computing Infrastructures","authors":"H. Pannu, Jianguo Liu, Song Fu","doi":"10.1109/SRDS.2012.3","DOIUrl":"https://doi.org/10.1109/SRDS.2012.3","url":null,"abstract":"Cloud computing has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructure. However, due to their inherent complexity and large scale, production cloud computing systems are prone to various runtime problems caused by hardware and software failures. Autonomic failure detection is a crucial technique for understanding emergent, cloudwide phenomena and self-managing cloud resources for system-level dependability assurance. To detect failures, we need to monitor the cloud execution and collect runtime performance data. These data are usually unlabeled, and thus a prior failure history is not always available in production clouds, especially for newly managed or deployed systems. In this paper, we present an Adaptive Anomaly Detection (AAD) framework for cloud dependability assurance. It employs data description using hypersphere for adaptive failure detection. Based on the cloud performance data, AAD detects possible failures, which are verified by the cloud operators. They are confirmed as either true failures with failure types or normal states. The algorithm adapts itself by recursively learning from these newly verified detection results to refine future detections. Meanwhile, it exploits the observed but undetected failure records reported by the cloud operators to identify new types of failures. We have implemented a prototype of the algorithm and conducted experiments in an on-campus cloud computing environment. Our experimental results show that AAD can achieve more efficient and accurate failure detection than other existing scheme.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131403111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
A Theory of Packet Flows Based on Law-of-Mass-Action Scheduling 基于质量-动作调度定律的分组流理论
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.2
Thomas Meyer, C. Tschudin
Designing dynamically robust protocols is not a simple task with current classic work-conserving scheduling, where packets are sent out as soon as processing and transmission capacity is available. We show that deviating from this fundamental queuing assumption leads to much more controllable and analyzable forms of protocols. At the core of our work is a queue-scheduling discipline based on the chemical "Law of Mass Action" (LoMA) that serves a queue with a rate proportional to its fill level. In this paper we introduce our LoMA-scheduling approach and provide a solid mathematical framework adopted from chemistry that simplifies the analysis of the corresponding queueing networks, including the prediction of the underlying protocols' dynamics. We demonstrate the elegance of our model by implementing and analyzing a TCP-compatible "chemical" congestion control algorithm C3A with only a few interacting queues (another novelty of our approach). We also show the application of our theory to gossip protocols, explain an effective implementation of the scheduler and discuss possibilities of how to integrate mass-action scheduling into traditional networking environments.
设计动态健壮的协议并不是一项简单的任务,当前经典的节省工作的调度,在这种调度中,只要处理和传输能力可用,数据包就会发送出去。我们表明,偏离这个基本的排队假设会导致更可控和可分析的协议形式。我们工作的核心是基于化学“质量作用定律”(LoMA)的队列调度学科,该学科以与其填充水平成比例的速率为队列提供服务。在本文中,我们介绍了我们的loma调度方法,并提供了一个来自化学的坚实数学框架,简化了相应队列网络的分析,包括对底层协议动态的预测。我们通过实现和分析一个tcp兼容的“化学”拥塞控制算法C3A来展示我们模型的优雅之处,该算法只有几个交互队列(我们方法的另一个新颖之处)。我们还展示了我们的理论在八卦协议中的应用,解释了调度程序的有效实现,并讨论了如何将大规模动作调度集成到传统网络环境中的可能性。
{"title":"A Theory of Packet Flows Based on Law-of-Mass-Action Scheduling","authors":"Thomas Meyer, C. Tschudin","doi":"10.1109/SRDS.2012.2","DOIUrl":"https://doi.org/10.1109/SRDS.2012.2","url":null,"abstract":"Designing dynamically robust protocols is not a simple task with current classic work-conserving scheduling, where packets are sent out as soon as processing and transmission capacity is available. We show that deviating from this fundamental queuing assumption leads to much more controllable and analyzable forms of protocols. At the core of our work is a queue-scheduling discipline based on the chemical \"Law of Mass Action\" (LoMA) that serves a queue with a rate proportional to its fill level. In this paper we introduce our LoMA-scheduling approach and provide a solid mathematical framework adopted from chemistry that simplifies the analysis of the corresponding queueing networks, including the prediction of the underlying protocols' dynamics. We demonstrate the elegance of our model by implementing and analyzing a TCP-compatible \"chemical\" congestion control algorithm C3A with only a few interacting queues (another novelty of our approach). We also show the application of our theory to gossip protocols, explain an effective implementation of the scheduler and discuss possibilities of how to integrate mass-action scheduling into traditional networking environments.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"744 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions 正常条件下具有恒定时间复杂度的稳健投机拜占庭随机共识
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.62
Bruno Vavala, N. Neves
Randomized Byzantine Consensus can be an interesting building block in the implementation of asynchronous distributed systems. Despite its exponential worst-case complexity, which would make it less appealing in practice, a few experimental works have argued quite the opposite. To bridge the gap between theory and practice, we analyze a well-known state-of-the-art algorithm in normal system conditions, in which crash failures may occur but no malicious attacks, proving that it is fast on average. We then leverage our analysis to improve its best-case complexity from three to two phases, by reducing the communication operations through speculative executions. Our findings are confirmed through an experimental validation.
在异步分布式系统的实现中,随机拜占庭共识可能是一个有趣的构建块。尽管它的指数最坏情况复杂性会使它在实践中不那么吸引人,但一些实验作品却提出了相反的观点。为了弥合理论与实践之间的差距,我们在正常的系统条件下分析了一种众所周知的最先进的算法,在这种情况下,可能会发生崩溃故障,但没有恶意攻击,证明了它的平均速度。然后,我们利用我们的分析,通过减少通过推测执行的通信操作,将其最佳情况复杂度从三个阶段提高到两个阶段。我们的发现通过实验验证得到了证实。
{"title":"Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions","authors":"Bruno Vavala, N. Neves","doi":"10.1109/SRDS.2012.62","DOIUrl":"https://doi.org/10.1109/SRDS.2012.62","url":null,"abstract":"Randomized Byzantine Consensus can be an interesting building block in the implementation of asynchronous distributed systems. Despite its exponential worst-case complexity, which would make it less appealing in practice, a few experimental works have argued quite the opposite. To bridge the gap between theory and practice, we analyze a well-known state-of-the-art algorithm in normal system conditions, in which crash failures may occur but no malicious attacks, proving that it is fast on average. We then leverage our analysis to improve its best-case complexity from three to two phases, by reducing the communication operations through speculative executions. Our findings are confirmed through an experimental validation.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SPECULA: Speculative Replication of Software Transactional Memory SPECULA:软件事务性内存的推测复制
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.67
Sebastiano Peluso, João Fernandes, P. Romano, F. Quaglia, L. Rodrigues
This paper introduces SPECULA, a novel replication protocol for Software Transactional Memory (STM) systems that seeks maximum overlap between transaction execution and replica synchronization phases via speculative processing techniques. By removing the replica synchronization phase from the critical path of execution of transactions, SPECULA allows threads to speculatively pipeline the execution of both transactional and/or non-transactional code. The core of SPECULA is a multi-version concurrency control algorithm that supports speculative transaction processing while ensuring the strong consistency criteria that are desirable in non-sand-boxed environments like STMs. Via an experimental study, based on a fully-fledged prototype and on both synthetic and standard STM benchmarks, we demonstrate that SPECULA can achieve speedups of up to one order of magnitude with respect to state-of-the-art non-speculative replication techniques.
本文介绍了SPECULA,一种用于软件事务性内存(STM)系统的新型复制协议,它通过推测处理技术寻求事务执行和副本同步阶段之间的最大重叠。通过从事务执行的关键路径中删除副本同步阶段,SPECULA允许线程推测性地执行事务性和/或非事务性代码。SPECULA的核心是一个多版本并发控制算法,它支持推测性事务处理,同时确保在stm等非沙盒环境中所需的强一致性标准。通过一项基于成熟原型以及合成和标准STM基准的实验研究,我们证明,与最先进的非推测复制技术相比,SPECULA可以实现高达一个数量级的加速。
{"title":"SPECULA: Speculative Replication of Software Transactional Memory","authors":"Sebastiano Peluso, João Fernandes, P. Romano, F. Quaglia, L. Rodrigues","doi":"10.1109/SRDS.2012.67","DOIUrl":"https://doi.org/10.1109/SRDS.2012.67","url":null,"abstract":"This paper introduces SPECULA, a novel replication protocol for Software Transactional Memory (STM) systems that seeks maximum overlap between transaction execution and replica synchronization phases via speculative processing techniques. By removing the replica synchronization phase from the critical path of execution of transactions, SPECULA allows threads to speculatively pipeline the execution of both transactional and/or non-transactional code. The core of SPECULA is a multi-version concurrency control algorithm that supports speculative transaction processing while ensuring the strong consistency criteria that are desirable in non-sand-boxed environments like STMs. Via an experimental study, based on a fully-fledged prototype and on both synthetic and standard STM benchmarks, we demonstrate that SPECULA can achieve speedups of up to one order of magnitude with respect to state-of-the-art non-speculative replication techniques.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Pairwise Key Generation Scheme for Cellular Mobile Communication 蜂窝式移动通信的成对密钥生成方案
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.48
Chetan Jaiswal, Vijay Kumar
We present two new key generation schemes for secure communication between a pair of mobile nodes (cell phones). Unlike existing algorithms, our scheme does not (a) store a key chain in the memory from a universal key space, (b) use key broadcast, (c) distribute selected keys to the network nodes, and (d) use database of keys for selecting keys for communication. Rather, the pair of nodes that want to communicate securely generate identical keys independently with the help of a head node. We show the behavior of these schemes through a simple analytical model.
我们提出了两种新的密钥生成方案,用于一对移动节点(手机)之间的安全通信。与现有算法不同,我们的方案不需要(a)在内存中存储通用密钥空间中的密钥链,(b)使用密钥广播,(c)将选择的密钥分发到网络节点,以及(d)使用密钥数据库选择用于通信的密钥。相反,希望安全通信的两个节点在头节点的帮助下独立生成相同的密钥。我们通过一个简单的解析模型来说明这些方案的行为。
{"title":"Pairwise Key Generation Scheme for Cellular Mobile Communication","authors":"Chetan Jaiswal, Vijay Kumar","doi":"10.1109/SRDS.2012.48","DOIUrl":"https://doi.org/10.1109/SRDS.2012.48","url":null,"abstract":"We present two new key generation schemes for secure communication between a pair of mobile nodes (cell phones). Unlike existing algorithms, our scheme does not (a) store a key chain in the memory from a universal key space, (b) use key broadcast, (c) distribute selected keys to the network nodes, and (d) use database of keys for selecting keys for communication. Rather, the pair of nodes that want to communicate securely generate identical keys independently with the help of a head node. We show the behavior of these schemes through a simple analytical model.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121699903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Availability Modeling and Analysis for Data Backup and Restore Operations 数据备份和恢复操作的可用性建模与分析
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.9
Xiaoyan Yin, Javier Alonso, F. Machida, E. Andrade, Kishor S. Trivedi
Data backup operation is an essential part of common IT system administration to protect against data loss caused by any storage failures, human errors, or disasters. Lost data can be recovered from the backed up data if it exists. Since the backup and restore operations accrue downtime overhead or performance degradation, they have to be designed to ensure the data reliability while minimizing the performance and availability overhead. In this paper, we study the impacts of different backup policies on availability measures such as storage availability, system availability, and user-perceived availability. Backup and restore operations are designed using SysML Activity diagrams that are automatically translated into Stochastic Reward Net (SRN) to compute the availability measures. Our numerical results show the effectiveness of the combination of full backup and partial backup in terms of user-perceived data availability and data loss rate. Furthermore, the sensitivity ranking can help improve the availability measures.
数据备份操作是通用IT系统管理的重要组成部分,可以防止由于存储故障、人为错误或灾难导致的数据丢失。如果备份数据存在,则可以从备份数据中恢复丢失的数据。由于备份和恢复操作会增加停机开销或性能下降,因此必须对其进行设计,以确保数据可靠性,同时尽量减少性能和可用性开销。在本文中,我们研究了不同的备份策略对可用性度量的影响,如存储可用性、系统可用性和用户感知可用性。备份和恢复操作使用SysML活动图设计,这些活动图自动转换为随机奖励网(SRN)来计算可用性度量。我们的数值结果表明,在用户感知的数据可用性和数据丢失率方面,完全备份和部分备份组合的有效性。此外,灵敏度排序有助于改进可用性度量。
{"title":"Availability Modeling and Analysis for Data Backup and Restore Operations","authors":"Xiaoyan Yin, Javier Alonso, F. Machida, E. Andrade, Kishor S. Trivedi","doi":"10.1109/SRDS.2012.9","DOIUrl":"https://doi.org/10.1109/SRDS.2012.9","url":null,"abstract":"Data backup operation is an essential part of common IT system administration to protect against data loss caused by any storage failures, human errors, or disasters. Lost data can be recovered from the backed up data if it exists. Since the backup and restore operations accrue downtime overhead or performance degradation, they have to be designed to ensure the data reliability while minimizing the performance and availability overhead. In this paper, we study the impacts of different backup policies on availability measures such as storage availability, system availability, and user-perceived availability. Backup and restore operations are designed using SysML Activity diagrams that are automatically translated into Stochastic Reward Net (SRN) to compute the availability measures. Our numerical results show the effectiveness of the combination of full backup and partial backup in terms of user-perceived data availability and data loss rate. Furthermore, the sensitivity ranking can help improve the availability measures.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Improving the Reliability and Availability of Vehicular Communications Using Voronoi Diagram-Based Placement of Road Side Units 利用基于Voronoi图的路边单元布置提高车辆通信的可靠性和可用性
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.39
Prithviraj Patil, A. Gokhale
Vehicular Ad-hoc Networks (VANETs) form the basis for critical services that improve traffic safety and alleviate traffic congestion. The reliability of VANET-based services and applications that are based solely on vehicle-to-vehicle (V2V) communications, however, is hindered due primarily to limited and often fluctuating V2V communications. To address this limitation, Road-Side Units (RSU) have been proposed to complement V2V communications by providing stable event and data brokering capability. Effective placement of the RSUs is a key requirement in improving reliability of VANET services. This poster describes a novel Voronoi network-based algorithm for the effective placement of RSUs. The reliability metric considered in placing the RSUs involves bounding both the delay incurred by communication packets and packet loss, which in turn ensure timeliness and correct operation of the VANET services.
车辆自组织网络(vanet)构成了提高交通安全和缓解交通拥堵的关键服务的基础。然而,完全基于车对车(V2V)通信的基于vanet的服务和应用程序的可靠性受到阻碍,主要原因是V2V通信有限且经常波动。为了解决这一限制,路边单元(RSU)被提议通过提供稳定的事件和数据代理功能来补充V2V通信。有效安置rsu是提高VANET服务可靠性的关键要求。这张海报描述了一种新颖的基于Voronoi网络的rsu有效放置算法。放置rsu时考虑的可靠性度量包括对通信数据包产生的延迟和丢包进行限制,从而确保VANET业务的及时性和正确运行。
{"title":"Improving the Reliability and Availability of Vehicular Communications Using Voronoi Diagram-Based Placement of Road Side Units","authors":"Prithviraj Patil, A. Gokhale","doi":"10.1109/SRDS.2012.39","DOIUrl":"https://doi.org/10.1109/SRDS.2012.39","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) form the basis for critical services that improve traffic safety and alleviate traffic congestion. The reliability of VANET-based services and applications that are based solely on vehicle-to-vehicle (V2V) communications, however, is hindered due primarily to limited and often fluctuating V2V communications. To address this limitation, Road-Side Units (RSU) have been proposed to complement V2V communications by providing stable event and data brokering capability. Effective placement of the RSUs is a key requirement in improving reliability of VANET services. This poster describes a novel Voronoi network-based algorithm for the effective placement of RSUs. The reliability metric considered in placing the RSUs involves bounding both the delay incurred by communication packets and packet loss, which in turn ensure timeliness and correct operation of the VANET services.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GSFord: Towards a Reliable Geo-social Notification System GSFord:迈向可靠的地理社会通知系统
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.35
Kyungbaek Kim, Ye Zhao, N. Venkatasubramanian
The eventual goal of any notification system is to deliver appropriate messages to all relevant recipients with very high reliability in a timely manner. In particular, we focus on notification in extreme situations (e.g. disasters) where geographically correlated failures hinder the ability to reach recipients inside the corresponding failed region. In this paper, we present GSFord, a reliable geo-social notification system that is aware of (a) the geographies in which the message needs to be disseminated and (b) the social network characteristics of the intended recipient, in order to maximize/increase the coverage and reliability. GSFord builds robust geo-aware P2P overlays to provide efficient location-based message delivery and reliable storage of geo-social information of recipients. When an event occurs, GSFord is able to efficiently deliver the message to recipients who are either (a) located in the event area or (b) socially correlated to the event (e.g. relatives/friends of those who are impacted by an event). Furthermore, GSFord leverages the geo-social information to trigger a social diffusion process, which operates through out-of band channels such as phone calls and human contacts, in order to reach recipients which are isolated in the failed region. Through extensive evaluations, we show that GSFord is reliable, the social diffusion process enhanced by GSFord reaches up to 99.9% of desired recipients even under massive geographically correlated regional failures. We also show that GSFord is efficient even under skewed distribution of user populations.
任何通知系统的最终目标都是将适当的消息以非常高的可靠性及时地传递给所有相关的接收者。我们特别关注极端情况下的通知(例如灾难),在这种情况下,地理上相关的故障阻碍了到达相应故障区域内的收件人的能力。在本文中,我们介绍了GSFord,一个可靠的地理社会通知系统,它意识到(a)信息需要传播的地理位置和(b)预期接收者的社会网络特征,以最大化/增加覆盖范围和可靠性。GSFord构建了强大的地理感知P2P覆盖,以提供高效的基于位置的消息传递和可靠的接收者地理社会信息存储。当事件发生时,GSFord能够有效地将消息传递给(a)位于事件区域或(b)与事件有社会关联的接收者(例如,受事件影响者的亲戚/朋友)。此外,GSFord利用地理社会信息触发社会扩散过程,该过程通过电话和人际接触等带外渠道运作,以便接触到在失败地区被隔离的接收者。通过广泛的评估,我们表明GSFord是可靠的,即使在大量地理相关区域失效的情况下,GSFord增强的社会扩散过程也达到99.9%的期望接受者。我们还表明,即使在用户群体分布不均的情况下,GSFord也是有效的。
{"title":"GSFord: Towards a Reliable Geo-social Notification System","authors":"Kyungbaek Kim, Ye Zhao, N. Venkatasubramanian","doi":"10.1109/SRDS.2012.35","DOIUrl":"https://doi.org/10.1109/SRDS.2012.35","url":null,"abstract":"The eventual goal of any notification system is to deliver appropriate messages to all relevant recipients with very high reliability in a timely manner. In particular, we focus on notification in extreme situations (e.g. disasters) where geographically correlated failures hinder the ability to reach recipients inside the corresponding failed region. In this paper, we present GSFord, a reliable geo-social notification system that is aware of (a) the geographies in which the message needs to be disseminated and (b) the social network characteristics of the intended recipient, in order to maximize/increase the coverage and reliability. GSFord builds robust geo-aware P2P overlays to provide efficient location-based message delivery and reliable storage of geo-social information of recipients. When an event occurs, GSFord is able to efficiently deliver the message to recipients who are either (a) located in the event area or (b) socially correlated to the event (e.g. relatives/friends of those who are impacted by an event). Furthermore, GSFord leverages the geo-social information to trigger a social diffusion process, which operates through out-of band channels such as phone calls and human contacts, in order to reach recipients which are isolated in the failed region. Through extensive evaluations, we show that GSFord is reliable, the social diffusion process enhanced by GSFord reaches up to 99.9% of desired recipients even under massive geographically correlated regional failures. We also show that GSFord is efficient even under skewed distribution of user populations.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130754737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2012 IEEE 31st Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1