{"title":"Adaptive Consistency Guarantees for Large-Scale Replicated Services","authors":"Yijun Lu, Ying Lu, Hong Jiang","doi":"10.1109/NAS.2008.64","DOIUrl":"https://doi.org/10.1109/NAS.2008.64","url":null,"abstract":"To maintain consistency, designers of replicated services have traditionally been forced to choose from either strong consistency guarantees or none at all. Realizing that a continuum between strong and optimistic consistencies is semantically meaningful for a broad range of network services, previous research has proposed a continuous consistency model for replicated services to support the tradeoff between the guaranteed consistency level, performance and availability. However, to meet changing application needs and to make the model useful for interactive users of large-scale replicated services, the adaptability and the swiftness of inconsistency resolution are important and challenging. This paper presents IDEA (an infrastructure for detection-based adaptive consistency guarantees) for adaptive consistency guarantees of large-scale, Internet-based replicated services. The main functions enabled by IDEA include quick inconsistency detection and resolution, consistency adaptation and quantified consistency level guarantees. Through experimentation on the Planet-Lab, IDEA is evaluated from two aspects: its adaptive consistency guarantees and its performance for inconsistency resolution. Results show that IDEA is able to provide consistency guarantees adaptive to userpsilas changing needs, and it achieves low delay for inconsistency resolution and incurs small communication overhead.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115335455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Interoperable Model of Distributed UDDI","authors":"Libing Wu, Yanxiang He, Dan Wu, Jianqun Cui","doi":"10.1109/NAS.2008.16","DOIUrl":"https://doi.org/10.1109/NAS.2008.16","url":null,"abstract":"UDDI acts a very important role in the web service. It can be used to publish and lookup services. Most of the current UDDI models are centralized so that the performance will decrease if there are too many services to be registered or queried. In this paper, an interoperable model of distributed UDDI is proposed. The model divides whole UDDI servers into there types: root server, super domain server and normal server. The simulation results show that the model can get better lookup performance.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116586749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hard Real-Time Communication over Multi-hop Switched Ethernet","authors":"Minghu Zhang, Jianguo Shi, Ting Zhang, Yang Hu","doi":"10.1109/NAS.2008.31","DOIUrl":"https://doi.org/10.1109/NAS.2008.31","url":null,"abstract":"Currently, hard real-time communication over multi-hop switched Ethernet is still an open problem for researchers. In this paper, a novel hard real-time communication approach over multi-hop switched Ethernet is introduced without any modifications to existing Ethernet hardware. Firstly, the upper delay bounds are analyzed using the network calculus theories. Then the dual-level traffic smoothing technique is proposed, which combines the node-level traffic smoothing with the global-level traffic controlling techniques. Thorough measurements are made to demonstrate the hard real-time communication performance of this approach over multi-hop switched Ethernet.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117310749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wan Huang, Jizhong Han, Jin He, Lisheng Zhang, Yao Lin
{"title":"Enabling RDMA Capability of InfiniBand Network for Java Applications","authors":"Wan Huang, Jizhong Han, Jin He, Lisheng Zhang, Yao Lin","doi":"10.1109/NAS.2008.55","DOIUrl":"https://doi.org/10.1109/NAS.2008.55","url":null,"abstract":"In this paper, we propose a Java application interface on InfiniBand network, named Jdib, which provides a viable approach for Java applications to use RDMA semantics directly. Most functions in InfiniBand Verbs are implemented in Jdib, which provides the feasibility of building high-performance cluster applications in Java. Further, a JNIO-based mechanism is used to get rid of extra data copy between JVM buffers and OS buffers, and an optimized method is proposed for sharing data structures between Java code and native code. The experimental evaluation demonstrates performance improvements using Jdib.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123594008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cluster Maintenance Algorithm Based on LEACH-DCHS Protoclol","authors":"Yuhua Liu, Jingju Gao, Yongcan Jia, Longquan Zhu","doi":"10.1109/NAS.2008.59","DOIUrl":"https://doi.org/10.1109/NAS.2008.59","url":null,"abstract":"LEACH-DCHS CM (LEACH-DCHS cluster maintenance) algorithm based on LEACH-DCHS algorithm is proposed in this paper. By prolonging the steady-state phase time and retaining the concept of round in the original algorithm, the new algorithm achieves the purpose of saving energy ultimately. Simulation results validate the energy efficiency of LEACH-DCHS CM algorithm.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Trust Evaluation Model of Grid Services","authors":"Xiaohua Dong, Zhongfu Wu","doi":"10.1109/NAS.2008.61","DOIUrl":"https://doi.org/10.1109/NAS.2008.61","url":null,"abstract":"In an open grid of services architecture, to reflect service reliability is a major security problem. In this paper a trust evaluation model based on compensation is presented to enhance the reliability and credibility of grid services by evaluating the servicespsila trust value dynamically. For evaluating servicespsila trust, the trust model combines consumerspsila commendatory trust, services access frequency, servicepsilas own assigned trust and the decrease of the trust. Both theoretical analysis and emulation experiments show that the model can make the service providers and service demanders voluntarily discard the intention of cheating and other malicious behaviors, and then promote the creditability of services, simplify the calculating process and reduce the cost of communication. It is a creative solution for identifying reliability of grid services.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"24 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Barrier Performance on Dual Quad-Core Opterons","authors":"Jie Chen, W. Watson","doi":"10.1109/NAS.2008.27","DOIUrl":"https://doi.org/10.1109/NAS.2008.27","url":null,"abstract":"Multi-core processors based SMP servers have become building blocks for Linux clusters in recent years because they can deliver better performance for multi-threaded programs through on-chip multi-threading. However, a relative slow software barrier can hinder the performance of a data-parallel scientific application on a multi-core system. In this paper we study the performance of different software barrier algorithms on a server based on newly introduced AMD quad-core Opteron processors. We study how the memory architecture and the cache coherence protocol of the system influence the performance of barrier algorithms. We present an optimized barrier algorithm derived from the queue-based barrier algorithm. We find that the optimized barrier algorithm achieves speedup of 1.77 over the original queue-based algorithm. In addition, it has speedup of 2.39 over the software barrier generated by the Intel OpenMP compiler.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121396231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of Behavior Anomalies in a Representative File System","authors":"Qiang Zou, D. Feng","doi":"10.1109/NAS.2008.29","DOIUrl":"https://doi.org/10.1109/NAS.2008.29","url":null,"abstract":"As one of the workload characteristics, the anomaly behaviorsin real workload have been recognized as a critical requirement for file system design. In this paper, a set of traces collected from typically realistic file system have been analyzed. Studying the correlations of I/O request inter-arrival times shows that it is necessary to examine the self-similarity in file system workload. And then the phenomenon of self-similarity which had been initially observed in network and disk I/O workload has also been visually and statistically observed in file system workload used in this paper. Furthermore, this property is further explored and we find that the self-similarity of I/O accesses in those sets of traces studied in this paper is mainly due to reads. This study is extremely important to provide useful insight into the design and analysis of file system for performance gains, as well as to model file system I/O workloads.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123606585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Storage Aware Resource Allocation for Grid Data Streaming Pipelines","authors":"Wen Zhang, Junwei Cao, Yisheng Zhong, Lianchen Liu, Cheng Wu","doi":"10.1109/NAS.2008.24","DOIUrl":"https://doi.org/10.1109/NAS.2008.24","url":null,"abstract":"Data streaming applications, usually composed with sequential/parallel tasks in a data pipeline form, bring new challenges to task scheduling and resource allocation in grid environments. Due to high volumes of data and relatively limit storage capability, resource allocation and data streaming have to be storage aware. In this paper, genetic algorithm (GA) is adopted for task scheduling of pipelines, based on on-line measurement and prediction with gray model (GM). On-demand data streaming is introduced to avoid data overflow using repertory strategies. Experimental results show that balance among task executions with on-demand data streaming is required to improve overall performance, avoid system bottlenecks and backlogs of intermediate data, and increase data throughput of pipelines as a whole.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A K-hop Based Clustering Algorithm in Ad Hoc Networks","authors":"Ge He, Shangbo Zhou, Shan Liu","doi":"10.1109/NAS.2008.15","DOIUrl":"https://doi.org/10.1109/NAS.2008.15","url":null,"abstract":"In this paper, an improved k-hop cluster based algorithm in mobile ad-hoc networks (MANET) is proposed and its performance is analyzed. Experimental results show that the proposed clustering algorithm outperforms an existing algorithm.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}