27th International Conference on Distributed Computing Systems (ICDCS '07)最新文献

筛选
英文 中文
Optimizing Multicast Performance in Large-Scale WLANs 大规模无线局域网中的组播性能优化
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.125
Ai Chen, Dongwook Lee, P. Sinha
{"title":"Optimizing Multicast Performance in Large-Scale WLANs","authors":"Ai Chen, Dongwook Lee, P. Sinha","doi":"10.1109/ICDCS.2007.125","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.125","url":null,"abstract":"Support for efficient multicasting in WLANs can enable new services such as streaming TV channels, radio channels, and visitor's information. With increasing deployments of large-scale WLANs, such services can have a significant impact. However, for a solution to be viable, the mutlicast services must minimally impact the existing unicast services which are currently the core services offered by most WLANs. This paper focuses on three objective functions motivated by different revenue functions and network scenarios: maximizing the number of users (MNU), balancing the load among APs (BLA), and minimizing the load of APs (MLA). We show that these problems are NP-hard and present centralized approximation algorithms and distributed approaches to solve them. Using simulations we evaluate the performance of these algorithms. We observe that the number of users can be increased by up to 36.9%, and the maximum AP load and the total load can be reduced by up to 52.9% and 31.1%, respectively.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122506305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Virtual Node-Based Tracking Algorithm for Mobile Networks 基于虚拟节点的移动网络跟踪算法
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.82
Tina Nolte, N. Lynch
{"title":"A Virtual Node-Based Tracking Algorithm for Mobile Networks","authors":"Tina Nolte, N. Lynch","doi":"10.1109/ICDCS.2007.82","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.82","url":null,"abstract":"We introduce a virtual-node based mobile object tracking algorithm for mobile sensor networks, VINESTALK. The algorithm uses the virtual stationary automata programming layer, consisting of mobile clients, virtual timed machines distributed at known locations in the plane, called virtual stationary automata (VSAs), and a communication service connecting VSAs and mobile clients. VINESTALK maintains a data structure on top of an underlying hierarchical partitioning of the network. In a grid partitioning, operations to find a mobile object distance d away take O(d) time and communication to complete. Updates to the tracking structure after the object has moved a total of d distance take O{d*log network diameter) amortized time and communication to complete. The tracked object may relocate without waiting for VINESTALK to complete updates for prior moves, and while a find is in progress.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116243956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Asymptotic Connectivity in Wireless Networks Using Directional Antennas 使用定向天线的无线网络的渐近连通性
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.85
Pan Li, Chi Zhang, Yuguang Fang
{"title":"Asymptotic Connectivity in Wireless Networks Using Directional Antennas","authors":"Pan Li, Chi Zhang, Yuguang Fang","doi":"10.1109/ICDCS.2007.85","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.85","url":null,"abstract":"Connectivity is a crucial issue in wireless networks. Gupta and Kumar show that with omnidirectional antennas, the critical transmission range for a wireless network to achieve asymptotic connectivity is O(radiclog n/n) if n nodes are uniformly and independently distributed in a disk of unit area. In this paper, we investigate the connectivity problem when directional antennas are used. We find that there also exists a critical transmission range, which corresponds to a critical transmission power. We show that in the same propagation environment, when directional antennas use the optimal antenna pattern, the critical transmission power could be much smaller than that in networks using omnidirectional antennas. Moreover, to achieve asymptotic connectivity, it is known that each node has to have O(log n) neighbors when using omnidirectional antennas. We show that even using the transmission power level at which each node has only O(1) neighbors when using omnidirectional antennas, we can still achieve the asymptotic connectivity with directional antennas.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Characterizing Network Traffic in a Cluster-based, Multi-tier Data Center 在基于集群的多层数据中心中描述网络流量
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.90
D. Ersoz, Mazin S. Yousif, C. Das
{"title":"Characterizing Network Traffic in a Cluster-based, Multi-tier Data Center","authors":"D. Ersoz, Mazin S. Yousif, C. Das","doi":"10.1109/ICDCS.2007.90","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.90","url":null,"abstract":"With the increasing use of various Web-based services, design of high performance, scalable and dependable data centers has become a critical issue. Recent studies show that a clustered, multi-tier architecture is a cost-effective approach to design such servers. Since these servers are highly distributed and complex, understanding the workloads driving them is crucial for the success of the ongoing research to improve them. In view of this, there has been a significant amount of work to characterize the workloads of Web-based services. However, all of the previous studies focus on a high level view of these servers, and analyze request-based or session-based characteristics of the workloads. In this paper, we focus on the characteristics of the network behavior within a clustered, multi-tiered data center. Using a real implementation of a clustered three-tier data center, we analyze the arrival rate and inter-arrival time distribution of the requests to individual server nodes, the network traffic between tiers, and the average size of messages exchanged between tiers. The main results of this study are; (1) in most cases, the request inter-arrival rates follow log-normal distribution, and self-similarity exists when the data center is heavily loaded, (2) message sizes can be modeled by the log-normal distribution, and (3) service times fit reasonably well with the Pareto distribution and show heavy tailed behavior at heavy loads.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Optimizing Peer Relationships in a Super-Peer Network 超级对等网络中对等关系的优化
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.126
P. Garbacki, D. Epema, M. Steen
{"title":"Optimizing Peer Relationships in a Super-Peer Network","authors":"P. Garbacki, D. Epema, M. Steen","doi":"10.1109/ICDCS.2007.126","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.126","url":null,"abstract":"Super-peer architectures exploit the heterogeneity of nodes in a P2P network by assigning additional responsibilities to higher-capacity nodes. In the design of a super-peer network for file sharing, several issues have to be addressed: how client peers are related to super-peers, how super-peers locate files, how the load is balanced among the super-peers, and how the system deals with node failures. In this paper we introduce a self-organizing super-peer network architecture (SOSPNET) that solves these issues in a fully decentralized manner. SOSPNET maintains a super-peer network topology that reflects the semantic similarity of peers sharing content interests. Super-peers maintain semantic caches of pointers to files which are requested by peers with similar interests. Client peers, on the other hand, dynamically select super-peers offering the best search performance. We show how this simple approach can be employed not only to optimize searching, but also to solve generally difficult problems encountered in P2P architectures such as load balancing and fault tolerance. We evaluate SOSPNET using a model of the semantic structure derived from the 8-month traces of two large file-sharing communities. The obtained results indicate that SOSPNET achieves close-to-optimal file search performance, quickly adjusts to changes in the environment (node joins and leaves), survives even catastrophic node failures, and efficiently distributes the system load taking into account peer capacities.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126259006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Magellan: Charting Large-Scale Peer-to-Peer Live Streaming Topologies 麦哲伦:绘制大规模点对点直播拓扑
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.118
Chuan Wu, Baochun Li, Shuqiao Zhao
{"title":"Magellan: Charting Large-Scale Peer-to-Peer Live Streaming Topologies","authors":"Chuan Wu, Baochun Li, Shuqiao Zhao","doi":"10.1109/ICDCS.2007.118","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.118","url":null,"abstract":"Live peer-to-peer (P2P) streaming applications have been successfully deployed in the Internet. With relatively simple peer selection protocol design, modern live P2P streaming applications are able to provide millions of concurrent users adequately satisfying viewing experiences. That said, few existing research has provided sufficient insights on the time-varying internal characteristics of P2P topologies in live streaming. With 120 GB worth of traces in late 2006 from a commercial P2P live streaming system of UUSee Inc. in Beijing, this paper represents the first attempt in the research community to explore topological properties in practical P2P streaming, and how they behave over time. Starting from classical graph metrics, such as degree, clustering coefficient, and reciprocity, we explore and extend them in specific perspectives of streaming applications. We also compare our findings with existing insights from topological studies of P2P file sharing applications, which shed new and unique insights specific to streaming. Our characterization reveals the scalability of the commercial P2P streaming application even in case of large flash crowds, the clustering phenomenon of peers in each ISP, as well as the reciprocal behavior among peers, all of which play important roles in achieving its current success.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Combating Double-Spending Using Cooperative P2P Systems 利用协作式P2P系统打击双重消费
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.91
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim
{"title":"Combating Double-Spending Using Cooperative P2P Systems","authors":"Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim","doi":"10.1109/ICDCS.2007.91","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.91","url":null,"abstract":"An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that the broker cannot link spent coins to the user who withdraws them. A variety of schemes with various security properties have been proposed for this purpose, but because strings of bits are inherently copyable, they must all deal with the problem of double-spending. In this paper, we present an electronic cash scheme that introduces a new peer-to-peer system architecture to prevent double-spending without requiring an on-line trusted party or tamper-resistant software or hardware. The scheme is easy to implement, computationally efficient, and provably secure. To demonstrate this, we report on a proof-of-concept implementation for Internet vendors along with a detailed complexity analysis and selected security proofs.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol BitTorrent协议建模与分析的多阶段方法
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.81
Vivek Rai, S. Sivasubramanian, S. Bhulai, P. Garbacki, M. Steen
{"title":"A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol","authors":"Vivek Rai, S. Sivasubramanian, S. Bhulai, P. Garbacki, M. Steen","doi":"10.1109/ICDCS.2007.81","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.81","url":null,"abstract":"BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical model of the protocol. Our work differs from previous works as it models the BitTorrent protocol specifically and not as a general file-swarming protocol. In our study, we observe that to accurately model the download process of a BitTorrent client, we need to split this process into three phases. We validate our model using simulations and real-world traces. Using this model, we study the efficiency of the protocol based on various protocol-specific parameters such as the maximum number of connections and the peer set size. Furthermore, we study the relationship between changes in the system parameters and the stability of the protocol. Our model suggests that the stability of BitTorrent protocol depends heavily on the number of pieces a file is divided into and the arrival rate of clients to the network.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133997691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Conflict Managers for Self-stabilization without Fairness Assumption 无公平假设的自稳定冲突管理
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.95
M. Potop-Butucaru, S. Tixeuil
{"title":"Conflict Managers for Self-stabilization without Fairness Assumption","authors":"M. Potop-Butucaru, S. Tixeuil","doi":"10.1109/ICDCS.2007.95","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.95","url":null,"abstract":"In this paper, we specify the conflict manager abstraction. Informally, a conflict manager guarantees that any two nodes that are in conflict cannot enter their critical section simultaneously (safety), and that at least one node is able to execute its critical section (progress). The conflict manager problem is strictly weaker than the classical local mutual exclusion problem, where any node that requests to enter its critical section eventually does so (fairness). We argue that conflict managers are a useful mechanism to transform a large class of self-stabilizing algorithms that operate in an essentially sequential model, into self-stabilizing algorithm that operate in a completely asynchronous distributed model. We provide two implementations (one deterministic and one probabilistic) of our abstraction, and provide a composition mechanism to obtain a generic transformer. Our transformers have low overhead: the deterministic transformer requires one memory bit, and guarantees time overhead in order of the network degree, the probabilistic transformer does not require extra memory. While the probabilistic algorithm performs in anonymous networks, it only provides probabilistic stabilization guarantees. In contrast, the deterministic transformer requires initial symmetry breaking but preserves the original algorithm guarantees.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132290019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
LagOver: Latency Gradated Overlays LagOver:延迟渐变叠加
27th International Conference on Distributed Computing Systems (ICDCS '07) Pub Date : 2007-06-25 DOI: 10.1109/ICDCS.2007.116
Anwitaman Datta, I. Stoica, M. Franklin
{"title":"LagOver: Latency Gradated Overlays","authors":"Anwitaman Datta, I. Stoica, M. Franklin","doi":"10.1109/ICDCS.2007.116","DOIUrl":"https://doi.org/10.1109/ICDCS.2007.116","url":null,"abstract":"We propose a new genre of overlay network for disseminating information from popular but resource constrained sources. We call this communication primitive as latency gradated overlay, where information consumers self- organize themselves according to their individual resource constraints and the latency they are willing to tolerate in receiving the information from the source. Such a communication primitive finds immediate use in applications like RSS feeds aggregation. We propose heuristic algorithms to construct LagOver based on preferably some partial knowledge of the network at users (no knowledge slows the construction process) but no global coordination. The algorithms are evaluated based on simulations and show good characteristics including convergence, satisfying peers' latency and bandwidth constraints even in presence of moderately high membership dynamics. There are two points worth noting. First, optimizing jointly for latency and capacity (i.e., placing nodes that have free capacity close to the source) as long as latency constraint of other nodes are not violated performs better than optimizing for latency only. The joint optimization strategy has faster convergence of the LagOver network, and can deal with adversarial workloads that optimization of only latency can not deal with. Secondly, somewhat counter-intuitively, in order to do the aforementioned joint optimization, it is sufficient to find random nodes based on only the latency constraint, since even if the capacity of individual nodes is saturated it does not matter since the LagOver network can potentially be reconfigured.","PeriodicalId":170317,"journal":{"name":"27th International Conference on Distributed Computing Systems (ICDCS '07)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114526007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信