{"title":"From Spatial Reuse to Transmission Power Control for CSMA/CA Based Wireless Ad Hoc Networks","authors":"H. Luo, E. Wu, Gen-Huey Chen","doi":"10.1109/ICPPW.2011.12","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.12","url":null,"abstract":"In this paper, we introduce the concept of ceased areas for enhancing the spatial reuse in CSMA/CA based wireless ad hoc networks. Intuitively, a ceased area is created by a transmitter-receiver pair where all other nodes are required to keep silent. The size of a ceased area depends on the transmission power and the transmitter-receiver distance. A new transmission power control (TPC) scheme that can minimize the induced ceased area is proposed. And it is superior to previous TPC schemes in throughput.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joshua Ladd, Manjunath Gorentla Venkata, R. Graham, Pavel Shamis
{"title":"Analyzing the Effects of Multicore Architectures and On-Host Communication Characteristics on Collective Communications","authors":"Joshua Ladd, Manjunath Gorentla Venkata, R. Graham, Pavel Shamis","doi":"10.1109/ICPPW.2011.15","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.15","url":null,"abstract":"Shared memory optimizations for blocking collective communications implemented for multi-core, and distributed systems have previously shown to improve the performance of these operations. Such previous studies have tended to neglect the architecture of multi-core node and shared-memory communication characteristics. In this paper, we examine in detail the impact of on-node memory and cache hierarchy, and the optimization opportunities these provide, on the performance of the barrier and broadcast collective operations. The primary contribution of this paper is the demonstration of how exploiting the local memory-hierarchy impacts the performance of these operations in the distributed system context. Our results show that factors such as the location of communicating process in the node, number of communication processes, amount of shared-memory communication, and the amount of inter-socket (Central Processing Unit (CPU) socket) communication affect latency-sensitive and bandwidth-sensitive collective operations. The effect of these parameters varies on the type of operations, and are coupled to the architecture of the shared-memory node and the scale of collective operation. We have seen that for 3,072 processes on Jaguar, and considering the socket layout in collective communication algorithm improves the large-data MPI Bcast () performance by 50% and MPI Barrier by 40% when compared to neglecting this architectural feature. For 512 processes job on Smoky, the corresponding improvement is 38%, and an order of magnitude, respectively. Small data broadcast performance is not noticeably impacted on Jaguar, when considering the shared-memory hierarchy, and on Smoky the corresponding performance improvement is 3%.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interval Based I/O: A New Approach to Providing High Performance Parallel I/O","authors":"Jeremy S. Logan, P. Dickens","doi":"10.1109/ICPPW.2011.45","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.45","url":null,"abstract":"Providing scalable, high-performance parallel I/O for data-intensive computations is beset by a number of difficult challenges. The most often cited difficulties include the non-contiguous I/O patterns prominent in scientific codes, the lack of support for parallel I/O optimizations in POSIX, the high cost of providing strict file consistency semantics, and the cost of accessing storage devices over a network. We believe, however, that a more fundamental problem is the legacy view of a file as a linear sequence of bytes. To address this issue, we are developing a new approach to parallel I/O that is based on what we term intervals and interval files. This paper provides an overview of the interval-IO system and a set of benchmarks demonstrating the power of this new approach.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Power Efficiency of GPUs in Multi Nodes Environment with Molecular Dynamics","authors":"T. Udagawa, M. Sekijima","doi":"10.1109/ICPPW.2011.43","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.43","url":null,"abstract":"Energy efficient systems are highly demanded as the power consumption in HPC region increase. The use of GPUs has attracted attention as a possible solution to these problems because of their parallel performance and power efficiency. However, it is uncertain how much improvement can be obtained by applying GPUs to applications. In this study, we developed a molecular dynamics simulation program for CPU parallel and GPU parallel, and executed it on our computer cluster. Then we compared the performance of CPUs and GPUs. We obtained the result that the GPUs were about 10 times faster and 5 times more power efficient than the CPUs.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks","authors":"Hung-Min Sun, Chiung-Hsun Chen, Po-Chi Li","doi":"10.1109/ICPPW.2011.24","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.24","url":null,"abstract":"Data aggregation is a widely used technique in wireless sensor networks. There has been many related work proposed to address the data aggregation. However less of them pay attention to the property of data integrity. An attacker can simply forge data to affect the decision of base station by compromised nodes. We, therefore, propose a lightweight secure data aggregation protocol to find the compromised nodes and help the base station to verify the final results. Finally, we provide detailed security analyses to verify security of our scheme.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126952315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Generic Scheme for Secure Data Sharing in Cloud","authors":"Yanjiang Yang, Youcheng Zhang","doi":"10.1109/ICPPW.2011.51","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.51","url":null,"abstract":"Working in various service models ranging from SaaS, PaaS, to IaaS, cloud computing is a new revolution in IT, and could reshape the business model of how the IT industry works today. Storage services are a fundamental component of the cloud computing paradigm. By exploiting the storage services, users outsource their data to the cloud so as to enjoy the reduced upfront maintenance and capital costs. However, a security challenge associated with data outsourcing is how to prevent data abuses by the cloud. It has been commonly accepted that data encryption offers a good solution to this problem. With data encryption, an issue arises when the data owner who outsourced the data wants to revoke some data consumers' access privileges, which normally involves key re-distribution and data re-encryption. In this work, we propose a generic scheme to enable fine-grained data sharing over the cloud, which does not require key-redistribution and data re-encryption whatsoever. The main primitives we make use of are attribute-based/predicate encryption and proxy re-encryption, but our construction is not restricted to any specific scheme of its kind. Our scheme has a number of advantages over other similar proposals in the literature.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129649151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Tang, N. Desai, V. Vishwanath, Daniel Buettner, Z. Lan
{"title":"Job Coscheduling on Coupled High-End Computing Systems","authors":"Wei Tang, N. Desai, V. Vishwanath, Daniel Buettner, Z. Lan","doi":"10.1109/ICPPW.2011.59","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.59","url":null,"abstract":"Supercomputer centers often deploy large-scale computing systems together with an associated data analysis or visualization system. In this paper, we propose a co scheduling mechanism, providing the ability to coordinate execution between jobs on different systems. The mechanism is built on top of a lightweight protocol for coordination between policy domains without manual intervention. We have evaluated this system using real job traces from Intrepid and Eureka, the production Blue Gene/P and data analysis systems, respectively, deployed at Argonne National Laboratory. Our experimental results quantify the costs of co scheduling and demonstrate that co scheduling can be achieved with limited impact on system performance under varying workloads.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122980061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Multipath Planning for Neyman-Pearson Detection in Wireless Sensor Networks","authors":"Yung-Liang Lai, Jehn-Ruey Jiang","doi":"10.1109/ICPPW.2011.63","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.63","url":null,"abstract":"Target detection is one of the most important services in wireless sensor networks (WSNs) for making decisions about the presence of specified targets by collecting sensed data from geographically distributed wireless sensors nodes. In this paper, we consider designing target detection systems in WSNs on the basis of the Neyman-Pearson Detector (NPD), a statistical decision making method of which accuracy depends on the amount of data collected within a limited time period. We propose the Optimal Multipath Planning Algorithm (OMPA) based on the maximum flow minimum cost algorithm for WSNs to set up paths to reliably deliver as many as possible data packets from data sources to the sink node. OMPA is optimal in the sense that it sets up the maximum number of node-disjoint paths composed of the links with the minimized expected transmission time (ETT). We also evaluate OMPA¶V decision quality with the help of the Receiver Operating Characteristic (ROC) curves and compare OMPA with the Minimum Cost Path Planning Algorithm (MCPPA) in terms of the detection decision quality and the number of available paths at the presence of node failures.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded Network Intrusion Detection Systems with a Multi-core Aware Packet Capture Module","authors":"Chia-Hao Hsu, Sheng-de Wang","doi":"10.1109/ICPPW.2011.37","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.37","url":null,"abstract":"Network security has been a main concern in the Internet. To address this issue, network intrusion detection or prevention tools have become indispensable for system security. In this paper we first propose a multi-core aware packet capture module and integrated it with a network intrusion detection system (NIDS). We then analyze the performance of the NIDS under different packet capture libraries in high speed networks. The proposed multi-core aware packet capture module, called Flow Ring, can enhance the performance of NIDS to meet the speed requirements without packet loss. Together with the techniques for the configuration of an NIDS with respect to multi-core and IRQ affinity, the proposed approach can get the most effective performance.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125269588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Synchronized versus Self-Organized K-Coverage Configuration in WSNs","authors":"M. Wueng, P. Sahoo, I. Hwang","doi":"10.1109/ICPPW.2011.34","DOIUrl":"https://doi.org/10.1109/ICPPW.2011.34","url":null,"abstract":"The K-coverage configuration is widely exploited to monitor critical applications in wireless sensor networks. A major challenge here is how to maximize the system lifetime while preserving high-quality coverage. The existing sleep scheduling algorithms, classified into time-synchronized and self-organized approaches, either generate many redundant active sensors or incur high computation cost. In this paper, we propose KGS and DKEA algorithms to settle all essential problems of these two approaches respectively. KGS adopts an appropriate scheduling granularity to minimize the number of active sensors. DKEA efficiently determines whether a sensor should stay active by tracing only some decision areas. We further analyzed which approach maximizes the system lifetime of the K-coverage configuration. Experimental results show that, (i) KGS minimizes the average coverage degree among several popular time-synchronized algorithms, (ii) the computation cost of DKEA is only 11% of that of a well-known self-organized algorithm, and (iii) DKEA outperforms KGS in most cases.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}