{"title":"Multi-objective Optimization Approaches Using a CE-ACO Inspired Strategy to Improve Grid Jobs Scheduling","authors":"Y. Hu, Bin Gong","doi":"10.1109/ChinaGrid.2009.40","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.40","url":null,"abstract":"Grid scheduling is one of the most crucial issue in a grid environment because it strongly affects the performance of the whole system. Taking into account that the issue of allocating jobs on resources is a combinatorial optimization problem, a NP-complete problem, several heuristics have been proposed to provide good performance. In this paper, the proposed approach considers a stochastic optimization called the cross entropy method. The CE method is used to tackle efficiently the initialization sensitiveness problem associated with ant colony algorithm for multi-objective scheduling, which accelerates the convergence rate and improves the ability of searching an optimum solution. Simulation shows that it performs better than the ACO in the integrated performances.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121939089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To Improve Throughput via Multi-pathing and Parallel TCP on Each Path","authors":"Jinyu Zhang, Yongzhe Gui, Cheng Liu, Xiaoming Li","doi":"10.1109/ChinaGrid.2009.32","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.32","url":null,"abstract":"Parallel TCP, which opens multiple TCP connections over a single direct path, and Multi-Pathing, which concurrently uses multiple disjointed paths to transfer data, have both been proved to be effective methods to improve end-to-end throughput. How much throughput can we ultimately achieve between a source and a destination if we use multiple overlay paths and open multiple TCP connections on each used path? In order to find all possible overlay paths of good quality between a source and a destination, a path probing process similar to the path discovery protocol of IEEE 802.5 is started by the destination. A probing packet(a TCP connection request followed by padding data) is flooded across an overlay between the destination and the source. Intermediate overlay nodes selectively accept and forward probing packets. If a probing pack is accepted, a corresponding TCP connection is created. Trade-offs then are made between reducing the probing traffic and keeping multiple TCP connections on each path. The source strips data into small packets and adaptively assigns them to selected overlay paths according to the changing quality of each path. This proposed data transfer technology is evaluated within an overlay that consists of 15 servers on the Internet in China, across 3 different autonomous systems. Experiments show that with this technology, 54% of the measured samples yield a throughput larger than 60Mb/s, which is 60% of the bandwidth that could be possibly obtained(the access bandwidth is 100Mb/s for all servers). Comparing with direct path and Parallel TCP, only less than 1% and 25% of the measured samples reach the same level of throughput respectively.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Heuristic Method for Web-Service Program Security Testing","authors":"Gang Zhao, Weimin Zheng, Jinjing Zhao, Hua Chen","doi":"10.1109/ChinaGrid.2009.10","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.10","url":null,"abstract":"The security of the web-service program is a very significant facet in the grid computing environment. A fuzzer is a program that attempts to discover security vulnerabilities by sending random input to an application. How to efficiently reduce the fuzzing data scale with the assurance of high fuzzing veracity and vulnerability coverage is a very important issue for its effective practice. In this paper, aimed at the web-service program, a new heuristic method for fuzzing data generation named as H-Fuzzing is be presented, which has high program executing path coverage with the information from the static analysis and dynamic property of the program. The main thought of H-Fuzzing is collecting the information of the key branch predications and building its relations with the input variables in order to supervise the dimension reducing of the fuzzing data aggregation.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133153561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biao Fan, Guangqiang Liu, Tao Liu, H. Hu, Xiaoyong Du
{"title":"KeyOnto: A Hybrid Knowledge Retrieval Model in Law Semantic Web","authors":"Biao Fan, Guangqiang Liu, Tao Liu, H. Hu, Xiaoyong Du","doi":"10.1109/ChinaGrid.2009.19","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.19","url":null,"abstract":"This paper proposes a hybrid knowledge retrieval model KeyOnto, which combines ontology based knowledge retrieval model with traditional Vector Space Model (VSM). KeyOnto model makes use of domain ontology to organize and structure knowledge resources. Documents and queries are represented by concepts and term vectors respectively. Furthermore, ontology based query expansion called K2CM, is introduced to get expanded concepts of a query. Domain specific terms are used to form a term vector for queries and documents. Basing on these vectors, we can evaluate term similarity and concept similarity respectively, and integrate them together. Domain specific thesaurus is used to assist knowledge retrieval. Experiments show that compared with each single model, KeyOnto model improves precision of query result.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Double Redundant Fault-Tolerance Service Routing Model in ESB","authors":"Bin Wu, Shijun Liu, Wei Cui","doi":"10.1109/ChinaGrid.2009.22","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.22","url":null,"abstract":"With the development of the Service Oriented Architecture (SOA), the Enterprise Service Bus (ESB) is becoming more and more important in the management of mass services. The main function of it is service routing which focuses on delivery of message among different services. At present, some routing patterns have been implemented to finish the messaging, but they are all static configuration service routing. Once one service fails in its operation, the whole service system will not be able to detect such fault, so the whole business function will also fail finally. In order to solve this problem, we present a double redundant fault tolerant service routing model. This model has its own double redundant fault tolerant mechanism and algorithm to guarantee that if the original service fails, another replica service that has the same function will return the response message instead automatically. The service requester will receive the response message transparently without taking care where it comes from. Besides, the state of failed service will be recorded for service management. At the end of this article, we evaluated the performance of double redundant fault tolerant service routing model. Our analysis shows that, by importing double redundant fault tolerance, we can improve the fault-tolerant capability of the services routing apparently. It will solve the limitation of existent static service routing and ensure the reliability of messaging in SOA.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134453500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Virtual Machines on System Security","authors":"Siqin Zhao, Kang Chen, Weimin Zheng","doi":"10.1109/ChinaGrid.2009.45","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.45","url":null,"abstract":"It is very important to protect critical resources such as private data and code in computer systems. It is promising to protect private data and to improve the system security by leveraging the isolation attribute of virtual machine(VM). The isolation attribute of VM is provided by Virtual Machine Monitor (VMM) that runs in higher priority than guest OSes. If the critical components are isolated in VMs,access control can be enforced or attestation can be made when the subject is accessing via VMs. In this way, VMs can improve the security level of critical components such as OS, kernel, data, and applications. For computer system security, VMs can be used to detect malware intrusions and to protect critical components, which can be implemented by integrating detection or protection mechanism in either VMM or VMs. Authentication is required to create trustful VMs. This paper surveys technologies related of using virtual machines to enhance system security.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongbo Tian, Xiaoshe Dong, Siyuan Ma, Bingyi Li, Feifei Liu
{"title":"GridDEV: A Platform for Service Grid Evaluation","authors":"Hongbo Tian, Xiaoshe Dong, Siyuan Ma, Bingyi Li, Feifei Liu","doi":"10.1109/ChinaGrid.2009.37","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.37","url":null,"abstract":"GridDEV is a DEVS-based platform for evaluation of service grid. Through the analysis of SOA, we characterize important features of service grid and select four components as the base of grid modeling. With DSDEVS, this paper models the basic components selected, as well as the relationships between them. As a result, the model fully formalizes the gird system;hence facilitates the design and optimization of grid services. Based on this model, we map the DEVS component into elements of simulator development library SimGrid, and construct the platform GridDEV for grid performance and reliability evaluation.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"601 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131775129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tiezhu Zhao, Yi-Hang Ding, Verdi March, Shoubin Dong, S. See
{"title":"Research on the Performance of xVM Virtual Machine Based on HPCC","authors":"Tiezhu Zhao, Yi-Hang Ding, Verdi March, Shoubin Dong, S. See","doi":"10.1109/ChinaGrid.2009.36","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.36","url":null,"abstract":"The virtual machine (VM) technology has received an increasing interest a spotlight both in the industry and the research communities. Although the potential advantages of virtualization in HPC workloads have been documented, the potential impact to application performance in HPC environments is not clearly understood. This paper presents a study on performance evaluation of virtual HPC systems using High Performance Computing Challenge (HPCC) benchmark suite and xVM as the workload representative and VM technology, respectively. Based on the extended AHP (Analytic Hierarchy Process) method, we propose an efficient performance evaluation model based on extended AHP and analyze the results and quantify the performance overhead of xVM in terms of compute, memory, and network overhead. Our analysis shows that the computational and network performance in HVM is slightly better and the memory performance is significantly better compared to paravirtualization.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RAS-M: Resource Allocation Strategy Based on Market Mechanism in Cloud Computing","authors":"Xindong You, Xianghua Xu, Jian Wan, Dong-Jin Yu","doi":"10.1109/ChinaGrid.2009.41","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.41","url":null,"abstract":"Resource management is one of the main issues in Cloud Computing. In order to improve resource utilization of large Data Centers while delivering services with higher QoS to Cloud Clients, a resource allocation strategy based on market (RAS-M) is proposed. Firstly, the architecture and the market model of RAS-M are constructed, in which a QoS-refection utility function is designed according to different resource requirements of the Cloud Client, the equilibrium state of RAS-M is defined and the proof of its optimality is given. Secondly, GA-based price adjusted algorithm is introduced to deal with the problem of achieving the equilibrium state of RAS-M. Finally, RAS-M is implemented upon Xen to reallocate the VM’s weight. Experiments results obtained by setting different parameters show that RAS-M can achieve the equilibrium state approximately, that is, demand and supply is balanced nearly, which validates RAS-M is effective and practicable, and is capable of achieving its goal.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}