2009 17th International Workshop on Quality of Service最新文献

筛选
英文 中文
Cooperative multicast scheduling with random network coding in WiMAX WiMAX随机网络编码下的协同组播调度
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201384
Jin Jin, Baochun Li
{"title":"Cooperative multicast scheduling with random network coding in WiMAX","authors":"Jin Jin, Baochun Li","doi":"10.1109/IWQoS.2009.5201384","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201384","url":null,"abstract":"The Multicast and Broadcast Service (MBS) in WiMAX has emerged as the next-generation wireless infrastructure to broadcast data or digital video. Multicast scheduling protocols play a critical role in achieving efficient multicast transmissions in MBS. However, the current state-of-the-art protocols, based on the shared-channel single-hop transmission model, do not exploit any potential advantages provided by the channel and cooperative diversity in multicast sessions, even while WiMAX OFDMA provides such convenience. The inefficient multicast transmission leads to the under-utilization of scarce wireless bandwidth. In this paper, we revisit the multicast scheduling problem, but with a new perspective in the specific case of MBS in WiMAX, considering the use of multiple ODFMA channels, multiple hops, and multiple paths simultaneously. Participating users in the multicast session are dynamically enabled as relays and concurrently communicate with others to supply more data. During the transmission, random network coding is adopted, which helps to significantly reduce the overhead. We design practical scheduling protocols by jointly studying the problems of channel and power allocation on relays, which are very critical for efficient cooperative communication. Protocols that are theoretically and practically feasible are provided to optimize multicast rates and to efficiently allocate resources in the network. Finally, with simulation studies, we evaluate our proposed protocols to highlight the effectiveness of cooperative communication and random network coding in multicast scheduling with respect to improving performance.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131510562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Ensuring data storage security in Cloud Computing 确保云计算环境下的数据存储安全
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201385
Rampal Singh, Sawan Kumar, Shani Kumar Agrahari
{"title":"Ensuring data storage security in Cloud Computing","authors":"Rampal Singh, Sawan Kumar, Shani Kumar Agrahari","doi":"10.1109/IWQoS.2009.5201385","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201385","url":null,"abstract":"Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1114
Reliable navigation of mobile sensors in wireless sensor networks without localization service 无定位服务无线传感器网络中移动传感器的可靠导航
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201398
Qingjun Xiao, Bin Xiao, Jiaqing Luo, Guobin Liu
{"title":"Reliable navigation of mobile sensors in wireless sensor networks without localization service","authors":"Qingjun Xiao, Bin Xiao, Jiaqing Luo, Guobin Liu","doi":"10.1109/IWQoS.2009.5201398","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201398","url":null,"abstract":"This paper deals with the problem of guiding mobile sensors (or robots) to a phenomenon across a region covered by static sensors. We present a distributed, reliable and energy-efficient algorithm to construct a smoothed moving trajectory for a mobile robot. The reliable trajectory is realized by first constructing among static sensors a distributed hop count based artificial potential field (DH-APF) with only one local minimum near the phenomenon, and then navigating the robot to that minimum by an attractive force following the reversed gradient of the constructed field. Besides the attractive force towards the phenomenon, our algorithm adopts an additional repulsive force to push the robot away from obstacles, exploiting the fast sensing devices carried by the robot. Compared with previous navigation algorithms that guide the robot along a planned path, our algorithm can (1) tolerate the potential deviation from a planned path, since the DH-APF covers the entire deployment region; (2) mitigate the trajectory oscillation problem; (3) avoid the potential collision with obstacles; (4) save the precious energy of static sensors by configuring a large moving step size, which is not possible for algorithms neglecting the issue of navigation reliability. Our theoretical analysis of the above features considers practical sensor network issues including radio irregularity, packet loss and radio conflict. We implement the proposed algorithm over TinyOS and test its performance on the simulation platform with a high fidelity provided by TOSSIM and Tython. Simulation results verify the reliability and energy efficiency of the proposed mobile sensor navigation algorithm.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115042885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient server provisioning with end-to-end delay guarantee on multi-tier clusters 高效的服务器配置,在多层集群上提供端到端延迟保证
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201420
P. Lama, Xiaobo Zhou
{"title":"Efficient server provisioning with end-to-end delay guarantee on multi-tier clusters","authors":"P. Lama, Xiaobo Zhou","doi":"10.1109/IWQoS.2009.5201420","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201420","url":null,"abstract":"Dynamic server provisioning is critical to quality-of-service assurance for multi-tier Internet applications. In this paper, we address three important and challenging problems. First, we propose an efficient server provisioning approach on multi-tier clusters based on an end-to-end resource allocation optimization model. It is to minimize the number of servers allocated to the system while the average end-to-end delay guarantee is satisfied. Second, we design a model-independent fuzzy controller for bounding an important performance metric, the 90th-percentile delay of requests flowing through the multi-tier architecture. Third, to compensate for the latency due to the dynamic addition of servers, we design a self-tuning component that adaptively adjusts the output scaling factor of the fuzzy controller according to the transient behavior of the end-to-end delay. Extensive simulation results, using one representative customer behavior model in a typical three-tier web cluster, demonstrate that the provisioning approach is able to significantly reduce the server utilization compared to an existing representative approach. The approach integrated with the model-independent self-tuning fuzzy controller can efficiently assure the average and the 90th-percentile end-to-end delay guarantees on multi-tier server clusters.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134516331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Uncovering global icebergs in distributed monitors 在分布式监视器中发现全球冰山
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201394
Guanyao Huang, Ashwin Lall, C. Chuah, Jun Xu
{"title":"Uncovering global icebergs in distributed monitors","authors":"Guanyao Huang, Ashwin Lall, C. Chuah, Jun Xu","doi":"10.1109/IWQoS.2009.5201394","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201394","url":null,"abstract":"Security is becoming an increasingly important QoS parameter for which network providers should provision. We focus on monitoring and detecting one type of network event, which is important for a number of security applications such as DDoS attack mitigation and worm detection, called distributed global icebergs. While previous work has concentrated on measuring local heavy-hitters using “sketches” in the non-distributed streaming case or icebergs in the non-streaming distributed case, we focus on measuring icebergs from distributed streams. Since an iceberg may be “hidden” by being distributed across many different streams, we combine a sampling component with local sketches to catch such cases. We provide a taxonomy of the existing sketches and perform a thorough study of the strengths and weaknesses of each of them, as well as the interactions between the different components, using both real and synthetic Internet trace data. Our combination of sketching and sampling is simple yet efficient in detecting global icebergs.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Congestion location detection: Methodology, algorithm, and performance 拥塞位置检测:方法论、算法和性能
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201404
Shao Liu, M. Chiang, M. Jourdain, Jin Li
{"title":"Congestion location detection: Methodology, algorithm, and performance","authors":"Shao Liu, M. Chiang, M. Jourdain, Jin Li","doi":"10.1109/IWQoS.2009.5201404","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201404","url":null,"abstract":"We address the following question in this study: Can a network application detect not only the occurrence, but also the location of congestion? Answering this question will not only help the diagnostic of network failure and monitor server's QoS, but also help developers to engineer transport protocols with more desirable congestion avoidance behavior. The paper answers this question through new analytic results on the two underlying technical difficulties: 1) synchronization effects of loss and delay in TCP, and 2) distributed hypothesis testing using only local loss and delay data. We present a practical Congestion Location Detection (CLD) algorithm that effectively allows an end host to distributively detect whether congestion happens in the local access link or in more remote links. We validate the effectiveness of CLD algorithm with extensive experiments.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133996237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Generalized distributed rate limiting 广义分布速率限制
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201389
R. Stanojevic, R. Shorten
{"title":"Generalized distributed rate limiting","authors":"R. Stanojevic, R. Shorten","doi":"10.1109/IWQoS.2009.5201389","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201389","url":null,"abstract":"The Distributed Rate Limiting (DRL) paradigm is a recently proposed mechanism for decentralized control of cloud-based services. DRL is a simple and efficient approach to resolve the issues of pricing and resource control/engineering of cloud based services. The existing DRL schemes focus on very specific performance metrics (such as loss rate and fair-share) and their design heavily depends on the assumption that the traffic is generated by elastic TCP sources. In this paper we tackle the DRL problem for general workloads and performance metrics and propose an analytic framework for the design of stable DRL algorithms. The closed-form nature of our results allows simple design rules which, together with extremely low communication overhead, makes the presented algorithms practical and easy to deploy with guaranteed convergence properties under a wide range of possible scenarios.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On generalized low-rate denial-of-quality attack against Internet services 针对互联网服务的广义低速率拒绝质量攻击
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201419
Yajuan Tang, Xiapu Luo, Qing Hui, R. Chang
{"title":"On generalized low-rate denial-of-quality attack against Internet services","authors":"Yajuan Tang, Xiapu Luo, Qing Hui, R. Chang","doi":"10.1109/IWQoS.2009.5201419","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201419","url":null,"abstract":"Low-rate Denial of Quality (DoQ) attacks, by sending intermittent bursts of requests, can severely degrade the quality of Internet services and evade detection. In this paper, we generalize the previous results by considering arbitrary attack intervals. We obtain two sets of new results for a web server with feedback-based admission control. First, we model the web server under the attack as a switched system. By proving the Lyapunov and Lagrange stability of the system, we show that the admission rate can always be throttled to a bounded low value. Second, we investigate the worst impacts of a DoQ attack by optimizing a utility function for the attacks. As a result, we obtain for the first time optimal attack patterns for both periodic and aperiodic attacks. Extensive simulation results also agree with the analytical results.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124952588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
HOBRP: A hardware optimized packet scheduler that provides tunable end-to-end delay bound HOBRP:硬件优化的包调度程序,提供可调的端到端延迟绑定
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201397
Ruisheng Wang, Youjian Zhao, Hong-Tao Guan, Guanghui Yang
{"title":"HOBRP: A hardware optimized packet scheduler that provides tunable end-to-end delay bound","authors":"Ruisheng Wang, Youjian Zhao, Hong-Tao Guan, Guanghui Yang","doi":"10.1109/IWQoS.2009.5201397","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201397","url":null,"abstract":"A packet scheduler is a primary component of the improved Quality of Service (QoS) model for today's Internet. Although many fair packet schedulers have been proposed through theoretical consideration, practical high-speed packet schedulers remain elementary. The disparity arises because existent schedulers either lack of necessary QoS guarantee or have an unacceptable cost of computation and storage. In this paper, we propose a simple and efficient packet scheduler called Hardware Optimized Bit Reversal Permutation (HOBRP) based scheduler. Besides some common merits including low time- and space-complexity, bounded end-to-end delay guarantee and constant fairness index that many well-known schedulers have already owned, our HOBRP still possesses two additional features: One is that the end-to-end delay bound of HOBRP is tunable, which makes itself flexible enough to provide different levels of delay bounds for diverse types of application flows. The other is that all the operations and structures used by HOBRP are very simple and easy to be pipelined and paralleled, which benefits an intuitive high-speed hardware design scheme.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HiDRA: Statistical multi-dimensional resource discovery for large-scale systems 大规模系统的统计多维资源发现
2009 17th International Workshop on Quality of Service Pub Date : 2009-07-13 DOI: 10.1109/IWQoS.2009.5201408
Michael Cardosa, A. Chandra
{"title":"HiDRA: Statistical multi-dimensional resource discovery for large-scale systems","authors":"Michael Cardosa, A. Chandra","doi":"10.1109/IWQoS.2009.5201408","DOIUrl":"https://doi.org/10.1109/IWQoS.2009.5201408","url":null,"abstract":"Resource discovery enables applications deployed in heterogeneous large-scale distributed systems to find resources that meet QoS requirements. In particular, most applications need resource requirements to be satisfied simultaneously for multiple resources (such as CPU, memory and network bandwidth). Due to dynamism in many large-scale systems, providing statistical guarantees on such requirements is important to avoid application failures and overheads. However, existing techniques either provide guarantees only for individual resources, or take a static or memoryless approach along multiple dimensions. We present HiDRA, a scalable resource discovery technique providing statistical guarantees for resource requirements spanning multiple dimensions simultaneously. Through trace analysis and a 307-node PlanetLab implementation, we show that HiDRA, while using over 1,400 times less data, performs nearly as well as a fully-informed algorithm, showing better precision and having recall within 3%. We demonstrate that HiDRA is a feasible, low-overhead approach to statistical resource discovery in a distributed system.","PeriodicalId":231103,"journal":{"name":"2009 17th International Workshop on Quality of Service","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信