2011 IEEE 10th International Symposium on Network Computing and Applications最新文献

筛选
英文 中文
Performance Evaluation of DCB's Priority-Based Flow Control 基于优先级的DCB流量控制性能评价
Mikkel Hagen, Ryan Zarick
{"title":"Performance Evaluation of DCB's Priority-Based Flow Control","authors":"Mikkel Hagen, Ryan Zarick","doi":"10.1109/NCA.2011.58","DOIUrl":"https://doi.org/10.1109/NCA.2011.58","url":null,"abstract":"Data Center Bridging (DCB) is a group of technologies defined within the IEEE to transform Ethernet into a lossless fabric. This paper uses data center network cards and switches to analyze the performance of Priority-based Flow Control, a DCB technology. The network hardware required to support this new technology is still new and not widely available. This paper is the first to experimentally show how Priority-based Flow Control performs well in simple systems but as the system becomes more complicated traffic streams within a priority show fate sharing characteristics. Notably, the throughput of different traffic streams converges to the lowest throughput among the streams. One of the most common applications used in data centers for interprocessor communication, MPI (Message Passing Interface), is analyzed. Finally, an iSCSI initiator and target are used to observe the throughput of iSCSI over a network with PFC. This paper shows the performance benefits of using PFC with TCP-based applications.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decentralized Topology Aggregation for QoS Estimation in Large Overlay Networks 基于分散拓扑聚合的大型覆盖网络QoS估计
S. Wieser, L. Böszörményi
{"title":"Decentralized Topology Aggregation for QoS Estimation in Large Overlay Networks","authors":"S. Wieser, L. Böszörményi","doi":"10.1109/NCA.2011.51","DOIUrl":"https://doi.org/10.1109/NCA.2011.51","url":null,"abstract":"This paper introduces a scalable approach for efficient, low-cost multi-level Quality of Service (QoS) estimation in large overlay networks (ON). We modify an existing distributed partitioning algorithm, and use it to create \"QoS maps\". QoS maps empower applications to quickly predict several QoS metrics for any given route, and to obtain multiple alternative routes to any target node in the ON. We show that our modifications of the partitioning algorithm permit the aggregation of large hubs, but still preserve the sub-linear runtime of the original heuristic. Simulations with large ONs are performed to evaluate the proposed approach and demonstrate its scalability. Finally, we outline our estimation algorithm that we use to predict QoS and perform QoS aware routing in any given ON.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129857658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Encoding for Generalized Reed Solomon Codes 广义Reed - Solomon码的高效编码
M. Shrestha, Lihao Xu
{"title":"Efficient Encoding for Generalized Reed Solomon Codes","authors":"M. Shrestha, Lihao Xu","doi":"10.1109/NCA.2011.52","DOIUrl":"https://doi.org/10.1109/NCA.2011.52","url":null,"abstract":"Generalized Reed Solomon (GRS) codes are widely used for reliability applications in computer systems like data storage and communications and thus, efficiency in encoding and decoding of GRS codes is very important for system performance. Though GRS codes provide enormous flexibility, they are computationally expensive since calculations happen in Galois fields. In this paper, we present an algorithm to reduce the number of field multiplications in the encoding process of the GRS codes by selecting good values of $bm{alpha}$ and $bm{w}$, the parameters of a GRS code. These values are usually set to some default value but by finding good values for these parameters using our algorithm we present here, we can impose a structure on the encoding matrix which enables significant reduction in the number of multiplications to enable efficient encoding. Our method provides from 25% to over 90% reduction in the number of multiplications depending on the code attributes.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Validation of Security Solutions for Communication Networks: A Policy-Based Approach 通信网络安全解决方案的验证:基于策略的方法
S. Rekhis, Baha Bennour, N. Boudriga
{"title":"Validation of Security Solutions for Communication Networks: A Policy-Based Approach","authors":"S. Rekhis, Baha Bennour, N. Boudriga","doi":"10.1109/NCA.2011.23","DOIUrl":"https://doi.org/10.1109/NCA.2011.23","url":null,"abstract":"Typically, security solutions are defined to meet the requirements of security policies, and are configured to implement some of their rules. Approaches proposed so far in the literature to validate security solutions have merely taken interest to the need of: a) describing the security policy used to define and configure these solutions b) generating executable description of attack scenarios targeting the secured system and c) verifying whether the secured systems react as expected. In this paper we develop a logic-based approach for the modeling of security policies and solutions based on the concept of observations, and the generation of executable scenarios of attacks. This approach provides a unified formalism for the specification of security policies, security solutions, library of legitimate actions and attacks, and correctness rules in the form of predicates over executions. We propose a modeling of two types of security solutions, namely passive and active solutions. We develop a Model Checker to generate executable scenarios of attacks, verify the security state of the system, and test whether the solutions react as expected to security attacks. A case study is proposed to illustrate the proposal.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing 云计算中的调度程序漏洞和协同攻击
Fangfei Zhou, Manishi Goel, Peter Desnoyers, Ravi Sundaram
{"title":"Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing","authors":"Fangfei Zhou, Manishi Goel, Peter Desnoyers, Ravi Sundaram","doi":"10.1109/NCA.2011.24","DOIUrl":"https://doi.org/10.1109/NCA.2011.24","url":null,"abstract":"Recently, cloud computing services such as Amazon EC2 have used virtualization to provide customers with virtual machines running on the provider's hardware, typically charging by wall clock time rather than resources consumed. Under this business model, manipulation of the scheduler may allow theft-of-service at the expense of other customers. We have discovered and implemented an attack scenario which when implemented on Amazon EC2 allowed virtual machines to consume more CPU time regardless of fair share. We provide a novel analysis of the necessary conditions for such attacks, and describe scheduler modifications to eliminate the vulnerability. We present experimental results demonstrating the effectiveness of these defenses while imposing negligible overhead. Cloud providers such as Amazon's EC2 do not explicitly provide the mapping of VMs to physical hosts. Our attack itself provides a mechanism for detecting the co-placement of VMs, which in conjunction with appropriate algorithms can be utilized to reveal this mapping. We abstract mapping discovery as a problem of finding an unknown partition (i.e. of VMs among physical hosts) using a minimum number of co-location queries. We present an algorithm that is provably optimal when the maximum partition size is bounded. In the unbounded case we show upper and lower bounds using the probabilistic method in conjunction with a sieving technique. Our work has implications beyond this attack, for other cases of system and network topology inference from limited data.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Towards Resilient Synchronous e-Training Platforms 迈向弹性同步电子训练平台
J. C. Granda, Pelayo Nuño, D. García, F. J. Suárez
{"title":"Towards Resilient Synchronous e-Training Platforms","authors":"J. C. Granda, Pelayo Nuño, D. García, F. J. Suárez","doi":"10.1109/NCA.2011.42","DOIUrl":"https://doi.org/10.1109/NCA.2011.42","url":null,"abstract":"Synchronous e-training is emerging as an alternative for developing human resources training plans in large organizations. However, synchronous e-training platforms must face many issues affecting their resilience. Self-recovering and self-protection software techniques should be implemented to enable the continuity of e-training activities faced with network failures or entities of the platform going down. In this paper, the resilience issues in synchronous e-training are identified, and those presented in a real e-training platform are analyzed. The platform includes a self-optimizing technique to make efficient use of network resources as participants join and leave. Furthermore, various self-recovering and a self-protection techniques are proposed, making possible the continuity of ongoing e-training activities with reduced functionality until the automatic full system recovery. Most of the proposed techniques are applicable to other real-time communication systems, since the e-training platform is built using standard technologies such as SIP and RTP, commonly used in voice over IP systems.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132031387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams 三维Voronoi图在P2P虚拟环境中的及时仲裁选择
Mahathir Almashor, I. Khalil
{"title":"Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams","authors":"Mahathir Almashor, I. Khalil","doi":"10.1109/NCA.2011.40","DOIUrl":"https://doi.org/10.1109/NCA.2011.40","url":null,"abstract":"Dynamically selecting game-play arbitrators remains a key concern in fully Peer-to-Peer Virtual Environments (P2P-VE). The lack of hierarchical structures and dedicated servers mean suitable candidates must be chosen from amongst the peer population. These selected peers are elevated to the role of momentary referees, deciding on the outcomes of interactions (e.g., combat) between adversarial peers. Accordingly, a timely selection process will aid game-play responsiveness in such time-sensitive applications. There is a need to promptly affirm the arbitrator as delays will hinder peers from initiating combat, impeding game-play. The aim is to address this singular issue, investigating a myriad of selection policies contrived within the context of 3D Voronoi Diagrams (3D-VD). Prior art utilized basic 2D varieties to spatially cluster peers and limit network traffic growth. The work presented here augments this approach with a non-spatial Z-axis and the use of unique selection algorithms. Each mechanism is discussed and extensively tested, with detailed simulation results presented herein. We thus demonstrate 3D-VD's unique ability to deterministically appoint such on-the-fly adjudicators from localised candidate pools in a timely manner.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122294376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Granularity Graph for Improving Adaptive Application Partitioning Efficacy in Mobile Computing Environments 一种提高移动计算环境下自适应应用分区效率的混合粒度图
E. Abebe, C. Ryan
{"title":"A Hybrid Granularity Graph for Improving Adaptive Application Partitioning Efficacy in Mobile Computing Environments","authors":"E. Abebe, C. Ryan","doi":"10.1109/NCA.2011.16","DOIUrl":"https://doi.org/10.1109/NCA.2011.16","url":null,"abstract":"The feasibility of using adaptive object migration to enable the execution of heavy applications in pervasive environments, is determined by the computational efficiency of adaptation algorithms and the efficacy of their decisions. These two factors, which are largely predicated by the resource constraints of devices, are heavily influenced by the granularity at which adaptation decisions are performed. This paper proposes a new type of adaptation granularity which combines the efficiency of coarse level approaches with the efficacy of fine-grained adaptation. A novel approach for achieving this level of granularity through the dynamic decomposition of runtime class graphs is presented and empirically evaluated on a corpus of real world applications. It is shown that the approach improves the efficacy of adaptation decisions by reducing network overheads by a minimum of 17% to as much 99%, while maintaining comparable decision making efficiency to class level adaptation.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113944503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
ScaleStream - An Adaptive Replication Algorithm for Scalable Multimedia Streaming ScaleStream -可扩展多媒体流的自适应复制算法
Shabnam Ataee, B. Garbinato, Mouna Allani, F. Pedone
{"title":"ScaleStream - An Adaptive Replication Algorithm for Scalable Multimedia Streaming","authors":"Shabnam Ataee, B. Garbinato, Mouna Allani, F. Pedone","doi":"10.1109/NCA.2011.39","DOIUrl":"https://doi.org/10.1109/NCA.2011.39","url":null,"abstract":"In this paper, we propose Scale Stream, a new algorithm to support scalable multimedia streaming in peer-to-peer networks, under strict resources constraints. With the growth of multimedia consumption over the Internet, achieving scalability in a resource-constrained environment is indeed becoming a critical requirement. Intuitively, our approach consists in dynamically replicating the multimedia content being streamed, based on bandwidth and memory constraints. Our replication management strategy maximizes the number of consumers being served concurrently, while minimizing memory usage, under strict bandwidth constraints.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NoC Reconfiguration for CMP Virtualization CMP虚拟化的NoC重构
F. Triviño, F. J. Alfaro, J. L. Sánchez, J. Flich
{"title":"NoC Reconfiguration for CMP Virtualization","authors":"F. Triviño, F. J. Alfaro, J. L. Sánchez, J. Flich","doi":"10.1109/NCA.2011.37","DOIUrl":"https://doi.org/10.1109/NCA.2011.37","url":null,"abstract":"At NoC level, the traffic interferences can be drastically reduced by using virtualization mechanisms. An effective strategy to virtualize a NoC consists in dividing the network in different partitions, each one serving different applications and traffic flows. In this paper, we propose a NoC reconfiguration mechanism to support NoC virtualization under real scenarios. Dynamic reassignment of network resources to different partitions is allowed in order to NoC dynamically adapts to application needs. Evaluation results show a good behavior of CMP virtualization.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124222976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信