{"title":"Performance Evaluation of DCB's Priority-Based Flow Control","authors":"Mikkel Hagen, Ryan Zarick","doi":"10.1109/NCA.2011.58","DOIUrl":"https://doi.org/10.1109/NCA.2011.58","url":null,"abstract":"Data Center Bridging (DCB) is a group of technologies defined within the IEEE to transform Ethernet into a lossless fabric. This paper uses data center network cards and switches to analyze the performance of Priority-based Flow Control, a DCB technology. The network hardware required to support this new technology is still new and not widely available. This paper is the first to experimentally show how Priority-based Flow Control performs well in simple systems but as the system becomes more complicated traffic streams within a priority show fate sharing characteristics. Notably, the throughput of different traffic streams converges to the lowest throughput among the streams. One of the most common applications used in data centers for interprocessor communication, MPI (Message Passing Interface), is analyzed. Finally, an iSCSI initiator and target are used to observe the throughput of iSCSI over a network with PFC. This paper shows the performance benefits of using PFC with TCP-based applications.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized Topology Aggregation for QoS Estimation in Large Overlay Networks","authors":"S. Wieser, L. Böszörményi","doi":"10.1109/NCA.2011.51","DOIUrl":"https://doi.org/10.1109/NCA.2011.51","url":null,"abstract":"This paper introduces a scalable approach for efficient, low-cost multi-level Quality of Service (QoS) estimation in large overlay networks (ON). We modify an existing distributed partitioning algorithm, and use it to create \"QoS maps\". QoS maps empower applications to quickly predict several QoS metrics for any given route, and to obtain multiple alternative routes to any target node in the ON. We show that our modifications of the partitioning algorithm permit the aggregation of large hubs, but still preserve the sub-linear runtime of the original heuristic. Simulations with large ONs are performed to evaluate the proposed approach and demonstrate its scalability. Finally, we outline our estimation algorithm that we use to predict QoS and perform QoS aware routing in any given ON.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129857658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Encoding for Generalized Reed Solomon Codes","authors":"M. Shrestha, Lihao Xu","doi":"10.1109/NCA.2011.52","DOIUrl":"https://doi.org/10.1109/NCA.2011.52","url":null,"abstract":"Generalized Reed Solomon (GRS) codes are widely used for reliability applications in computer systems like data storage and communications and thus, efficiency in encoding and decoding of GRS codes is very important for system performance. Though GRS codes provide enormous flexibility, they are computationally expensive since calculations happen in Galois fields. In this paper, we present an algorithm to reduce the number of field multiplications in the encoding process of the GRS codes by selecting good values of $bm{alpha}$ and $bm{w}$, the parameters of a GRS code. These values are usually set to some default value but by finding good values for these parameters using our algorithm we present here, we can impose a structure on the encoding matrix which enables significant reduction in the number of multiplications to enable efficient encoding. Our method provides from 25% to over 90% reduction in the number of multiplications depending on the code attributes.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validation of Security Solutions for Communication Networks: A Policy-Based Approach","authors":"S. Rekhis, Baha Bennour, N. Boudriga","doi":"10.1109/NCA.2011.23","DOIUrl":"https://doi.org/10.1109/NCA.2011.23","url":null,"abstract":"Typically, security solutions are defined to meet the requirements of security policies, and are configured to implement some of their rules. Approaches proposed so far in the literature to validate security solutions have merely taken interest to the need of: a) describing the security policy used to define and configure these solutions b) generating executable description of attack scenarios targeting the secured system and c) verifying whether the secured systems react as expected. In this paper we develop a logic-based approach for the modeling of security policies and solutions based on the concept of observations, and the generation of executable scenarios of attacks. This approach provides a unified formalism for the specification of security policies, security solutions, library of legitimate actions and attacks, and correctness rules in the form of predicates over executions. We propose a modeling of two types of security solutions, namely passive and active solutions. We develop a Model Checker to generate executable scenarios of attacks, verify the security state of the system, and test whether the solutions react as expected to security attacks. A case study is proposed to illustrate the proposal.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fangfei Zhou, Manishi Goel, Peter Desnoyers, Ravi Sundaram
{"title":"Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing","authors":"Fangfei Zhou, Manishi Goel, Peter Desnoyers, Ravi Sundaram","doi":"10.1109/NCA.2011.24","DOIUrl":"https://doi.org/10.1109/NCA.2011.24","url":null,"abstract":"Recently, cloud computing services such as Amazon EC2 have used virtualization to provide customers with virtual machines running on the provider's hardware, typically charging by wall clock time rather than resources consumed. Under this business model, manipulation of the scheduler may allow theft-of-service at the expense of other customers. We have discovered and implemented an attack scenario which when implemented on Amazon EC2 allowed virtual machines to consume more CPU time regardless of fair share. We provide a novel analysis of the necessary conditions for such attacks, and describe scheduler modifications to eliminate the vulnerability. We present experimental results demonstrating the effectiveness of these defenses while imposing negligible overhead. Cloud providers such as Amazon's EC2 do not explicitly provide the mapping of VMs to physical hosts. Our attack itself provides a mechanism for detecting the co-placement of VMs, which in conjunction with appropriate algorithms can be utilized to reveal this mapping. We abstract mapping discovery as a problem of finding an unknown partition (i.e. of VMs among physical hosts) using a minimum number of co-location queries. We present an algorithm that is provably optimal when the maximum partition size is bounded. In the unbounded case we show upper and lower bounds using the probabilistic method in conjunction with a sieving technique. Our work has implications beyond this attack, for other cases of system and network topology inference from limited data.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. C. Granda, Pelayo Nuño, D. García, F. J. Suárez
{"title":"Towards Resilient Synchronous e-Training Platforms","authors":"J. C. Granda, Pelayo Nuño, D. García, F. J. Suárez","doi":"10.1109/NCA.2011.42","DOIUrl":"https://doi.org/10.1109/NCA.2011.42","url":null,"abstract":"Synchronous e-training is emerging as an alternative for developing human resources training plans in large organizations. However, synchronous e-training platforms must face many issues affecting their resilience. Self-recovering and self-protection software techniques should be implemented to enable the continuity of e-training activities faced with network failures or entities of the platform going down. In this paper, the resilience issues in synchronous e-training are identified, and those presented in a real e-training platform are analyzed. The platform includes a self-optimizing technique to make efficient use of network resources as participants join and leave. Furthermore, various self-recovering and a self-protection techniques are proposed, making possible the continuity of ongoing e-training activities with reduced functionality until the automatic full system recovery. Most of the proposed techniques are applicable to other real-time communication systems, since the e-training platform is built using standard technologies such as SIP and RTP, commonly used in voice over IP systems.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132031387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams","authors":"Mahathir Almashor, I. Khalil","doi":"10.1109/NCA.2011.40","DOIUrl":"https://doi.org/10.1109/NCA.2011.40","url":null,"abstract":"Dynamically selecting game-play arbitrators remains a key concern in fully Peer-to-Peer Virtual Environments (P2P-VE). The lack of hierarchical structures and dedicated servers mean suitable candidates must be chosen from amongst the peer population. These selected peers are elevated to the role of momentary referees, deciding on the outcomes of interactions (e.g., combat) between adversarial peers. Accordingly, a timely selection process will aid game-play responsiveness in such time-sensitive applications. There is a need to promptly affirm the arbitrator as delays will hinder peers from initiating combat, impeding game-play. The aim is to address this singular issue, investigating a myriad of selection policies contrived within the context of 3D Voronoi Diagrams (3D-VD). Prior art utilized basic 2D varieties to spatially cluster peers and limit network traffic growth. The work presented here augments this approach with a non-spatial Z-axis and the use of unique selection algorithms. Each mechanism is discussed and extensively tested, with detailed simulation results presented herein. We thus demonstrate 3D-VD's unique ability to deterministically appoint such on-the-fly adjudicators from localised candidate pools in a timely manner.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122294376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Granularity Graph for Improving Adaptive Application Partitioning Efficacy in Mobile Computing Environments","authors":"E. Abebe, C. Ryan","doi":"10.1109/NCA.2011.16","DOIUrl":"https://doi.org/10.1109/NCA.2011.16","url":null,"abstract":"The feasibility of using adaptive object migration to enable the execution of heavy applications in pervasive environments, is determined by the computational efficiency of adaptation algorithms and the efficacy of their decisions. These two factors, which are largely predicated by the resource constraints of devices, are heavily influenced by the granularity at which adaptation decisions are performed. This paper proposes a new type of adaptation granularity which combines the efficiency of coarse level approaches with the efficacy of fine-grained adaptation. A novel approach for achieving this level of granularity through the dynamic decomposition of runtime class graphs is presented and empirically evaluated on a corpus of real world applications. It is shown that the approach improves the efficacy of adaptation decisions by reducing network overheads by a minimum of 17% to as much 99%, while maintaining comparable decision making efficiency to class level adaptation.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113944503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shabnam Ataee, B. Garbinato, Mouna Allani, F. Pedone
{"title":"ScaleStream - An Adaptive Replication Algorithm for Scalable Multimedia Streaming","authors":"Shabnam Ataee, B. Garbinato, Mouna Allani, F. Pedone","doi":"10.1109/NCA.2011.39","DOIUrl":"https://doi.org/10.1109/NCA.2011.39","url":null,"abstract":"In this paper, we propose Scale Stream, a new algorithm to support scalable multimedia streaming in peer-to-peer networks, under strict resources constraints. With the growth of multimedia consumption over the Internet, achieving scalability in a resource-constrained environment is indeed becoming a critical requirement. Intuitively, our approach consists in dynamically replicating the multimedia content being streamed, based on bandwidth and memory constraints. Our replication management strategy maximizes the number of consumers being served concurrently, while minimizing memory usage, under strict bandwidth constraints.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NoC Reconfiguration for CMP Virtualization","authors":"F. Triviño, F. J. Alfaro, J. L. Sánchez, J. Flich","doi":"10.1109/NCA.2011.37","DOIUrl":"https://doi.org/10.1109/NCA.2011.37","url":null,"abstract":"At NoC level, the traffic interferences can be drastically reduced by using virtualization mechanisms. An effective strategy to virtualize a NoC consists in dividing the network in different partitions, each one serving different applications and traffic flows. In this paper, we propose a NoC reconfiguration mechanism to support NoC virtualization under real scenarios. Dynamic reassignment of network resources to different partitions is allowed in order to NoC dynamically adapts to application needs. Evaluation results show a good behavior of CMP virtualization.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124222976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}