Resource management is central to grid computing and plays a vital role in ensuring that the jobs execute both successfully and economically on the grid. In this paper, we present an analysis of the factors affecting ...
详细信息
Resource management is central to grid computing and plays a vital role in ensuring that the jobs execute both successfully and economically on the grid. In this paper, we present an analysis of the factors affecting resource allocation and illustrate the same in the case of disk space aggregation. We explore the feasibility of a comprehensive resource aggregation network that can bind fragmented resources together to provide a unified resource for grid jobs. We provide an implementation framework to realise resource aggregation, by adopting and enhancing the Alchemi [1] framework.
Self-stabilization is a theoretical framework of non-masking fault-tolerant distributed algorithms. A self-stabilizing system tolerates any kind and any finite number of transient faults, such as message loss, memory ...
详细信息
ISBN:
(纸本)0889865906
Self-stabilization is a theoretical framework of non-masking fault-tolerant distributed algorithms. A self-stabilizing system tolerates any kind and any finite number of transient faults, such as message loss, memory corruption, and topology change. Because message loss and topology change occur so frequently in mobile ad hoc networks, distributed algorithms on them should tolerate such events. In this paper, we propose a self-stabilizing distributed algorithm for computing a 5-spanner, which can be used, for example, as a basis for computing virtual backbone or routing in mobile ad hoc networks.
Firewalls, and packet classification in general, are becoming more and more significant as data rates soar and hackers become increasingly sophisticated - and more forceful. In this paper, we present a new packet-clas...
详细信息
ISBN:
(纸本)088986392X
Firewalls, and packet classification in general, are becoming more and more significant as data rates soar and hackers become increasingly sophisticated - and more forceful. In this paper, we present a new packet-classification approach that uses set theory to classify packets. This approach has significant theoretical advantages over current approaches. We demonstrate its practicality by implementing a firewall subsystem in Linux which approaches the performance of today's naive packet-filtering implementations.
Comprehensive security policies are an integral part of creating a secure network and commonly firewalls are used to accomplish this. Firewalls inspect and filter traffic arriving or departing a network by comparing p...
详细信息
ISBN:
(纸本)0889865701
Comprehensive security policies are an integral part of creating a secure network and commonly firewalls are used to accomplish this. Firewalls inspect and filter traffic arriving or departing a network by comparing packets to a set of rules and performing the matching rule action, which is accept or deny. Unfortunately, traffic inspection of this type can impose significant delays on traffic due to the complexity and size of policies. Therefore, improving firewall performance is important, given the next generation of high-speed networks. This paper investigates the performance of a function parallel firewall architecture that distributes the original policy across an array of firewalls. A packet is processed by all the firewalls simultaneously and a gate then makes a final decision (accept or deny) based on the results of the individual firewalls. Since the individual firewalls have fewer rules to process (only a portion of the original policy), the function parallel system has lower delays (e.g. 74% lower for a four firewall array) and a higher throughput than other data parallel (load-balancing) firewalls. However, the performance increase is dependent on the speed of the gate. The potential speed increase and the impact of the gate will be demonstrated empirically.
In this paper three different Service Discovery approaches based on centralized and distributed registries within so called Virtual Organizations are assessed. The first approach is a centralized model, the second a c...
详细信息
ISBN:
(纸本)088986392X
In this paper three different Service Discovery approaches based on centralized and distributed registries within so called Virtual Organizations are assessed. The first approach is a centralized model, the second a completely decentralized and the third is a hybrid of both models. The Grid environment is typically comprised of heterogeneous resources over wide-area networks, It addresses all distributedcomputing issues, especially the problem of service discovery. The benefits and drawbacks of all three models are discussed and a comparison regarding issues such as administration, management, scalability and security is followed. Furthermore, measurements are executed in order to investigate the performance of all three models, and a reliability analysis is conducted.
Large clustered computers provide low-cost compute cycles, and therefore have promoted the development of sophisticated parallel-programming algorithms based on the Message Passing Interface. Storage platforms, howeve...
详细信息
ISBN:
(纸本)088986568X
Large clustered computers provide low-cost compute cycles, and therefore have promoted the development of sophisticated parallel-programming algorithms based on the Message Passing Interface. Storage platforms, however, fall to keep pace with similar advances. This paper compares standard 4X InfiniBand (IB) to 10-Gigabit Ethernet (GbE) for Use as a common storage infrastructure in addition to message passing. Considering IB's native ability to accelerate protocol processing in hardware, the Ethernet hardware in this study provided similar acceleration using TCP Offload Engines. We evaluated their I/O perfon-nance using the IOZONE benchmark on the iSCSI-based TerraGRID parallel filesystem. Our evaluations show that 10GbE, with or without protocol-offload, offered better throughput and latency than IB to socket-based applications. Although protocol-offload in both 10GbE and IB demonstrated significant improvement in I/O performance, large amount of CPU are still being consumed to handle the associated data-copies and interrupts. The emerging RDMA technologies hold promises to remove the remaining CPU overhead. We plan to continue our study to research the applications of RDMA in parallel I/O.
An important problem in the construction of distributed systems is the openness of these systems to dynamic computations, i.e. the ability of these systems to support new infrastructure services and applications durin...
详细信息
ISBN:
(纸本)088986392X
An important problem in the construction of distributed systems is the openness of these systems to dynamic computations, i.e. the ability of these systems to support new infrastructure services and applications during their operations. Algorithms and services have been designed using several system models: synchronous, asynchronous bonded-delay, asynchronous, etc. In practice, most of the existing systems implement a limited number of system models, and can be hardly adapted to new applications. For example, a metropolitan area network used to develop a reliable data communication system can hardly support real-time audio-communications. In this paper, we describe new principles and an architectural basis for the development of distributed system infrastructures supporting multiple system models, that can be dynamically modified to be adapted to new application requirements, using programmable networks. The paper provides a framework for the application of network programmability and active networks to distributed system design, and their use to dynamically enforce multiple and concurrent system models. Such systems can be used to support multiple application profiles with the same computing and communication resources.
We consider a distributed computer system in Wardrop equilibrium, i.e., situations where no user can reduce its own response time by unilaterally choosing another path, if all the other users retain their present path...
详细信息
ISBN:
(纸本)0889865701
We consider a distributed computer system in Wardrop equilibrium, i.e., situations where no user can reduce its own response time by unilaterally choosing another path, if all the other users retain their present paths. The Braess paradox is a famous example of paradoxical cases where adding capacity to a network degrades the performance of all users. This study examines numerically some examples around the Braess-like paradox in a distributed computer system. We found that Braess's paradox can occur, namely in equilibrium the mean job response time in the network after adding a communication line for the sharing of jobs between nodes, for some system parameter setting, can be greater than the mean job response time in the network before adding the communication line. Indeed, two different types of paradox called weak and strong paradox have been characterized. In the range of parameter values examined, the worst case ratio of performance degradation obtained in the examined network model is about 75% and 65% for the cases of weak and strong paradox respectively.
The generic functionality of passive testing is detecting failures (fault manifestations) in a distributed system. We deal with one of the key functions of a passive tester - Trace Analysis (TA). The standard TA algor...
详细信息
ISBN:
(纸本)0889865701
The generic functionality of passive testing is detecting failures (fault manifestations) in a distributed system. We deal with one of the key functions of a passive tester - Trace Analysis (TA). The standard TA algorithms proceed by traversing a Reference Specification (RS), which is usually given in the form of a FSM automaton. The run-time performance of such algorithms is known to be poor for a large, nondeterministic RS (i.e. for real protocols). To improve this aspect of passive testing, instead of considering new TA algorithms, we try to increase the performance of existing algorithms, by changing the form of a RS to an Event Graph (EG). We define an EG and submit a detailed algorithm for its derivation. We then outline the EG-based algorithm for RS traversal. We report on the results of simulation experiments that clearly show considerable improvements in run-time performance of EG-based passive testing over previous approaches, while the functionality of failure detection is strictly retained.
We present our research findings on the practicality of using RFID for building context-aware homes in India. Our research is the result of an endeavor to bring this global trend of smart homes to India. Rather than s...
详细信息
ISBN:
(纸本)9780889866386
We present our research findings on the practicality of using RFID for building context-aware homes in India. Our research is the result of an endeavor to bring this global trend of smart homes to India. Rather than studying the effects of such an influence in its original form-building smart homes equipped with such high-end sensors as real-time, audio-video sensing, and sophisticated, environmental sensors as are popular in a typical smart home-we studied the viability of realizing ambient-intelligence using simple, low-cost, and robust RFID sensors, which we believe would be suitable to Indian dwellings in the near future. We describe the learning and prediction algorithm used in our study;we modeled time as fuzzy-sets and used Markov model for predicting the future locations of inhabitants wearing RFID bracelets. Our system provides context-aware reactive and proactive services. We modeled the uncertainties-involved in inferring users' activities from their location information-using Bayesian Belief networks or BBNs. This improved the accuracy of prediction considerably. Our experience showed that it is possible to develop cost-effective, easily deployable, context-aware homes using only RFID in India in the short-term before high-end sensing technologies mature and become commercially affordable in the longer run.
暂无评论