Catálogo de publicaciones - libros
Network and Parallel Computing: IFIP International Conference, NPC 2005, Beijing, China, November 30: December 3, 2005, Proceedings
Hai Jin ; Daniel Reed ; Wenbin Jiang (eds.)
En conferencia: IFIP International Conference on Network and Parallel Computing (NPC) . Beijing, China . November 30, 2005 - December 3, 2005
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Theory of Computation; Computer Communication Networks; Software Engineering; Operating Systems; Algorithm Analysis and Problem Complexity; Information Systems Applications (incl. Internet)
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2005 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-29810-6
ISBN electrónico
978-3-540-32246-7
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2005
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2005
Cobertura temática
Tabla de contenidos
doi: 10.1007/11577188_11
Service-Based Grid Resource Monitoring with Common Information Model
Hongyan Mao; Linpeng Huang; Minglu Li
The monitoring of grid environments helps administrators and users keep track of the availability and loading of resources, and the management of resources is dependent on the monitoring of information data. There is not an efficient and consistent monitoring mechanism to the manipulation of devices, resources and services in Grid computing. We propose a novel monitoring framework used to gather and retrieve monitoring information of Grid environments. The monitoring system RMCS integrates and extends the existing monitoring system using service-oriented mechanism and the common information model CIM. The RMCS defines a hierarchical structure of monitoring resources, and customizes the monitoring parameters and the display way. The adoption of CIM-based monitoring service enables compatible with other grid services such as grid portal, transaction or resource management and charging. The investigation shows that this monitoring approach provides the scalable monitoring capabilities, enables to exchange information in an unrestricted and flexible way, and improves grid performance and utilization.
- Session 1: Grid Computing | Pp. 80-83
doi: 10.1007/11577188_12
Distributed Gridflow Model and Implementation
Cheng Bo; Qihe Liu; Guowei Yang
In this paper, we proposed distributed and adaptive grid workflow net model. Which applies the Coloured Petri net as the formalism to describe grid process, and proposed the formal method for grid services to composite the gridflows. And also proposed the multi-agent based implementation for gridflow net model.
- Session 1: Grid Computing | Pp. 84-87
doi: 10.1007/11577188_13
A Secure P2P Video Conference System for Enterprise Environments
Fuwen Liu; Hartmut Koenig
Many emerging group oriented and collaborative applications such as audio/video conferences use the peer-to-peer (P2P) paradigm. Confidentiality is an often demanded feature for such applications, e.g. in business meetings, to provide group privacy. How to build a secure P2P video conference system is still an open issue. In this paper several possible solutions are discussed. We present a security architecture used for P2P video conferences that ensures confidential talks in an enterprise environment whose branches might be geographically dispersed.
- Session 2: Peer-to-Peer Computing | Pp. 88-96
doi: 10.1007/11577188_14
Adaptive Query-Caching in Peer-to-Peer Systems
Zuoning Yin; Hai Jin; Chao Zhang; Quan Yuan; Chucheng Zhao
Peer-to-Peer (P2P) architectures are very prevalent in today’s Internet. Lots of P2P file sharing systems using Gnutella protocol emerge out and draw attractions of millions of people. The “flooding” search mechanism of Gnutella makes it easy to be deployed, but also spawns numerous messages which leads to serious scalability problems. However, the locality discovered in both user’s share files and queries, enables us to use query-caching to shorten the search length and reduce the messages traffic. This paper makes an extensive study of query-caching in P2P systems and proposes an adaptive query-caching mechanism to manage the cached query reply messages according to the heterogeneity of the uptime of different peers. Along with several other techniques we proposed, our approach achieves a 30% reduction of average search length and a 61% reduction of query message traffic comparing with the previous query-caching mechanisms in the simulation, which indicates that our approach makes Gnutella more scalable.
- Session 2: Peer-to-Peer Computing | Pp. 97-104
doi: 10.1007/11577188_15
Design and Deployment of Locality-Aware Overlay Multicast Protocol for Live Streaming Services
Xuping Tu; Hai Jin; Dafu Deng; Chao Zhang; Quan Yuan
This paper presents the design and deployment of a locality-aware overlay multicast protocol called . The key idea of is to use the geometrical information of end hosts to construct the locality-aware overlay data delivery tree such that nearby users in the underlying network can be organized into nearby subtrees. The prototype of has been widely used in CERNET. Logging traces obtained from broadcasting 2004 Athens Olympic Games over 16 days have shown that the performance of , such as end-to-end delay and absolute data delivery delay, significantly outperforms that of randomly constructed overlay multicast.
- Session 2: Peer-to-Peer Computing | Pp. 105-112
doi: 10.1007/11577188_16
Dynamic Thread Management in Kernel Pipeline Web Server
Shan-Shan Li; Xiang-Ke Liao; Yu-Song Tan; Jin-Yuan Liu
With the development of high-speed backbone network, more and more traffic load is pushed to the Internet end system. The satisfactory execution of common business applications depends on the efficient performance of web server. In this paper, we propose a pipeline multi-thread kernel web server open KETA which divides the processing of a request into several independent phases. This architecture reduces parallelism granularity and achieves inner-request parallelism to enhance its processing capability. Furthermore, a thread allocation model is used to manage threads effectively in this special architecture. This model can adjust the thread allocation based on the server load and the work character of each phase so that the thread resource of web server can be utilized properly. Experimental result shows the capability of this web server and the effectiveness of the thread allocation model.
- Session 3: Web Techniques | Pp. 113-122
doi: 10.1007/11577188_17
QoS Aware Service Composition with Multiple Quality Constraints
Bixin Liu; Quanyuan Wu; Yan Jia; Bin Zhou
Service composition has been recognized as a flexible way for resource sharing and application integration. Quality of service (QoS) is an important issue for composite services. In this paper, we address the issue of component services selection to ensures their composition satisfy given QoS constraints. We propose the concept of reduction tree as a general scheme to aggregate multi-dimensional quality. And then a heuristic algorithm MCSC_HEU is presented to find execution plans satisfying multiple QoS constrains, with the main idea of evaluating partial plans by a heuristic function during the course of reduction. The time complexity of MCSC_HEU is of polynomial level. Extensive evaluations show that MCSC_HEU succeeds in finding feasible plans with very high probability but demands much less time than exhausting search. So it is an efficient solution for QoS aware service selection with multiple constrains.
- Session 3: Web Techniques | Pp. 123-131
doi: 10.1007/11577188_18
Performance Modelling and Optimization of Memory Access on Cellular Computer Architecture Cyclops64
Yanwei Niu; Ziang Hu; Kenneth Barner; Guang R. Gao
This paper focuses on the Cyclops64 computer architecture and presents an analytical model and performance simulation results for the preloading and loop unrolling approaches to optimize the performance of SVD (Singular Value Decomposition) benchmark. A performance model for dissecting the total execution cycles is presented. The data preloading using “memcpy” or hand optimized “inline” assembly code, and the loop unrolling approach are implemented and compared with each other in terms of the total number of memory access cycles. The key idea is to preload data from offchip to onchip memory and store the data back after the computation. These approaches can reduce the total memory access cycles and can thus improve the benchmark performance significantly.
- Session 4: Cluster Computing | Pp. 132-143
doi: 10.1007/11577188_19
TCP-ABC: From Multiple TCP Connections to Atomic Broadcasting
Zhiyuan Shao; Hai Jin; Wenbin Jiang; Bin Cheng
In this paper, we propose a novel scheme, named as TCP-ABC, which replicates the server side TCP connections among multiple server nodes of a cluster. By guaranteeing atomic request delivery, and consensus on responses, this scheme provides the legacy server applications running on the server nodes with multiple active backups in a transparent fashion. By failing the connections over healthy units, the scheme enhances the service and data availability of the cluster. By conducting experiments on the prototype system of a cluster up to four nodes, we find TCP-ABC results in small performance lost while greatly enhances the service and data availability.
- Session 4: Cluster Computing | Pp. 144-152
doi: 10.1007/11577188_20
A Parallel File System Based on Spatial Information Object
Keying Huang; Guoqing Li; Dingsheng Liu; Wenyi Zhang
In this paper we introduced a parallel file system based on the spatial information object storage, the PIPFS system. PIPFS is a special-purpose parallel file system which designed in view of the remote sensing image processing. It uses the server/client pattern and bases on the metadata mechanism. It simultaneously accesses disks on several nodes for application I/O operations, which improves the efficiency of the operation on large scale data. A high performance is shown on high-data-complexity application, such as remote sensing image processing.
- Session 4: Cluster Computing | Pp. 153-162