Kommunikation in Verteilten Systemen (KiVS) 2009 (eBook)
XII, 326 Seiten
Springer Berlin (Verlag)
978-3-540-92666-5 (ISBN)
Die 16. GI/ITG-Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009) befasst sich mit einer großen Vielfalt an innovativen und zukunftsorientierten Fragestellungen. Sie spannt dabei einen Bogen von allgegenwärtigen verteilten Anwendungen über Middleware-Konzepte und Protokolltechniken bis hin zu modernen Netztechniken mit ihren Mobilitäts- und Sicherheitsfragen. KiVS ist das wichtigste deutschsprachige Forum für Forschung und Entwicklung auf den Gebieten Kommunikation und Verteilte Systeme.
Vorwort der Tagungsleiter 5
Organisation 7
Inhaltsverzeichnis 9
I Funknetze 13
Practical Rate-Based Congestion Control for Wireless Mesh Networks 14
1 Introduction 14
2 Related Work 15
3 The Leipzig Wireless Mesh Testbed 16
4 The Mesh Adaptive Pacing Scheme 17
4.1 Network Load Adaptation 17
4.2 The Spatial Reuse Constraint 18
4.3 Approximating the Out-of-Interference Delay 19
4.4 The MAP Pacing Rate 22
5 Comparative Performance Study 22
5.1 Wireless Chain Topology 22
5.2 Concurrent Flows Topology 23
5.3 Random Topology 24
6 Conclusion 25
7 References 25
Paving the Way Towards Reactive Planar Spanner Construction in Wireless Networks 27
1 Introduction 27
2 Concepts and Notations 28
3 Related Work 30
4 Direct Planarization 30
4.1 Angle-Based Direct Planarization 31
4.2 Delaunay-Based Direct Planarization 32
5 Reactive Link Selection 32
6 Simulation Studies 35
7 Conclusion 37
References 38
Preventing Service Discovery Cache Reply Storms in Wireless Mesh Networks 39
1 Introduction 39
2 Related Work 40
3 Message Reply Storm 41
4 Message Propagation Strategies 41
4.1 Simple Reply Flooding 42
4.2 Discarding Duplicates 42
4.3 Local Backoff 43
4.4 Nearest Nodes Send First (NNSF) 44
4.5 Farthest Nodes Send First (FNSF) 44
5 Wireless Mesh Testbed 44
6 Measurements 45
6.1 Detailed Performance Discussion 46
7 Conclusion 48
Acknowledgment 49
References 49
II Standardization and Research – How Do These Two Fit Together? 51
Bringing ICT Research into Standardisation - What Can Standards Bodies Do? 52
1 A Brief Introduction 52
2 Improving Standards Through Integration of Research Results 53
2.1 Motivations and Barriers 53
2.2 What SSBs Can Do – Mechanisms to Bridge the Gap Between Research and Standardisation 55
Adaptation of Processes 55
Monitoring and Alerting Service 55
Education and Promotion 56
Some More Specific Suggestions 57
3 Some Comments on Current Practice 58
4 Brief Summary and Some Additional Advice 59
5 References 60
III Adaptive Systeme 61
Query Processing and System-Level Support for Runtime-Adaptive Sensor Networks 62
1 Introduction 62
2 Distributed Stream Processing 63
2.1 A Scenario for Global Query Management 64
2.2 Global Queries 64
2.3 Query Partitioning and Distribution of Operators 65
2.4 Creation of Operator Assemblies 67
3 Reprogramming Support 67
3.1 Deployment of an Operator Assembly 68
3.2 Target Platform 69
3.3 Flash Management 70
3.4 Creating Binaries and Flash Management 71
3.5 Named Memory 71
3.6 Application Programming Interface 72
4 Conclusion 72
References 73
SelfWISE: A Framework for Developing Self-Stabilizing Algorithms 74
1 Introduction 74
2 Self-Stabilization 75
2.1 Definitions and Notations 76
2.2 Self-Stabilizing Algorithms for WSNs 77
3 Related Work 78
4 SelfWISE 79
4.1 Overview 79
4.2 Language 81
4.3 Run-Time Environment 83
4.4 First Prototype 84
5 Conclusion 84
References 85
MASDynamics: Toward Systemic Modeling of Decentralized Agent Coordination 86
1 Introduction 86
2 Self–Organizing MAS Development 88
2.1 Engineering Self–Organization by Decentralized Coordination 88
2.2 Providing Decentralized Coordination Mechanisms as Services 89
3 Modeling and Reuse of Self–Organizing Dynamics 90
3.1 Systemic Modeling Self–Organizing MAS Dynamics 90
3.2 MASDynamics: A Coordination Language 91
4 Case Study: Supplementing an Allocation Strategy 94
5 Conclusions 96
Acknowledgment 96
References 96
IV Service-Oriented Computing 98
Leveraging the BPEL Event Model to Support QoS-aware Process Execution 99
1 Introduction 99
2 Basic Concepts 100
2.1 Fault Handling in BPEL 100
2.2 BPEL Event Model 101
2.3 ECA Rules 102
3 Approach 103
3.1 Detecting QoS Exceptions 104
3.2 Recovery Actions 106
4 Implementation 107
5 Related Work 108
6 Summary and Future Work 109
Acknowledgement 110
References 110
Automated Integration of Web Services in BPEL4WS Processes 111
1 Introduction 111
2 Self-Integration 112
3 Automatic Message Transformation for Web Services 114
3.1 Semantic Extension of WSDL 114
3.2 Semantic Service Discovery 116
4 Implementation 118
4.1 Performance 119
5 Related Work 120
6 Conclusions 121
References 121
Dynamic Message Routing Using Processes 123
1 Introduction 123
2 Problem Statement and Motivation 124
2.1 SOAP Processing Model 125
2.2 Open Issues in SOAP Routing 126
2.3 BPEL 126
3 Dynamic Message Routing Using Processes 127
4 SOAP BPEL Routing (SBR) 128
4.1 Header Information 128
4.2 Protocol Between Intermediary and Process 129
4.3 Detailed Routing Protocol 129
4.4 Example Scenario for SBR 131
5 Discussion and Future Work 133
6 Conclusions 134
7 References2 134
Abstract User Interfaces for Mobile Processes 135
1 Introduction 135
2 User Interactions for Mobile Processes: Requirement Analysis 137
3 Existing Approaches 138
4 A CCT-based Interface Model for Mobile Processes 139
4.1 Abstract Interaction Components for User Interfaces 140
4.2 Control Flow and Data Flow Components 141
5 User Interface Development, Integration and Realisation 142
5.1 Modelling Abstract User Interfaces with TERESA 142
5.2 Integration with the DEMAC Process Management System 142
5.3 Example Application Implementation 143
5.4 Prototypical Implementation and Usability Evaluation 145
6 Conclusion and Future Work 145
References 146
V Leistungsbewertung 147
A New Service Curve Model to Deal with Non-FIFO Systems 148
1 Introduction 148
1.1 Motivation 148
1.2 Related Work 149
2 Preliminaries on Network Calculus 150
3 Why Conventional Network Calculus Does Not Work Well for Non-FIFO Systems 151
3.1 Using Service Curves (SC) for Non-FIFO Systems 152
3.2 Using Strict Service Curves (S2C) for Non-FIFO Systems 153
4 Introducing a New Service Curve Model: Sufficiently Strict Service Curve 154
5 NumericalExperiments 157
5.1 Comparison of Different Service Curve Models 157
5.2 FIFO vs. Non-FIFO Delay Bounds 157
6 Conclusion 158
Acknowledgements 159
References 159
Providing Probabilistic Latency Bounds for Dynamic Publish/Subscribe Systems 160
1 Introduction 160
2 Probabilistic Latency Bounds in Content-Based Publish/Subscribe 161
3 Adaptation to Probabilistic Latency Requirements 163
3.1 Reactive and Proactive Adaptations 164
3.2 Algorithm Properties 165
4 Cluster Management 166
5 Evaluation 167
5.1 Algorithm Convergence 168
5.2 Algorithm Stability 169
6 Related Work 169
7 Conclusion 170
8 Acknowledgment 171
References 171
Traffic, Structure and Locality Characteristics of the Web’s Most Popular Services’ Home Pages 172
1 Introduction 172
1.1 Evolution of Web Applications 172
1.2 Related Work 173
1.3 Overview of the Paper 174
2 Measurement Method 174
3 Home Page Characteristics 175
4 Helper Services 180
5 Conclusions 181
References 182
Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions 184
1 Introduction 184
2 Overview and Problem Statement 185
2.1 Flow Monitoring 185
2.2 Requirements in the Security Domain 186
2.3 Challenges 186
3 Dynamic Reconfiguration 187
3.1 Vermont 187
3.2 Reconfiguration 188
3.3 Situation Awareness 189
4 Performance Measurements 190
4.1 Test Setup 190
4.2 Experiment Description 191
4.3 Further Issues 191
4.4 Results and Discussion 192
5 Conclusion 194
Acknowledgments 195
References 195
VI Sicherheit 196
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems 197
1 Introduction 197
2 Attacks Against P2P Streaming Topologies 198
3 Requirements for Manipulation-Proof Construction Mechanisms 201
3.1 Distribution of Topology Information 201
3.2 Locality of Repair Mechanisms 201
3.3 Initiative of Repair Actions 202
3.4 Decision Process for Node Promotion and Degradation 203
3.5 Reliability Estimation Via Long-Term Service 203
3.6 Bootstrapping Joining Nodes 204
4 A Brief Discussion of Existing Systems 204
5 A Push-Based Streaming System Utilizing a Manipulation Resistant Topology Repair Mechanism 205
6 Experiments 205
7 Conclusions 208
Acknowledgements 208
References 208
Turning the Tables: Using Wireless Communication Against an Attacker 209
1 Introduction 209
2 Unpredictability of Signal Propagation 210
3 Authentication Primitives 212
4 WSN Under Attack – A Real-World Analysis 213
4.1 AttackerModel and Countermeasures 214
4.2 Impact of an Injection Attack 215
5 Related Work 218
6 Conclusion 219
References 219
Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems by Simulations and Measurements 221
1 Introduction and Scope 221
2 The RSerPool Architecture 222
3 Quantifying an RSerPool System 223
4 SystemSetup 224
5 The Impact of an Attacker 225
5.1 An Attacker Masquerading as Pool Element 225
5.2 An Attacker Masquerading as Pool User 226
6 Applying Attack Countermeasures 227
6.1 Countermeasures Against Pool Element Attacks 227
6.2 Countermeasures Against Pool User Attacks 228
7 Conclusions 231
References 231
Towards a Generic Backup and Recovery Infrastructure for the German D-Grid Initiative 233
1 Introduction 233
2 Design of a Backup and Recovery Infrastructure for Grid Environments 234
2.1 Requirements Analysis 235
2.2 Pull- vs. Push-Based Backup and Recovery 235
2.3 User- vs. Node-Based Backup and Recovery 236
2.4 Incremental, Differential, and Full Backup 237
2.5 File Permissions 238
2.6 Architectural Blueprint 238
2.7 Backup 239
3 Implementation Issues 240
3.1 Selection of Appropriate Technologies 240
3.2 Accessing the Backup and Recovery Service 241
3.3 Submission of a Backup Job 241
4 Related Work 242
5 Conclusions 243
Acknowledgements 243
References 243
From Modelling to Execution of Enterprise Integration Scenarios: The GENIUS Tool 245
1 Introduction 245
2 Modelling of EAI Scenarios 247
2.1 Parameterized EAI Patterns 247
2.2 Model-Driven Development of Executable EAI Scenarios 248
3 GENIUS – A Tool for Modelling Executable EAI Scenarios 249
3.1 Features of GENIUS 249
3.2 Architecture and Extension Mechanism 250
3.3 Guarantee of Proper Configuration of Parameterized EAI Patterns 251
3.4 Generation Algorithm 251
4 Scenario: Developing an Integration Solution 252
4.1 Loan Broker Scenario with Parameterized EAI Pattern 252
4.2 Generated BPEL Code 253
5 Conclusion and Future Work 255
6 References3 256
Pluggable Authorization and Distributed Enforcement with pam_xacml 257
1 Introduction 257
2 Related Work 258
3 Pluggable Authorization with XACML 259
3.1 pam_xacml for Unmodified Applications That Support PAM 260
3.2 Applications with Authorization Interface 261
4 Experiments on Distributed Authorization 262
4.1 Reference Scenario with Consecutive Authorization Decisions 263
4.2 Measurements 264
4.3 Impact of Propagation Delay 265
5 Conclusion 266
References 267
VII Kurzbeiträge 269
Enhancing Application Layer Multicast Solutions by Wireless Underlay Support 270
1 Introduction 270
2 Nice 271
3 NICE-WLI Protocol Design 271
3.1 Gateway Nodes 272
3.2 Protocol Operation 272
3.3 Data Dissemination 273
4 Evaluation 274
5 Conclusion and Outlook 275
References 275
Strombasierte Struktur-Validierung von simple content in XML-Dokumenten 276
1 Einleitung 276
2 Validierung 277
3 Validierung im Detail 278
3.1 Repr¨asentation der Strukturdefinition 279
3.2 Kontrollelemente 280
3.3 pull-Operationen f¨ur simple content 280
4 Evaluation 281
5 Ausblick 281
Literaturverzeichnis 281
CLIO – A Cross-Layer Information Service for Overlay Network Optimization 282
1 Introduction 282
2 Challenges and State of the Art 282
3 CLIO – A Cross-Layer Information Service for Overlays 284
3.1 Inner Workings 285
3.2 Data Representation and Generic Interface 285
4 Discussion and Conclusion 286
References 287
Improving TCP’s Robustness to Packet Reordering 288
1 Motivation 288
2 Related Work 289
3 Algorithm 290
4 Implementation 291
5 Conclusion and Future Work 292
References 293
Banishing Patch-Cables from LAN Parties 294
1 Introduction 294
2 Ad-hoc P2P Multicast as a Patch-Cable Substitute 295
3 Scenario Modelling 296
4 Simulation Results 297
5 Summary and Conclusion 298
References 299
A Middleware for the Controlled Information Exchange Between Online Games and Internet Applications 300
1. Introduction 300
2. Related Work 301
3. Virtual Context Based Services 302
3.1 Virtual Parameters and Virtual Context 302
3.2 VCBS Middleware Architecture 302
4. Usage Scenarios 304
5. Summary 304
6. References 305
Re-sequencing Buffer Occupancy of a Concurrent Multipath Transmission Mechanism for Transport System Virtualization 306
1 Introduction 306
2 Transport System Virtualization 307
3 Implementing TSV Using Concurrent Multipath Transfer in Advanced Routing Overlays 307
4 Re-sequencing Buffer Occupancy in Concurrent Multipath Transport 308
4.1 Impact of Type of Delay Distribution 309
4.2 Path Selection Criteria 310
5 Conclusion 311
References 311
Designing a Decentralized Traffic Information System – AutoNomos 312
1 Introduction 312
2 Related Work 313
3 AutoNomos Architecture 313
3.1 Hovering Data Clouds 314
3.2 Organic Information Complexes 314
3.3 Data Dissemination Protocol AutoCast 316
3.4 Software Architecture 316
4 Conclusion and Future Work 317
References 318
VIII Preisträger 319
UMTS Radio Network Planning: Mastering Cell Coupling for Capacity Optimization 320
Stochastic Packet Loss Model to Evaluate QoE Impairments 321
References 321
Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks 322
Novel Network Architecture for Optical Burst Transport 323
Lightweight Authentication for HIP 324
References 324
Author Index 325
| Erscheint lt. Verlag | 10.3.2010 |
|---|---|
| Reihe/Serie | Informatik aktuell | Informatik aktuell |
| Zusatzinfo | XII, 326 S. |
| Verlagsort | Berlin |
| Sprache | deutsch |
| Themenwelt | Mathematik / Informatik ► Informatik ► Grafik / Design |
| Mathematik / Informatik ► Informatik ► Web / Internet | |
| Schlagworte | Algorithmen • Kommunikation • Kommunikationsnetze • Leistungsbewertung • Middleware • Mobilität • Processing • Verteilte Systeme • Web Services |
| ISBN-10 | 3-540-92666-6 / 3540926666 |
| ISBN-13 | 978-3-540-92666-5 / 9783540926665 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich