By Topic

2008 International Conference on Networking, Architecture, and Storage

12-14 June 2008

Filter Results

Displaying Results 1 - 25 of 75
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (218 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2008, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Secure Remote Storage through Authenticated Encryption

    Publication Year: 2008, Page(s):3 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Storage systems are more distributed and more subject to attacks. Cryptographic file system gives a promising way to mitigate the danger of exposing data by using encryption and integrity protection methods and guarantee end-to-end security to clients. This paper describes SRSAE, a generic approach to cryptographic file system, as well as its realization in a distributed data storage environment. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Assurance of RAID Storage Systems for a Wide Range of Latent Sector Errors

    Publication Year: 2008, Page(s):10 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The low-cost disk drives, which are increasingly being adopted in today's data storage systems, have higher capacity but lower reliability, which leads to more frequent rebuilds and to a higher risk of unrecoverable or latent media errors. An intra-disk redundancy scheme has been proposed to cope with such errors and enhance the reliability of RAID systems. Empirical field results recently reporte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Analysis of a Scalable Third-Party Storage Security Protocol

    Publication Year: 2008, Page(s):20 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    With the trend of networking and the growth of data value, networked storage security becomes hotpot of research. Aiming at the scalability and security requirement of massive storage system, we proposed a security storage service model combining storage mechanism and security policy and designed a set of scalable third-party security protocols. The protocols adopt public-key cryptography to guara... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel

    Publication Year: 2008, Page(s):28 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    To protect data and recover data in case of failures, Linux operating system has built-in MD device that implements RAID architectures. Such device can recover data in case of single hardware failure among multiple disks. But it cannot recover data that were damaged by human errors, virus attack, and disastrous failures. In this paper, we present an implementation of a device driver that is capabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Surviving Optimisation within Brick Based Storage System

    Publication Year: 2008, Page(s):36 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    The cost of providing an organization with enterprise class storage is continuing to rise, due primarily to the use of specialised components and the complex internal storage system structures. This high cost has resulted in researchers directing their efforts towards modular or 'brick' based storage, which utilise commodity components while employing autonomic principles for the management of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EBEM: An Event-driven Bandwidth Estimation Method for Mobile Ad Hoc Network

    Publication Year: 2008, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Quality of Service (QoS) support has been well studied as a hotspot in mobile ad hoc network. However, since interference range is much larger than transmission range, estimating available bandwidth at each node remains a challenge. To address this problem, a novel Event-driven Bandwidth Estimation Method (EBEM) is proposed in this paper. By incorporating a comprehensive intra-flow interference pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Route Diversion in Connectionless Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):53 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    In a mobile ad hoc network (MANET), communication connections need to adapt to frequent unpredictable topology changes due to the mobility, energy constraints, and limited computing power of the mobile hosts. Early solutions address this fundamental requirement by employing techniques that can reconnect a broken link quickly with low overhead. This strategy, however, cannot cope with a high freque... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Congestion Control Based Multipath Routing Protocol for Video Transmission over Ad Hoc Networks

    Publication Year: 2008, Page(s):62 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    In wireless ad hoc networks, there are great challenges of supporting real-time video transmission due to the impact of frequent link interruptions, collisions, and bandwidth limitations and so on. Based on the analysis of the multipath routing and congestion control strategy, we propose a dynamic congestion control based multipath routing protocol (DccMR). DccMR establishes and maintains redundan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Topology-Transparent Scheduling and QoS Routing in Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):70 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    In this paper, a framework for joint topology-transparent scheduling (TTS) and quality-of-service (QoS) routing in mobile ad hoc networks is proposed. Inspired by the fact that TTS can guarantee single-hop QoS support without the overhead due to the re-computation of transmission schedules when the network topology changes, TTS is chosen as the medium access control (MAC) in both the control and d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • POND: The Power of Zone Overlapping in DHT Networks

    Publication Year: 2008, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Distributed hash table (DHT) based algorithms have been proposed to solve the routing issues in large-scale peer-to-peer (P2P) applications. DHT systems create an elegant peer-to-peer service model and work perfect in a homogeneous environment. Workload are evenly distributed on every participating peer and system is supposed to achieve the optimal performance. However, in the real world, the comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Consistency Guarantees for Large-Scale Replicated Services

    Publication Year: 2008, Page(s):89 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    To maintain consistency, designers of replicated services have traditionally been forced to choose from either strong consistency guarantees or none at all. Realizing that a continuum between strong and optimistic consistencies is semantically meaningful for a broad range of network services, previous research has proposed a continuous consistency model for replicated services to support the trade... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Bloom Filters in Peer-to-peer Systems: Issues and Questions

    Publication Year: 2008, Page(s):97 - 103
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Bloom filter is a widely-used data structure that concisely represents a large set of contents for approximate membership queries. Due to its good space efficiency, Bloom filter has been applied or customized in a variety of P2P system designs. Although the basic idea of Bloom filter is explained each time it is used, elaborative details are ignored. However, we argue that it is no.t always a triv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Effective Algorithm for Counting Active Flows Based on Loop Bloom Filter

    Publication Year: 2008, Page(s):104 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Network traffic analysis based on flows plays an important role in network monitoring and P2P identification. They are all grounded in flow counting and differ in how to count. Timeout detecting is a major strategy to identify termination of flows and can influence the validity of flow counting. The algorithms for counting flow based on Hash method can't deal with timeout problems perfectly. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Mobile Router Forwarding Scheme for Multicast in the NEMO

    Publication Year: 2008, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    Multicast is an efficient method to transmit datagrams in the Internet. In this paper, we provide a multicast algorithm in a network mobility (NEMO) environment. We propose the mobile router forwarding scheme (MRFS) algorithm. There are two advantages in the MRFS algorithm. First, MRFS reduces the storages in every MR especially in the TLMR (top level MR). Second, MRFS transmits multicast datagram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.