38 results on '"Dian-Shen"'
Search Results
2. Micro-Burst Aware ECN in Multi-Queue Data Centers: Algorithm and Implementation
- Author
-
Jinghui Zhang, Dian Shen, Fang Dong, Kexi Kang, Jiahui Jin, Junzhou Luo, and Junxue Zhang
- Subjects
Computer Networks and Communications ,Control and Systems Engineering ,Computer Science Applications - Published
- 2023
3. Enabling Distributed and Optimal RDMA Resource Sharing in Large-Scale Data Center Networks: Modeling, Analysis, and Implementation
- Author
-
Dian Shen, Junzhou Luo, Fang Dong, Xiaolin Guo, Ciyuan Chen, Kai Wang, and John C. S. Lui
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering ,Software ,Computer Science Applications - Published
- 2023
4. LoRaDrone: Enabling Low-Power LoRa Data Transmission via a Mobile Approach
- Author
-
Ciyuan Chen, Junzhou Luo, Zhuqing Xu, Runqun Xiong, Zhimeng Yin, Jingkai Lin, and Dian Shen
- Published
- 2022
5. Long-Term Workload Forecasting in Grid Cloud using Deep Ensemble Model
- Author
-
Jiaang Bao, Chao Yang, Nu Xia, and Dian Shen
- Published
- 2022
6. Towards the Full Extensibility of Multipath TCP with eMPTCP
- Author
-
Bin Yang, Dian Shen, Junxue Zhang, Fang Dong, Junzhou Luo, and John C.S. Lui
- Published
- 2022
7. Exploiting the Computational Path Diversity with In-network Computing for MEC
- Author
-
Xiaolin Guo, Fang Dong, Dian Shen, Zhaowu Huang, Zhenyang Ni, Yulong Jiang, and Daheng Yin
- Published
- 2022
8. Last-mile Matters: Mitigating the Tail Latency of Virtualized Networks with Multipath Data Plane
- Author
-
Dian Shen, Yi Zhai, Fang Dong, and Junzhou Luo
- Published
- 2022
9. Enabling Latency-Sensitive DNN Inference via Joint Optimization of Model Surgery and Resource Allocation in Heterogeneous Edge
- Author
-
Zhaowu Huang, Fang Dong, Dian Shen, Huitian Wang, Xiaolin Guo, and Shucun Fu
- Published
- 2022
10. Flow Characteristics Estimation Based On Multilayer Virtual Active Counter Sharing in Data Center Network
- Author
-
Shiqi Wang, Fang Dong, Dian Shen, and Wei Zhao
- Published
- 2022
11. ParaGraph: Subgraph-Level Network Function Composition With Delay Balanced Parallelism
- Author
-
Dian Shen, Rui Wang, Fucun Li, Fang Dong, and Haoyang Liu
- Subjects
Network function virtualization ,General Computer Science ,Network packet ,Computer science ,05 social sciences ,Packet processing ,service function chain ,General Engineering ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Parallel computing ,0508 media and communications ,network function composition ,0202 electrical engineering, electronic engineering, information engineering ,Forwarding plane ,Redundancy (engineering) ,datacenter ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Paragraph ,lcsh:TK1-9971 - Abstract
Recent efforts in the network function virtualization (NFV) field have targeted ameliorating end-to-end latency of service function chains (SFCs) using network function (NF) composition. NF composition breaks the NF into building blocks and decides the appropriate combination for these blocks. However, two issues remain in current NF composition methods: (1) In the sequential scope, the fine-grained function’s block-level composition eliminates redundancy, but with the drawback of flexibility restriction. (2) In the vertical scope, complete NF parallelism adds overhead in packet copying and reordering. To reconcile this, here we present ParaGraph , a subgraph-level NF composition with delay-balanced parallelism. ParaGraph has three main components: an NF subgraph-extraction module that extrapolates right-grained core function subgraphs from NFs; an orchestrator that dynamically composes subgraphs with delay-balanced parallelism; and an infrastructure performing lightweight packet copying and merging. We implement a ParaGraph prototype based on Click and the Data Plane Development Kit (DPDK); extensive evaluations show that with minimum overhead, ParaGraph reaches line-speed packet processing and reduces latency by up to 55% compared to state-of-the-art methods.
- Published
- 2020
12. Mechanism of transverse fracture of the skull base caused by blunt force to the mandible
- Author
-
Dian-Shen Wang, Qi-Feng Miao, Dong-Ri Li, Teng-Fei Yang, Xing-An Yang, Yan-Lin Zhang, Yan-Geng Yu, and Fu Zhang
- Subjects
Orthodontics ,Skull Base ,Skull Fractures ,Finite Element Analysis ,Base (geometry) ,Mandible ,Middle cranial fossa ,Pathology and Forensic Medicine ,Issues, ethics and legal aspects ,Transverse plane ,Skull ,Fractures, Bone ,medicine.anatomical_structure ,Blunt ,Mandibular fossa ,otorhinolaryngologic diseases ,medicine ,Humans ,Joint (geology) ,Geology - Abstract
Transverse fracture of the skull base is common both in the crushing of temporal regions of the skull and in the case of force acting on one temporal region. However, the mechanism of transverse skull base fracture caused by maxillofacial force has not been fully clarified. To provide an injury identification basis for forensic pathologists and clinicians, this paper combines accident reconstruction and finite element analysis methods to study the injury mechanism of an incomplete transverse fracture of skull base after the injured individual’s mandible was subjected to violence in a traffic accident. The results show that after the injured individual’s mandible was subjected to violence, forces in the direction of the left mandibular fossa and the right mandibular fossa were generated, creating the component forces. The combination of the two forces can produce a crushing effect toward the center of the skull base, as if the left and right temporal regions are being crushed, and the stress is concentrated at the joint of the mandible, the middle cranial fossa and the hypophyseal fossa. When the stress exceeds a certain limit, it will cause a transverse fracture of the skull base.
- Published
- 2021
13. Enabling Low Latency Edge Intelligence based on Multi-exit DNNs in the Wild
- Author
-
Qiang He, Guangxing Cai, Huitian Wang, Dian Shen, Junxue Zhang, Huang Zhaowu, and Fang Dong
- Subjects
Speedup ,Computer science ,Distributed computing ,Testbed ,Queuing delay ,Inference ,Enhanced Data Rates for GSM Evolution ,Latency (engineering) ,Time complexity ,Edge computing - Abstract
In recent years, deep neural networks (DNNs) have witnessed a booming of artificial intelligence Internet of Things applications with stringent demands across high accuracy and low latency. A widely adopted solution is to process such computation-intensive DNNs inference tasks with edge computing. Nevertheless, existing edge-based DNN processing methods still cannot achieve acceptable performance due to the intensive transmission data and unnecessary computation. To address the above limitations, we take the advantage of Multi-exit DNNs (ME-DNNs) that allows the tasks to exit early at different depths of the DNN during inference, based on the input complexity. However, naively deploying ME-DNNs in edge still fails to deliver fast and consistent inference in the wild environment. Specifically, 1) at the model-level, unsuitable exit settings will increase additional computational overhead and will lead to excessive queuing delay; 2) at the computation-level, it is hard to sustain high performance consistently in the dynamic edge computing environment. In this paper, we present a Low Latency Edge Intelligence Scheme based on Multi-Exit DNNs (LEIME) to tackle the aforementioned problem. At the model-level, we propose an exit setting algorithm to automatically build optimal ME-DNNs with lower time complexity; At the computation-level, we present a distributed offloading mechanism to fine-tune the task dispatching at runtime to sustain high performance in the dynamic environment, which has the property of close-to-optimal performance guarantee. Finally, we implement a prototype system and extensively evaluate it through testbed and large-scale simulation experiments. Experimental results demonstrate that LEIME significantly improves applications' performance, achieving 1.1–18.7 × speedup in different situations.
- Published
- 2021
14. VirtCo: joint coflow scheduling and virtual machine placement in cloud data centers
- Author
-
Dian Shen, Junxue Zhang, Junzhou Luo, and Fang Dong
- Subjects
Multidisciplinary ,Optimization problem ,business.industry ,Computer science ,Distributed computing ,Big data ,Testbed ,020206 networking & telecommunications ,02 engineering and technology ,Flow network ,computer.software_genre ,Scheduling (computing) ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data center ,business ,Heuristics ,computer - Abstract
Cloud data centers, such as Amazon EC2, host myriad big data applications using Virtual Machines (VMs). As these applications are communication-intensive, optimizing network transfer between VMs is critical to the performance of these applications and network utilization of data centers. Previous studies have addressed this issue by scheduling network flows with coflow semantics or optimizing VM placement with traffic considerations. However, coflow scheduling and VM placement have been conducted orthogonally. In fact, these two mechanisms are mutually dependent, and optimizing these two complementary degrees of freedom independently turns out to be suboptimal. In this paper, we present VirtCO, a practical framework that jointly schedules coflows and places VMs ahead of VM launch to optimize the overall performance of data center applications. We model the joint coflow scheduling and VM placement optimization problem, and propose effective heuristics for solving it. We further implement VirtCO with OpenStack and deploy it in a testbed environment. Extensive evaluation of real-world traces shows that compared with state-of-the-art solutions, VirtCO greatly reduces the average coflow completion time by up to 36.5%. This new framework is also compatible with and readily deployable within existing data center architectures.
- Published
- 2019
15. Task-aware flow scheduling with heterogeneous utility characteristics for data center networks
- Author
-
Dian Shen, Xiaolin Guo, Fang Dong, and Pengcheng Zhou
- Subjects
Bargaining problem ,Multidisciplinary ,Karush–Kuhn–Tucker conditions ,business.industry ,Computer science ,Distributed computing ,Cloud computing ,Task (computing) ,symbols.namesake ,Bandwidth allocation ,Lagrange multiplier ,symbols ,Data center ,Sensitivity (control systems) ,business - Abstract
With the continuous enrichment of cloud services, an increasing number of applications are being deployed in data centers. These emerging applications are often communication-intensive and data-parallel, and their performance is closely related to the underlying network. With their distributed nature, the applications consist of tasks that involve a collection of parallel flows. Traditional techniques to optimize flow-level metrics are agnostic to task-level requirements, leading to poor application-level performance. In this paper, we address the heterogeneous task-level requirements of applications and propose task-aware flow scheduling. First, we model tasks' sensitivity to their completion time by utilities. Second, on the basis of Nash bargaining theory, we establish a flow scheduling model with heterogeneous utility characteristics, and analyze it using Lagrange multiplier method and KKT condition. Third, we propose two utility-aware bandwidth allocation algorithms with different practical constraints. Finally, we present Tasch, a system that enables tasks to maintain high utilities and guarantees the fairness of utilities. To demonstrate the feasibility of our system, we conduct comprehensive evaluations with real-world traffic trace. Communication stages complete up to 1.4× faster on average, task utilities increase up to 2.26×, and the fairness of tasks improves up to 8.66× using Tasch in comparison to per-flow mechanisms.
- Published
- 2019
16. Towards Tunable RDMA Parameter Selection at Runtime for Datacenter Applications
- Author
-
Dian Shen, Jinghui Zhang, Chengtian Zhang, Junzhou Luo, Fang Dong, and Kai Wang
- Subjects
050101 languages & linguistics ,Service (systems architecture) ,Software_OPERATINGSYSTEMS ,Hardware_MEMORYSTRUCTURES ,Remote direct memory access ,Exploit ,Computer science ,business.industry ,05 social sciences ,Decision tree ,02 engineering and technology ,Server ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,business ,Throughput (business) ,Selection (genetic algorithm) - Abstract
Because of the low-latency and high-throughput benefits of RDMA, an increasing number of collaborative applications in datacenters are re-designed with RDMA to boost the performance. Among various low-level hardware primitives provided by RDMA, exposed as parameters of APIs, the application designers select and hardcode them to exploit all the performance benefits of RDMA. However, with the dynamic nature of datacenter application, the hardcoded and fixed parameter selection fails to take full advantages of RDMA capabilities, which can cause up to 35% throughput performance loss. To address this issue, we present a tunable RDMA parameter selection framework, which allows parameter tuning at runtime, adaptive to the dynamic application and server status. To attain the native RDMA performance, we use a lightweight decision tree to reduce the overhead of RDMA parameter selection. Finally, we implement the tunable RDMA parameter selection framework with native RDMA API to provide a more abstract API. To demonstrate the effectiveness of our method, we implement a key-value service based on the abstract API. Experiment results show that our implementation has only a very small overhead compared with the native RDMA, while the optimized key-value service achieves 112% more throughput than Pilaf and 66% more throughput than FaRM.
- Published
- 2021
17. Distributed and Optimal RDMA Resource Scheduling in Shared Data Center Networks
- Author
-
John C. S. Lui, Junzhou Luo, Fang Dong, Xiaolin Guo, Kai Wang, and Dian Shen
- Subjects
020203 distributed computing ,Software_OPERATINGSYSTEMS ,Hardware_MEMORYSTRUCTURES ,Remote direct memory access ,business.industry ,Computer science ,Distributed computing ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Constraint (information theory) ,Convergence (routing) ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,Data center ,business ,Data transmission - Abstract
Remote Direct Memory Access (RDMA) suffers from unfairness issues and performance degradation when multiple applications share RDMA network resources. Hence, an efficient resource scheduling mechanism is urged to optimally allocates RDMA resources among applications. However, traditional Network Utility Maximization (NUM) based solutions are inadequate for RDMA due to three challenges: 1) The standard NUM-oriented algorithm cannot deal with coupling variables introduced by multiple dependent RDMA operations; 2) The stringent constraint of RDMA on-board resources complicates the standard NUM by bringing extra optimization dimensions; 3) Naively applying traditional algorithms for NUM suffers from scalability and convergence issues in solving a large-scale RDMA resource scheduling problem.
- Published
- 2020
18. Multi-exit DNN Inference Acceleration based on Multi-Dimensional Optimization for Edge Intelligence
- Author
-
Fang Dong, Huitian Wang, Dian Shen, Zhaowu Huang, Qiang He, Jinghui Zhang, Liangsheng Wen, and Tingting Zhang
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering ,Software - Published
- 2022
19. Fault Diagnosis for the Virtualized Network in the Cloud Environment using Reinforcement Learning
- Author
-
Tao Xu, Huanhuan Zhang, Dian Shen, Jiahui Jin, and R. Q. Xiong
- Subjects
Computer science ,business.industry ,Distributed computing ,Cloud computing ,computer.software_genre ,Electronic mail ,Virtual machine ,Server ,Overhead (computing) ,Reinforcement learning ,Network performance ,business ,computer ,Virtual network - Abstract
In the cloud environment, the virtualized network provides the connectivity to a massive of virtual machines through various virtual network devices. In such a complicated networking system, network faults are not occasional. It is urging for the system administrators to have the ability to investigate a fault and recover from it. However, the complexity of the virtualized network and the similarity among the symptom of faults makes the accurate diagnosis challenging. In this paper, we leverage the method of reinforcement learning to facilitate the fault diagnosis in the cloud environment, where it diagnoses the faults through an “exploration and exploitation” manner. Further, we investigate the key factors that influence the network performance and may cause the network faults. Based on this investigation, we present how to train the network diagnosis module with the Q-learning algorithm. Experimental results show that the diagnosis accuracy of our reinforcement learning based method is around 8% higher than traditional methods, and incurs very slight system overhead.
- Published
- 2019
20. MBECN: Enabling ECN with Micro-burst Traffic in Multi-queue Data Center
- Author
-
Jiahui Jin, Kexi Kang, Jinghui Zhang, Junzhou Luo, Zhiang Wu, Wenxin Li, and Dian Shen
- Subjects
Computer science ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network delay ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,Latency (engineering) ,business ,Generalized processor sharing ,Queue ,Explicit Congestion Notification ,Computer network - Abstract
Modern multi-queue data centers often use the standard Explicit Congestion Notification (ECN) scheme to achieve high network performance. However, one substantial drawback of this approach is that micro-burst traffic can cause the instantaneous queue length to exceed the ECN’s threshold, resulting in numerous mismarkings. After enduring too many mismarkings, senders may overreact, leading to severe throughput loss. As a solution to this dilemma, we propose our own adaptationthe Micro-burst ECN (MBECN) scheme-to mitigate mismarking. MBECN finds a more appropriate threshold baseline for each queue to absorb micro-bursts, based on steady-state analysis and an ideal generalized processor sharing (GPS) model. By adopting a queue-occupation-based dynamically adjusting algorithm, MBECN effectively handles packet backlog without hurting latency. Through testbed experiments, we find that MBECN improves throughput by ~20% and reduces flow completion time (FCT) by ~40%. Using large scale simulations, we find that throughput can be improved by 1.5~2.4× with DCTCP and 1.26~1.35× with ECN*. We also measure network delay and find that latency only increases by 7.36%.
- Published
- 2019
21. Rendering differential performance preference through intelligent network edge in cloud data centers
- Author
-
Pengcheng Zhou, Xiaolin Guo, Dian Shen, Yidan Gao, and R. Q. Xiong
- Subjects
Edge device ,Computer Networks and Communications ,business.industry ,Computer science ,Real-time computing ,Virtualization ,computer.software_genre ,Computer Science Applications ,Theoretical Computer Science ,Rendering (computer graphics) ,Intelligent Network ,Cloud data ,Computational Theory and Mathematics ,Data center ,business ,computer ,Software ,Flow scheduling - Published
- 2019
22. QAECN: Dynamically Tuning ECN Threshold with Micro-burst in Multi-queue Data Centers
- Author
-
Kexi Kang, Junzhou Luo, Jinghui Zhang, Jiahui Jin, R. Q. Xiong, and Dian Shen
- Subjects
050101 languages & linguistics ,Computer science ,Packet loss ,05 social sciences ,Real-time computing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Throughput ,02 engineering and technology ,Throughput (business) ,Queue ,Degradation (telecommunications) - Abstract
Packet loss is a common problem in data center networks. The factors causing packet loss are various. Among them, micro-burst is the most important reason. Some previous works have studied the causes and influence o f micro-burst in single queue data center. However, through simulations and experiments, we find that micro-burst could bring m ore serious performance degradation in multi-queue data centers. The micro-burst traffic could cause E CN marking ratio rising from 4% to 22%, and cause throughput loss by up to 40%. Through observing queue length, we find that the standard E CN, which adopts immutable threshold, is not suitable for micro-burst traffic because micro-burst could trigger spurious congestion signals frequently, especially in DCTCP. In this paper, we not only show how much influence the micro-burst brings, but also propose Queue-length Aware ECN (QA-ECN) scheme to mitigate micro-burst. Finally, the simulations and experiments show that QAECN could reduce ECN marking ratio to 2.5%. In addition, the throughput and flow completion time could be improved by up to 22.9% and 34.1%, respectively.
- Published
- 2019
23. Stochastic modeling of dynamic right-sizing for energy-efficiency in cloud data centers
- Author
-
Guoqing Jin, Wei Wang, Xiang Fei, Dian Shen, Junzhou Luo, Fang Dong, and Weidong Li
- Subjects
Queueing theory ,Computer Networks and Communications ,Stochastic modelling ,business.industry ,Computer science ,Distributed computing ,Workload ,Cloud computing ,Energy consumption ,Virtualization ,computer.software_genre ,Idle ,Hardware and Architecture ,Server ,Data center ,business ,computer ,Software ,Efficient energy use - Abstract
Large data centers are usually built to support increasing computational and data storage demand of growing global business and industry, which consume an enormous amount of energy, at a huge cost to both business and the environment. However, much of that energy is wasted to maintain excess service capacity during periods of low load. In this paper, we investigate the problem of "right-sizing" data center for energy-efficiency through virtualization which allows consolidation of workloads into smaller number of servers while dynamically powering off the idle ones. In view of the dynamic nature of data centers, we propose a stochastic model based on Queueing theory to capture the main characteristics. Solving this model, we notice that there exists a tradeoff between the energy consumption and performance. We hereby develop a BFGS based algorithm to optimize the tradeoff by searching for the optimal system parameter values for the data center operators to "right-size" the data centers. We implement our Stochastic Right-sizing Model (SRM) and deploy it in the real-world cloud data center. Experiments with two real-world workload traces show that SRM can significantly reduce the energy consumption while maintaining high performance. A Stochastic Right-sizing Model(SRM) based on Queueing theory is proposed.A BFGS based algorithm is proposed to achieve energy-efficiency.SRM is implemented with open-source cloud platform OpenStack.
- Published
- 2015
24. A Novel Solution of Cloud Operating System Based on X11 and Docker
- Author
-
Zhen Du, Fang Dong, Zhuging Xu, and Dian Shen
- Subjects
business.industry ,Computer science ,Bandwidth (signal processing) ,CPU time ,020207 software engineering ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Embedded operating system ,Software ,Virtual machine ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,020201 artificial intelligence & image processing ,business ,computer ,Virtual network - Abstract
With the fast development of cloud technologies, cloud-based operating systems are becoming increasingly popular, while several enterprise products, such as Chrome OS and SUNDE, are released continuously. According to the way of usage, the existing cloud-based operating systems can be divided into two categories: browser-driven operating system and virtualization-based operating system. However, traditional cloud-based operating systems have some disadvantages: As the functionality of browser is limited, it is difficult to transplant traditional desktop software to browser based cloud operating system; on the other hand, as for systems which are based on remote virtual machines (VMs) and Virtual Network Console (VNC), the system performance is constrained by the limited network bandwidth, which will also lead to performance degradation. To solve these problems, this paper designs AntOS, a full-featured cloud operating system. AntOS takes advantage of Docker and X11 technique, to reduce the load of network over 50% while increasing CPU utilization by 45%, which can effectively support the private cloud scenario in enterprises.
- Published
- 2017
25. Virtual network fault diagnosis mechanism based on fault injection
- Author
-
Huanhuan Zhang, Dian Shen, Jiahui Jin, Fang Dong, and R. Q. Xiong
- Subjects
0209 industrial biotechnology ,Computer science ,Network packet ,business.industry ,Distributed computing ,020208 electrical & electronic engineering ,Real-time computing ,Cloud computing ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Fault injection ,Fault (power engineering) ,Fault indicator ,Stuck-at fault ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,Power-system protection ,business ,Virtual network - Abstract
Diagnosing faults in virtual networks is always a popular research area. Existing researches primarily focus on diagnosing faults in physical networks, while they could not identify the faults introduced by virtual networks. Besides, the high complexity of algorithms and the requirement for modifying hardware may limit their scope of use. To address these drawbacks, in this paper, we propose a novel approach to diagnose faults in virtual networks. The rational of our approach is that the faults can be identified when located in the packet traces, with the knowledge that the possible known faults that can happen in that location. To achieve this goal, we apply packet marking, fault injection and machine learning techniques to provide precise fault diagnosis. Experimental results show that our approach can efficiently identify 73% of the faults while for virtual network-specific faults, our approach can diagnose 86% of them. Our system can also support real-time or near real-time fault analysis.
- Published
- 2017
26. Facilitating Application-aware Bandwidth Allocation in the Cloud with One-step-ahead Traffic Information
- Author
-
Junxue Zhang, Junzhou Luo, Dian Shen, Fang Dong, Jiahui Jin, and Jun Shen
- Subjects
020203 distributed computing ,Information Systems and Management ,Channel allocation schemes ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Big data ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Computer Science Applications ,Bandwidth allocation ,0803 Computer Software, 0805 Distributed Computing, 0806 Information Systems ,Hardware and Architecture ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,Overhead (computing) ,Resource management ,business ,computer - Abstract
© 2008-2012 IEEE. Bandwidth allocation to virtual machines (VMs) has a significant impact on the performance of communication-intensive big data applications hosted in VMs. It is crucial to accurately determine how much bandwidth to be reserved for VMs and when to adjust it. Past approaches typically resort to predicting the long-term network demands of applications for bandwidth allocation. However, lacking of prediction accuracy, these methods lead to the unpredictable application performance. Recently, it is conceded that the network demands of applications can only be accurately derived right before each of their execution phases. Hence, it is challenging to timely allocate the bandwidth to VMs with limited information. In this paper, we design and implement AppBag, an Application-aware Bandwidth guarantee framework, which allocates the accurate bandwidth to VMs with one-step-ahead traffic information. We propose an algorithm to allocate the bandwidth to VMs and map them onto feasible hosts. To reduce the overhead when adjusting the allocation, an efficient Lazy Migration (LM) algorithm is proposed with bounded performance. We conduct extensive evaluations using real-world applications, showing that AppBag can handle the bandwidth requests at run-time, while reducing the execution time of applications by 47.3 percent and the global traffic by 36.7 percent, compared to the state-of-the-art methods.
- Published
- 2019
27. A mixed lubrication model with consideration of starvation and interasperity cavitations
- Author
-
Shengguang Zhang, Yuanzhong Hu, Wenzhong Wang, Shanshan Li, and Dian Shen
- Subjects
Mathematical optimization ,Materials science ,Mechanical Engineering ,Lubrication ,Starvation (glaciology) ,Surfaces and Interfaces ,Mechanics ,Surfaces, Coatings and Films - Abstract
This article presents a mixed lubrication model for point contacts with considering the inlet starvation and interasperity cavitations. The pressure distribution on the entire computational domain is obtained through solving a unified Reynolds equation system without identifying hydrodynamic or asperity contact regions. The Jacobsson–Floberg–Olsson mass-conservative boundary conditions are incorporated in the lubrication analysis based on Elrod’s algorithm. The inlet oil supply condition which may bring about starvation and local cavitation phenomenon is considered by defining the inlet lubricant thickness distribution. The fast Fourier transform based technique is employed to speed up the surface deformation calculation. A unique solution scheme is constructed to solve full film region, cavitation region, and contact region simultaneously. The model has been applied to the lubrication problems of textured surface under starved conditions. Numerical examples are analyzed and the results show that the present model can be used to investigate the lubrication performance under starved conditions, and that the solution methods are computationally efficient and robust.
- Published
- 2012
28. Synthesis of Nonspherical Banana-Like Mesoporous Silica and their Vertically Deposition Assembly
- Author
-
Guanzhong Lu, Shao Dian Shen, Qiong Ji, Chen Liang Guan, Dong Sen Mao, and Sheng Han
- Subjects
Mesoporous organosilica ,Materials science ,Morphology (linguistics) ,business.industry ,Monolayer ,General Engineering ,Deposition (phase transition) ,Nanotechnology ,Photonics ,Mesoporous silica ,Anisotropy ,business ,BET theory - Abstract
Nonspherical mesoporous silica with banana-like morphology has been synthesized successfully through organic-inorganic cooperative interaction by adding the small molecules additives. SEM and TEM image revealed that the silica with banana-like morphology possess hexagonal pore channels and packed parallel to the long axis. XRD further confirmed the high ordered two dimensional (2-D) hexagonal (p6m) mesostructure. N2 adsorption-desorption measurement show that they have high BET surface area and large pore size and pore volume. Impressively, through vertical deposition assembly technique, the anisotropic nonspherical banana-like mesoporous silica can be organized into closely-packed monolayer and multilayer film, demonstrating potential application in photonics, electronics and magnetics.
- Published
- 2012
29. Towards a fast and secure design for enterprise-oriented cloud storage systems
- Author
-
Pengcheng Zhou, Junzhou Luo, Fang Dong, Zijian Liu, Zhuqing Xu, and Dian Shen
- Subjects
020203 distributed computing ,Computer access control ,Computer Networks and Communications ,business.industry ,Computer science ,Testbed ,Information technology ,Access control ,02 engineering and technology ,Computer security ,computer.software_genre ,Computer Science Applications ,Theoretical Computer Science ,Data access ,Computational Theory and Mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Role-based access control ,020201 artificial intelligence & image processing ,Data center ,business ,Distributed File System ,Cloud storage ,computer ,Software - Abstract
Summary With the rapid development of information technology, enormous volumes of data are being generated by enterprises at all times. The management and storage of these large-scale data have always been challenging enterprises. As these data are usually shared among users in a collaborative manner, secure data access and access performance are 2 key concerns for data storage of enterprises. However, current solutions fail to meet the requirements of enterprises since they suffer from the following drawbacks: (1) they do not support fine-grained access control and cannot meet the strict secure data access requirements of enterprises, and (2) they suffer from the unpredictable access latency. Thus in this paper, we propose Frostor, an enterprise-oriented cloud storage system, which addresses the secure data access issue through a user account and IP-based fine-grained access control mechanism, and guarantees the access performance via a two-level performance optimization mechanism. We further implement Frostor and deploy it on the testbed environment in a real data center. Extensive evaluations have shown that Frostor implements fine-grained access control, while achieving a significant reduction (≥60%) on access latency.
- Published
- 2017
30. Game theory based dynamic resource allocation for hybrid environment with cloud and big data application
- Author
-
Dian Shen, Junxue Zhang, Junzhou Luo, and Fang Dong
- Subjects
Computer science ,business.industry ,Distributed computing ,Big data ,Resource allocation ,Cloud computing ,business ,Game theory ,Dynamic resource - Published
- 2014
31. Cost-Effective Virtual Machine Image Replication Management for Cloud Data Centers
- Author
-
Junxue Zhang, Dian Shen, Junzhou Luo, and Fang Dong
- Subjects
Elasticity (cloud computing) ,Computer science ,Virtual machine ,business.industry ,High availability ,Distributed computing ,Real-time computing ,Cloud computing ,Provisioning ,computer.software_genre ,business ,computer ,Data modeling - Abstract
Cloud computing offers infrastructure as a service to deliver large amount of computation and storage resources, in which fast provisioning of virtual machine(VM) instances has significant impacts on the overall system performance and elasticity. In this paper, we analyze the characteristics of image provisioning by studying the traces collected from the real-world cloud data centre. From the analysis results, we observe that the overloaded and dynamic requests for some popular images result in degradation and fluctuation of performance and availability of the system. Addressing this issue, we propose a stochastic model based on queueing theory, which captures the main factors in image provisioning to optimize the number and placement of image replication, so as to manage the VM images in a cost-effective manner. We implement our theoretical model based on open-source cloud platform and carry out trace driven evaluation to validate its effectiveness. The evaluation results show that our system is cost-effective and can achieve high and stable performance in VM provisioning while remaining high availability under different test scenarios.
- Published
- 2014
32. Multiple renal arteries with renal cell carcinoma: preoperative evaluation using computed tomography angiography prior to laparoscopic nephrectomy
- Author
-
Zhang Xuan, Guan Wenhua, Dian-Shen Chen, Zhong-Wei Gao, Han Yan, and Xiao-Shan Feng
- Subjects
Adult ,Male ,medicine.medical_specialty ,urologic and male genital diseases ,Kidney ,Biochemistry ,Nephrectomy ,Renal Artery ,Renal cell carcinoma ,Multidetector computed tomography ,Preoperative Care ,medicine ,Humans ,Carcinoma, Renal Cell ,Computed tomography angiography ,Aged ,Aged, 80 and over ,medicine.diagnostic_test ,business.industry ,Biochemistry (medical) ,Multiple renal arteries ,Laparoscopic nephrectomy ,Angiography, Digital Subtraction ,Cell Biology ,General Medicine ,Middle Aged ,medicine.disease ,Kidney Neoplasms ,Female ,Laparoscopy ,Radiology ,business ,Tomography, X-Ray Computed - Abstract
Objective To investigate anatomical variations in the renal arteries of patients with renal cell carcinoma (RCC) using computed tomography angiography (CTA). Methods Patients diagnosed with RCC were evaluated using CTA prior to undergoing laparoscopic nephrectomy. Any anatomical variations of the renal arteries on the side affected by the RCC were recorded. The CTA results were compared with the observations made during surgery and those produced by conventional digital subtraction angiography. Results A total of 107 patients with RCC were enrolled in the study. Multiple renal arteries were found in 11 patients (10.3%). Accessory renal inferior polar arteries were the most common type of multiple renal arteries. Multiple renal arteries acting as the feeding arteries to the RCC were found in five patients (4.7%). Conclusion CTA can be used as part of the preoperative evaluation prior to laparoscopic nephrectomy to provide anatomical information about the presence of multiple renal arteries in the affected kidney of patients with RCC. This could help with planning the surgery and reducing surgical complications.
- Published
- 2013
33. Doing Better Business: Trading a Little Execution Time for High Energy Saving under SLA Constraints
- Author
-
Weidong Li, Xiang Fei, Dian Shen, Guoqing Jin, Wei Wang, Junzhou Luo, and Fang Dong
- Subjects
business.industry ,Computer science ,Distributed computing ,Cloud computing ,Energy consumption ,computer.software_genre ,Virtualization ,Energy conservation ,Virtual machine ,Server ,Overhead (computing) ,Data center ,business ,computer - Abstract
Large data centers are usually built to support the enormous computation and storage capability of Cloud Computing which has attracted people's attention nowadays. However, such large scale data centers generally consume an enormous amount of energy, which not only increases the running cost but also simultaneously enhances their greenhouse gas emissions. Addressing this issue, Virtualization technology is introduced, through which multiple Virtual Machines(VMs) can be centralized to fewer servers while allowing the idle servers to be dynamically powered off in order to save the energy consumption. In the paper, we investigate the impact of Virtualization technology on the energy and performance in data center environment taking into consideration various factors such as server failures and the overhead introduced by the VM contention. Noticing that there exits a tradeoff between energy consumption and execution time, we propose a stochastic model of data centers using Queueing theory to optimize performance and energy consumption. From the data center operators' prospective, they are willing to do better business by saving the energy consumption while abiding by the SLAs. Therefore, we try to find an optimal Energy-Performance tradeoff policy for the data center operators to operate data centers. The simulation results show that our model can significantly reduce the energy consumption by up to 35.4 while sacrificing a little execution time.
- Published
- 2013
34. The Effect of Triangle-Shaped Surface Textures on the Performance of the Lubricated Point-Contacts
- Author
-
Zhixiang Huang, Dian Shen, Shanshan Li, Wenzhong Wang, and Ling-Jia Kong
- Subjects
Engineering drawing ,Materials science ,Mechanical Engineering ,Contact resistance ,Surfaces and Interfaces ,Surface finish ,Tribology ,Electrical contacts ,Surfaces, Coatings and Films ,Mechanics of Materials ,Dimple ,Lubrication ,Profilometer ,Texture (crystalline) ,Composite material - Abstract
It has been recognized that purposefully designed surface texturing can contribute to the improvement of tribological performance of elements and friction reduction. However, its optimal parameters may depend on the operating conditions. This paper investigated the effect of a triangle-shaped dimples array on the tribological performance of the lubricated point-contacts under different lubrication regimes, based on the rotational sliding experiment of a patterned steel disk against smooth steel balls. The dimples arrays were produced by laser process and characterized by the 3D profilometer. A series of tests were conducted with different dimple parameters including depth, coverage ratio, size, and direction. Stribecklike curves were obtained to depict the transition of lubrication regimes, and the electrical contact resistance was utilized to qualitatively characterize the lubrication status. The test results showed that the dimples arrays with different sizes, depths and coverage ratios had a distinct effect on the friction behaviors. Compared with the nontextured surfaces, when the dimple depth decreased from 30μm to zero with fixed coverage ratio and size, the friction coefficient firstly decreased, and then increased. The friction coefficient finally approached that of the nontextured surface, during which the lowest value appeared at the dimple depth of approximately 10∼15μm. The coverage ratio of texture showed the similar effect on the friction coefficient. Usually, the coverage ratio of approximately 10% resulted in the lowest friction coefficient. The dimple size and direction also had obvious effects on the friction coefficient. Thus, it can be concluded that there exists a set of optimal values for the dimple depth, coverage ratio, size, and direction to realize the friction reduction.
- Published
- 2013
35. Enabling application-aware flexible graph partition mechanism for parallel graph processing systems
- Author
-
Dian Shen, Jiahui Jin, Junzhou Luo, Fang Dong, and Junxue Zhang
- Subjects
Theoretical computer science ,Computer Networks and Communications ,Computer science ,Distributed computing ,Graph partition ,Voltage graph ,02 engineering and technology ,Strength of a graph ,Computer Science Applications ,Theoretical Computer Science ,Computational Theory and Mathematics ,020204 information systems ,Clique-width ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,020201 artificial intelligence & image processing ,Null graph ,Software ,Complement graph ,Distance-hereditary graph - Published
- 2016
36. Research on the Impact of the Number of Wheels and Layouts to the Performances of Omni-Directional Chassis
- Author
-
Sheng-bin Huang, Dian-shen Chen, and Hao-qing Gong
- Subjects
Engineering ,Chassis ,Body posture ,business.industry ,Omni directional ,Stability (learning theory) ,Robot ,Functional requirement ,business ,Mobile device ,Automotive engineering ,Simulation - Abstract
The Omni-directional mobile chassis is a kind of mobile device which can travel in any direction under the premise of a fixed body posture, and can guarantee a zero radius of gyration when rotating. It shows different performances with different number of wheels or layouts. Based on the robot chassis functional requirements: mobility and stability, this article, through the theoretical analysis/ADAMS simulation and experiment to the three-wheel and four-wheel chassis proposals respectively, compares their two types of performances and finally gets their advantages and weaknesses. The conclusion of this paper provides some reference on the application of different Omni-directional mobile chassises in different situations.
- Published
- 2012
37. [The compatibility between packing material and ipratropium bromide aerosol]
- Author
-
Zhi-hua, Yue, Dian-dian, Shen, and Chang-qin, Hu
- Subjects
Aerosols ,Drug Incompatibility ,Quality Control ,Ipratropium ,Spectrometry, Mass, Matrix-Assisted Laser Desorption-Ionization ,Butylated Hydroxytoluene ,Antioxidants ,Chromatography, High Pressure Liquid ,Drug Packaging ,Bronchodilator Agents - Abstract
With the establishment of HPLC and LC-MS methods to determine the related substances and the content of active pharmaceutical ingredient (API) in ipratropium bromide aerosol products, several packing material-related impurities were identified, including antioxygen BHT and antioxygen 2246. Results showed that these leachable additives from the packing materials may present at a relative high level in the drug solution, and the low content of API in the drug products is usually due to the adsorption of the packing material as well as the leaking of contents. The current available assay methods for the control of ipratropium bromide aerosol products are often lack of specificity and unable to assure the drug quality effectively. To meet the increasing attention on the regulations of drug packing materials, our research would be a pilot study, indicating that the inappropriate packing materials could cause the migration and adsorption of the active ingredients, and the importance to have compatibility studies between packing materials and drugs.
- Published
- 2011
38. Bioactive triterpenoids from Symplocos chinensis
- Author
-
Dian-Dian Shen, Shi-Shan Yu, Xi-Hao Li, and Nan Li
- Subjects
Magnetic Resonance Spectroscopy ,Stereochemistry ,Carboxylic acid ,Pharmaceutical Science ,Antineoplastic Agents ,Pharmacognosy ,Asteraceae ,Crystallography, X-Ray ,Plant Roots ,Analytical Chemistry ,law.invention ,Inhibitory Concentration 50 ,Triterpene ,law ,Drug Discovery ,Symplocaceae ,Tumor Cells, Cultured ,Humans ,Pharmacology ,chemistry.chemical_classification ,Traditional medicine ,biology ,Plant Extracts ,Organic Chemistry ,Biological activity ,General Medicine ,biology.organism_classification ,Terpenoid ,Triterpenes ,Complementary and alternative medicine ,chemistry ,Molecular Medicine ,Phytotherapy - Abstract
A new triterpenoid, 2beta,3beta,19alpha,24-tetrahydroxy-23-norurs-12-en-28-oic acid (4), together with three known triterpenoids 3-oxo-19alpha,23,24-trihydroxyurs-12-en-28-oic acid (1), 2alpha,3beta,19alpha,23-tetrahydroxyurs-12-en-28-oic acid (2), 2alpha,3alpha,19alpha,23-tetrahydroxyurs-12-en-28-oic acid (3), was isolated from the roots of Symplocos chinensis. The new triterpenoid shows significant cytotoxic activity against B16 and BGC-823 cells.
- Published
- 2003
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.