Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2018-12

AUTHORS

T. R. Shmeleva

ABSTRACT

The classification and application of switching methods and their advantages and disadvantages are considered. A computing grid model was constructed in the form of a colored Petri net with a node, which implements cut-through packet switching. The model consists of packet switching nodes, traffic generators, and guns that form malicious traffic disguised as usual user traffic. The characteristics of the grid model are investigated under a workload with different intensities. The influence of malicious traffic such as “traffic duel” to the quality of service parameters of the grid is estimated. A comparative analysis of computing grid stability with nodes, which implement store-and-forward (SAF) and cut-through switching technologies, was conducted. It is shown that grid performance is approximately the same under workload, and under peak load the grid with a node implementing SAF packet transmission is more stable. The grid with nodes implementing SAF technology comes to a complete deadlock through an additional load, which is less than 10%. It is shown after detailed study that the traffic duel configuration does not affect the grid with cut-through nodes when increasing the workload up to peak load, at which the grid comes to a complete deadlock. The periodicity of execution of the guns, which generate malicious traffic, is determined by a random function with the Poisson distribution. The CPN Tools modeling system is used for constructing models and measuring characteristics. The grid performance and average packet delivery time are estimated under different variants of the grid load. More... »

PAGES

596-604

Identifiers

URI

http://scigraph.springernature.com/pub.10.3103/s0146411618070222

DOI

http://dx.doi.org/10.3103/s0146411618070222

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1112534962


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Popov Odessa National Academy of Telecommunications, 65029, Odessa, Ukraine"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Shmeleva", 
        "givenName": "T. R.", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/s10586-016-0582-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016063562", 
          "https://doi.org/10.1007/s10586-016-0582-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10586-016-0582-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016063562", 
          "https://doi.org/10.1007/s10586-016-0582-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://app.dimensions.ai/details/publication/pub.1026634143", 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/b95112", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026634143", 
          "https://doi.org/10.1007/b95112"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/b95112", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026634143", 
          "https://doi.org/10.1007/b95112"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-4612-0017-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029692188", 
          "https://doi.org/10.1007/978-1-4612-0017-8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-4612-0017-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029692188", 
          "https://doi.org/10.1007/978-1-4612-0017-8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-0-85729-676-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040179170", 
          "https://doi.org/10.1007/978-0-85729-676-4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-0-85729-676-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040179170", 
          "https://doi.org/10.1007/978-0-85729-676-4"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018-12", 
    "datePublishedReg": "2018-12-01", 
    "description": "The classification and application of switching methods and their advantages and disadvantages are considered. A computing grid model was constructed in the form of a colored Petri net with a node, which implements cut-through packet switching. The model consists of packet switching nodes, traffic generators, and guns that form malicious traffic disguised as usual user traffic. The characteristics of the grid model are investigated under a workload with different intensities. The influence of malicious traffic such as \u201ctraffic duel\u201d to the quality of service parameters of the grid is estimated. A comparative analysis of computing grid stability with nodes, which implement store-and-forward (SAF) and cut-through switching technologies, was conducted. It is shown that grid performance is approximately the same under workload, and under peak load the grid with a node implementing SAF packet transmission is more stable. The grid with nodes implementing SAF technology comes to a complete deadlock through an additional load, which is less than 10%. It is shown after detailed study that the traffic duel configuration does not affect the grid with cut-through nodes when increasing the workload up to peak load, at which the grid comes to a complete deadlock. The periodicity of execution of the guns, which generate malicious traffic, is determined by a random function with the Poisson distribution. The CPN Tools modeling system is used for constructing models and measuring characteristics. The grid performance and average packet delivery time are estimated under different variants of the grid load.", 
    "genre": "research_article", 
    "id": "sg:pub.10.3103/s0146411618070222", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1136763", 
        "issn": [
          "0146-4116", 
          "1558-108X"
        ], 
        "name": "Automatic Control and Computer Sciences", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "7", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "52"
      }
    ], 
    "name": "Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures", 
    "pagination": "596-604", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "65d6c90cb49b442a68f503eb28d5dbcd7a161355a98fec72224c312c41907615"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.3103/s0146411618070222"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1112534962"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.3103/s0146411618070222", 
      "https://app.dimensions.ai/details/publication/pub.1112534962"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T11:05", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000352_0000000352/records_60367_00000004.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.3103%2FS0146411618070222"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.3103/s0146411618070222'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.3103/s0146411618070222'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.3103/s0146411618070222'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.3103/s0146411618070222'


 

This table displays all metadata directly associated to this object as RDF triples.

77 TRIPLES      21 PREDICATES      32 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.3103/s0146411618070222 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N5c162400244041cea5be8166640ee91b
4 schema:citation sg:pub.10.1007/978-0-85729-676-4
5 sg:pub.10.1007/978-1-4612-0017-8
6 sg:pub.10.1007/b95112
7 sg:pub.10.1007/s10586-016-0582-9
8 https://app.dimensions.ai/details/publication/pub.1026634143
9 schema:datePublished 2018-12
10 schema:datePublishedReg 2018-12-01
11 schema:description The classification and application of switching methods and their advantages and disadvantages are considered. A computing grid model was constructed in the form of a colored Petri net with a node, which implements cut-through packet switching. The model consists of packet switching nodes, traffic generators, and guns that form malicious traffic disguised as usual user traffic. The characteristics of the grid model are investigated under a workload with different intensities. The influence of malicious traffic such as “traffic duel” to the quality of service parameters of the grid is estimated. A comparative analysis of computing grid stability with nodes, which implement store-and-forward (SAF) and cut-through switching technologies, was conducted. It is shown that grid performance is approximately the same under workload, and under peak load the grid with a node implementing SAF packet transmission is more stable. The grid with nodes implementing SAF technology comes to a complete deadlock through an additional load, which is less than 10%. It is shown after detailed study that the traffic duel configuration does not affect the grid with cut-through nodes when increasing the workload up to peak load, at which the grid comes to a complete deadlock. The periodicity of execution of the guns, which generate malicious traffic, is determined by a random function with the Poisson distribution. The CPN Tools modeling system is used for constructing models and measuring characteristics. The grid performance and average packet delivery time are estimated under different variants of the grid load.
12 schema:genre research_article
13 schema:inLanguage en
14 schema:isAccessibleForFree false
15 schema:isPartOf N003c6ba749a74296ab2b1e3c2dd0c57c
16 N553cccacea8b4e608d98d8bb98a23986
17 sg:journal.1136763
18 schema:name Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures
19 schema:pagination 596-604
20 schema:productId N6fd3823b39a84baaa8af903372ce28c7
21 Ndec938de0cd94afa8bdc5759eb2cc714
22 Ne40cc32cf8404cd79955793f1575f6a4
23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112534962
24 https://doi.org/10.3103/s0146411618070222
25 schema:sdDatePublished 2019-04-11T11:05
26 schema:sdLicense https://scigraph.springernature.com/explorer/license/
27 schema:sdPublisher Nb8340c513cbd43e3b4305449b7a04cb1
28 schema:url https://link.springer.com/10.3103%2FS0146411618070222
29 sgo:license sg:explorer/license/
30 sgo:sdDataset articles
31 rdf:type schema:ScholarlyArticle
32 N003c6ba749a74296ab2b1e3c2dd0c57c schema:issueNumber 7
33 rdf:type schema:PublicationIssue
34 N0b7f4f0df6d3425d84d4669d89c90d1d schema:name Popov Odessa National Academy of Telecommunications, 65029, Odessa, Ukraine
35 rdf:type schema:Organization
36 N4287f8d483eb4827a1729ed18a39901d schema:affiliation N0b7f4f0df6d3425d84d4669d89c90d1d
37 schema:familyName Shmeleva
38 schema:givenName T. R.
39 rdf:type schema:Person
40 N553cccacea8b4e608d98d8bb98a23986 schema:volumeNumber 52
41 rdf:type schema:PublicationVolume
42 N5c162400244041cea5be8166640ee91b rdf:first N4287f8d483eb4827a1729ed18a39901d
43 rdf:rest rdf:nil
44 N6fd3823b39a84baaa8af903372ce28c7 schema:name dimensions_id
45 schema:value pub.1112534962
46 rdf:type schema:PropertyValue
47 Nb8340c513cbd43e3b4305449b7a04cb1 schema:name Springer Nature - SN SciGraph project
48 rdf:type schema:Organization
49 Ndec938de0cd94afa8bdc5759eb2cc714 schema:name doi
50 schema:value 10.3103/s0146411618070222
51 rdf:type schema:PropertyValue
52 Ne40cc32cf8404cd79955793f1575f6a4 schema:name readcube_id
53 schema:value 65d6c90cb49b442a68f503eb28d5dbcd7a161355a98fec72224c312c41907615
54 rdf:type schema:PropertyValue
55 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
56 schema:name Information and Computing Sciences
57 rdf:type schema:DefinedTerm
58 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
59 schema:name Computer Software
60 rdf:type schema:DefinedTerm
61 sg:journal.1136763 schema:issn 0146-4116
62 1558-108X
63 schema:name Automatic Control and Computer Sciences
64 rdf:type schema:Periodical
65 sg:pub.10.1007/978-0-85729-676-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040179170
66 https://doi.org/10.1007/978-0-85729-676-4
67 rdf:type schema:CreativeWork
68 sg:pub.10.1007/978-1-4612-0017-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029692188
69 https://doi.org/10.1007/978-1-4612-0017-8
70 rdf:type schema:CreativeWork
71 sg:pub.10.1007/b95112 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026634143
72 https://doi.org/10.1007/b95112
73 rdf:type schema:CreativeWork
74 sg:pub.10.1007/s10586-016-0582-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016063562
75 https://doi.org/10.1007/s10586-016-0582-9
76 rdf:type schema:CreativeWork
77 https://app.dimensions.ai/details/publication/pub.1026634143 schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...