Manghui Tu1, Liangliang Xiao2 and Dianxiang Xu3
1Purdue University Northwest, Indiana, 2Frostburg State University, Maryland and 3Boise State University, Idaho
ABSTRACT
Mechanism to improve data or service availability is critical for an enterprise to ensure the quality of
service in terms of availability. Replication has been used to improve system availability. The number and
location of the replicas are two impact factors on availability. In this paper, we will consider the impact of
the node and network edge failures on the availability of replicated data or services. The Effective
availability modeling approach is designed and efficient availability computing algorithms are developed
to model and compute availability of replicated services for systems with the tree topology. The availability
enhancement problem (maximizing the objective function) is transformed to a p-median problem
(minimizing the objective function) through re-define the availability enhancement problem. An efficient
replica allocation algorithm is developed to improve data availability in tree networks, with a runtime
complexity of O(K|V|2
), where K is the number of replicas and |V| is the number of nodes in the tree
network. Finally, experimental studies have been conducted to evaluate how efficient and effective the
proposed availability computing algorithm and the availability enhancement algorithm on improving the
availability of replicated data or services. The results show that the proposed solutions are efficient and
effective on availability computing and availability enhancement.
KEYWORDS
Network Protocols, Wireless Network, Mobile Network, Virus, Worms &Trojon
AUTHORS
Michael Tu is a Ph.D. in Computer Science, Associate Professor of Computer
Information Technology, director of the Center for Cyber Security and Infrastructure
Protection at Purdue University Northwest. Dr. Tu’s are as of expertise are information
assurance, digital forensics, and cybersecurity education. He has published over 40 peer
reviewed papers in prestigious journals and peer reviewed conference proceedings. Dr.
Tu is a Certified Information System Security Professional (CISSP), Certified Ethical
Hacker (CEH), Certified Hacking and Forensics Investigator (CHFI) and AccessData
Computer Examiner (ACE).
Dianxiang Xu, received the B.S., M.S., and Ph.D. degrees in computer science from
Nanjing University, Nanjing, China. He is a Professor with the Department of Computer
Science, Boise State University, Boise, ID, USA. His research interests include software
security and safety, software engineering, access control, and software-defined systems.
Dr. Xu has published over 100 peer reviewed papers in prestigious journals and peer
reviewed conference proceedings.
Liangliang Xiao, received the M.S., and Ph.D. degrees in computer science from The
University of Texas at Dallas, Richardson, USA. He is an Associate Professor with the
Department of Computer Science & Information Technologies, Frostburg State
University, Frostburg, MD, USA. His research interests include data security and
distributed systems. Dr. Xiao has published over 30 peer reviewed papers in prestigious
journals and peer reviewed conference proceedings.
No comments:
Post a Comment