95 research outputs found

    The QUIC Fix for Optimal Video Streaming

    Get PDF
    Within a few years of its introduction, QUIC has gained traction: a significant chunk of traffic is now delivered over QUIC. The networking community is actively engaged in debating the fairness, performance, and applicability of QUIC for various use cases, but these debates are centered around a narrow, common theme: how does the new reliable transport built on top of UDP fare in different scenarios? Support for unreliable delivery in QUIC remains largely unexplored. The option for delivering content unreliably, as in a best-effort model, deserves the QUIC designers' and community's attention. We propose extending QUIC to support unreliable streams and present a simple approach for implementation. We discuss a simple use case of video streaming---an application that dominates the overall Internet traffic---that can leverage the unreliable streams and potentially bring immense benefits to network operators and content providers. To this end, we present a prototype implementation that, by using both the reliable and unreliable streams in QUIC, outperforms both TCP and QUIC in our evaluations.Comment: Published to ACM CoNEXT Workshop on the Evolution, Performance, and Interoperability of QUIC (EPIQ

    A Study of Selective Motor Fitness Components Empowers On Playing Ability among Low and High Performers of State Level Football Players

    Get PDF
    Motor fitness is a present aptitude for physical skills, includes strength and co-ordination enriches today’s Manpower in players performance.  The study focuses on selected motor fitness components to ensure the playing ability among low and high performers of State level Football players. To achieve this study, One hundred and fifty men Football players were randomly selected as subjects from Tamilnadu State level men Football Tournament held at Chennai in 2008-09. Their age ranged from20 to 25 years. Selected subjects were classified into three equal groups of each fifty members. Group 1 served as -Chennai Team, Group-II as Salem and Coimbatore Team and Group III Trichy and Madurai Team. All the subjects were oriented the purpose of the test and procedure of conducting this test. Regular activities and training were given that aplomb the player’s ability to perform the game. Questionnaire preparation was also done by our Research Scholar with the reference to the review of the literature. The investigator has provided onto the following selected motor fitness variables such as Cardio-vascular Endurance, Speed, Agility and Explosive Power. The data is collected with the help of five PhD Scholars, Department of Physical Education who were well versed with the conduct of test and collections under the direct supervision of our Research Scholar. Resulting data will be collected before and after the competition and statistically analyzed using ANOVA and DMRT. Hence the study concluded that playing ability solely depends on the physical fitness, stress free mind more than that it relates the socio-economic status to perform the better strategy of playing games.Â

    Performance Characterization of NVMe Flash Devices with Zoned Namespaces (ZNS)

    Full text link
    The recent emergence of NVMe flash devices with Zoned Namespace support, ZNS SSDs, represents a significant new advancement in flash storage. ZNS SSDs introduce a new storage abstraction of append-only zones with a set of new I/O (i.e., append) and management (zone state machine transition) commands. With the new abstraction and commands, ZNS SSDs offer more control to the host software stack than a non-zoned SSD for flash management, which is known to be complex (because of garbage collection, scheduling, block allocation, parallelism management, overprovisioning). ZNS SSDs are, consequently, gaining adoption in a variety of applications (e.g., file systems, key-value stores, and databases), particularly latency-sensitive big-data applications. Despite this enthusiasm, there has yet to be a systematic characterization of ZNS SSD performance with its zoned storage model abstractions and I/O operations. This work addresses this crucial shortcoming. We report on the performance features of a commercially available ZNS SSD (13 key observations), explain how these features can be incorporated into publicly available state-of-the-art ZNS emulators, and recommend guidelines for ZNS SSD application developers. All artifacts (code and data sets) of this study are publicly available at https://github.com/stonet-research/NVMeBenchmarks.Comment: Paper to appear in the https://clustercomp.org/2023/program

    Performance Characterization of NVMe Flash Devices with Zoned Namespaces (ZNS)

    Get PDF
    The recent emergence of NVMe flash devices with Zoned Namespace support, ZNS SSDs, represents a significant new advancement in flash storage. ZNS SSDs introduce a new storage abstraction of append-only zones with a set of new I/O (i.e., append) and management (zone state machine transition) commands. With the new abstraction and commands, ZNS SSDs offer more control to the host software stack than a non-zoned SSD for flash management, which is known to be complex (because of garbage collection, scheduling, block allocation, parallelism management, overprovisioning). ZNS SSDs are, consequently, gaining adoption in a variety of applications (e.g., file systems, key-value stores, and databases), particularly latency-sensitive big-data applications. Despite this enthusiasm, there has yet to be a systematic characterization of ZNS SSD performance with its zoned storage model abstractions and I/O operations. This work addresses this crucial shortcoming. We report on the performance features of a commercially available ZNS SSD (13 key observations), explain how these features can be incorporated into publicly available state-of-the-art ZNS emulators, and recommend guidelines for ZNS SSD application developers. All artifacts (code and data sets) of this study are publicly available at https://github.com/stonet-research/NVMeBenchmarks

    Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains

    Full text link
    In permissionless blockchains, transaction issuers include a fee to incentivize miners to include their transaction. To accurately estimate this prioritization fee for a transaction, transaction issuers (or blockchain participants, more generally) rely on two fundamental notions of transparency, namely contention and prioritization transparency. Contention transparency implies that participants are aware of every pending transaction that will contend with a given transaction for inclusion. Prioritization transparency states that the participants are aware of the transaction or prioritization fees paid by every such contending transaction. Neither of these notions of transparency holds well today. Private relay networks, for instance, allow users to send transactions privately to miners. Besides, users can offer fees to miners via either direct transfers to miners' wallets or off-chain payments -- neither of which are public. In this work, we characterize the lack of contention and prioritization transparency in Bitcoin and Ethereum resulting from such practices. We show that private relay networks are widely used and private transactions are quite prevalent. We show that the lack of transparency facilitates miners to collude and overcharge users who may use these private relay networks despite them offering little to no guarantees on transaction prioritization. The lack of these transparencies in blockchains has crucial implications for transaction issuers as well as the stability of blockchains. Finally, we make our data sets and scripts publicly available.Comment: This is a pre-print of our paper accepted to appear to the Financial Cryptography and Data Security 2023 (FC '23

    Understanding Blockchain Governance: Analyzing Decentralized Voting to Amend DeFi Smart Contracts

    Full text link
    Smart contracts are contractual agreements between participants of a blockchain, who cannot implicitly trust one another. They are software programs that run on top of a blockchain, and we may need to change them from time to time (e.g., to fix bugs or address new use cases). Governance protocols define the means for amending or changing these smart contracts without any centralized authority. They distribute instead the decision-making power to every user of the smart contract: Users vote on accepting or rejecting every change. The focus of this work is to evaluate whether, how, and to what extent these protocols ensure decentralized governance, the fundamental tenet of blockchains, in practice. This evaluation is crucial as smart contracts continue to transform our key, traditional, centralized institutions, particularly banking and finance. In this work, we review and characterize decentralized governance in practice, using Compound -- one of the widely used governance protocols -- as a case study. We reveal a high concentration of voting power in Compound: 10 voters hold together 57.86% of the voting power. Although proposals to change or amend the protocol (or, essentially, the application they support) receive, on average, a substantial number of votes (i.e., 89.39%) in favor, they require fewer than three voters to obtain 50% or more votes. We show that voting on Compound governance proposals can be unfairly expensive for small token holders, and also discover voting coalitions that can further marginalize these users. We plan on publishing our scripts and data set on GitHub to support reproducible research.Comment: We have submitted this work for publication and are currently awaiting a decisio

    An Efficient Hierarchical Multi-Authority Attribute Based Encryption Scheme for Profile Matching using a Fast Ate Pairing in Cloud Environment

    Get PDF
    In cloud environment, profile matching is a key technique in applications such as health care and social networks. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable technique for data sharing in such environments. In this paper, we propose an asymmetric pairing based Hierarchical Multi-Authority CP-ABE (HM-CP-ABE) construction for profile matching. We utilize the fast Ate pairing to make the proposed HM-CP-ABE scheme efficient. The performance analysis of the proposed scheme shows improved efficiency in terms of computational costs for initialization, key generation and encryption using ELiPS library when compared with existing works

    Secure Data Communication using File Hierarchy Attribute Based Encryption in Wireless Body Area Networks

    Get PDF
    Wireless Body Area Networks (WBANs) play an important role in healthcare system by enabling medical experts to guide patients without measuring face-to-face. The unauthorized access of medical data from WBAN controller as well as the unreliable data communication may leads to risk for patients life. Currently, Chunqiang Hu et al., [1] proposed a data communication protocol by using Ciphertext-Policy Attribute-Based Encryption (CP-ABE) for a single file. The major limitation of Chunqiang Hu et al., [1] is that as the number of files increases, CP-ABE will suffer from parameters such as message size, energy consumption and computation cost. This paper proposes a more secure and efficient data communication protocol for WBANs by using an efficient File Hierarchy CP-ABE (FH-CP-ABE). We propose a more efficient Secure and Efficient data communication protocol for WBANs by using an efficient File Hierarchy CP-ABE (FH-CP-ABE). We use the integrated access structure which is a combination of two or more access structures and with the hierarchical files are encrypted. We evaluate the performance analysis of the proposed data communication protocol in terms of message size, energy consumption, computation cost and compared with Chunqiang Hu et al., [1] while the number of files increases
    corecore