Shared-Storage Auctions • LDAP • Fuzzy Conceptual Indexing S E P T E M B E R / O C T O B E R 2 0 0 4 Internet Measurement p. 30 ® www.computer.org Dare Develop to Mobile data is CTIA WIRELESS I.T. & Entertainment 2004 is the evolving. one event to get your application noticed by key industry buyers and decision makers: • 3 days of keynote addresses featuring a diverse and influential line-up of the CTIA WIRELESS I.T. & industry's most sought-after speakers Entertainment 2004 is • A vast show floor jam-packed with the ideal opportunity carriers and I.T. professionals looking for for software develop- the next must-have application for their wireless device or enterprise ers and application providers to share • 3 Tracks, 2 Workshops and 12 Breakout Sessions covering a wide range of topics from their latest product new technologies to the latest applications with a qualified buying • 7 Special Interest Seminars, including audience. In addition, developers' conferences from major handset seminars and educational and OS companies sessions will explore the • 2 key networking opportunities allow you latest wireless buzz and pro- to mix and mingle with the industry leaders (Exhibit Floor Preview Reception and vide inspiration for the next Mobile Entertainment Reception) must-have application. • RFID World - the Smart Pass Executive Conference will explore how this new technology is set to transform many sec- tors of our economy Register Today – Be a part of the largest, platform-neutral, wireless developer event in the industry Keynotes www.ctia.org Day One Day Two Day Three Ed Colligan Dr. Paul Jacobs Dan Rosensweig President President COO palmOne, Inc. QUALCOMM Wireless Yahoo! Inc. & Internet Group Stay tuned for the announcement of more exciting Keynote Speakers! October 25-27, 2004 Moscone West San Francisco, CA CTIA WIRELESS I.T. & Entertainment 2004 for everything that is Mobile Data. V o l u m e 8 N u m b e r 5 CC OO LL UU MM NN SS Networked 4 Interface Pains Robert E.Filman Toward Integration 94 Is Your Middleware Dead? Steve Vinoski Architectural Perspectives 97 Agents, Grids, and Middleware Craig W.Thompson Scaling the Web 100 Mapping Service-Level Agreements in Distributed Applications Daniel A.Menascé IInntteerrnneett Peer to Peer 104 It’s China(town) Li Gong MMeeaassuurreemmeenntt TT UU TT OO RR II AA LL Spotlight 66 LDAP: Framework, 30 Guest Editors’ Introduction: Practices, and Trends Internet Measurement Vassiliki Koutsonikola and Athena Vakali Nevil Brownlee and kc claffy The Lightweight Directory Access Protocol is a promising technology 34 Locating Available that provides access to directory information using a data structure similar to that of the X.500 protocol. Bandwidth Bottlenecks DD EE PP AA RR TT MM EE NN TT SS Vinay J.Ribeiro,Rudolf H.Riedi,and Richard G.Baraniuk The Spatio-Temporal Available Bandwidth estimator, a new edge-based probing tool, locates thin links on end-to-end network paths, thus 7 News & Trends facilitating network operations and troubleshooting. 42 Multicast Routing Instabilities 10 Elsewhere Prashant Rajvaidya and Kevin C.Almeroth Native multicast is critical for scaling the delivery of high-bandwidth data, such as audio and video, to multiple receivers, but until recently, 29 Call for Papers 93 Ad/Product Index multicast routing has been too unstable to ensure robust data delivery. Editorial:IEEE Internet Computingtargets the technical and scientific Internet user communities as well as designers and right law for patrons’ private use those articles that carry a code at the bottom of the first page,provided the per-copy fee in the developers of Internet-based applications and enabling technologies.Instructions to authors are at www.computer.org/internet/ code is paid through the Copyright Clearance Center,222 Rosewood Dr.,Danvers,Mass.01923.For copying,reprint,or repub- author.htm.Articles are peer reviewed for technical merit and copy edited for clarity,style,and space.Unless otherwise lication permission,write to Copyright and Permissions Dept.,IEEE Service Center,445 Hoes Ln.,Piscataway,NJ 08855-1331. stated,bylined articles and departments,as well as product and service descriptions,reflect the author’s or firm’s opinion;inclu- Circulation:IEEE Internet Computing(ISSN 1089-7801) is published bimonthly by the IEEE Computer Society.IEEE head- sion in this publication does not necessarily constitute endorsement by the IEEE or the IEEEComputer Society. quarters:3 Park Avenue,17th Floor,New York,NY 10016-5997.IEEE Computer Society headquarters:1730 Massachusetts Copyright and reprint permission:Copyright © 2004 by the Institute of Electrical and Electronics Engineers.All rights Ave.,Washington,DC 20036-1903.IEEEComputer Society Publications Office:10662 Los Vaqueros Circle,PO Box 3014,Los reserved.Abstracting is permitted with credit to the source.Libraries are permitted to photocopy beyond the limits of U.S.copy- Alamitos,Calif.90720;(714) 821-8380;fax (714) 821-4010. S E P T E M B E R / O C T O B E R 2 0 0 4 FF EE AA TT UU RR EE SS 14 Fuzzy Conceptual Indexing for Concept-Based Cross-Lingual Text Retrieval Rowena Chau and Chung-Hsing Yeh Fuzzy conceptual indexing extends cross-lingual text retrieval to include documents that share concepts but don’t contain exact transla- tions of query terms. 22 Shared-Storage Auction Ensures Data Availability Hady Wirawan Lauw,Siu Cheung Hui, and Edmund Ming-Kit Lai Decentralizing auction services among peers distributes the required processing load and aggregates peers’ resources for common use. TT RR AA CC KK SS Middleware 74 A Portable CPU-Management Framework for Java Walter Binder and Jarle Hulaas The Java resource accounting framework, second edition, uses bytecode-level transformation techniques to facilitate resource man- 50 Comparing Probe- and Router- agement. It provides extensible runtime APIs for tailoring management policies as needed. Based Packet-Loss Measurement Agent Paul Barford and Joel Sommers 84 A Framework and Ontology for Experiments from a laboratory case study and a wide-area network reveal that common methods for active probing suffer from high vari- Dynamic Web Services Selection ance and the effects of end-host interface loss. Passive Simple Network Measurement Protocol measurements can prove very accurate however. E.Michael Maximilien and Munindar P.Singh Using an agent framework coupled with a QoS ontology can let 57 Long-Range Dependence: participants collaborate to determine each other’s service quality and trustworthiness to dynamically select services. Ten Years of Internet Traffic Modeling For more information on these or any other computing topics, please visit the IEEE Computer Society Digital Library at Thomas Karagiannis,Mart Molle,and Michalis Faloutsos www.computer.org/publications/dlib. Despite LRD’s widespread use in network traffic analysis, its utility is constrained by the complexities and inaccuracies inherent in identify- ing dependence and estimating parameters. The authors challenge the community to reevaluate modeling assumptions and methodologies. COVERADAPTEDFROMAWALRUSVISUALIZATIONCREATEDBYTHECOOPERATIVEASSOCIATIONFORINTERNET www.computer.org/internet/ DATAANALYSIS, COPYRIGHT© 2002 THEREGENTSOFTHEUNIVERSITYOFCALIFORNIA. ALLRIGHTSRESERVED. Cover design:Rob Magiera, Studio Noumena www.studionoumena.com Subscription rates:IEEE Computer Society members get the lowest rates and choice of media option — US$37/30/48 for print/electronic/combination.For information on other prices or to order,go to www.computer.org/subscribe.Back issues: $10 for members,$108 for nonmembers. This publication is indexed by ISI (Institute for Postmaster:Send undelivered copies and address changes to IEEE Internet Computing,IEEEService Center,445 Hoes Ln., Scientific Information) in SciSearch, Research Alert, Piscataway,NJ 08855-1331.Periodicals postage paid at New York,NY,and at additional mailing offices.Canadian GST #125634188.Canada Post Publications Mail Agreement Number 40013885.Return undeliverable Canadian addresses to the CompuMath Citation Index, and Current 4960-2 Walker Rd.,Windsor,ON N9A 6J3.Printed in the USA. Contents/Engineering, Computing, and Technology. 2004 E d i t o r i a l C a l e n d a r Engineering and Applying the Internet JANUARY/FEBRUARY—BUSINESS PROCESSES ON THE WEB Akhil Sahai and Charles Petrie A complex infrastructure is usually a reality in virtual enterprises. To operate well, they need JAN/FEB notions of workflows, global and local business processes, service-level agreements, and business transactions. Web service standards such as SOAP and the Web Services Description Language (WSDL) make virtual enterprises increasingly practical by speeding up the flow of business and reducing costs. These Web services must interface with internal business processes, thus creating new distributed processes as existing business processes interact in new ways. MARCH/APRIL—SEEDS OF INTERNET GROWTH The Internet’s global spread has, in fairly short order, made it fundamental to modern life. Despite that pervasiveness, however, the Internet’s architecture includes many unresolved issues MAR/APR that affect the network’s ability to handle the growing needs of mobile users, new applications, and Web services. Researchers are exploring novel solutions to many key issues, looking for fertile ground to see their work grow into something that can make the Internet truly ubiquitous. This issue of ICpresents various proposals for improving mobile access, network performance, quality-of-service, and other important topics. For submission information MAY/JUNE—DATA DISSEMINATION ON THE WEB Elisa Bertino and Krithi Ramamritham and author guidelines: The Internet and World Wide Web have enabled different ways disseminating information to MAY/JUN consumers. In addition to the traditional approach, in which users explicitly request information when needed, researchers have developed more proactive approaches in which information sources automatically initiate the dissemination. Such new approaches, often combining aspects of push-based dissemination, have generated a lot of research and commercial activities — as well as controversy. www.computer.org/internet/ author.htm JULY/AUGUST— WIRELESS GRIDS Scott Bradner and Lee McKnight A computer grid is a collection of distributed resources shared among a group of users. Wireless JULgrids/ ranAge froUm lowG-power sensor networks to high-end mobile computers. The growth of wireless services and technologies brings new challenges, including resource discovery, sharing in dynamic ad hoc network environments, routing, business models, and policy infrastructure. This special issue aims to introduce the technical, economic, business, and policy issues likely to arise as wireless grids progress from laboratory theory to market reality. SEPTEMBER/OCTOBER—MEASURING PERFORMANCE Nevil Brownlee and kc claffy This special issue seeks submissions in all areas of network measurement, with an emphasis on SEhPow m/eaOsuremCent hTas improved our understanding of Internet workload, topology, routing, performance, and scaling behavior. We invite researchers and practitioners to submit original work on Internet measurement, especially studies that involve open-source or freely available tools and data from wide area or WAN access networks. NOVEMBER/DECEMBER—HOMELAND SECURITY Michael Reiter and Pankaj Rohatgi "Homeland security" is a major concern for governments worldwide, which must protect their NOpoVpulati/onsD and tEhe cCritical infrastructures that support them, including power systems, There’s always more online… communications, government and military functions, and food and water supplies. In this special issue, we seek contributions describing the role of Internet and information technologies in homeland security, both as an infrastructure to be protected and as a tool for enabling the defense of other critical infrastructures. oonnlliinnee www.computer.org/internet/ V o l u m e 8 N u m b e r 5 CC OO LL UU MM NN SS Networked 4 Interface Pains Robert E.Filman Toward Integration 94 Is Your Middleware Dead? Steve Vinoski Architectural Perspectives 97 Agents, Grids, and Middleware Craig W.Thompson Scaling the Web 100 Mapping Service-Level Agreements in Distributed Applications Daniel A.Menascé IInntteerrnneett Peer to Peer 104 It’s China(town) Li Gong MMeeaassuurreemmeenntt TT UU TT OO RR II AA LL Spotlight 66 LDAP: Framework, 30 Guest Editors’ Introduction: Practices, and Trends Internet Measurement Vassiliki Koutsonikola and Athena Vakali Nevil Brownlee and kc claffy The Lightweight Directory Access Protocol is a promising technology 34 Locating Available that provides access to directory information using a data structure similar to that of the X.500 protocol. Bandwidth Bottlenecks DD EE PP AA RR TT MM EE NN TT SS Vinay J.Ribeiro,Rudolf H.Riedi,and Richard G.Baraniuk The Spatio-Temporal Available Bandwidth estimator, a new edge-based probing tool, locates thin links on end-to-end network paths, thus 7 News & Trends facilitating network operations and troubleshooting. 42 Multicast Routing Instabilities 10 Elsewhere Prashant Rajvaidya and Kevin C.Almeroth Native multicast is critical for scaling the delivery of high-bandwidth data, such as audio and video, to multiple receivers, but until recently, 29 Call for Papers 93 Ad/Product Index multicast routing has been too unstable to ensure robust data delivery. Editorial:IEEE Internet Computingtargets the technical and scientific Internet user communities as well as designers and right law for patrons’ private use those articles that carry a code at the bottom of the first page,provided the per-copy fee in the developers of Internet-based applications and enabling technologies.Instructions to authors are at www.computer.org/internet/ code is paid through the Copyright Clearance Center,222 Rosewood Dr.,Danvers,Mass.01923.For copying,reprint,or repub- author.htm.Articles are peer reviewed for technical merit and copy edited for clarity,style,and space.Unless otherwise lication permission,write to Copyright and Permissions Dept.,IEEE Service Center,445 Hoes Ln.,Piscataway,NJ 08855-1331. stated,bylined articles and departments,as well as product and service descriptions,reflect the author’s or firm’s opinion;inclu- Circulation:IEEE Internet Computing(ISSN 1089-7801) is published bimonthly by the IEEE Computer Society.IEEE head- sion in this publication does not necessarily constitute endorsement by the IEEE or the IEEEComputer Society. quarters:3 Park Avenue,17th Floor,New York,NY 10016-5997.IEEE Computer Society headquarters:1730 Massachusetts Copyright and reprint permission:Copyright © 2004 by the Institute of Electrical and Electronics Engineers.All rights Ave.,Washington,DC 20036-1903.IEEEComputer Society Publications Office:10662 Los Vaqueros Circle,PO Box 3014,Los reserved.Abstracting is permitted with credit to the source.Libraries are permitted to photocopy beyond the limits of U.S.copy- Alamitos,Calif.90720;(714) 821-8380;fax (714) 821-4010. S E P T E M B E R / O C T O B E R 2 0 0 4 FF EE AA TT UU RR EE SS 14 Fuzzy Conceptual Indexing for Concept-Based Cross-Lingual Text Retrieval Rowena Chau and Chung-Hsing Yeh Fuzzy conceptual indexing extends cross-lingual text retrieval to include documents that share concepts but don’t contain exact transla- tions of query terms. 22 Shared-Storage Auction Ensures Data Availability Hady Wirawan Lauw,Siu Cheung Hui, and Edmund Ming-Kit Lai Decentralizing auction services among peers distributes the required processing load and aggregates peers’ resources for common use. TT RR AA CC KK SS Middleware 74 A Portable CPU-Management Framework for Java Walter Binder and Jarle Hulaas The Java resource accounting framework, second edition, uses bytecode-level transformation techniques to facilitate resource man- 50 Comparing Probe- and Router- agement. It provides extensible runtime APIs for tailoring management policies as needed. Based Packet-Loss Measurement Agent Paul Barford and Joel Sommers 84 A Framework and Ontology for Experiments from a laboratory case study and a wide-area network reveal that common methods for active probing suffer from high vari- Dynamic Web Services Selection ance and the effects of end-host interface loss. Passive Simple Network Measurement Protocol measurements can prove very accurate however. E.Michael Maximilien and Munindar P.Singh Using an agent framework coupled with a QoS ontology can let 57 Long-Range Dependence: participants collaborate to determine each other’s service quality and trustworthiness to dynamically select services. Ten Years of Internet Traffic Modeling For more information on these or any other computing topics, please visit the IEEE Computer Society Digital Library at Thomas Karagiannis,Mart Molle,and Michalis Faloutsos www.computer.org/publications/dlib. Despite LRD’s widespread use in network traffic analysis, its utility is constrained by the complexities and inaccuracies inherent in identify- ing dependence and estimating parameters. The authors challenge the community to reevaluate modeling assumptions and methodologies. COVERADAPTEDFROMAWALRUSVISUALIZATIONCREATEDBYTHECOOPERATIVEASSOCIATIONFORINTERNET www.computer.org/internet/ DATAANALYSIS, COPYRIGHT© 2002 THEREGENTSOFTHEUNIVERSITYOFCALIFORNIA. ALLRIGHTSRESERVED. Cover design:Rob Magiera, Studio Noumena www.studionoumena.com Subscription rates:IEEE Computer Society members get the lowest rates and choice of media option — US$37/30/48 for print/electronic/combination.For information on other prices or to order,go to www.computer.org/subscribe.Back issues: $10 for members,$108 for nonmembers. This publication is indexed by ISI (Institute for Postmaster:Send undelivered copies and address changes to IEEE Internet Computing,IEEEService Center,445 Hoes Ln., Scientific Information) in SciSearch, Research Alert, Piscataway,NJ 08855-1331.Periodicals postage paid at New York,NY,and at additional mailing offices.Canadian GST #125634188.Canada Post Publications Mail Agreement Number 40013885.Return undeliverable Canadian addresses to the CompuMath Citation Index, and Current 4960-2 Walker Rd.,Windsor,ON N9A 6J3.Printed in the USA. Contents/Engineering, Computing, and Technology. Networked From the Editor in Chief... Interface Pains Robert E.Filman • RIACS/NASAAmes Research Center• [email protected] L ast week I tried to reserve an auto rental over implies that a Web page cluttered with advertise- the Web. The site asked me where and when I ments is not as simple to use as one without — a wanted to rent, presented choices of possible moral likely lost on advertisement-supported Web cars, went through a long dialogue to get person- page designers — and that there’s no point in get- al data such as addresses and credit-card numbers, ting details about the purchase of a product you and then told me that the car I had selected was can’t sell. Raskin’s book, The Human Interface, unavailable. I iterated the process through sever- contains a wonderful illustration of these points, al different types of cars, always with the same showing how attention to the user’s task and the result. I eventually retreated to an albeit-more- costs of different activities can be combined to expensive-but-nevertheless-willing-to-actually- produce more usable systems.4 rent-me-something competitor. I’m not sure what the original rental company thought this activi- Dimensions of Choice ty’s purpose was, unless it hoped to catch me fail- Interface design is complicated, both in the com- ing to uncheck the “send me email offers” box, plexity of the design space and the pragmatics of thereby providing a “requesting” spam recipient usable systems. The user-interface designer can into perpetuity. choose from a large variety of mechanisms, At last month’s European Conference on including (to name a few) command languages, Object-Oriented Programming (ECOOP), I met a character languages, natural languages, direct- student contemplating a dissertation on graphi- manipulation graphics, forms, and menus. We cal tools for program understanding. She can indicate our choices to systems via switches, expressed the belief that the best tools maximized dials, keyboards, mice, tablets, joysticks, touch- the amount of information presented to users. I pads, and touchscreens — or perhaps by pushing was surprised, after 20 years of Tufte1–3and work foot pedals, speaking, whistling, or grunting on the theory and practice of interface design, rhythmically. The machine can respond with a that a student building a system with a major display that ranges from lighting a single point interface component would start from such an to presenting a high-resolution, color animation. assumption. It can simultaneously squeak, flash, and speak. These experiences lead me to believe that a dis- For blind programmers, there is even a device cussion on the design of usable systems might be that converts ASCII to Braille, invoking the sense appropriate. of touch. (For the moment, proprioception has I told the student that maximizing the amount been employed only in certain flight simulators of information a system conveys to a user isn’t a and games, and designers have made little use of good idea. Rather, the designer should keep in the sense of smell — surely serious oversights.) mind what the user is trying to accomplish and These controls can be organized into command figure out how to minimize the effort (physical sequences, dialogs, macros, forms, menus, direct- and intellectual) the user must expend to get that manipulation systems, and so forth. task done. For example, if a user is seeking a sin- gle value, it’s better to present a screen with just Complexity Is in the that value than a screen that includes that data Mind of the Beholder along with a lot of additional, superfluous infor- The simplicity of an artifact varies depending on mation. Separating the grain of edible data from who is doing the evaluation. My favorite example the screen full of chaff can be painful. It also of this comes from cooking. 4 SEPTEMBER • OCTOBER 2004 Published by the IEEE Computer Society 1089-7801/04/$20.00 © 2004 IEEE IEEEINTERNETCOMPUTING