-
Small-Signal Dynamics of Lossy Inverter-Based Microgrids for Generalized Droop Controls
Authors:
Abdullah Al Maruf,
Anamika Dubey,
Sandip Roy
Abstract:
A network-level small-signal model is developed for lossy microgrids, which considers coupled angle and voltage dynamics of inverter-based microgrids and uses a more general framework of droop controls in the inverter. It is shown that when relative resistances of the lines in the microgrid are reasonably consistent and differences of voltage angles across the lines are small at the operating poin…
▽ More
A network-level small-signal model is developed for lossy microgrids, which considers coupled angle and voltage dynamics of inverter-based microgrids and uses a more general framework of droop controls in the inverter. It is shown that when relative resistances of the lines in the microgrid are reasonably consistent and differences of voltage angles across the lines are small at the operating point, the generalized droop controls can be designed to enforce decoupling between angle dynamics and voltage dynamics. Next, structural results for the asymptotic stability of small-signal angle and voltage dynamics are given for the case when generalized droop control achieves decoupling. Simulated transient responses of a modified IEEE 9-bus system are presented to validate the theoretical findings which show the effectiveness of generalized droop controls in independently sha** the settling times of the angle and voltage responses of the lossy microgrid system.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
Memory Sharing with CXL: Hardware and Software Design Approaches
Authors:
Sunita Jain,
Nagaradhesh Yeleswarapu,
Hasan Al Maruf,
Rita Gupta
Abstract:
Compute Express Link (CXL) is a rapidly emerging coherent interconnect standard that provides opportunities for memory pooling and sharing. Memory sharing is a well-established software feature that improves memory utilization by avoiding unnecessary data movement. In this paper, we discuss multiple approaches to enable memory sharing with different generations of CXL protocol (i.e., CXL 2.0 and C…
▽ More
Compute Express Link (CXL) is a rapidly emerging coherent interconnect standard that provides opportunities for memory pooling and sharing. Memory sharing is a well-established software feature that improves memory utilization by avoiding unnecessary data movement. In this paper, we discuss multiple approaches to enable memory sharing with different generations of CXL protocol (i.e., CXL 2.0 and CXL 3.0) considering the challenges with each of the architectures from the device hardware and software viewpoint.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
An Exploration Into Web Session Security- A Systematic Literature Review
Authors:
Md. Imtiaz Habib,
Abdullah Al Maruf,
Md. Jobair Ahmed Nabil
Abstract:
The most common attacks against web sessions are reviewed in this paper, for example, some attacks against web browsers' honest users attempting to create session with trusted web browser application legally. We have assessed with four different ways to judge the viability of a certain solution by reviewing existing security solutions which prevent or halt the different attacks. Then we have point…
▽ More
The most common attacks against web sessions are reviewed in this paper, for example, some attacks against web browsers' honest users attempting to create session with trusted web browser application legally. We have assessed with four different ways to judge the viability of a certain solution by reviewing existing security solutions which prevent or halt the different attacks. Then we have pointed out some guidelines that have been taken into account by the designers of the proposals we reviewed. The guidelines we have identified will be helpful for the creative solutions proceeding web security in a more structured and holistic way.
△ Less
Submitted 14 October, 2023;
originally announced October 2023.
-
Widely tunable solid-state source of single-photons matching an atomic transition
Authors:
Rubayet Al Maruf,
Sreesh Venuturumilli,
Divya Bharadwaj,
Paul Anderson,
Jiawei Qiu,
Yujia Yuan,
Mohd Zeeshan,
Behrooz Semnani,
Philip J. Poole,
Dan Dalacu,
Kevin Resch,
Michael E. Reimer,
Michal Bajcsy
Abstract:
Hybrid quantum technologies aim to harness the best characteristics of multiple quantum systems, in a similar fashion that classical computers combine electronic, photonic, magnetic, and mechanical components. For example, quantum dots embedded in semiconductor nanowires can produce highly pure, deterministic, and indistinguishable single-photons with high repetition, while atomic ensembles offer…
▽ More
Hybrid quantum technologies aim to harness the best characteristics of multiple quantum systems, in a similar fashion that classical computers combine electronic, photonic, magnetic, and mechanical components. For example, quantum dots embedded in semiconductor nanowires can produce highly pure, deterministic, and indistinguishable single-photons with high repetition, while atomic ensembles offer robust photon storage capabilities and strong optical nonlinearities that can be controlled with single-photons. However, to successfully integrate quantum dots with atomic ensembles, one needs to carefully match the optical frequencies of these two platforms. Here, we propose and experimentally demonstrate simple, precise, reversible, broad-range, and local method for controlling the emission frequency of individual quantum dots embedded in tapered semiconductor nanowires and use it to interface with an atomic ensemble via single-photons matched to hyperfine transitions and slow-light regions of the cesium D1-line. Our approach allows linking together atomic and solid-state quantum systems and can potentially also be applied to other types of nanowire-embedded solid-state emitters, as well as to creating devices based on multiple solid-state emitters tuned to produce indistinguishable photons.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
Memory Disaggregation: Advances and Open Challenges
Authors:
Hasan Al Maruf,
Mosharaf Chowdhury
Abstract:
Compute and memory are tightly coupled within each server in traditional datacenters. Large-scale datacenter operators have identified this coupling as a root cause behind fleet-wide resource underutilization and increasing Total Cost of Ownership (TCO). With the advent of ultra-fast networks and cache-coherent interfaces, memory disaggregation has emerged as a potential solution, whereby applicat…
▽ More
Compute and memory are tightly coupled within each server in traditional datacenters. Large-scale datacenter operators have identified this coupling as a root cause behind fleet-wide resource underutilization and increasing Total Cost of Ownership (TCO). With the advent of ultra-fast networks and cache-coherent interfaces, memory disaggregation has emerged as a potential solution, whereby applications can leverage available memory even outside server boundaries.
This paper summarizes the growing research landscape of memory disaggregation from a software perspective and introduces the challenges toward making it practical under current and future hardware trends. We also reflect on our seven-year journey in the SymbioticLab to build a comprehensive disaggregated memory system over ultra-fast networks. We conclude with some open challenges toward building next-generation memory disaggregation systems leveraging emerging cache-coherent interconnects.
△ Less
Submitted 6 May, 2023;
originally announced May 2023.
-
A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems
Authors:
Luyao Niu,
Abdullah Al Maruf,
Andrew Clark,
J. Sukarno Mertoguno,
Radha Poovendran
Abstract:
Interconnected systems such as power systems and chemical processes are often required to satisfy safety properties in the presence of faults and attacks. Verifying safety of these systems, however, is computationally challenging due to nonlinear dynamics, high dimensionality, and combinatorial number of possible faults and attacks that can be incurred by the subsystems interconnected within the n…
▽ More
Interconnected systems such as power systems and chemical processes are often required to satisfy safety properties in the presence of faults and attacks. Verifying safety of these systems, however, is computationally challenging due to nonlinear dynamics, high dimensionality, and combinatorial number of possible faults and attacks that can be incurred by the subsystems interconnected within the network. In this paper, we develop a compositional resilience index to verify safety properties of interconnected systems under faults and attacks. The resilience index is a tuple serving the following two purposes. First, it quantifies how a safety property is impacted when a subsystem is compromised by faults and attacks. Second, the resilience index characterizes the needed behavior of a subsystem during normal operations to ensure safety violations will not occur when future adverse events occur. We develop a set of sufficient conditions on the dynamics of each subsystem to satisfy its safety constraint, and leverage these conditions to formulate an optimization program to compute the resilience index. When multiple subsystems are interconnected and their resilience indices are given, we show that the safety constraints of the interconnected system can be efficiently verified by solving a system of linear inequalities. We demonstrate our developed resilience index using a numerical case study on chemical reactors connected in series.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Risk-Aware Distributed Multi-Agent Reinforcement Learning
Authors:
Abdullah Al Maruf,
Luyao Niu,
Bhaskar Ramasubramanian,
Andrew Clark,
Radha Poovendran
Abstract:
Autonomous cyber and cyber-physical systems need to perform decision-making, learning, and control in unknown environments. Such decision-making can be sensitive to multiple factors, including modeling errors, changes in costs, and impacts of events in the tails of probability distributions. Although multi-agent reinforcement learning (MARL) provides a framework for learning behaviors through repe…
▽ More
Autonomous cyber and cyber-physical systems need to perform decision-making, learning, and control in unknown environments. Such decision-making can be sensitive to multiple factors, including modeling errors, changes in costs, and impacts of events in the tails of probability distributions. Although multi-agent reinforcement learning (MARL) provides a framework for learning behaviors through repeated interactions with the environment by minimizing an average cost, it will not be adequate to overcome the above challenges. In this paper, we develop a distributed MARL approach to solve decision-making problems in unknown environments by learning risk-aware actions. We use the conditional value-at-risk (CVaR) to characterize the cost function that is being minimized, and define a Bellman operator to characterize the value function associated to a given state-action pair. We prove that this operator satisfies a contraction property, and that it converges to the optimal value function. We then propose a distributed MARL algorithm called the CVaR QD-Learning algorithm, and establish that value functions of individual agents reaches consensus. We identify several challenges that arise in the implementation of the CVaR QD-Learning algorithm, and present solutions to overcome these. We evaluate the CVaR QD-Learning algorithm through simulations, and demonstrate the effect of a risk parameter on value functions at consensus.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint
Authors:
Abdullah Al Maruf,
Luyao Niu,
Andrew Clark,
J. Sukarno Mertoguno,
Radha Poovendran
Abstract:
Cyber-physical systems (CPS) are required to satisfy safety constraints in various application domains such as robotics, industrial manufacturing systems, and power systems. Faults and cyber attacks have been shown to cause safety violations, which can damage the system and endanger human lives. Resilient architectures have been proposed to ensure safety of CPS under such faults and attacks via me…
▽ More
Cyber-physical systems (CPS) are required to satisfy safety constraints in various application domains such as robotics, industrial manufacturing systems, and power systems. Faults and cyber attacks have been shown to cause safety violations, which can damage the system and endanger human lives. Resilient architectures have been proposed to ensure safety of CPS under such faults and attacks via methodologies including redundancy and restarting from safe operating conditions. The existing resilient architectures for CPS utilize different mechanisms to guarantee safety, and currently there is no approach to compare them. Moreover, the analysis and design undertaken for CPS employing one architecture is not readily extendable to another. In this paper, we propose a timing-based framework for CPS employing various resilient architectures and develop a common methodology for safety analysis and computation of control policies and design parameters. Using the insight that the cyber subsystem operates in one out of a finite number of statuses, we first develop a hybrid system model that captures CPS adopting any of these architectures. Based on the hybrid system, we formulate the problem of joint computation of control policies and associated timing parameters for CPS to satisfy a given safety constraint and derive sufficient conditions for the solution. Utilizing the derived conditions, we provide an algorithm to compute control policies and timing parameters relevant to the employed architecture. We also note that our solution can be applied to a wide class of CPS with polynomial dynamics and also allows incorporation of new architectures. We verify our proposed framework by performing a case study on adaptive cruise control of vehicles.
△ Less
Submitted 1 September, 2022; v1 submitted 30 August, 2022;
originally announced August 2022.
-
Microservice Architecture Reconstruction and Visualization Techniques: A Review
Authors:
Tomas Cerny,
Amr S. Abdelfattah,
Vincent Bushong,
Abdullah Al Maruf,
Davide Taibi
Abstract:
Microservice system solutions are driving digital transformation; however, fundamental tools and system perspectives are missing to better observe, understand, and manage these systems, their properties, and their dependencies. Microservices architecture leads towards decentralization, which implies many advantages to system operation; it, however, brings challenges to their development. Microserv…
▽ More
Microservice system solutions are driving digital transformation; however, fundamental tools and system perspectives are missing to better observe, understand, and manage these systems, their properties, and their dependencies. Microservices architecture leads towards decentralization, which implies many advantages to system operation; it, however, brings challenges to their development. Microservice systems often lack a system-centric perspective that would help engineers better cope with system evolution and quality assessment. In this work, we explored microservice-specific architecture reconstruction based on static analysis. Such reconstruction typically results in system models to visualize selected system-centric perspectives. Conventional models involve 2D methods; however, these methods are limited in utility when services proliferate. We considered various architectural perspectives relevant to microservices and assessed the relevancy of the traditional method, comparing it to alternative data visualization using 3D space. As a representative of the 3D method, we considered a 3D graph model presented in augmented reality. To begin testing the feasibility of deriving such perspectives from microservice systems, we developed and implemented prototype tools for software architecture reconstruction and visualization of compared perspectives. Using these prototypes, we performed a small user study with software practitioners to highlight the potentials and limitations of these innovative visualizations used for common practitioner reasoning and tasks.
△ Less
Submitted 23 July, 2022; v1 submitted 6 July, 2022;
originally announced July 2022.
-
Microvision: Static analysis-based approach to visualizing microservices in augmented reality
Authors:
Tomas Cerny,
Amr S. Abdelfattah,
Vincent Bushong,
Abdullah Al Maruf,
Davide Taibi
Abstract:
Microservices are supporting digital transformation; however, fundamental tools and system perspectives are missing to better observe, understand, and manage these systems, their properties, and their dependencies. Microservices architecture leans toward decentralization, which yields many advantages to system operation; it, however, brings challenges to their development. Microservices lack a sys…
▽ More
Microservices are supporting digital transformation; however, fundamental tools and system perspectives are missing to better observe, understand, and manage these systems, their properties, and their dependencies. Microservices architecture leans toward decentralization, which yields many advantages to system operation; it, however, brings challenges to their development. Microservices lack a system-centric perspective to better cope with system evolution and quality assessment. In this work, we explore microservice-specific architecture reconstruction based on static analysis. Such reconstruction typically results in system models to visualize selected system-centric perspectives. Conventional models are limited in utility when the service cardinality is high. We consider an alternative data visualization using 3D space using augmented reality. To begin testing the feasibility of deriving such perspectives from microservice systems, we developed and implemented prototype tools for software architecture reconstruction and visualization of compared perspectives.
△ Less
Submitted 23 July, 2022; v1 submitted 6 July, 2022;
originally announced July 2022.
-
Using Microservice Telemetry Data for System Dynamic Analysis
Authors:
Abdullah Al Maruf,
Alexander Bakhtin,
Tomas Cerny,
Davide Taibi
Abstract:
Microservices bring various benefits to software systems. They also bring decentralization and lose coupling across self-contained system parts. Since these systems likely evolve in a decentralized manner, they need to be monitored to identify when possibly poorly designed extensions deteriorate the overall system quality. For monolith systems, such tasks have been commonly addressed through stati…
▽ More
Microservices bring various benefits to software systems. They also bring decentralization and lose coupling across self-contained system parts. Since these systems likely evolve in a decentralized manner, they need to be monitored to identify when possibly poorly designed extensions deteriorate the overall system quality. For monolith systems, such tasks have been commonly addressed through static analysis. However, given the decentralization and possible language diversity across microservices, static analysis tools are lacking. On the other hand, there are available tools commonly used by practitioners that offer centralized logging, tracing, and metric collection for microservices. In this paper, we assess the opportunity to combine current dynamic analysis tools with anomaly detection in the form of quality metrics and anti-patterns. We develop a tool prototype that we use to assess a large microservice system benchmark demonstrating the feasibility and potential of such an approach.
△ Less
Submitted 6 July, 2022;
originally announced July 2022.
-
TPP: Transparent Page Placement for CXL-Enabled Tiered-Memory
Authors:
Hasan Al Maruf,
Hao Wang,
Abhishek Dhanotia,
Johannes Weiner,
Niket Agarwal,
Pallab Bhattacharya,
Chris Petersen,
Mosharaf Chowdhury,
Shobhit Kanaujia,
Prakash Chauhan
Abstract:
The increasing demand for memory in hyperscale applications has led to memory becoming a large portion of the overall datacenter spend. The emergence of coherent interfaces like CXL enables main memory expansion and offers an efficient solution to this problem. In such systems, the main memory can constitute different memory technologies with varied characteristics. In this paper, we characterize…
▽ More
The increasing demand for memory in hyperscale applications has led to memory becoming a large portion of the overall datacenter spend. The emergence of coherent interfaces like CXL enables main memory expansion and offers an efficient solution to this problem. In such systems, the main memory can constitute different memory technologies with varied characteristics. In this paper, we characterize memory usage patterns of a wide range of datacenter applications across the server fleet of Meta. We, therefore, demonstrate the opportunities to offload colder pages to slower memory tiers for these applications. Without efficient memory management, however, such systems can significantly degrade performance.
We propose a novel OS-level application-transparent page placement mechanism (TPP) for CXL-enabled memory. TPP employs a lightweight mechanism to identify and place hot/cold pages to appropriate memory tiers. It enables a proactive page demotion from local memory to CXL-Memory. This technique ensures a memory headroom for new page allocations that are often related to request processing and tend to be short-lived and hot. At the same time, TPP can promptly promote performance-critical hot pages trapped in the slow CXL-Memory to the fast local memory, while minimizing both sampling overhead and unnecessary migrations. TPP works transparently without any application-specific knowledge and can be deployed globally as a kernel release.
We evaluate TPP in the production server fleet with early samples of new x86 CPUs with CXL 1.1 support. TPP makes a tiered memory system performant as an ideal baseline (<1% gap) that has all the memory in the local tier. It is 18% better than today's Linux, and 5-17% better than existing solutions including NUMA Balancing and AutoTiering. Most of the TPP patches have been merged in the Linux v5.18 release.
△ Less
Submitted 28 May, 2023; v1 submitted 6 June, 2022;
originally announced June 2022.
-
Survey on Tools and Techniques Detecting Microservice API Patterns
Authors:
Alexander Bakhtin,
Abdullah Al Maruf,
Tomas Cerny,
Davide Taibi
Abstract:
It is well recognized that design patterns improve system development and maintenance in many aspects. While we commonly recognize these patterns in monolithic systems, many patterns emerged for cloud computing, specifically microservices. Unfortunately, while various patterns have been proposed, available quality assessment tools often do not recognize many. This article performs a grey literatur…
▽ More
It is well recognized that design patterns improve system development and maintenance in many aspects. While we commonly recognize these patterns in monolithic systems, many patterns emerged for cloud computing, specifically microservices. Unfortunately, while various patterns have been proposed, available quality assessment tools often do not recognize many. This article performs a grey literature review to find and catalog available tools to detect microservice API patterns (MAP). It reasons about mechanisms that can be used to detect these patterns. Furthermore, the results indicate gaps and opportunities for improvements for quality assessment tools. Finally, the reader is provided with a route map to detection techniques that can be used to mine MAPs.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee
Authors:
Luyao Niu,
Abdullah Al Maruf,
Andrew Clark,
J. Sukarno Mertoguno,
Radha Poovendran
Abstract:
Cyber-physical systems (CPS) are required to operate safely under fault and malicious attacks. The simplex architecture and the recently proposed cyber resilient architectures, e.g., Byzantine fault tolerant++ (BFT++), provide safety for CPS under faults and malicious cyber attacks, respectively. However, these existing architectures make use of different timing parameters and implementations to p…
▽ More
Cyber-physical systems (CPS) are required to operate safely under fault and malicious attacks. The simplex architecture and the recently proposed cyber resilient architectures, e.g., Byzantine fault tolerant++ (BFT++), provide safety for CPS under faults and malicious cyber attacks, respectively. However, these existing architectures make use of different timing parameters and implementations to provide safety, and are seemingly unrelated. In this paper, we propose an analytical framework to represent the simplex, BFT++ and other practical cyber resilient architectures (CRAs). We construct a hybrid system that models CPS adopting any of these architectures. We derive sufficient conditions via our proposed framework under which a control policy is guaranteed to be safe. We present an algorithm to synthesize the control policy. We validate the proposed framework using a case study on lateral control of a Boeing 747, and demonstrate that our proposed approach ensures safety of the system.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics
Authors:
Abdullah Al Maruf,
Luyao Niu,
Andrew Clark,
J. Sukarno Mertoguno,
Radha Poovendran
Abstract:
Complex, interconnected Cyber-physical Systems (CPS) are increasingly common in applications including smart grids and transportation. Ensuring safety of interconnected systems whose dynamics are coupled is challenging because the effects of faults and attacks in one sub-system can propagate to other sub-systems and lead to safety violations. In this paper, we study the problem of safety-critical…
▽ More
Complex, interconnected Cyber-physical Systems (CPS) are increasingly common in applications including smart grids and transportation. Ensuring safety of interconnected systems whose dynamics are coupled is challenging because the effects of faults and attacks in one sub-system can propagate to other sub-systems and lead to safety violations. In this paper, we study the problem of safety-critical control for CPS with coupled dynamics when some sub-systems are subject to failure or attack. We first propose resilient-safety indices (RSIs) for the faulty or compromised sub-systems that bound the worst-case impacts of faulty or compromised sub-systems on a set of specified safety constraints. By incorporating the RSIs, we provide a sufficient condition for the synthesis of control policies in each failure- and attack- free sub-systems. The synthesized control policies compensate for the impacts of the faulty or compromised sub-systems to guarantee safety. We formulate sum-of-square optimization programs to compute the RSIs and the safety-ensuring control policies. We present a case study that applies our proposed approach on the temperature regulation of three coupled rooms. The case study demonstrates that control policies obtained using our algorithm guarantee system's safety constraints.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
Privacy-Preserving Reinforcement Learning Beyond Expectation
Authors:
Arezoo Rajabi,
Bhaskar Ramasubramanian,
Abdullah Al Maruf,
Radha Poovendran
Abstract:
Cyber and cyber-physical systems equipped with machine learning algorithms such as autonomous cars share environments with humans. In such a setting, it is important to align system (or agent) behaviors with the preferences of one or more human users. We consider the case when an agent has to learn behaviors in an unknown environment. Our goal is to capture two defining characteristics of humans:…
▽ More
Cyber and cyber-physical systems equipped with machine learning algorithms such as autonomous cars share environments with humans. In such a setting, it is important to align system (or agent) behaviors with the preferences of one or more human users. We consider the case when an agent has to learn behaviors in an unknown environment. Our goal is to capture two defining characteristics of humans: i) a tendency to assess and quantify risk, and ii) a desire to keep decision making hidden from external parties. We incorporate cumulative prospect theory (CPT) into the objective of a reinforcement learning (RL) problem for the former. For the latter, we use differential privacy. We design an algorithm to enable an RL agent to learn policies to maximize a CPT-based objective in a privacy-preserving manner and establish guarantees on the privacy of value functions learned by the algorithm when rewards are sufficiently close. This is accomplished through adding a calibrated noise using a Gaussian process mechanism at each step. Through empirical evaluations, we highlight a privacy-utility tradeoff and demonstrate that the RL agent is able to learn behaviors that are aligned with that of a human user in the same environment in a privacy-preserving manner
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
Memtrade: A Disaggregated-Memory Marketplace for Public Clouds
Authors:
Hasan Al Maruf,
Yuhong Zhong,
Hongyi Wang,
Mosharaf Chowdhury,
Asaf Cidon,
Carl Waldspurger
Abstract:
We present Memtrade, the first memory disaggregation system for public clouds. Public clouds introduce a set of unique challenges for resource disaggregation across different tenants, including security, isolation and pricing. Memtrade allows producer virtual machines (VMs) to lease both their unallocated memory and allocated-but-idle application memory to remote consumer VMs for a limited period…
▽ More
We present Memtrade, the first memory disaggregation system for public clouds. Public clouds introduce a set of unique challenges for resource disaggregation across different tenants, including security, isolation and pricing. Memtrade allows producer virtual machines (VMs) to lease both their unallocated memory and allocated-but-idle application memory to remote consumer VMs for a limited period of time. Memtrade does not require any modifications to host-level system software or support from the cloud provider. It harvests producer memory using an application-aware control loop to form a distributed transient remote memory pool with minimal performance impact; it employs a broker to match producers with consumers while satisfying performance constraints; and it exposes the matched memory to consumers as a secure KV cache. Our evaluation using real-world cluster traces shows that Memtrade provides significant performance benefit for consumers (improving average read latency up to 2.8x) while preserving confidentiality and integrity, with little impact on producer applications (degrading performance by less than 2.1%).
△ Less
Submitted 16 August, 2021;
originally announced August 2021.
-
Observability-Blocking Control using Sparser and Regional Feedback for Network Synchronization Processes
Authors:
Abdullah Al Maruf,
Sandip Roy
Abstract:
The design of feedback control systems to block observability in a network synchronization model, i.e. to make the dynamics unobservable from measurements at a subset of the network's nodes, is studied. First, a general design algorithm is presented for blocking observability at any specified group of $m$ nodes, by applying state feedback controls at $m+2$ specified actuation nodes. The algorithm…
▽ More
The design of feedback control systems to block observability in a network synchronization model, i.e. to make the dynamics unobservable from measurements at a subset of the network's nodes, is studied. First, a general design algorithm is presented for blocking observability at any specified group of $m$ nodes, by applying state feedback controls at $m+2$ specified actuation nodes. The algorithm is based on a method for eigenstructure assignment, which allows surgical modification of particular eigenvectors to block observability while preserving the remaining open-loop eigenstructure. Next, the topological structure of the network is exploited to reduce the number of controllers required for blocking observability; the result is based on blocking observability on the nodes associated with a vertex-cutset separating the actuation and measurement locations. Also, the design is modified to encompass regional feedback controls, which only use data from a subset of accessible nodes. The regional feedback design does not maintain the open-loop eigenstructure, but can be guaranteed to preserve stability via a time-scale argument. The results are illustrated with numerical examples.
△ Less
Submitted 10 September, 2021; v1 submitted 15 March, 2021;
originally announced March 2021.
-
A Note on Surgical Eigenstructure Assignment via State Feedback
Authors:
Abdullah Al Maruf,
Sandip Roy
Abstract:
Assignability of all eigenvalues and a subset of key eigenvectors/generalized eigenvectors of a linear time-invariant system via state feedback is considered. We clarify that, if the key eigenvectors/generalized eigenvectors and their associated eigenvalues satisfy the classical conditions for full eigenstructure assignment, the remaining eigenvalues can be assigned at will.
Assignability of all eigenvalues and a subset of key eigenvectors/generalized eigenvectors of a linear time-invariant system via state feedback is considered. We clarify that, if the key eigenvectors/generalized eigenvectors and their associated eigenvalues satisfy the classical conditions for full eigenstructure assignment, the remaining eigenvalues can be assigned at will.
△ Less
Submitted 24 August, 2021; v1 submitted 5 October, 2020;
originally announced October 2020.
-
Effectively Prefetching Remote Memory with Leap
Authors:
Hasan Al Maruf,
Mosharaf Chowdhury
Abstract:
Memory disaggregation over RDMA can improve the performance of memory-constrained applications by replacing disk swap** with remote memory accesses. However, state-of-the-art memory disaggregation solutions still use data path components designed for slow disks. As a result, applications experience remote memory access latency significantly higher than that of the underlying low-latency network,…
▽ More
Memory disaggregation over RDMA can improve the performance of memory-constrained applications by replacing disk swap** with remote memory accesses. However, state-of-the-art memory disaggregation solutions still use data path components designed for slow disks. As a result, applications experience remote memory access latency significantly higher than that of the underlying low-latency network, which itself is too high for many applications.
In this paper, we propose Leap, a prefetching solution for remote memory accesses due to memory disaggregation. At its core, Leap employs an online, majority-based prefetching algorithm, which increases the page cache hit rate. We complement it with a lightweight and efficient data path in the kernel that isolates each application's data path to the disaggregated memory and mitigates latency bottlenecks arising from legacy throughput-optimizing operations. Integration of Leap in the Linux kernel improves the median and tail remote page access latencies of memory-bound applications by up to 104.04x and 22.62x, respectively, over the default data path. This leads to up to 10.16x performance improvements for applications using disaggregated memory in comparison to the state-of-the-art solutions.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Spin-Preserving Chiral Photonic Crystal Mirror
Authors:
Behrooz Semnani,
Jeremy Flannery,
Rubayet Al Maruf,
Michal Bajcsy
Abstract:
Chirality refers to a geometric phenomenon in which objects are not superimposable on their mirror image. Structures made of nano-scale chiral elements can display chiroptical effects, such as dichroism for left- and right- handed circularly polarized light, which makes them of high interest for applications ranging from quantum information processing and quantum optics to circular dichroism spect…
▽ More
Chirality refers to a geometric phenomenon in which objects are not superimposable on their mirror image. Structures made of nano-scale chiral elements can display chiroptical effects, such as dichroism for left- and right- handed circularly polarized light, which makes them of high interest for applications ranging from quantum information processing and quantum optics to circular dichroism spectroscopy and molecular recognition. At the same time, strong effects have been challenging to achieve even in synthetic optical media and chiroptical effects for light with normal incidence has been speculated to be prohibited in lossless, thin, quasi-two-dimensional structures. Here, we report on our experimental realization of a giant chiroptical effect in a thin monolithic photonic crystal mirror. Unlike conventional mirrors, our structure selectively reflects only one spin state of light, while preserving its handedness, with a near unity level of circular dichroism. The operational principle of the photonic-crystal mirror relies on Guided Mode Resonance (GMR) with simultaneous excitation of leaky TE and TM Bloch modes in the photonic crystal slab. Such modes are not reliant on the suppression of their radiative losses through the long-range destructive interference and even small areas of the photonic-crystal exhibit robust circular dichroism. Despite its simplicity, the mirror strongly surpasses the performance of earlier reported structures and, contrary to a prevailed notion, demonstrates that near unity reflectivity contrast for the opposite helicities is achievable in a quasi-two-dimensional structure.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
Hydra: Resilient and Highly Available Remote Memory
Authors:
Youngmoon Lee,
Hasan Al Maruf,
Mosharaf Chowdhury,
Asaf Cidon,
Kang G. Shin
Abstract:
We present Hydra, a low-latency, low-overhead, and highly available resilience mechanism for remote memory. Hydra can access erasure-coded remote memory within a single-digit microsecond read/write latency, significantly improving the performance-efficiency trade-off over the state-of-the-art -- it performs similar to in-memory replication with 1.6X lower memory overhead. We also propose CodingSet…
▽ More
We present Hydra, a low-latency, low-overhead, and highly available resilience mechanism for remote memory. Hydra can access erasure-coded remote memory within a single-digit microsecond read/write latency, significantly improving the performance-efficiency trade-off over the state-of-the-art -- it performs similar to in-memory replication with 1.6X lower memory overhead. We also propose CodingSets, a novel coding group placement algorithm for erasure-coded data, that provides load balancing while reducing the probability of data loss under correlated failures by an order of magnitude. With Hydra, even when only 50% of memory is local, unmodified memory-intensive applications achieve performance close to that of the fully in-memory case in the presence of remote failures and outperform the state-of-the-art solutions by up to 4.35X.
△ Less
Submitted 28 May, 2023; v1 submitted 21 October, 2019;
originally announced October 2019.
-
Small-Signal Stability Analysis for Droop-Controlled Inverter-based Microgrids with Losses and Filtering
Authors:
Abdullah Al Maruf,
Mohammad Ostadijafari,
Anamika Dubey,
Sandip Roy
Abstract:
An islanded microgrid supplied by multiple distributed energy resources (DERs) often employs droop-control mechanisms for power sharing. Because microgrids do not include inertial elements, and low pass filtering of noisy measurements introduces lags in control, droop-like controllers may pose significant stability concerns. This paper aims to understand the effects of droop-control on the small-s…
▽ More
An islanded microgrid supplied by multiple distributed energy resources (DERs) often employs droop-control mechanisms for power sharing. Because microgrids do not include inertial elements, and low pass filtering of noisy measurements introduces lags in control, droop-like controllers may pose significant stability concerns. This paper aims to understand the effects of droop-control on the small-signal stability and transient response of the microgrid. Towards this goal, we present a compendium of results on the small-signal stability of droop-controlled inverter-based microgrids with heterogeneous loads, which distinguishes: (1) lossless vs. lossy networks; (2) droop mechanisms with and without filters, and (3) mesh vs. radial network topologies. Small-signal and transient characteristics are also studied using multiple simulation studies on IEEE test systems
△ Less
Submitted 3 July, 2019;
originally announced July 2019.
-
Decomposition of Nonlinear Dynamical Networks via Comparison Systems
Authors:
Abdullah Maruf,
Soumya Kundu,
Enoch Yeung,
Marian Anghel
Abstract:
In analysis and control of large-scale nonlinear dynamical systems, a distributed approach is often an attractive option due to its computational tractability and usually low communication requirements. Success of the distributed control design relies on the separability of the network into weakly interacting subsystems such that minimal information exchange between subsystems is sufficient to ach…
▽ More
In analysis and control of large-scale nonlinear dynamical systems, a distributed approach is often an attractive option due to its computational tractability and usually low communication requirements. Success of the distributed control design relies on the separability of the network into weakly interacting subsystems such that minimal information exchange between subsystems is sufficient to achieve satisfactory control performance. While distributed analysis and control design for dynamical network have been well studied, decomposition of nonlinear networks into weakly interacting subsystems has not received as much attention. In this article we propose a vector Lyapunov functions based approach to quantify the energy-flow in a dynamical network via a model of a comparison system. Introducing a notion of power and energy flow in a dynamical network, we use sum-of-squares programming tools to partition polynomial networks into weakly interacting subsystems. Examples are provided to illustrate the proposed method of decomposition.
△ Less
Submitted 8 March, 2018;
originally announced March 2018.
-
Fabry-Pérot Cavity Formed with Dielectric Metasurfaces in a Hollow-Core Fiber
Authors:
Jeremy Flannery,
Rubayet Al Maruf,
Taehyun Yoon,
Michal Bajcsy
Abstract:
We demonstrate a fiber-integrated Fabry-Pérot cavity formed by attaching a pair of dielectric metasurfaces to the ends of a hollow-core photonic-crystal fiber segment. The metasurfaces consist of perforated membranes designed as photonic-crystal slabs that act as planar mirrors but can potentially allow injection of gases through their holes into the hollow core of the fiber. We have so far observ…
▽ More
We demonstrate a fiber-integrated Fabry-Pérot cavity formed by attaching a pair of dielectric metasurfaces to the ends of a hollow-core photonic-crystal fiber segment. The metasurfaces consist of perforated membranes designed as photonic-crystal slabs that act as planar mirrors but can potentially allow injection of gases through their holes into the hollow core of the fiber. We have so far observed cavities with finesse of ~11 and Q factors of ~$4.5 \times 10^5$, but much higher values should be achievable with improved fabrication procedures. We expect this device to enable development of new fiber lasers, enhanced gas spectroscopy, and studies of fundamental light-matter interactions and nonlinear optics.
△ Less
Submitted 7 February, 2018;
originally announced February 2018.