Performance Evaluation最新文献

筛选
英文 中文
An experimental study on beamforming architecture and full-duplex wireless across two operational outdoor massive MIMO networks 关于波束成形架构和两个室外大规模多输入多输出网络全双工无线技术的实验研究
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-09-27 DOI: 10.1016/j.peva.2024.102447
{"title":"An experimental study on beamforming architecture and full-duplex wireless across two operational outdoor massive MIMO networks","authors":"","doi":"10.1016/j.peva.2024.102447","DOIUrl":"10.1016/j.peva.2024.102447","url":null,"abstract":"<div><div>Full-duplex (FD) wireless communication refers to a communication system in which both ends of a wireless link transmit and receive data simultaneously in the same frequency band. One of the major challenges of FD communication is self-interference (SI), which refers to the interference caused by transmitting elements of a radio to its own receiving elements. Fully digital beamforming is a technique used to conduct beamforming and has been recently repurposed to also reduce SI. However, the cost of fully digital systems dramatically increases with the number of antennas, as each antenna requires an independent Tx-Rx RF chain. Hybrid beamforming systems use a much smaller number of RF chains to feed the same number of antennas, and hence can significantly reduce the deployment cost. In this paper, we aim to quantify the performance gap between these two radio architectures in terms of SI cancellation and system capacity in FD multi-user Multiple Input Multiple Output (MIMO) setups. We first obtained over-the-air channel measurement data on two outdoor massive MIMO deployments over the course of three months. We next study SoftNull and M-HBFD as two state-of-the-art transmit (Tx) beamforming based FD systems, and introduce two new joint transmit-receive (Tx-Rx) beamforming based FD systems named TR-FD<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> and TR-HBFD for fully digital and hybrid radio architectures, respectively. We show that the hybrid beamforming systems can achieve 80%–99% of the fully digital systems capacity, depending on the number of users. Our results show that it is possible to get many benefits associated with fully digital massive MIMO systems with a hybrid beamforming architecture at a fraction of the cost.</div></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142427974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic performance evaluation of the class-A device in LoRaWAN protocol on the MAC layer LoRaWAN 协议中 A 类设备在 MAC 层的概率性能评估
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-09-21 DOI: 10.1016/j.peva.2024.102446
{"title":"Probabilistic performance evaluation of the class-A device in LoRaWAN protocol on the MAC layer","authors":"","doi":"10.1016/j.peva.2024.102446","DOIUrl":"10.1016/j.peva.2024.102446","url":null,"abstract":"<div><div>LoRaWAN is a network technology that provides a long-range wireless network while maintaining low energy consumption. It adopts the pure Aloha MAC protocol and the duty-cycle limitation at both uplink and downlink on the MAC layer to conserve energy. Additionally, LoRaWAN employs orthogonal parameters to mitigate collisions. However, synchronization in star-of-star topology networks and the complicated collision mechanism make it challenging to conduct a quantitative performance evaluation in LoRaWAN. Our previous work proposes a Probabilistic Timed Automata (PTA) model to represent the uplink transmission in LoRaWAN. It is a mathematical model that presents the nondeterministic and probabilistic choice with time passing. However, this model remains a work in progress. This study extends the PTA model to depict Class-A devices in the LoRaWAN protocol. The complete characteristics of LoRaWAN’s MAC layer, such as duty-cycle limits, bidirectional communication, and confirmed message transmission, are accurately modeled. Furthermore, a comprehensive collision model is integrated into the PTA. Various properties are verified using the probabilistic model checker PRISM, and quantitative properties are calculated under diverse scenarios. This quantitative analysis provides valuable insights into the performance and behavior of LoRaWAN networks under varying conditions.</div></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142314790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal resource management for multi-access edge computing without using cross-layer communication 不使用跨层通信的多接入边缘计算的最优资源管理
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-09-12 DOI: 10.1016/j.peva.2024.102445
{"title":"Optimal resource management for multi-access edge computing without using cross-layer communication","authors":"","doi":"10.1016/j.peva.2024.102445","DOIUrl":"10.1016/j.peva.2024.102445","url":null,"abstract":"<div><p>We consider a Multi-access Edge Computing (MEC) system with a set of users, a base station (BS) with an attached MEC server, and a cloud server. The users can serve the service requests locally or can offload them to the BS which in turn can serve a subset of the offloaded requests at the MEC and can forward the requests to the cloud server. The user devices and the MEC server can be dynamically configured to serve different classes of services. The service requests offloaded to the BS incur offloading costs and those forwarded to the cloud incur additional costs; the costs could represent service charges or delays. Aggregate cost minimization subject to stability warrants optimal service scheduling and offloading at the users and the MEC server, at their application layers, and optimal uplink packet scheduling at the users’ MAC layers. Classical back-pressure (BP) based solutions entail cross-layer message exchange, and hence are not viable. We propose virtual queue-based drift-plus-penalty algorithms that are throughput optimal, and achieve the optimal delay arbitrarily closely but do not require cross-layer communication. We first consider an MEC system without local computation, and subsequently, extend our framework to incorporate local computation also. We demonstrate that the proposed algorithms offer almost the same performance as BP based algorithms. These algorithms contain tuneable parameters that offer a trade off between queue lengths at the users and the BS and the offloading costs.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient handling of sporadic messages in FlexRay 在 FlexRay 中高效处理零星信息
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-09-06 DOI: 10.1016/j.peva.2024.102444
{"title":"Efficient handling of sporadic messages in FlexRay","authors":"","doi":"10.1016/j.peva.2024.102444","DOIUrl":"10.1016/j.peva.2024.102444","url":null,"abstract":"<div><p>FlexRay is a high-bandwidth protocol that supports hard-deadline periodic and sporadic traffic in modern in-vehicle communication networks. The dynamic segment of FlexRay is used for transmitting hard deadline sporadic messages. In this paper, we describe an algorithm to minimize the duration of the dynamic segment in a FlexRay cycle, yielding better results than existing algorithms in the literature. The proposed algorithm consists of two phases. In the first phase, we assume that a sporadic message instance contends for service with only one instance of each higher-priority message. The lower bound provided by the first phase serves as the initial guess for the number of mini-slots used in the second phase, where an exact scheduling analysis is performed. In the second phase, a sporadic message may contend for service with multiple instances of each higher-priority message. This two-phase approach is efficient because the first phase has low overhead and its estimate greatly reduces the number of iterations needed in the second phase. We conducted experiments using the dataset provided in the literature as well as the SAE benchmark dataset. The experimental results demonstrate superior bandwidth minimization and computational efficiency compared to other algorithms.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network-calculus service curves of the interleaved regulator 交错调节器的网络计算服务曲线
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-09-02 DOI: 10.1016/j.peva.2024.102443
{"title":"Network-calculus service curves of the interleaved regulator","authors":"","doi":"10.1016/j.peva.2024.102443","DOIUrl":"10.1016/j.peva.2024.102443","url":null,"abstract":"<div><p>The interleaved regulator (implemented by IEEE TSN Asynchronous Traffic Shaping) is used in time-sensitive networks for reshaping the flows with per-flow contracts. When applied to an aggregate of flows that come from a FIFO system, an interleaved regulator that reshapes the flows with their initial contracts does not increase the worst-case delay of the aggregate. This shaping-for-free property supports the computation of end-to-end latency bounds and the validation of the network’s timing requirements. A common method to establish the properties of a network element is to obtain a network-calculus service-curve model. The existence of such a model for the interleaved regulator remains an open question. If a service-curve model were found for the interleaved regulator, then the analysis of this mechanism would no longer be limited to the situations where the shaping-for-free holds, which would widen its use in time-sensitive networks. In this paper, we investigate if network-calculus service curves can capture the behavior of the interleaved regulator. For an interleaved regulator that is placed outside of the shaping-for-free requirements (after a non-FIFO system), we develop Spring, an adversarial traffic generation that yields unbounded latencies. Consequently, we prove that no network-calculus service curve exists to explain the interleaved regulator’s behavior. It is still possible to find non-trivial service curves for the interleaved regulator. However, their long-term rate cannot be large enough to provide any guarantee. Specifically, we prove that for the regulators that process at least four flows with the same contract, the long-term rate of any service curve is upper bounded by three times the rate of the per-flow contract.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of containers for low-latency packet processing in virtualized network environments 虚拟化网络环境中用于低延迟数据包处理的容器性能评估
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-08-28 DOI: 10.1016/j.peva.2024.102442
{"title":"Performance evaluation of containers for low-latency packet processing in virtualized network environments","authors":"","doi":"10.1016/j.peva.2024.102442","DOIUrl":"10.1016/j.peva.2024.102442","url":null,"abstract":"<div><p>Packet processing in current network scenarios faces complex challenges due to the increasing prevalence of requirements such as low latency, high reliability, and resource sharing. Virtualization is a potential solution to mitigate these challenges by enabling resource sharing and on-demand provisioning; however, ensuring high reliability and ultra-low latency remains a key challenge. Since bare-metal systems are often impractical because of high cost and space usage, and the overhead of virtual machines (VMs) is substantial, we evaluate the utilization of containers as a potential lightweight solution for low-latency packet processing. Herein, we discuss the benefits and drawbacks and encourage container environments in low-latency packet processing when the degree of isolation of customer data is adequate and bare metal systems are unaffordable. Our results demonstrate that containers exhibit similar latency performance with more predictable tail-latency behavior than bare metal packet processing. Moreover, deciding which mainboard architecture to use, especially the cache division, is equally vital as containers are prone to higher latencies on more shared caches between cores especially when other optimizations cannot be used. We show that this has a higher impact on latencies within containers than on bare metal or VMs, resulting in the selection of hardware architectures following optimizations as a critical challenge. Furthermore, the results reveal that the virtualization overhead does not impact tail latencies.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531624000476/pdfft?md5=92c046df1bfad30f8dbdb77dadbb4fd5&pid=1-s2.0-S0166531624000476-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142137317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-reliability trade-off analysis for transmit antenna selection in cognitive ambient backscatter communications 认知环境反向散射通信中发射天线选择的安全性-可靠性权衡分析
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-08-26 DOI: 10.1016/j.peva.2024.102441
{"title":"Security-reliability trade-off analysis for transmit antenna selection in cognitive ambient backscatter communications","authors":"","doi":"10.1016/j.peva.2024.102441","DOIUrl":"10.1016/j.peva.2024.102441","url":null,"abstract":"<div><p>Massive deployment of IoT devices raises the need for energy-efficient spectrum-efficient low-cost communications. Ambient backscatter communication (AmBC) technology provides a promising solution to achieve that. Moreover, incorporating AmBC with cognitive radio networks (CRNs) achieves better spectrum efficiency; however, this comes with performance drawbacks. In this work, we investigate the security and reliability performance of an underlay CRN with AmBC, where the backscattering device (BD) exploits the radio frequency (RF) signals of the secondary transmitter (ST), and both the ST and the BD share a common receiver. Different from previous work, we consider an ST with multiple antenna. The ST employs a transmit antenna selection (TAS) scheme to enhance the ST performance and overcome the performance degradation caused by the BD interference. TAS exploits multiple antenna diversity with lower hardware complexity and power consumption. Considering the Nakagami-<span><math><mi>m</mi></math></span> fading model, closed-form expressions are derived for the outage probability (OP) and intercept probability (IP) of both the ST and the BD transmissions at the legitimate receiver and the eavesdropper. Moreover, the asymptotic behavior of OPs and IPs is also investigated in the high signal-to-noise ratio regime and the high main-to-eavesdropper ratio regime, respectively. Monte Carlo simulations are performed to validate the derived closed-form expressions. Numerical results show that employing TAS enhances the ST and BD reliability performance by percentages up to 98% and 80%, respectively, at high primary user interference threshold values. Moreover, it results in a better security-reliability trade-off for the ST and the BD.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lure: A simulator for networks of batteryless intermittent nodes 诱惑无电池间歇节点网络模拟器
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-08-23 DOI: 10.1016/j.peva.2024.102440
{"title":"Lure: A simulator for networks of batteryless intermittent nodes","authors":"","doi":"10.1016/j.peva.2024.102440","DOIUrl":"10.1016/j.peva.2024.102440","url":null,"abstract":"<div><p>The emerging paradigm of batteryless intermittent sensor networks (BISNs) presents new challenges for researchers of low-power wireless systems and protocols. The nature of these challenges exacerbates the difficulty of evaluating networks of physical sensor nodes, making simulation an even more important component in evaluating performance metrics, such as communication throughput and delay, for BISN designs. To our knowledge, existing simulators and analytical models do not meet the unique needs of BISN research; therefore, we have created a new open-source BISN simulator named <em>Lure</em>. Lure is designed from the ground-up for simulation of batteryless intermittent systems and networks. Written in Python, Lure is powerful, flexible, highly configurable, and supports rapid prototyping of new protocols, systems, and applications, with a low learning curve. In this paper, we present Lure and validate it with experimental data to show that Lure can accurately reflect the reality of BISNs. We then demonstrate the process of applying Lure to research questions in select case studies.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531624000452/pdfft?md5=1c6343234e3ac7dad5efd12075fa6bfd&pid=1-s2.0-S0166531624000452-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inference latency prediction for CNNs on heterogeneous mobile devices and ML frameworks 异构移动设备和 ML 框架上 CNN 的推理延迟预测
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-08-01 DOI: 10.1016/j.peva.2024.102429
{"title":"Inference latency prediction for CNNs on heterogeneous mobile devices and ML frameworks","authors":"","doi":"10.1016/j.peva.2024.102429","DOIUrl":"10.1016/j.peva.2024.102429","url":null,"abstract":"<div><p>Due to the proliferation of inference tasks on mobile devices, state-of-the-art neural architectures are typically designed using Neural Architecture Search (NAS) to achieve good tradeoffs between machine learning accuracy and inference latency. While measuring inference latency of a huge set of candidate architectures during NAS is not feasible, latency prediction for mobile devices is challenging, because of hardware heterogeneity, optimizations applied by machine learning frameworks, and diversity of neural architectures. Motivated by these challenges, we first quantitatively assess the characteristics of neural architectures (specifically, convolutional neural networks for image classification), ML frameworks, and mobile devices that have significant effects on inference latency. Based on this assessment, we propose an operation-wise framework which addresses these challenges by developing operation-wise latency predictors and achieves high accuracy in end-to-end latency predictions, as shown by our comprehensive evaluations on multiple mobile devices using multicore CPUs and GPUs. To illustrate that our approach does not require expensive data collection, we also show that accurate predictions can be achieved on real-world neural architectures using only small amounts of profiling data.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141714597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface: Special issue on ACM/SPEC ICPE 2023 前言:ACM/SPEC ICPE 2023 特刊
IF 1 4区 计算机科学
Performance Evaluation Pub Date : 2024-08-01 DOI: 10.1016/j.peva.2024.102430
{"title":"Preface: Special issue on ACM/SPEC ICPE 2023","authors":"","doi":"10.1016/j.peva.2024.102430","DOIUrl":"10.1016/j.peva.2024.102430","url":null,"abstract":"","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141850193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信