Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)最新文献

筛选
英文 中文
Simulation-based 'STRESS' testing case study: a multicast routing protocol 基于模拟的“压力”测试案例研究:多播路由协议
A. Helmy, D. Estrin
{"title":"Simulation-based 'STRESS' testing case study: a multicast routing protocol","authors":"A. Helmy, D. Estrin","doi":"10.1109/MASCOT.1998.693672","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693672","url":null,"abstract":"We propose a method for using simulation to analyze the robustness of multiparty (multicast-based) protocols in a systematic fashion. We call our method Systematic Testing of Robustness by Examination of Selected Scenarios (STRESS). STRESS aims to cut the time and effort needed to explore pathological cases of a protocol during its design. This paper has two goals: (1) to describe the method, and (2) to serve as a case study of robustness analysis of multicast routing protocols. We aim to offer design tools similar to those used in CAD and VLSI design, and demonstrate how effective systematic simulation can be in studying protocol robustness.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114435165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Simulation of self-organizing spectrum management in wireless networks 无线网络中自组织频谱管理的仿真
S. Borst, S. A. Grandhi, Colin L. Kahn, K. Kumaran, B. Lubachevsky, Donna M. Sand
{"title":"Simulation of self-organizing spectrum management in wireless networks","authors":"S. Borst, S. A. Grandhi, Colin L. Kahn, K. Kumaran, B. Lubachevsky, Donna M. Sand","doi":"10.1109/MASCOT.1998.693705","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693705","url":null,"abstract":"We describe the simulation of a new dynamic channel assignment algorithm in FDMA/TDMA wireless networks. The algorithm relies on periodic interference measurements by each of the base stations on the inactive frequencies, so as to identify appropriate candidate channels. The adaptive nature provides automatic configuration at the time of system initialization and adaptation to system expansion and traffic patterns with spatial or temporal variations. By eliminating the manual frequency planning process inherent to today's fixed channel assignment procedures, the self-organizing capability guarantees ease of operation for service providers, while increasing both capacity and voice quality. Our simulation experiments demonstrate stability of the algorithm and confirm its self-organizing capability. They also indicate a significant decrease of call blocking and dropping and other quality-of-service improvements.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130575556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic schemes for speculative execution of code 用于推测执行代码的动态方案
P. Raghavan, H. Shachnai, Mira Yaniv
{"title":"Dynamic schemes for speculative execution of code","authors":"P. Raghavan, H. Shachnai, Mira Yaniv","doi":"10.1109/MASCOT.1998.693711","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693711","url":null,"abstract":"Speculative execution of code is becoming a key technique for enhancing the performance of pipeline processors. We study schemes that predict the execution path of a program based on the history of branch executions. Building on previous work, we present a model for analyzing the effective speedup from pipelining using various schemes for speculative execution. We follow this with stochastic analyses of various speculative execution schemes. Finally, we conclude with simulations covering several of the settings we study.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115803650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Prioritized multiprocessor networks: design and performance 优先多处理器网络:设计和性能
G. Ravindran, M. Stumm
{"title":"Prioritized multiprocessor networks: design and performance","authors":"G. Ravindran, M. Stumm","doi":"10.1109/MASCOT.1998.693689","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693689","url":null,"abstract":"This paper proposes and evaluates prioritized direct shared-memory multiprocessor networks. We use three components to implement prioritized networks, namely, priority-based link arbitration, priority inheritance, and dynamic virtual channels. The two major results from our study are: (i) adding priorities to direct shared-memory multiprocessor networks can lead to reduced average transaction latencies and increased system throughput when running traditional parallel applications, and (ii) a prioritized multiprocessor network can be used to reduce the worst-case latencies of time-constrained traffic when it co-exists with best-effort traffic, without penalizing the average performance of best-effort traffic.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel analysis technique for investigating transient performance of queueing systems 一种研究排队系统暂态性能的新分析技术
Guang-Liang Li, Jun-hong Cui, Bo Li, Fang-Ming Li
{"title":"A novel analysis technique for investigating transient performance of queueing systems","authors":"Guang-Liang Li, Jun-hong Cui, Bo Li, Fang-Ming Li","doi":"10.1109/MASCOT.1998.693697","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693697","url":null,"abstract":"Conventional analysis techniques of queueing systems typically assume that the stochastic process under study is already in steady state. This assumption is, however, not valid if the life cycle of the process is not large enough. Previous work in transient analysis of queueing systems usually focuses on Markov models. This paper, in contrast, presents an analysis technique for investigating transient performance of queueing systems that are not necessarily Markovian.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132490374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of gateway buffer management policies on TCP over ATM performance 网关缓冲区管理策略对TCP over ATM性能的影响
P. Mishra, M. Saksena
{"title":"Effect of gateway buffer management policies on TCP over ATM performance","authors":"P. Mishra, M. Saksena","doi":"10.1109/MASCOT.1998.693676","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693676","url":null,"abstract":"In this paper, we examine the effect of the buffer management policies, used at the IP/ATM gateway, on the end-to-end performance seen by IP traffic when using the ATM ABR service class. The ABR service class uses feedback-based flow control at the ATM layer to dynamically partition bandwidth among active ABR virtual circuits. It is likely that the ABR service will be operated in a manner designed to achieve nearly loss free operation in the core of the ATM network, causing most of the buffering requirements to be pushed to the ingress points of the ATM network. In our traffic model, an ingress IP/ATM gateway is responsible for setting up ATM virtual circuits and mapping IP packets onto ATM virtual circuits. In this model of network transport, the IP/ATM gateways serve as ABR source and destination end-points. Since the buffering available at an IP/ATM gateway will typically be small relative to the worst case buffer buildups that can occur due to transient overloads in the ATM network. Therefore, the buffer management policy can significantly impact the end to end performance.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"98 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114271285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An on-line simulator for wormhole routing networks 虫洞路由网络的在线模拟器
L. Tao
{"title":"An on-line simulator for wormhole routing networks","authors":"L. Tao","doi":"10.1109/MASCOT.1998.693702","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693702","url":null,"abstract":"We present the design and implementation of an efficient online simulator for wormhole routing networks, which is an important part of the Concordia Parallel Systems Simulator (CPSS), a simulator for wormhole routed multicomputers. The ultimate purpose of the CPSS is to provide a parallel programming environment which allows users to study impacts of system and software factors on program performance and to locate performance bottlenecks in parallel programs. Our simulator can accurately simulate a large range of regular topologies that represent the communication structures of most wormhole routed networks. Users are given the flexibility of changing communication and computation parameters as often as needed without recompilation. It is unique in its integrated parallel simulation of the communication process and the execution of user applications. This makes possible real time evaluation of network performance in realistic application domains.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123205143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension of the working set for modeling spatial locality in program behavior 程序行为空间局部性建模工作集的扩展
A. Tanaka
{"title":"Extension of the working set for modeling spatial locality in program behavior","authors":"A. Tanaka","doi":"10.1109/MASCOT.1998.693671","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693671","url":null,"abstract":"The paper extends the definition of the working set for modeling spatial locality in program behavior, and it presents theoretical results. One of the theoretical results is that the working set based hit ratio can be given by the time or ensemble averages of the distributions of the interreference interval. We also present, as a theorem, that the average number of unique blocks in the extended working set can be given by the sum of the miss ratios. We derive a mathematical formula to calculate the hit ratio for Markov Chains. A kind of random walk is examined as an example of program behavior. The average number of unique blocks of a given block size in the extended working set is used for comparison with other empirical observations. The comparison had good agreement with our random walk model of program behavior and the empirical observations.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122153514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving lookahead in parallel wireless network simulation 并行无线网络仿真中的前瞻性改进
R. A. Meyer, R. Bagrodia
{"title":"Improving lookahead in parallel wireless network simulation","authors":"R. A. Meyer, R. Bagrodia","doi":"10.1109/MASCOT.1998.693704","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693704","url":null,"abstract":"Simulation of large sets of mobile computers or other wireless communication devices is difficult because of the computationally intensive models of wireless channels. Parallel simulation would seem to be applicable here because of the large computation granularity, but the location based communication topology makes conservative methods difficult to implement. This paper considers a novel approach to improving lookahead in conservative parallel simulations by differentiating between data flow paths in the simulation. An experimental study shows that for this application, the technique produces a 70% reduction in null message traffic, with only a 25% increase in null message computation overhead, and a consistent improvement in parallel performance.","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Pro-active performance management of distributed applications 分布式应用程序的主动性能管理
A. Ferscha, James Johnson, Gabriele Anderst-Kotsis, C. Anglano
{"title":"Pro-active performance management of distributed applications","authors":"A. Ferscha, James Johnson, Gabriele Anderst-Kotsis, C. Anglano","doi":"10.1109/MASCOT.1998.693688","DOIUrl":"https://doi.org/10.1109/MASCOT.1998.693688","url":null,"abstract":"Self-managing systems able to dynamically re-configure with respect to time-varying workload mixes and changing system resource availability are of growing importance in heterogeneous multicomputer environments. Advanced performance evaluation techniques are needed to induce and assess the impact of such re-configurations where guaranteeing timeliness of reconfiguration activities is particularly challenging. A whole new class of methods supporting \"pro-active\" adaptivity based on the predicted system state at the re-configuration instant are needed to alleviate the shortcomings of \"re-active\" systems which bring reconfigurations in effect after the system state has changed. In this paper we argue for self-contained performance management of distributed applications, i.e. integrated performance tuning with the ability to automatically adapt the application behavior to the performance characteristics of the execution environment. Particularly, we study pro-active performance management for distributed simulation based on the Time Warp protocol executing on a network of workstations (NOWs).","PeriodicalId":272859,"journal":{"name":"Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信