2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems最新文献

筛选
英文 中文
Power-Sleuth: A Tool for Investigating Your Program's Power Behavior Power- sleuth:一个调查你的程序的权力行为的工具
Vasileios Spiliopoulos, Andreas Sembrant, S. Kaxiras
{"title":"Power-Sleuth: A Tool for Investigating Your Program's Power Behavior","authors":"Vasileios Spiliopoulos, Andreas Sembrant, S. Kaxiras","doi":"10.1109/MASCOTS.2012.36","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.36","url":null,"abstract":"Modern processors support aggressive power saving techniques to reduce energy consumption. However, traditional profiling techniques have mainly focused on performance, which does not accurately reflect the power behavior of applications. For example, the longest running function is not always the most energy-hungry function. Thus software developers cannot always take full advantage of these power-saving features. We present Power-Sleuth, a power/performance estimation tool which is able to provide a full description of an application's behavior for any frequency from a single profiling run. The tool combines three techniques: a power and a performance estimation model with a program phase detection technique to deliver accurate, per-phase, per-frequency analysis. Our evaluation (against real power measurements) shows that we can accurately predict power and performance across different frequencies with average errors of 3.5% and 3.9% respectively.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Reliability of Data Storage Systems under Network Rebuild Bandwidth Constraints 网络重构带宽约束下数据存储系统可靠性研究
V. Venkatesan, I. Iliadis, R. Haas
{"title":"Reliability of Data Storage Systems under Network Rebuild Bandwidth Constraints","authors":"V. Venkatesan, I. Iliadis, R. Haas","doi":"10.1109/MASCOTS.2012.31","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.31","url":null,"abstract":"To improve the reliability of data storage systems, certain data placement schemes spread replicas corresponding to data stored on each node across several other nodes. When node failures occur, this enables parallelizing the rebuild process which in turn results in reducing the rebuild times. However, the underlying assumption is that the parallel rebuild process is facilitated by sufficient availability of network bandwidth to transfer data across nodes at full speed. In a large-scale data storage system where the network bandwidth for rebuild is constrained, such placement schemes will not be as effective. In this paper, it is shown through analysis and simulation how the spread of replicas across nodes affects system reliability under a network bandwidth constraint. Efficient placement schemes that can achieve high reliability in the presence of bandwidth constraints are proposed. Furthermore, in a dynamically changing storage system, in which the number of nodes and the network rebuild bandwidth can change over time, the data placement can be accordingly adapted to maintain a high level of reliability.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"9 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120810142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Understanding Scalability and Performance Requirements of I/O-Intensive Applications on Future Multicore Servers 了解未来多核服务器上I/ o密集型应用程序的可伸缩性和性能需求
Shoaib Akram, M. Marazakis, A. Bilas
{"title":"Understanding Scalability and Performance Requirements of I/O-Intensive Applications on Future Multicore Servers","authors":"Shoaib Akram, M. Marazakis, A. Bilas","doi":"10.1109/MASCOTS.2012.29","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.29","url":null,"abstract":"Today, there is increased interest in understanding the impact of data-centric applications on compute and storage infrastructures as datasets are projected to grow dramatically. In this paper, we examine the storage I/O behavior of twelve data-centric applications as the number of cores per server grows. We configure these applications with realistic datasets and examine configuration points where they perform significant amount of I/O. We propose using cycles per I/O (cpio) as a metric for abstracting many I/O subsystem configuration details. We analyze specific architectural issues pertaining to data-centric applications including the usefulness of hyperthreading, sensitivity to memory bandwidth, and the potential impact of disruptive storage technologies. Our results show that today's data-centric applications are not able to scale with the number of cores: moving from one to eight cores, results in 0% to 400% more cycles per I/O operation. These applications can achieve much of their performance with only 50% of the memory bandwidth available on modern processors. Hyper-threading is extremely effective for these applications and, on average, applications suffer only a 15% reduction in performance when hyper-threading is used instead of full cores. Further, DRAM-type persistent memory has the potential to solve scalability bottlenecks by reducing or eliminating idle and I/O completion periods and improving server utilization. We use a detailed methodology to project that in the year 2020, at 4096 processors, servers will require between 250-500 GB/s under optimistic scaling assumptions. We show that if the current trend in application scalability is not reversed, we will need about 2.5M servers that will consume 10 BKWh of energy to do a single pass over the projected 35 Zeta Bytes of data in 2020.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Carbon-Aware Energy Capacity Planning for Datacenters 数据中心的碳意识能源容量规划
Chuangang Ren, Di Wang, B. Urgaonkar, A. Sivasubramaniam
{"title":"Carbon-Aware Energy Capacity Planning for Datacenters","authors":"Chuangang Ren, Di Wang, B. Urgaonkar, A. Sivasubramaniam","doi":"10.1109/MASCOTS.2012.51","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.51","url":null,"abstract":"Datacenters are facing increasing pressure to cap their carbon footprints at low cost. Recent work has shown the significant environmental benefits of using renewable energy for datacenters by supply-following techniques (workload scheduling, geographical load balancing, etc.) However, all such prior work has only considered on-site renewable generation when numerous other options also exist, which may be superior to on-site renewables for many datacenters. Alternative ways for datacenters to incorporate renewable energy into their overall energy portfolio include: construction of or investment into off-site renewable farms at locations with more abundant renewable energy potential, indirect purchase of renewable energy through buying renewable energy certificates (RECs), purchase of renewable energy products such as power purchase agreements (PPAs) or through third-party renewable providers. We propose a general, optimization-based framework to minimize datacenter costs in the presence of different carbon footprint reduction goals, renewable energy characteristics, policies, utility tariff, and energy storage devices (ESDs). We expect that our work can help datacenter operators make informed decisions about sustainable, renewable-energy-powered IT system design.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"381 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
Performance Modeling of Design Patterns for Distributed Computation 分布式计算设计模式的性能建模
Ronald Strebelow, M. Tribastone, C. Prehofer
{"title":"Performance Modeling of Design Patterns for Distributed Computation","authors":"Ronald Strebelow, M. Tribastone, C. Prehofer","doi":"10.1109/MASCOTS.2012.37","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.37","url":null,"abstract":"In software engineering, design patterns are commonly used and represent robust solution templates to frequently occurring problems in software design and implementation. In this paper, we consider performance simulation for two design patterns for processing of parallel messaging. We develop continuous-time Markov chain models of two commonly used design patterns, Half-Sync/Half-Async and Leader/Followers, for their performance evaluation in multicore machines. We propose a unified modeling approach which contemplates a detailed description of the application-level logic and abstracts away from operating system calls and complex locking and networking application programming interfaces. By means of a validation study against implementations on a 16-core machine, we show that the models accurately predict peak throughputs and variation trends with increasing concurrency levels for a wide range of message processing workloads. We also discuss the limits of our models when memory-level internal contention is not captured.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Energy-Efficient Cached DIMM Architecture 高能效缓存DIMM架构
Mu-Tien Chang, J. Gross, B. Jacob
{"title":"Energy-Efficient Cached DIMM Architecture","authors":"Mu-Tien Chang, J. Gross, B. Jacob","doi":"10.1109/MASCOTS.2012.65","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.65","url":null,"abstract":"This paper presents a cached DIMM architecture - a low-latency and energy-efficient memory system. Two techniques are proposed: the on-DIMM cache and the on-DIMM cache-aware address mapping scheme. These two techniques work together to reduce the memory access latency. Based on the benchmarks considered, our experiments show that compared to a conventional DRAM main memory, the proposed architecture reduces memory access latency by up to 30% (25% on average), reduces system execution time by up to 25% (10% on average), achieves up to 12% energy savings (5% on average), and improves the energy delay product by up to 27% (14% on average).","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practical Approach for Target Tracking in Sparsely Deployed Binary Sensor Network 稀疏二值传感器网络中目标跟踪的实用方法
Deepak Jeswani, Ankit Kesharwani, Sneha S. Chaudhari, V. Sadaphal, R. Ghosh
{"title":"A Practical Approach for Target Tracking in Sparsely Deployed Binary Sensor Network","authors":"Deepak Jeswani, Ankit Kesharwani, Sneha S. Chaudhari, V. Sadaphal, R. Ghosh","doi":"10.1109/MASCOTS.2012.27","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.27","url":null,"abstract":"In this paper we propose a novel real time approach to localize and track a target using sparsely (non-overlapping) deployed binary sensors. Each of these sensors reports 1-bit information regarding a target's presence or absence within its sensing range. Our technique estimates the distance covered by a target on the basis of the time it spends in the sensing region. The trajectory of the target is approximated by a piece-wise linear path, where each piece is an estimated tangent segment to a pair of circular sensing range of two adjacent sensors that sense the target. The formulation of the problem as estimates of tangent segments allows us to convert the original problem into a quadratic programming problem. We compare the results of the proposed method with that of the other existing methods and demonstrate that even with a sparse deployment, our approach tracks the target with competitive accuracy.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Cross-Layer Analytical Model to Estimate the Capacity of a WiMAX Network 一种估算WiMAX网络容量的跨层分析模型
A. Alim, Al Islam, V. Raghunathan
{"title":"A Cross-Layer Analytical Model to Estimate the Capacity of a WiMAX Network","authors":"A. Alim, Al Islam, V. Raghunathan","doi":"10.1109/MASCOTS.2012.15","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.15","url":null,"abstract":"Specialized physical and medium access control layer operations of WiMAX introduce a challenging problem to formulate a precise cross-layer analytical model for its capacity estimation. Although the cross-layer formulation is yet to be attempted in the literature, it can effectively serve as a fast and cost-effective tool to facilitate future deployment planning, efficient network maintenance, etc., and thus can expedite to cope up with the recent blast in WiMAX deployment. Therefore, we propose a novel formulation of cross-layer analytical model for WiMAX capacity estimation in this paper. Our formulation addresses intricate interrelationships between different layers in a protocol stack. Besides, the formulation separately addresses both reliable and unreliable transport layer transmissions. We verify our formulated model using ns-2 simulation, which reveals that the model can estimate the capacity of a WiMAX network with as low as 1% average error having a standard deviation of only 1%. Consequently, we find that the proposed model can achieve up to a 97% decrease in the average error compared to other available analytical models in the literature. Finally, we present different applications of the proposed model by utilizing it in network planning and protocol overhead analysis.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117280096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using QNA to Evaluate Parameter Tuning in Mission Critical SOA Networks 使用QNA评估关键任务SOA网络中的参数调整
M. T. Gardner, C. Beard
{"title":"Using QNA to Evaluate Parameter Tuning in Mission Critical SOA Networks","authors":"M. T. Gardner, C. Beard","doi":"10.1109/MASCOTS.2012.69","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.69","url":null,"abstract":"One of the limitations of using Service Oriented Architecture (SOA) in mission critical applications (like Air Traffic Control) is the ability to specify stringent Quality of Service (QoS) parameters for individual services. Even determining which Message Broker optimizations to utilize to achieve high QoS is difficult. This research is utilizing the concepts introduced by the Queuing Network Analyzer (QNA) [1] to model the performance of SOA networks with features like message chunking, message exchange patterns (MEP), multi-layer structure and multiple classes of products. Non-exponential service and arrival distributions are investigated. As this is work in progress, we have not completed the simulation models to support the analytic models presented in this paper.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Traffic Benchmarks for Empirical Networking Research: The Role of Connection Structure in Traffic Workload Modeling 面向实证网络研究的流量基准:连接结构在流量负荷建模中的作用
Jay Aikat, Shaddi Hasan, K. Jeffay, F. D. Smith
{"title":"Towards Traffic Benchmarks for Empirical Networking Research: The Role of Connection Structure in Traffic Workload Modeling","authors":"Jay Aikat, Shaddi Hasan, K. Jeffay, F. D. Smith","doi":"10.1109/MASCOTS.2012.19","DOIUrl":"https://doi.org/10.1109/MASCOTS.2012.19","url":null,"abstract":"Networking research would be well served by the adoption of a set of traffic benchmarks to model network applications for empirical evaluations; such benchmarks are common in many other areas of computing. While it has long been known that certain aspects of modeling traffic, such as round trip time, can dramatically affect application and network performance, there is still no agreement as to how such components should be controlled within an experiment. In this paper we advance the discussion of standards for empirical networking research by demonstrating how certain components of network traffic, such as the structure of application data exchanges within a TCP connection, can have a larger impact on the results obtained through experimentation than other dimensions of traffic such as round-trip time. Such findings point to the pressing need for traffic benchmarks in networking research. Through testbed experiments performed with synthetically generated network traffic from two very different traffic sources, and using several models of TCP connection structure, we demonstrate the strong effects of connection structure in traffic workload modeling on performance measures such as queue length at routers, number of active connections in the network, user response times, and connection durations.","PeriodicalId":278764,"journal":{"name":"2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122595897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信