Lu Peng, J. Peir, T. K. Prakash, Yen-kuang Chen, David M. Koppelman
{"title":"Memory Performance and Scalability of Intel's and AMD's Dual-Core Processors: A Case Study","authors":"Lu Peng, J. Peir, T. K. Prakash, Yen-kuang Chen, David M. Koppelman","doi":"10.1109/PCCC.2007.358879","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358879","url":null,"abstract":"As chip multiprocessor (CMP) has become the mainstream in processor architectures, Intel and AMD have introduced their dual-core processors to the PC market. In this paper, performance studies on an Intel Core 2 Duo, an Intel Pentium D and an AMD Athlon 64times2 processor are reported. According to the design specifications, key derivations exist in the critical memory hierarchy architecture among these dual-core processors. In addition to the overall execution time and throughput measurement using both multiprogrammed and multi-threaded workloads, this paper provides detailed analysis on the memory hierarchy performance and on the performance scalability between single and dual cores. Our results indicate that for the best performance and scalability, it is important to have (1) fast cache-to-cache communication, (2) large L2 or shared capacity, (3) fast L2 to core latency, and (4) fair cache resource sharing. Three dual-core processors that we studied have shown benefits of some of these factors, but not all of them. Core 2 Duo has the best performance for most of the workloads because of its microarchitecture features such as shared L2 cache. Pentium D shows the worst performance in many aspects due to its technology-remap of Pentium 4.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time","authors":"Kai Ouyang, J. Joshi","doi":"10.1109/PCCC.2007.358928","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358928","url":null,"abstract":"Many emerging applications show the need for a fine-grained context based access control requirements. The generalized temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time. In this paper, we present conditional temporal RBAC (CT-RBAC) model that extends GTRBAC model by extending the periodic time expression. In particular, the extension allows fine-grained extension to capture other logical conditions that restricts the validity of the temporal constraints. CT-RBAC uses a symbolic representation of conditional periodic time that can be used to define a set of conditions to qualify the components of a periodic time expression, using the concurrent transaction logic. Because of the conditional set introduced, CT-RBAC extends the time control dimension to the (condition, time) control plane and the (time, constraint) plane of the GTRBAC framework to the (condition, time, constraint) three-dimensional control space, thus providing more flexibility in the access control model. We analyze conflicts introduced by the constraint set and the complexity of evaluating the conditional set.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114722793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach","authors":"Zhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen","doi":"10.1109/PCCC.2007.358913","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358913","url":null,"abstract":"With the increase of network bandwidth, high performance protocol processing plays more and more important role in high speed network security. Recent studies show that current computer architecture advances and CPU performance improvements have limited impact on network protocol processing performance. Some studies find that in real SMT processor like Intel Xeon processor with hyper-threadings, the sharing resources (like cache) contention between threads can hurt the processing performance of network applications like servers or IDS. How to make protocol processing cope with the advances in computer architecture has been widely studied. In this paper, we put our focus on the processing performance of TCP automata phases, using execution based simulations to model the relationship between each phase performance and cache size, and then measuring the cache contention between threads. We find (1) the load/store units can be the bottleneck of protocol processing; and (2) in connection establishing phase of TCP processing, cache contention between threads is more aggressive than any other phase. We also suggest a FSM decomposition based parallel processing approach to use sharing cache of SMT processors effectively.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Roccetti, M. Gerla, C. Palazzi, S. Ferretti, G. Pau
{"title":"First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle","authors":"M. Roccetti, M. Gerla, C. Palazzi, S. Ferretti, G. Pau","doi":"10.1109/PCCC.2007.358940","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358940","url":null,"abstract":"Successes and failures during rescue operations after hurricane Katrina and the Twin Towers attack demonstrated the importance of supporting first responders with adequate means to perform their operations in an effective and safe way. From a networking point of view, one of the main challenges is that of providing first responders with multimedia information about the emergency as soon as possible, even from a remote location. To this aim, we designed an inter-vehicular communication system able to quickly discover and transmit real time multimedia information from around a crisis area to approaching first responders' vehicles. As vehicular communications are highly variable in nature, we endowed our system with a transmission range estimator that is put to good use to reduce the number of hops that a video triggering message sent by a vehicle will experience to reach its destination. Experimental results demonstrate the efficacy of our scheme in reducing the message delivery time and the traffic generated.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123742370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Assign Traffic Sources to Nodes in Disaster Area Scenarios","authors":"N. Aschenbruck, P. Martini, M. Gerharz","doi":"10.1109/PCCC.2007.358906","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358906","url":null,"abstract":"This paper deals with the characteristics of multicast push to talk voice traffic sources for disaster area scenarios. The goal is to design models that can be used to assign voice traffic sources to nodes. The modelling is based on an analysis of real-life measurements during a catastrophe maneuver. The analysis shows that about half of all calls originate from the communication head of a talk group. Based on this characteristic, different models are considered. Synthetic distributions of traffic sources for the different models are generated and evaluated by statistical analysis. Finally, the impact of the different models is evaluated in an exemplary simulative network performance analysis.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reliable Wireless Mesh Infrastructure Deployment at Crisis Site","authors":"R. Dilmaghani, R. Rao","doi":"10.1109/PCCC.2007.358944","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358944","url":null,"abstract":"emergency communication infrastructure should allow fast and reliable information dissemination to assist community and ease mitigation activities. Failure in communication networks and information exchange in past has impeded the responders' efforts resulting in huge loss of lives and economical impacts. Reliability, quick reconfiguration and interoperability are specific requirements of a robust communication infrastructure at disaster sites. We have deployed a wireless mesh test bed at several drills on campus and in the city to identify the vulnerabilities of the existing communication infrastructure and enhance the network capacity and performance. We present the real measurements obtained over the deployment of the wireless mesh test bed at disaster site followed by an analytical discussion of the important observations concerning the factors that impact performance or cause network congestion.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xu Chenguang, X. Yinlong, Zhan Cheng, Wu Ruizhe, Wang Qingshan
{"title":"On Network Coding Based Multirate Video Streaming in Directed Networks","authors":"Xu Chenguang, X. Yinlong, Zhan Cheng, Wu Ruizhe, Wang Qingshan","doi":"10.1109/PCCC.2007.358911","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358911","url":null,"abstract":"This paper focuses on network coding based multirate multimedia streaming in directed networks and aims at maximizing the total layers received by all receivers, which directly determine the quality of video streaming. We consider the property of layered coding in video streaming and propose the layer separated network coding scheme (LSNC) for layered video streaming. Two algorithms OLSNC and SLSNC are proposed for LSNC based video streaming, where OLSNC achieves an optimal solution, while SLSNC is a polynomial time approximation algorithm. Simulation results show that LSNC is an efficient network coding scheme for multirate multimedia streaming, and the aggregated number of received layers of both OLSNC and SLSNC is very close to the theoretical upper bound in all configurations analyzed.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117027711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Queuing Delay in RPR Networks","authors":"B. Hariri, Mohammadreza Pakravan","doi":"10.1109/PCCC.2007.358888","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358888","url":null,"abstract":"Resilient packet ring (RPR) that has been standardized as IEEE 802.17 is a MAC layer protocol designed for data centric metropolitan area network applications. A well-designed RPR network would be able to offer QoS guarantee for throughput and delay sensitive data classes in addition to providing other types of low cost best effort services. Careful network planning would be required to allow successful provisioning of classA services with strict delay and jitter requirements over RPR networks. This would require the knowledge of the dependency of delay and jitter for classA traffic on the load that is added to the ring. In this article, we propose an algorithm to estimate the dependency of delay and jitter for classA traffic in RPR networks on the total traffic added to the ring by nodes. We will follow an analytical approach based on queuing theory to find the probability density function of the delay for classA packets and try to find a closed-form solution to the problem using some simplifying assumptions. Simulations are used to verify the results of analytical derivations.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132547638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PID: A Queue Management Scheme for Improving Network Resilience Under Worm Attacks","authors":"Jintao Xiong","doi":"10.1109/PCCC.2007.358932","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358932","url":null,"abstract":"In this paper, we propose PID (per inefficiency dropping), a queue management scheme that can not only preserve bandwidth for normal traffic when a worm is spreading fast but also significantly reduce the spreading rate of the worm. PID preferentially drops packets of inefficient applications that generate large numbers of invalid packets according to the bandwidth impact of the invalid packets. Thus bandwidth can be preserved for normal efficient applications. Simulations show that PID can significantly slow the propagation of scanning worms. They also show that worm traffic only has limited impact on normal traffic even after all vulnerable nodes in the simulated network have been infected.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Localized-Scanning Worms","authors":"Zesheng Chen, Chao-Yu Chen, C. Ji","doi":"10.1109/PCCC.2007.358894","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358894","url":null,"abstract":"Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable hosts and has been used by Code Red II and Ninida worms. As such a strategy is so simple yet effective in attacking the Internet, it is important that defenders understand the spreading ability and behaviors of localized-scanning worms. In this work, we first characterize the relationships between vulnerable-host distributions and the spread of localized-scanning worms through mathematical modeling and analysis, and compare random scanning with localized scanning. We then design an optimal localized-scanning strategy, which provides an upper bound on the spreading speed of localized-scanning self-propagating codes. Furthermore, we construct three variants of localized scanning. Specifically, the feedback localized scanning and the ping-pong localized scanning adapt the scanning methods based on the feedback from the probed host, and thus spread faster than the original localized scanning and meanwhile have a smaller variance.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121844636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}