Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems最新文献

筛选
英文 中文
The effect of peer selection and buffering strategies on the performance of peer-to-peer file sharing systems 对等体选择和缓冲策略对对等体文件共享系统性能的影响
L. Zou, E. Zegura, M. Ammar
{"title":"The effect of peer selection and buffering strategies on the performance of peer-to-peer file sharing systems","authors":"L. Zou, E. Zegura, M. Ammar","doi":"10.1109/MASCOT.2002.1167061","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167061","url":null,"abstract":"Peer-to-peer systems contain a collection of equivalent entities that form an application-layer overlay network. Each entity acts as client, server, and overlay network router. Peer-to-peer systems enable the rapid development of distributed applications; peer-to-peer file sharing has become one of the most popular Internet applications. There are two primary functions in a peer-to-peer file sharing application: content discovery (determining which peers have the desired content) and content retrieval (transferring content from a peer to the requester). We focus on two aspects of content retrieval that have received limited attention, namely peer selection and request buffering. Using a combination of analytic modelling and simulation, we find that a simple greedy scheme that uses only local information to select a peer has performance comparable to alternative schemes, including those that make more globally-informed decisions. We also find that the optimal request buffering strategy depends on the system load and availability of peer information. For example, when peer information is scarce, download buffering works well; when peer information is plentiful, no buffering is preferable for a better throughput. Our results have implications for the design of high-performance, low overhead peer-to-peer file sharing systems.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Energy-aware routing in cluster-based sensor networks 基于簇的传感器网络中的能量感知路由
M. Younis, M. Youssef, K. A. Arisha
{"title":"Energy-aware routing in cluster-based sensor networks","authors":"M. Younis, M. Youssef, K. A. Arisha","doi":"10.1109/MASCOT.2002.1167069","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167069","url":null,"abstract":"There has been a growing interest in the applications of sensor networks. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial in extending the life of the sensor. We present a novel approach for energy-aware and context-aware routing of sensor data. The approach calls for network clustering and assigns a less-energy-constrained gateway node that acts as a centralized network manager. Based on energy usage at every sensor node and changes in the mission and the environment, the gateway sets routes for sensor data, monitors latency throughout the cluster, and arbitrates medium access among sensors. Simulation results demonstrate that our approach can achieve substantial energy saving.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123486949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 637
Modified LC-trie based efficient routing lookup 改进的基于LC-trie的高效路由查找
V. Ravikumar, R. Mahapatra, Jyh-Charn S. Liu
{"title":"Modified LC-trie based efficient routing lookup","authors":"V. Ravikumar, R. Mahapatra, Jyh-Charn S. Liu","doi":"10.1109/MASCOT.2002.1167075","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167075","url":null,"abstract":"IP address lookup at the router is a complex problem. This has been primarily due to the increasing table sizes, growth in traffic rate and high link capacities. We propose an algorithm for fast routing lookup with reduced memory utilization and access time. This approach shows significant performance improvement in the average case and optimizes the overall time taken for packet routing. Since storage requirement, processing time and number of lookups performed are reduced, power consumption by the router is also reduced. Our simulation result indicates that the proposed technique works approximately 4.11 times better than the standard level compressed trie (LC-trie) approach (see Nilsson, S. and Karlsson, G., Proc. IEEE Broadband Commun. 98, p.9-18, 1998) in the average case.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Network traffic behaviour in switched Ethernet systems 交换以太网系统中的网络流量行为
T. Field, U. Harder, P. Harrison
{"title":"Network traffic behaviour in switched Ethernet systems","authors":"T. Field, U. Harder, P. Harrison","doi":"10.1109/MASCOT.2002.1167058","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167058","url":null,"abstract":"Measurements on a high-performance Ethernet are shown to match well a truncated Cauchy probability distribution, with a much better fit over smaller file/request sizes than the commonly used Pareto distribution. We observe self similar characteristics in the traffic both at file servers and at a CPU server elsewhere in the network, which targets, predominantly, file and Web servers. This suggests propagation of self similarity. A simulation model of a single server with Poisson arrivals and Cauchy service-demands yields a departure process that follows a power law and matches closely the observed traffic. This suggests a link between file/request size distribution and self similarity in traffic, leading to the possibility of using conventional queueing network performance models with processor sharing queueing discipline. This idea is further supported by an additional simulation experiment; suitable models are proposed.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123159863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Disha: a performance model of a true fully adaptive routing algorithm in k-ary n-cubes Disha: k-ary n-cubes中真完全自适应路由算法的性能模型
A. Khonsari, Alireza Farahani, M. Ould-Khaoua
{"title":"Disha: a performance model of a true fully adaptive routing algorithm in k-ary n-cubes","authors":"A. Khonsari, Alireza Farahani, M. Ould-Khaoua","doi":"10.1109/MASCOT.2002.1167076","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167076","url":null,"abstract":"A number of analytical models for predicting message latency in k-ary n-cubes have recently been reported in the literature. Most of these models, however, have been discussed for adaptive routing algorithms based on deadlock avoidance. Several research studies have empirically demonstrated that routing algorithms based on deadlock recovery offer maximal adaptivity that can result in considerable improvement in network performance. Disha (see Anjan, K.V. and Pinkston, T.M., Proc. 22nd ACM/IEEE Int. Symp. on Computer Architecture, p.201-10, 1996; Pinkston, T.M., IEEE Trans. Computers, vol.7, no.48, p.649-69, 1999) is an example of a true fully adaptive routing algorithm that uses minimal hardware to implement a simple and efficient progressive method to recover from potential deadlocks. The paper proposes a new analytical model of Disha in wormhole-routed k-ary n-cubes. Simulation experiments confirm that the proposed model exhibits a good degree of accuracy for various networks sizes and under different traffic conditions.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131707639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel formulae for GSPN aggregation GSPN聚合的新公式
J. Freiheit, A. Heindl
{"title":"Novel formulae for GSPN aggregation","authors":"J. Freiheit, A. Heindl","doi":"10.1109/MASCOT.2002.1167079","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167079","url":null,"abstract":"Stationary analysis of generalized stochastic Petri nets (GSPNs) often suffers from the state space explosion problem. Large reachability sets somorphic to continuous-time Markov chains - are not only expensive to generate, but related high-dimensional data structures also put excessive demands on numerical algorithms. In particular, sequences of transitions and alternative branches contribute multiplicatively to the size of the state space - if enabled concurrently. The paper examines under which circumstances such structures can be merged into a single timed transition while preserving the stationary token distributions in the embedding environment. For these aggregation steps on net level, novel formulae for the (locally) marking-dependent rates of the merged transition are developed, which solely rely on parameters of the aggregated subnet. These formulae bear a strong relation to flow equivalence. Examples throughout the paper demonstrate the gains both in drastically reduced state spaces and shortened processing times of the numerical analysis.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Collision avoidance in multi-hop ad hoc networks 多跳自组织网络中的碰撞避免
Yu Wang, J. Garcia-Luna-Aceves
{"title":"Collision avoidance in multi-hop ad hoc networks","authors":"Yu Wang, J. Garcia-Luna-Aceves","doi":"10.1109/MASCOT.2002.1167071","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167071","url":null,"abstract":"Collision avoidance is very important in contention-based medium access control protocols for multi-hop ad hoc networks due to the adverse effects of hidden terminals. Four-way sender-initiated schemes are the most popular collision-avoidance schemes to date. Although there has been considerable work on the performance evaluation of these schemes, most analytical work is confined to single-hop ad hoc networks or networks with very few hidden terminals. We use a simple analytical model to derive the saturation throughput of collision avoidance protocols in multi-hop ad hoc networks with nodes randomly placed according to a two-dimensional Poisson distribution, which, to our knowledge, has not been investigated sufficiently before. We show that the sender-initiated collision-avoidance scheme achieves much higher throughput than the idealized carrier sense multiple access scheme with an ideal separate channel for acknowledgments. More importantly, we show that the collision avoidance scheme can accommodate much fewer competing nodes within a region in a network infested with hidden terminals than in a fully-connected network, if reasonable throughput is to be maintained. This shows that the scalability problem of contention-based collision-avoidance protocols looms much earlier than might be expected. Simulation experiments of the popular IEEE 802.11 MAC protocol validate the predictions made in the analysis.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117113994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
An efficient routing algorithm for all-optical networks with turn constraints 一种具有回合约束的全光网络路由算法
H. Soliman, Chad Peyton
{"title":"An efficient routing algorithm for all-optical networks with turn constraints","authors":"H. Soliman, Chad Peyton","doi":"10.1109/MASCOT.2002.1167073","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167073","url":null,"abstract":"In all-optical networks, adjacent link constraints (known as turn constraints) can model existing restrictions in all-optical networks with limited wavelength converters and blocking optical switches. We present two different concrete implementations for a shortest path routing algorithm that accounts for link and turn constraints in all-optical networks. The efficiency of our new algorithm implementation is proven and analyzed via the simulation of sparse network topologies.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126666923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting the predictability of TCP's steady-state behavior to speed up network simulation 利用TCP稳态行为的可预测性来加速网络模拟
Qi He, M. Ammar, G. Riley, R. Fujimoto
{"title":"Exploiting the predictability of TCP's steady-state behavior to speed up network simulation","authors":"Qi He, M. Ammar, G. Riley, R. Fujimoto","doi":"10.1109/MASCOT.2002.1167066","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167066","url":null,"abstract":"In discrete-event network simulation, a significant portion of resources and computation are dedicated to the creation and processing of packet transmission events. For large-scale network simulations with a large number of high-speed data flows, the processing of packet events is the most time consuming aspect of the simulation. We develop a technique that saves on the processing of packet events for TCP flows using the well established results showing that the average behavior of a TCP flow is predictable given a steady-state path condition. We exploit this to predict the average behavior of a TCP flow over a future period of time where steady-state conditions hold, thus allowing for a reduction (or elimination) of the processing required for packet events during this period. We consider two approaches to predicting TCP's steady-state behavior: using throughput formulas or by direct monitoring of a flow's throughput in a simulation. We design a simulation framework that provides the flexibility to incorporate this method of simulating TCP packet flows. Our goal is (1) to accommodate different network configurations, on/off flow behavior and interaction between predicted flows and packet-based flows; and (2) to preserve the statistical behavior of every entity in the system, from hosts to routers to links, so as to maintain the accuracy of the network simulation as a whole. In order to illustrate the promise of this idea we implement it in the context of the ns2 simulation system. A set of experiments illustrate the speedup and approximation of the simulation framework under different scenarios and for different network performance metrics.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the sensitivity of network simulation to topology 网络仿真对拓扑的敏感性研究
K. Anagnostakis, M. Greenwald, Raphael S. Ryger
{"title":"On the sensitivity of network simulation to topology","authors":"K. Anagnostakis, M. Greenwald, Raphael S. Ryger","doi":"10.1109/MASCOT.2002.1167068","DOIUrl":"https://doi.org/10.1109/MASCOT.2002.1167068","url":null,"abstract":"While network simulations for congestion control studies have often varied traffic loads and protocol parameters, they have typically investigated only a few topologies. The most common is by far the so-called \"barbell\" topology. We argue, first, that the \"barbell\" topology is not representative of the Internet. In particular we report that a measurable fraction of packets pass through multiple congestion points. Second, we argue that the distinction between the \"barbell\" topology and more complex topologies is relevant by presenting a scenario with multiple congestion points that exhibits behavior that seems unexpected based on intuition derived from the barbell topology (in particular, a TCP-only system that exhibits behavior technically considered \"congestion collapse\"). We make the larger argument that the typical methodology currently accepted for evaluating network protocols is flawed. Finally, we comment on some issues that arise in designing a simulation methodology that will be better suited to comparison of network protocol performance.","PeriodicalId":384900,"journal":{"name":"Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信