首页 > 最新文献

IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings最新文献

英文 中文
Rule-based call-by-call source routing for integrated communication networks 基于规则的集成通信网络逐呼叫源路由
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253267
W. C. Lee, M. Hluchyj, P. Humblet
Routing subject to multiple quality-of-service (QOS) constraints is considered. Such a problem arises in both private corporate backbone networks and public switched networks, and will become even more prevalent in the future with the emergence of asynchronous transfer mode (ATM) networks. A rule-based call-by-call source routing strategy that makes use of routing fallbacks to accommodate users with diverse QOS requirements is proposed.<>
考虑了受多个服务质量(QOS)约束的路由。这种问题在私有企业骨干网和公共交换网络中都存在,随着异步传输模式(ATM)网络的出现,这种问题将在未来变得更加普遍。提出了一种基于规则的逐呼叫源路由策略,该策略利用路由回退来适应具有不同QOS需求的用户。
{"title":"Rule-based call-by-call source routing for integrated communication networks","authors":"W. C. Lee, M. Hluchyj, P. Humblet","doi":"10.1109/INFCOM.1993.253267","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253267","url":null,"abstract":"Routing subject to multiple quality-of-service (QOS) constraints is considered. Such a problem arises in both private corporate backbone networks and public switched networks, and will become even more prevalent in the future with the emergence of asynchronous transfer mode (ATM) networks. A rule-based call-by-call source routing strategy that makes use of routing fallbacks to accommodate users with diverse QOS requirements is proposed.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121291822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dispersity routing on ATM networks ATM网络中的分散路由
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253342
N. Maxemchuk
Dispersity routing is defined. It is combined with random access and fast circuit set-up and tear-down to put bursty data on an asynchronous transfer mode (ATM) network. This approach makes the storage in the network independent of the message length. This approach is evaluated assuming that the propagation delay may be more than the message transmission time. It is shown that the efficiency improves as the number of channels on each path increases, and that dispersity routing makes it reasonable to use the strategy on networks with a small number of channels per path. Dispersity routing requires networks with multiple paths between many of the nodes. This characteristic is also required for many adaptive routing strategies. A class of networks is proposed in which the fraction of nodes with multiple paths, and the number of multiple paths between nodes, can be controlled. These networks provide a platform for evaluating multiple path strategies.<>
定义分散性路由。它与随机存取和快速电路建立和拆卸相结合,将突发数据放在异步传输模式(ATM)网络上。这种方法使网络中的存储与消息长度无关。假设传播延迟可能大于消息传输时间,对该方法进行评估。研究表明,随着每条路径上通道数量的增加,效率也会提高,并且分散性路由使得该策略在每条路径上通道数量较少的网络上使用是合理的。分散性路由要求网络在许多节点之间具有多条路径。许多自适应路由策略也需要这种特性。提出了一类具有多条路径的节点的比例和节点间多条路径的数量可以控制的网络。这些网络为评估多路径策略提供了一个平台。
{"title":"Dispersity routing on ATM networks","authors":"N. Maxemchuk","doi":"10.1109/INFCOM.1993.253342","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253342","url":null,"abstract":"Dispersity routing is defined. It is combined with random access and fast circuit set-up and tear-down to put bursty data on an asynchronous transfer mode (ATM) network. This approach makes the storage in the network independent of the message length. This approach is evaluated assuming that the propagation delay may be more than the message transmission time. It is shown that the efficiency improves as the number of channels on each path increases, and that dispersity routing makes it reasonable to use the strategy on networks with a small number of channels per path. Dispersity routing requires networks with multiple paths between many of the nodes. This characteristic is also required for many adaptive routing strategies. A class of networks is proposed in which the fraction of nodes with multiple paths, and the number of multiple paths between nodes, can be controlled. These networks provide a platform for evaluating multiple path strategies.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121253885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
On protective buffer policies 关于保护性缓冲策略
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253260
I. Cidon, R. Guérin, A. Khamisy
Buffering policies that provide different loss priorities to packets/cells with no change in packet ordering (space priority disciplines) are studied. These policies are motivated by the possible presence, within the same connection, of packets with different loss probability requirements or guarantees. Examples of such applications are voice and video coders that generate information of unequal importance, and rate control mechanisms that mark excess traffic with a low priority rate violation tag. The focus is on the identification and evaluation of buffering policies that can guarantee performance, i.e. loss probability, to high priority packets irrespective of the traffic intensity and arrival patterns of low priority packets, while preserving the original ordering among packets. Such policies are termed protective policies.<>
研究了在不改变分组顺序的情况下为分组/单元提供不同丢失优先级的缓冲策略(空间优先级原则)。这些策略的动机是在同一连接中可能存在具有不同丢失概率要求或保证的数据包。这类应用的例子有语音和视频编码器,它们产生不同等重要的信息,速率控制机制用低优先级速率违反标签标记多余的流量。重点是识别和评估缓冲策略,这些缓冲策略可以保证高优先级数据包的性能,即不管低优先级数据包的流量强度和到达模式如何,同时保持数据包之间的原始顺序。这种政策被称为保护性政策。
{"title":"On protective buffer policies","authors":"I. Cidon, R. Guérin, A. Khamisy","doi":"10.1109/INFCOM.1993.253260","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253260","url":null,"abstract":"Buffering policies that provide different loss priorities to packets/cells with no change in packet ordering (space priority disciplines) are studied. These policies are motivated by the possible presence, within the same connection, of packets with different loss probability requirements or guarantees. Examples of such applications are voice and video coders that generate information of unequal importance, and rate control mechanisms that mark excess traffic with a low priority rate violation tag. The focus is on the identification and evaluation of buffering policies that can guarantee performance, i.e. loss probability, to high priority packets irrespective of the traffic intensity and arrival patterns of low priority packets, while preserving the original ordering among packets. Such policies are termed protective policies.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126565475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Memory- and channel-sharing techniques for congestion control in ATM networks ATM网络中用于拥塞控制的内存和信道共享技术
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253351
K. Eng, M. Karol, R. Gitlin
The use of two resource-sharing techniques for congestion control in a backbone asynchronous transfer mode (ATM) network consisting of ATM cross-connects interconnected with high-speed optical links such as 2.4-Gb/s OC-48c fibers is studied. Memory sharing allows an optimal shared use of buffer space in an ATM switch fabric. Channel (or line) sharing, on the other hand, takes advantage of spare line capacity in the system to permit temporary increases in the output rates of the congested output ports. Fundamental bounds on delay-throughput performance and buffer requirements for specific cell loss rates are presented, and two practical application scenarios, representing line protection arrangements with and without service access capabilities, are introduced.<>
研究了两种资源共享技术在高速光链路(如2.4 gb /s OC-48c光纤)下由ATM交叉连接组成的骨干异步传输模式(ATM)网络中的拥塞控制。内存共享允许在ATM交换机结构中对缓冲区空间进行最佳共享使用。另一方面,通道(或线路)共享利用系统中的备用线路容量来允许临时增加拥塞输出端口的输出速率。提出了延迟吞吐量性能的基本界限和特定小区损失率的缓冲要求,并介绍了两种实际应用场景,分别表示具有和不具有业务访问能力的线路保护安排
{"title":"Memory- and channel-sharing techniques for congestion control in ATM networks","authors":"K. Eng, M. Karol, R. Gitlin","doi":"10.1109/INFCOM.1993.253351","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253351","url":null,"abstract":"The use of two resource-sharing techniques for congestion control in a backbone asynchronous transfer mode (ATM) network consisting of ATM cross-connects interconnected with high-speed optical links such as 2.4-Gb/s OC-48c fibers is studied. Memory sharing allows an optimal shared use of buffer space in an ATM switch fabric. Channel (or line) sharing, on the other hand, takes advantage of spare line capacity in the system to permit temporary increases in the output rates of the congested output ports. Fundamental bounds on delay-throughput performance and buffer requirements for specific cell loss rates are presented, and two practical application scenarios, representing line protection arrangements with and without service access capabilities, are introduced.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Is there life beyond linear topologies? A comparison of DQDB and the Manhattan street network 线性拓扑之外还有生命吗?DQDB和曼哈顿街道网络的比较
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253302
R. Krishnan, N. Maxemchuk
The performance and reliability comparison of two networks that have been proposed for use as high-speed metropolitan area networks (MANs)-the Manhattan street network (MS Net) and the distributed-queue dual-bus (DQDB) network-are compared. Both networks use slotted access protocols and have the same number of links, transmitters, and receivers per node. It is shown that the MS Net provides a much higher network throughput for a variety of traffic patterns, both uniform and nonuniform. It is shown that the MS Net can survive more failures than the DQDB network and that failures cause a lesser performance degradation in the MS Net. It is also shown that higher-level mechanisms are required in the DQDB network to recover from link failures, whereas deflection routing is sufficient in the MS Net.<>
本文比较了两种高速城域网(MANs)网络的性能和可靠性,即曼哈顿街网(MS Net)和分布式队列双总线(DQDB)网络。两个网络都使用槽式访问协议,每个节点的链路、发射器和接收器数量相同。结果表明,对于各种流量模式,无论是统一的还是非统一的,MS Net都提供了更高的网络吞吐量。结果表明,与DQDB网络相比,MS Net可以承受更多的故障,并且故障导致的MS Net性能下降较小。研究还表明,DQDB网络需要更高级别的机制来从链路故障中恢复,而偏转路由在MS网络中就足够了。
{"title":"Is there life beyond linear topologies? A comparison of DQDB and the Manhattan street network","authors":"R. Krishnan, N. Maxemchuk","doi":"10.1109/INFCOM.1993.253302","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253302","url":null,"abstract":"The performance and reliability comparison of two networks that have been proposed for use as high-speed metropolitan area networks (MANs)-the Manhattan street network (MS Net) and the distributed-queue dual-bus (DQDB) network-are compared. Both networks use slotted access protocols and have the same number of links, transmitters, and receivers per node. It is shown that the MS Net provides a much higher network throughput for a variety of traffic patterns, both uniform and nonuniform. It is shown that the MS Net can survive more failures than the DQDB network and that failures cause a lesser performance degradation in the MS Net. It is also shown that higher-level mechanisms are required in the DQDB network to recover from link failures, whereas deflection routing is sufficient in the MS Net.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of shared-buffered banyan networks under arbitrary traffic patterns 任意流量模式下共享缓冲榕树网络的性能分析
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253272
S. Gianatti, A. Pattavina
The performance of multistage banyan networks with a shared buffer in each switching element is studied. Two different internal protocols are considered for the transfer of packets from stage to stage based on the presence or absence of interstage backpressure signals to signal the occurrence of buffer saturation conditions. As far as the offered traffic is concerned, two kinds of traffic patterns have been studied, a burst and an unbalanced traffic pattern. For both of them an analytical model is developed based on the iterative solution of state equations in order to compute the main traffic performance of the network.<>
研究了各交换单元具有共享缓冲区的多级榕树网络的性能。基于是否存在级间背压信号来指示缓冲区饱和条件的发生,考虑了两种不同的内部协议,用于在级到级之间传输数据包。就所提供的流量而言,研究了两种流量模式:突发流量模式和不平衡流量模式。为了计算网络的主要流量性能,本文建立了基于状态方程迭代解的解析模型
{"title":"Performance analysis of shared-buffered banyan networks under arbitrary traffic patterns","authors":"S. Gianatti, A. Pattavina","doi":"10.1109/INFCOM.1993.253272","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253272","url":null,"abstract":"The performance of multistage banyan networks with a shared buffer in each switching element is studied. Two different internal protocols are considered for the transfer of packets from stage to stage based on the presence or absence of interstage backpressure signals to signal the occurrence of buffer saturation conditions. As far as the offered traffic is concerned, two kinds of traffic patterns have been studied, a burst and an unbalanced traffic pattern. For both of them an analytical model is developed based on the iterative solution of state equations in order to compute the main traffic performance of the network.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Self-stabilizing ARQ on channels with bounded memory or bounded delay 有界存储或有界延迟信道上的自稳定ARQ
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253264
J. Spinelli
It is shown that implementing self-stabilizing versions of standard ARQ (automatic-repeat-request) protocols, such as stop-and-wait or go-back-n, would require knowledge of a bound on the maximum delay or maximum memory of the communication channel involved. An alternative approach to self-stabilizing ARQ that incorporates a delay or memory bound directly as part of the communication model is given. Two ARQ protocols are presented that self-stabilize by using one bit of overhead in each transmitted message. The protocols operate exactly like standard stop-and-wait ARQ except that when a fault places them in an incorrect (unsafe) state, the additional bit in the protocol messages allows automatic recovery.<>
结果表明,实现标准ARQ(自动重复请求)协议的自稳定版本,例如停止-等待或回退n,将需要了解所涉及的通信通道的最大延迟或最大内存的范围。给出了一种自稳定ARQ的替代方法,该方法将延迟或内存绑定直接作为通信模型的一部分。提出了两种自稳定的ARQ协议,在每条发送的消息中使用一个比特的开销。除了当故障使它们处于不正确(不安全)状态时,协议消息中的附加位允许自动恢复之外,协议的操作与标准的停止-等待ARQ完全相同。
{"title":"Self-stabilizing ARQ on channels with bounded memory or bounded delay","authors":"J. Spinelli","doi":"10.1109/INFCOM.1993.253264","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253264","url":null,"abstract":"It is shown that implementing self-stabilizing versions of standard ARQ (automatic-repeat-request) protocols, such as stop-and-wait or go-back-n, would require knowledge of a bound on the maximum delay or maximum memory of the communication channel involved. An alternative approach to self-stabilizing ARQ that incorporates a delay or memory bound directly as part of the communication model is given. Two ARQ protocols are presented that self-stabilize by using one bit of overhead in each transmitted message. The protocols operate exactly like standard stop-and-wait ARQ except that when a fault places them in an incorrect (unsafe) state, the additional bit in the protocol messages allows automatic recovery.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127536058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of MMPP/D/1/K queues for aggregate ATM traffic models MMPP/D/1/K队列在ATM聚合流量模型中的性能评价
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253394
F. Yegenoglu, B. Jabbari
The performance of an asynchronous transfer mode (ATM) multiplexer is evaluated, with the aggregate arrivals modeled as a Markov-modulated Poisson process (MMPP). The analysis is based on two simplifying assumptions: the probability that the MMPP goes through multiple state transitions between two successive departures is negligible, and state transitions occur at departure points. The transition probability matrix that describes the number of cells in the buffer after a departure can then be partitioned into submatrices, each of which is analogous to that of an M/D/1/K queue. These assumptions are reasonable for ATM traffic models in which the arrival rates are large and cell size is small. The accuracy of the analysis is evaluated, using a four-state MMPP model to represent the aggregate arrival process. The departure point and arrival point queue-length distributions, cell loss probabilities and average queuing delays are obtained analytically and compared to simulation results.<>
采用马尔可夫调制泊松过程(MMPP)建模,对异步传输模式(ATM)多路复用器的性能进行了评价。该分析基于两个简化假设:MMPP在两个连续的出发点之间经历多次状态转换的概率可以忽略不计,状态转换发生在出发点。描述离开后缓冲区中单元数的转移概率矩阵可以划分为子矩阵,每个子矩阵都类似于M/D/1/K队列。这些假设对于到达率大而单元大小小的ATM流量模型是合理的。使用四状态MMPP模型来表示总体到达过程,对分析的准确性进行了评估。分析得到了出发点和到达点的队列长度分布、单元损失概率和平均排队延迟,并与仿真结果进行了比较。
{"title":"Performance evaluation of MMPP/D/1/K queues for aggregate ATM traffic models","authors":"F. Yegenoglu, B. Jabbari","doi":"10.1109/INFCOM.1993.253394","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253394","url":null,"abstract":"The performance of an asynchronous transfer mode (ATM) multiplexer is evaluated, with the aggregate arrivals modeled as a Markov-modulated Poisson process (MMPP). The analysis is based on two simplifying assumptions: the probability that the MMPP goes through multiple state transitions between two successive departures is negligible, and state transitions occur at departure points. The transition probability matrix that describes the number of cells in the buffer after a departure can then be partitioned into submatrices, each of which is analogous to that of an M/D/1/K queue. These assumptions are reasonable for ATM traffic models in which the arrival rates are large and cell size is small. The accuracy of the analysis is evaluated, using a four-state MMPP model to represent the aggregate arrival process. The departure point and arrival point queue-length distributions, cell loss probabilities and average queuing delays are obtained analytically and compared to simulation results.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Load balancing of complex stochastic tasks using stochastic majorization 基于随机多数化的复杂随机任务负载均衡
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253393
D. Nicol, R. Simha, D. Towsley
The authors consider the static load balancing problem of assigning several large tasks to a (smaller) system of homogeneous processors, where a task's structure is modeled as a branching process, and all tasks are assumed to have stochastically identical behavior. They show how the theory of majorization can be used to obtain a partial order among possible task assignment. The power of this approach may be summarized as follows: a simple comparison between assignments creates an ordering between them that holds for a variety of objective functions as well as for several statistics such as the mean and variance. This partial ordering is particularly useful when heterogeneous constraints are placed on the numbers of tasks that one may assign to the processors. The results show that if the vector of numbers of tasks assigned to each processor under one mapping is majorized by that of another mapping, then the former mapping is better than the latter with respect to a large number of objective functions. In particular, it is shown how measurements of finishing time, resource utilization, and reliability are all captured by the theory.<>
作者考虑将几个大任务分配给一个(较小的)同构处理器系统的静态负载平衡问题,其中任务的结构被建模为分支过程,并且假设所有任务具有随机相同的行为。他们展示了如何用多数化理论在可能的任务分配中获得偏序。这种方法的力量可以概括如下:在赋值之间进行简单的比较,就可以在赋值之间建立一种排序,这种排序适用于各种目标函数以及一些统计数据,如均值和方差。当对可能分配给处理器的任务数量施加异构约束时,这种部分排序特别有用。结果表明,如果一个映射下分配给每个处理器的任务数向量被另一个映射的任务数向量大部分,那么对于大量的目标函数,前一个映射优于后一个映射。特别是,它显示了如何测量完成时间,资源利用率和可靠性都被捕获的理论。
{"title":"Load balancing of complex stochastic tasks using stochastic majorization","authors":"D. Nicol, R. Simha, D. Towsley","doi":"10.1109/INFCOM.1993.253393","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253393","url":null,"abstract":"The authors consider the static load balancing problem of assigning several large tasks to a (smaller) system of homogeneous processors, where a task's structure is modeled as a branching process, and all tasks are assumed to have stochastically identical behavior. They show how the theory of majorization can be used to obtain a partial order among possible task assignment. The power of this approach may be summarized as follows: a simple comparison between assignments creates an ordering between them that holds for a variety of objective functions as well as for several statistics such as the mean and variance. This partial ordering is particularly useful when heterogeneous constraints are placed on the numbers of tasks that one may assign to the processors. The results show that if the vector of numbers of tasks assigned to each processor under one mapping is majorized by that of another mapping, then the former mapping is better than the latter with respect to a large number of objective functions. In particular, it is shown how measurements of finishing time, resource utilization, and reliability are all captured by the theory.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114904186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast routing table lookup using CAMs 使用cam快速查找路由表
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253403
A. McAuley, P. Francis
The authors investigate fast routing table lookup techniques, where the table is composed of hierarchical addresses such as those found in a national telephone network. The hierarchical addresses provide important benefits in large networks, but existing fast routing table lookup techniques, based on hardware such as content addressable memory (CAM), work only with flat addresses. Several fast routing table lookup solutions for hierarchical address based on binary and ternary CAMs are presented, and their advantages and drawbacks are analyzed.<>
作者研究了快速路由表查找技术,其中表由分层地址组成,例如在国家电话网络中发现的地址。分层地址在大型网络中提供了重要的好处,但是现有的基于硬件(如内容可寻址存储器(CAM))的快速路由表查找技术只能处理平面地址。提出了几种基于二元和三元CAMs的分层地址快速路由表查找方案,并分析了它们的优缺点
{"title":"Fast routing table lookup using CAMs","authors":"A. McAuley, P. Francis","doi":"10.1109/INFCOM.1993.253403","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253403","url":null,"abstract":"The authors investigate fast routing table lookup techniques, where the table is composed of hierarchical addresses such as those found in a national telephone network. The hierarchical addresses provide important benefits in large networks, but existing fast routing table lookup techniques, based on hardware such as content addressable memory (CAM), work only with flat addresses. Several fast routing table lookup solutions for hierarchical address based on binary and ternary CAMs are presented, and their advantages and drawbacks are analyzed.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 335
期刊
IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1