Pub Date : 2022-10-01DOI: 10.1016/j.peva.2022.102316
Salah Al-Deen Almousa , Gábor Horváth , Miklós Telek
Markov modulated discrete arrival processes have a wide literature, including parameter estimation methods based on expectation–maximization (EM). In this paper, we investigate the adaptation of these EM based methods to Markov modulated fluid arrival processes (MMFAP), and conclude that only the generator matrix of the modulating Markov chain of MMFAPs can be approximated by EM based method. For the rest of the parameters, the fluid rates and the fluid variances, we investigate the efficiency of numerical likelihood maximization.
To reduce the computational complexity of the likelihood computation, we accelerate the numerical inverse Laplace transformation step of the procedure with function fitting.
{"title":"Parameter estimation of Markov modulated fluid arrival processes","authors":"Salah Al-Deen Almousa , Gábor Horváth , Miklós Telek","doi":"10.1016/j.peva.2022.102316","DOIUrl":"10.1016/j.peva.2022.102316","url":null,"abstract":"<div><p>Markov modulated discrete arrival processes have a wide literature, including parameter estimation methods based on expectation–maximization (EM). In this paper, we investigate the adaptation of these EM based methods to Markov modulated fluid arrival processes (MMFAP), and conclude that only the generator matrix of the modulating Markov chain of MMFAPs can be approximated by EM based method. For the rest of the parameters, the fluid rates and the fluid variances, we investigate the efficiency of numerical likelihood maximization.</p><p>To reduce the computational complexity of the likelihood computation, we accelerate the numerical inverse Laplace transformation step of the procedure with function fitting.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102316"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531622000256/pdfft?md5=aedc437af6444b2801e92fd5922ca3f7&pid=1-s2.0-S0166531622000256-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74301314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed scheduling algorithms based on carrier sense multiple access (CSMA) are optimal in terms of the throughput and the steady-state queue lengths. However, they take a prohibitively long time to reach the steady-state, often exponential in the network size. Therefore for large networks that operate over a finite time horizon, apart from the guarantees on the steady-state queue lengths, performance guarantees on the short-term (i.e., transient) queuing behaviour are also required. To that end, we propose distributed scheduling algorithms that are guaranteed to have expected queue lengths not just in the steady-state but at every time instant, where is with respect to the network size. Further, our algorithms have complexity and support a constant fraction of the maximum throughput for typical wireless topologies. The central idea of our algorithms is to resolve collisions among pairs of conflicting nodes by assigning a master–follower hierarchy. The master–follower hierarchy can either be chosen randomly or based on the topology of the conflict graph, leading to different performance guarantees.
In addition to these hierarchical collision resolution algorithms, which are primarily designed for the conflict graph-based interference model, we also propose an Aloha-based algorithm for the -neighbour collision tolerance interference model, which is a generalization of the conflict graph model. We show that the proposed Aloha-based algorithm supports a constant fraction of the maximum throughput for typical wireless topologies.
{"title":"Low-complexity scheduling algorithms with constant queue length and throughput guarantees","authors":"Subrahmanya Swamy Peruru , Aravind Srinivasan , Radha Krishna Ganti , Krishna Jagannathan","doi":"10.1016/j.peva.2022.102310","DOIUrl":"10.1016/j.peva.2022.102310","url":null,"abstract":"<div><p><span>Distributed scheduling algorithms based on carrier sense multiple access (CSMA) are optimal in terms of the throughput and the steady-state queue lengths. However, they take a prohibitively long time to reach the steady-state, often exponential in the network size. Therefore for large networks that operate over a finite time horizon, apart from the guarantees on the steady-state queue lengths, performance guarantees on the short-term (</span><em>i.e.</em>, transient) queuing behaviour are also required. To that end, we propose distributed scheduling algorithms that are guaranteed to have <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> expected queue lengths not just in the steady-state but at every time instant, where <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>⋅</mi><mo>)</mo></mrow></mrow></math></span> is with respect to the network size. Further, our algorithms have <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span><span> complexity and support a constant fraction of the maximum throughput for typical wireless topologies. The central idea of our algorithms is to resolve collisions among pairs of conflicting nodes by assigning a master–follower hierarchy. The master–follower hierarchy can either be chosen randomly or based on the topology of the conflict graph, leading to different performance guarantees.</span></p><p><span>In addition to these hierarchical collision resolution algorithms, which are primarily designed for the conflict graph-based interference model, we also propose an Aloha-based algorithm for the </span><span><math><mi>K</mi></math></span><em>-neighbour collision tolerance</em> interference model, which is a generalization of the conflict graph model. We show that the proposed Aloha-based algorithm supports a constant fraction of the maximum throughput for typical wireless topologies.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102310"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76504274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1016/j.peva.2022.102318
Ahmad Maroof Karimi , Arnab K. Paul , Feiyi Wang
The popularity of machine learning technologies and frameworks has led to an increasingly large number of machine learning workloads running on high-performance computing (HPC) clusters. The ML workflows are readily being adopted in diverse computational fields such as Biology, Physics, Materials, and Computer Science. The I/O behavior of the emerging ML workloads distinctly differs from the traditional HPC workloads, such as simulation or checkpoint/restart-based HPC I/O behavior. Additionally, the ML workloads have also pushed for the utilization of GPUs or a combination of CPUs and GPUs in addition to using only CPUs for computational tasks. The diverse and complex I/O behavior of ML workloads requires extensive study and is critical for the efficient performance of various layers of the I/O stack and the overall performance of HPC workloads. This work aims to fill the gap in understanding the I/O behavior of emerging ML workloads by providing an in-depth analysis of ML jobs running on large-scale leadership HPC systems. In particular, we have analyzed the behavior of jobs based on the scale of the jobs, the science domains, and the processing units used by the ML jobs. The analysis was performed on 23,000 ML jobs collected from one year of Darshan logs running on Summit, which is one of the fastest supercomputers. We also collect the CPU and GPU usage of 15,165 ML jobs by merging the Darshan dataset with the power usage of the processing units on Summit. Therefore, this paper is able to provide a systematic I/O characterization of ML workloads on a leadership scale HPC machine to understand how the I/O behavior differs for workloads across various science domains, the scale of workloads, and processing units and analyze the usage of parallel file system and burst buffer by ML I/O workloads. We have made several observations regarding I/O performances and access patterns through various analytical studies and discuss the important lessons learnt from the perspective of a ML user and a storage architect for emerging ML workloads running on large-scale supercomputers.
{"title":"I/O performance analysis of machine learning workloads on leadership scale supercomputer","authors":"Ahmad Maroof Karimi , Arnab K. Paul , Feiyi Wang","doi":"10.1016/j.peva.2022.102318","DOIUrl":"10.1016/j.peva.2022.102318","url":null,"abstract":"<div><p>The popularity of machine learning<span> technologies and frameworks has led to an increasingly large number of machine learning workloads running on high-performance computing (HPC) clusters. The ML workflows are readily being adopted in diverse computational fields such as Biology, Physics, Materials, and Computer Science. The I/O behavior of the emerging ML workloads distinctly differs from the traditional HPC workloads, such as simulation or checkpoint/restart-based HPC I/O behavior. Additionally, the ML workloads have also pushed for the utilization of GPUs or a combination of CPUs and GPUs in addition to using only CPUs for computational tasks. The diverse and complex I/O behavior of ML workloads requires extensive study and is critical for the efficient performance of various layers of the I/O stack and the overall performance of HPC workloads. This work aims to fill the gap in understanding the I/O behavior of emerging ML workloads by providing an in-depth analysis of ML jobs running on large-scale leadership HPC systems. In particular, we have analyzed the behavior of jobs based on the scale of the jobs, the science domains, and the processing units used by the ML jobs. The analysis was performed on 23,000 ML jobs collected from one year of Darshan logs running on Summit, which is one of the fastest supercomputers<span>. We also collect the CPU and GPU usage of 15,165 ML jobs by merging the Darshan dataset with the power usage of the processing units on Summit. Therefore, this paper is able to provide a systematic I/O characterization of ML workloads on a leadership scale HPC machine to understand how the I/O behavior differs for workloads across various science domains, the scale of workloads, and processing units and analyze the usage of parallel file system and burst buffer by ML I/O workloads. We have made several observations regarding I/O performances and access patterns through various analytical studies and discuss the important lessons learnt from the perspective of a ML user and a storage architect for emerging ML workloads running on large-scale supercomputers.</span></span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102318"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79762898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1016/j.peva.2022.102308
Erol Gelenbe , Mert Nakıp, Tadeusz Czachórski
IoT networks handle incoming packets from large numbers of IoT Devices (IoTDs) to IoT Gateways. This can lead to the IoT Massive Access Problem that causes buffer overflow, large end-to-end delays and missed deadlines. This paper analyzes a novel traffic shaping method named the Quasi-Deterministic Traffic Policy (QDTP) that mitigates this problem by shaping the incoming traffic without increasing the end-to-end delay or dropping packets. Using queueing theoretic techniques and extensive data driven simulations with real IoT datasets, the value of QDTP is shown as a means to considerably reduce congestion at the Gateway, and significantly improve the IoT network’s overall performance.
{"title":"Improving Massive Access to IoT Gateways","authors":"Erol Gelenbe , Mert Nakıp, Tadeusz Czachórski","doi":"10.1016/j.peva.2022.102308","DOIUrl":"10.1016/j.peva.2022.102308","url":null,"abstract":"<div><p>IoT networks handle incoming packets from large numbers of IoT Devices (IoTDs) to IoT Gateways. This can lead to the IoT Massive Access Problem that causes buffer overflow, large end-to-end delays and missed deadlines. This paper analyzes a novel traffic shaping method named the Quasi-Deterministic Traffic Policy (QDTP) that mitigates this problem by shaping the incoming traffic without increasing the end-to-end delay or dropping packets. Using queueing theoretic techniques and extensive data driven simulations with real IoT datasets, the value of QDTP is shown as a means to considerably reduce congestion at the Gateway, and significantly improve the IoT network’s overall performance.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102308"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531622000219/pdfft?md5=a2c57652ab751313e9ab77ef1b537d4c&pid=1-s2.0-S0166531622000219-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88195224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1016/j.peva.2022.102320
Sanidhay Bhambay, Arpan Mukhopadhyay
The Join-the-Shortest-Queue (JSQ) load-balancing scheme is known to minimise the average delay of jobs in homogeneous systems consisting of identical servers. However, it performs poorly in heterogeneous systems where servers have different processing rates. Finding a delay optimal scheme remains an open problem for heterogeneous systems. In this paper, we consider a speed-aware version of the JSQ scheme for heterogeneous systems and show that it achieves delay optimality in the fluid limit. One of the key issues in establishing this optimality result for heterogeneous systems is to show that the sequence of steady-state distributions indexed by the system size is tight in an appropriately defined space. The usual technique for showing tightness by coupling with a suitably defined dominant system does not work for heterogeneous systems. To prove tightness, we devise a new technique that uses the drift of exponential Lyapunov functions. Using the non-negativity of the drift, we show that the stationary queue length distribution has an exponentially decaying tail — a fact we use to prove tightness. Another technical difficulty arises due to the complexity of the underlying state-space and the separation of two time-scales in the fluid limit. Due to these factors, the fluid-limit turns out to be a function of the invariant distribution of a multi-dimensional Markov chain which is hard to characterise. By using some properties of this invariant distribution and using the monotonicity of the system, we show that the fluid limit is has a unique and globally attractive fixed point.
{"title":"Asymptotic optimality of speed-aware JSQ for heterogeneous service systems","authors":"Sanidhay Bhambay, Arpan Mukhopadhyay","doi":"10.1016/j.peva.2022.102320","DOIUrl":"https://doi.org/10.1016/j.peva.2022.102320","url":null,"abstract":"<div><p>The Join-the-Shortest-Queue (JSQ) load-balancing scheme is known to minimise the average delay of jobs in homogeneous systems consisting of identical servers. However, it performs poorly in heterogeneous systems where servers have different processing rates. Finding a delay optimal scheme remains an open problem for heterogeneous systems. In this paper, we consider a speed-aware version of the JSQ scheme for heterogeneous systems and show that it achieves delay optimality in the fluid limit. One of the key issues in establishing this optimality result for heterogeneous systems is to show that the sequence of steady-state distributions indexed by the system size is tight in an appropriately defined space. The usual technique for showing tightness by coupling with a suitably defined dominant system does not work for heterogeneous systems. To prove tightness, we devise a new technique that uses the drift of exponential Lyapunov functions. Using the non-negativity of the drift, we show that the stationary queue length distribution has an exponentially decaying tail — a fact we use to prove tightness. Another technical difficulty arises due to the complexity of the underlying state-space and the separation of two time-scales in the fluid limit. Due to these factors, the fluid-limit turns out to be a function of the invariant distribution of a multi-dimensional Markov chain which is hard to characterise. By using some properties of this invariant distribution and using the monotonicity of the system, we show that the fluid limit is has a unique and globally attractive fixed point.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102320"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531622000281/pdfft?md5=16a46606029e0e71f6846c950586957f&pid=1-s2.0-S0166531622000281-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137428776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1016/j.peva.2022.102312
Ilias Iliadis, Linus Jordan, Mark Lantz, Slavisa Sarafijanovic
Magnetic tape provides a cost-effective way to retain the exponentially increasing volumes of data being produced. The low cost per gigabyte and the low energy consumption render tape a preferred option over hard disk drives and flash for infrequently accessed data. Assessing the performance of tape library systems is central to achieving appropriate storage provisioning and dimensioning. Performance is affected by the number and the operational characteristics of the tape drives and the robotic arms, and the mount and unmount policies deployed. In this paper, we develop a novel analytical model that accurately captures the principal aspects of tape library operation. Several relevant performance measures including the mean waiting time and the mount/unmount rates are derived. The model provides useful insights into the behavior of the tape libraries and yields results that enable a better understanding of the design tradeoffs. The validity of the model developed is confirmed by demonstrating a good agreement of the predicted performance with that obtained by simulation across various configurations. To mitigate the burden on the robotic mechanism, a scheme of accumulating multiple requests before sending them to the tape library is proposed and studied.
{"title":"Performance evaluation of tape library systems","authors":"Ilias Iliadis, Linus Jordan, Mark Lantz, Slavisa Sarafijanovic","doi":"10.1016/j.peva.2022.102312","DOIUrl":"10.1016/j.peva.2022.102312","url":null,"abstract":"<div><p><span>Magnetic tape provides a cost-effective way to retain the exponentially increasing volumes of data being produced. The low cost per gigabyte and the low energy consumption<span> render tape a preferred option over hard disk drives and flash for infrequently accessed data. Assessing the performance of tape library systems is central to achieving appropriate storage provisioning and dimensioning. Performance is affected by the number and the operational characteristics of the tape drives and the </span></span>robotic arms, and the mount and unmount policies deployed. In this paper, we develop a novel analytical model that accurately captures the principal aspects of tape library operation. Several relevant performance measures including the mean waiting time and the mount/unmount rates are derived. The model provides useful insights into the behavior of the tape libraries and yields results that enable a better understanding of the design tradeoffs. The validity of the model developed is confirmed by demonstrating a good agreement of the predicted performance with that obtained by simulation across various configurations. To mitigate the burden on the robotic mechanism, a scheme of accumulating multiple requests before sending them to the tape library is proposed and studied.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102312"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90450259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1016/j.peva.2022.102314
Kalpana Devarajan , Muthukrishnan Senthilkumar
The present research aims to study the strategic behaviour of users in an Internet of Things(IoT) system that is impeded by an unreliable server. In the system, an IoT device is equipped with an energy harvesting unit. The IoT system under study is employed as a Markovian retrial queueing system that is used in a single server, subject to active failures. The failed server is repaired immediately, while the user who was served before the system’s breakdown event waits in the server until the server is repaired. The generating function approach is used to identify important system performance metrics. Moreover, queueing theory concepts are incorporated into game theory for the analysis of the users’ strategies. The users in the IoT system, act to maximize their expected benefit without being perturbed by other users in the system and determine their equilibrium joining strategies. Furthermore, taking into account social welfare factors, the IoT device acts as a social planner, and as a consequence, socially optimal joining strategies are also analysed. Finally, the analytical findings are validated with numerical examples.
{"title":"Strategic access in a Green IoT(Internet of Things) system with an unreliable server","authors":"Kalpana Devarajan , Muthukrishnan Senthilkumar","doi":"10.1016/j.peva.2022.102314","DOIUrl":"10.1016/j.peva.2022.102314","url":null,"abstract":"<div><p>The present research aims to study the strategic behaviour of users in an Internet of Things(IoT) system that is impeded by an unreliable server. In the system, an IoT device is equipped with an energy harvesting<span> unit. The IoT system under study is employed as a Markovian retrial queueing system<span> that is used in a single server, subject to active failures. The failed server is repaired immediately, while the user who was served before the system’s breakdown event waits in the server until the server is repaired. The generating function approach is used to identify important system performance metrics. Moreover, queueing theory concepts are incorporated into game theory for the analysis of the users’ strategies. The users in the IoT system, act to maximize their expected benefit without being perturbed by other users in the system and determine their equilibrium joining strategies. Furthermore, taking into account social welfare factors, the IoT device acts as a social planner, and as a consequence, socially optimal joining strategies are also analysed. Finally, the analytical findings are validated with numerical examples.</span></span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102314"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74338509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1016/j.peva.2022.102319
Vineeth B.S. , Chandramani Singh
We consider a single-source single-destination delay tolerant network (DTN) with Poisson packet arrivals. The source uses a store and forward protocol which makes multiple copies of a packet to relays which buffer them until delivery to the destination. We characterize the stability threshold, defined as the maximum value of arrival rate for which the source has finite average queue length, as a function of number of relays, relay contact rate, relay packet buffer capacity, and number of packet copies. We analyse DTNs without packet delivery feedback and with instantaneous feedback. For DTNs without packet delivery feedback, we obtain a non-asymptotic analytical stability threshold and show that it only doubles as the relay-buffer capacity increases from one to infinity. For DTNs with instantaneous packet delivery feedback, we characterize the stability threshold using simulations. We also present an analytical approximation for the stability threshold in the case of unit relay-buffer capacity, and show that it is approximately double of that without feedback for large number of packet copies and relays. For DTNs with and without feedback, we also study the average delay performance through simulations. We obtain analytical approximations for the average delays of the packets for DTNs without feedback. We observe that the last-in-first-out relay to destination packet transmission policy has the minimum delay.
{"title":"Stability and average delay in delay tolerant networks with Poisson packet arrivals and buffered relay nodes","authors":"Vineeth B.S. , Chandramani Singh","doi":"10.1016/j.peva.2022.102319","DOIUrl":"10.1016/j.peva.2022.102319","url":null,"abstract":"<div><p><span><span>We consider a single-source single-destination delay tolerant network (DTN) with Poisson </span>packet arrivals. The source uses a store and forward protocol which makes multiple copies of a packet to relays which buffer them until delivery to the destination. We characterize the stability threshold, defined as the maximum value of </span>arrival rate<span><span><span> for which the source has finite average queue length, as a function of number of relays, relay contact rate, relay packet buffer capacity, and number of packet copies. We analyse DTNs without </span>packet delivery feedback and with instantaneous feedback. For DTNs without packet delivery feedback, we obtain a non-asymptotic analytical stability threshold and show that it only doubles as the relay-buffer capacity increases from one to infinity. For DTNs with instantaneous packet delivery feedback, we characterize the stability threshold using simulations. We also present an analytical </span>approximation<span> for the stability threshold in the case of unit relay-buffer capacity, and show that it is approximately double of that without feedback for large number of packet copies and relays. For DTNs with and without feedback, we also study the average delay performance through simulations. We obtain analytical approximations for the average delays of the packets for DTNs without feedback. We observe that the last-in-first-out relay to destination packet transmission policy has the minimum delay.</span></span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"157 ","pages":"Article 102319"},"PeriodicalIF":2.2,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85777097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-27DOI: 10.1177/13563890221126744
M. Coldwell, Sarah Pearson, Ian D. Wilson
This article focuses on the evaluation of the Children’s Community programme, addressing the question: how can evaluators effectively address complex place-based system change initiatives, particularly those working across differing contexts? After considering alternatives, including what we describe as ‘first-generation’ linear, logic model-based approaches and second-generation Theory of Change approaches, we discuss the development of ‘third-generation’ systems-change evaluations and articulate a novel comparative maturity matrix approach, developed for the evaluation of Children’s Communities with potential wider applicability for evaluation of complex systems change interventions. The article discusses the evaluation approach in depth and concludes with reflection on what learning points may be derived for use in subsequent evaluations of place-based and complex systems change initiatives.
{"title":"Evaluating local system change using a comparative maturity matrix","authors":"M. Coldwell, Sarah Pearson, Ian D. Wilson","doi":"10.1177/13563890221126744","DOIUrl":"https://doi.org/10.1177/13563890221126744","url":null,"abstract":"This article focuses on the evaluation of the Children’s Community programme, addressing the question: how can evaluators effectively address complex place-based system change initiatives, particularly those working across differing contexts? After considering alternatives, including what we describe as ‘first-generation’ linear, logic model-based approaches and second-generation Theory of Change approaches, we discuss the development of ‘third-generation’ systems-change evaluations and articulate a novel comparative maturity matrix approach, developed for the evaluation of Children’s Communities with potential wider applicability for evaluation of complex systems change interventions. The article discusses the evaluation approach in depth and concludes with reflection on what learning points may be derived for use in subsequent evaluations of place-based and complex systems change initiatives.","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"91 1","pages":"446 - 465"},"PeriodicalIF":2.2,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80529756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-27DOI: 10.1177/13563890221129496
clés: Groupes de discussion; entretiens de groupe; évaluation fondée sur la théorie; évaluation réaliste; théorie de moyenne portée; théorie de programme de matrice comparative de maturité, développée pour l’évaluation des Réseaux pour l’Enfance, et susceptible d’une application plus large à l’évaluation des inter-ventions complexes de changement systémique. L’article formule une analyse approfondie de la méthode d’évaluation et conclut sur une réflexion portant sur les enseignements pratiques que l’on peut en tirer pour les évaluations à venir d’initiatives de changements systémiques localisés et complexes.
{"title":"French language abstracts","authors":"","doi":"10.1177/13563890221129496","DOIUrl":"https://doi.org/10.1177/13563890221129496","url":null,"abstract":"clés: Groupes de discussion; entretiens de groupe; évaluation fondée sur la théorie; évaluation réaliste; théorie de moyenne portée; théorie de programme de matrice comparative de maturité, développée pour l’évaluation des Réseaux pour l’Enfance, et susceptible d’une application plus large à l’évaluation des inter-ventions complexes de changement systémique. L’article formule une analyse approfondie de la méthode d’évaluation et conclut sur une réflexion portant sur les enseignements pratiques que l’on peut en tirer pour les évaluations à venir d’initiatives de changements systémiques localisés et complexes.","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"36 1","pages":"555 - 558"},"PeriodicalIF":2.2,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77948035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}