首页 > 最新文献

1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)最新文献

英文 中文
Management policies for non-volatile write caches 非易失性写缓存的管理策略
Theodore R. Haining, D. Long
Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of writes to disk (called delayed writes). While delayed writes improve system performance, volatile caches can cause the loss of vital data during sudden failure. In this study, we investigate managing non-volatile RAM (NVRAM) caches with different simple strategies to delay writes to disk. We evaluate the performance of NVRAM caches using three measures of merit: the number of stalled writes which wait while the cache is cleaned before being serviced the mean service time far I/O requests, and the number of writes generated by cleaning the cache. Our results show that even small non-volatile write caches using simple management policies can reduce the number of writes to disk by at least 70% and as much as 80% in some cases. Our results also show that the number of stalled writes is high: 30% at best and nearly 100% at worst. Adding pro-active purging effectively decreases both stalled writes and disk write activity.
许多计算机硬件和软件架构在内存中缓冲数据以提高系统性能。易失性磁盘或文件缓存有时用于延迟写入磁盘的传播(称为延迟写入)。虽然延迟写入可以提高系统性能,但易失性缓存可能会导致在突然故障期间丢失重要数据。在本研究中,我们研究了用不同的简单策略来管理非易失性RAM (NVRAM)缓存,以延迟对磁盘的写入。我们使用三个优点度量来评估NVRAM缓存的性能:在为缓存提供服务之前清理缓存期间等待的停滞写次数、处理I/O请求的平均服务时间,以及清理缓存产生的写次数。我们的结果表明,即使是使用简单管理策略的小型非易失性写缓存,也可以将对磁盘的写次数减少至少70%,在某些情况下最多可减少80%。我们的结果还表明,写暂停的数量很高:最好的情况是30%,最坏的情况是接近100%。添加主动清除可以有效地减少停滞的写操作和磁盘写活动。
{"title":"Management policies for non-volatile write caches","authors":"Theodore R. Haining, D. Long","doi":"10.1109/PCCC.1999.749455","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749455","url":null,"abstract":"Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of writes to disk (called delayed writes). While delayed writes improve system performance, volatile caches can cause the loss of vital data during sudden failure. In this study, we investigate managing non-volatile RAM (NVRAM) caches with different simple strategies to delay writes to disk. We evaluate the performance of NVRAM caches using three measures of merit: the number of stalled writes which wait while the cache is cleaned before being serviced the mean service time far I/O requests, and the number of writes generated by cleaning the cache. Our results show that even small non-volatile write caches using simple management policies can reduce the number of writes to disk by at least 70% and as much as 80% in some cases. Our results also show that the number of stalled writes is high: 30% at best and nearly 100% at worst. Adding pro-active purging effectively decreases both stalled writes and disk write activity.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115397779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An open solution to fault-tolerant Ethernet: design, prototyping, and evaluation 容错以太网的开放解决方案:设计、原型设计和评估
Jiandong Huang, Sejun Song, L. Li, P. Kappler, R. Freimark, J. Gustin, T. Kozlik
Presented is an open solution based approach to fault tolerant Ethernet for process control networks. This unique approach provides fault tolerance capability that requires no change of vendor hardware (Ethernet physical link and Network Interface Card) and software (Ethernet driver and protocol), yet it is transparent to control applications. The open fault tolerant Ethernet (OFTE) developed based on this approach performs failure detection and recovery for handling single point of network failure and serves regular IP traffic. Our experimentation shows that OFTE performs efficiently, achieving less than 1 ms end to end LAN swapping time and less than 2 sec failover time, and that concurrent application and system loads have little impact on the performance of failure detection and recovery operations.
提出了一种基于开放解决方案的过程控制网络容错以太网方法。这种独特的方法提供了容错功能,不需要更改供应商硬件(以太网物理链路和网络接口卡)和软件(以太网驱动程序和协议),但它对控制应用程序是透明的。基于这种方法开发的开放式容错以太网(OFTE)可以进行故障检测和恢复,以处理单点网络故障,并为常规IP流量提供服务。我们的实验表明,OFTE执行效率很高,实现了不到1毫秒的端到端LAN交换时间和不到2秒的故障转移时间,并且并发应用程序和系统负载对故障检测和恢复操作的性能几乎没有影响。
{"title":"An open solution to fault-tolerant Ethernet: design, prototyping, and evaluation","authors":"Jiandong Huang, Sejun Song, L. Li, P. Kappler, R. Freimark, J. Gustin, T. Kozlik","doi":"10.1109/PCCC.1999.749473","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749473","url":null,"abstract":"Presented is an open solution based approach to fault tolerant Ethernet for process control networks. This unique approach provides fault tolerance capability that requires no change of vendor hardware (Ethernet physical link and Network Interface Card) and software (Ethernet driver and protocol), yet it is transparent to control applications. The open fault tolerant Ethernet (OFTE) developed based on this approach performs failure detection and recovery for handling single point of network failure and serves regular IP traffic. Our experimentation shows that OFTE performs efficiently, achieving less than 1 ms end to end LAN swapping time and less than 2 sec failover time, and that concurrent application and system loads have little impact on the performance of failure detection and recovery operations.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An agent framework for survivable network systems 可生存网络系统的代理框架
T. S. Perraju
Large network systems elevate the levels of efficiency and effectiveness of organisations by improving systems integration. This improved integration of computer networks and information systems is accompanied by increased risks of intrusion and compromise. Survivability of networks and information systems in face of these risks becomes an important aspect in the effective functioning of an organisation. The unbounded nature of today's networks and the Internet make it impossible to foresee all possible risks and cover the systems against all possible attacks. In this scenario, it becomes necessary that the network be designed to resist possible attacks, recognise attacks and recover from attacks. The open ended nature of this problem requires that flexible architectures be employed to improve survivability. Agent technology is a highly flexible and robust paradigm for building large scale distributed systems. We present an agent based framework for Survivable Network Systems.
大型网络系统通过改进系统集成来提高组织的效率和有效性。随着计算机网络和信息系统一体化程度的提高,入侵和妥协的风险也在增加。面对这些风险,网络和信息系统的生存能力成为组织有效运作的一个重要方面。当今网络和互联网的无界特性使其不可能预见所有可能的风险,并使系统免受所有可能的攻击。在这种情况下,有必要设计网络来抵御可能的攻击,识别攻击并从攻击中恢复。这个问题的开放性要求采用灵活的体系结构来提高生存能力。代理技术是构建大规模分布式系统的高度灵活和健壮的范例。提出了一种基于agent的可生存网络系统框架。
{"title":"An agent framework for survivable network systems","authors":"T. S. Perraju","doi":"10.1109/PCCC.1999.749474","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749474","url":null,"abstract":"Large network systems elevate the levels of efficiency and effectiveness of organisations by improving systems integration. This improved integration of computer networks and information systems is accompanied by increased risks of intrusion and compromise. Survivability of networks and information systems in face of these risks becomes an important aspect in the effective functioning of an organisation. The unbounded nature of today's networks and the Internet make it impossible to foresee all possible risks and cover the systems against all possible attacks. In this scenario, it becomes necessary that the network be designed to resist possible attacks, recognise attacks and recover from attacks. The open ended nature of this problem requires that flexible architectures be employed to improve survivability. Agent technology is a highly flexible and robust paradigm for building large scale distributed systems. We present an agent based framework for Survivable Network Systems.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Operating firewalls outside the LAN perimeter 在局域网外围操作防火墙
R. N. Smith, S. Bhattacharya
Firewalls are well known for their task of securing the enterprise intranet from untrusted users attempting to gain access. The concept of firewalls got its start when routers began to be used to balance network load. The effort to balance network traffic load at the transport level was extended to the server operating system where application proxy service and application level filtering is provided. Firewalls allow selected communications data to pass from one side of the corporate network perimeter to the other side. Since the firewall is the primary entry point to a corporate LAN from the Internet, the firewall frequently comes under attack by hackers and crackers. One form of attack is "denial-of-service". "Denial-of-service" attacks are easier to detect than are attacks that allow the attacker through the firewall on a valid password that they obtained by performing social engineering. Spamming the corporate email system is one form of "denial-of-service" attack, while many other forms simply flood the firewall with useless packets to prevent other authorized users from gaining access through the firewall. The paper presents a plan to place firewalls outside the corporate network boundaries, into the Internet. By having firewalls out in the Internet acting as agents for the corporations we expect to see attackers stopped closer to their source gateway. This changes the firewall task from a defensive mode to an offensive one. By having firewalls working together to seek out and locate or block the attacker at the source gateway, we gain several benefits. The paper proposes that the gateway protocol be modified to include this filtering function.
众所周知,防火墙的任务是保护企业内部网,防止不受信任的用户试图访问。当路由器开始被用来平衡网络负载时,防火墙的概念就开始了。在传输级别平衡网络流量负载的工作扩展到服务器操作系统,其中提供了应用程序代理服务和应用程序级别过滤。防火墙允许选定的通信数据从公司网络边界的一端传递到另一端。由于防火墙是从Internet进入公司LAN的主要入口点,因此防火墙经常受到黑客和破解者的攻击。攻击的一种形式是“拒绝服务”。“拒绝服务”攻击比允许攻击者使用他们通过执行社会工程获得的有效密码通过防火墙的攻击更容易检测。向公司电子邮件系统发送垃圾邮件是“拒绝服务”攻击的一种形式,而许多其他形式只是用无用的数据包淹没防火墙,以防止其他授权用户通过防火墙获得访问权限。本文提出了一种将防火墙置于公司网络边界之外,进入Internet的方案。通过在互联网上设置防火墙作为公司的代理,我们期望看到攻击者在其源网关附近被阻止。将防火墙任务从防御模式转换为攻击模式。通过让防火墙一起工作来查找、定位或阻止源网关上的攻击者,我们可以获得几个好处。本文建议修改网关协议,使其包含此过滤功能。
{"title":"Operating firewalls outside the LAN perimeter","authors":"R. N. Smith, S. Bhattacharya","doi":"10.1109/PCCC.1999.749478","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749478","url":null,"abstract":"Firewalls are well known for their task of securing the enterprise intranet from untrusted users attempting to gain access. The concept of firewalls got its start when routers began to be used to balance network load. The effort to balance network traffic load at the transport level was extended to the server operating system where application proxy service and application level filtering is provided. Firewalls allow selected communications data to pass from one side of the corporate network perimeter to the other side. Since the firewall is the primary entry point to a corporate LAN from the Internet, the firewall frequently comes under attack by hackers and crackers. One form of attack is \"denial-of-service\". \"Denial-of-service\" attacks are easier to detect than are attacks that allow the attacker through the firewall on a valid password that they obtained by performing social engineering. Spamming the corporate email system is one form of \"denial-of-service\" attack, while many other forms simply flood the firewall with useless packets to prevent other authorized users from gaining access through the firewall. The paper presents a plan to place firewalls outside the corporate network boundaries, into the Internet. By having firewalls out in the Internet acting as agents for the corporations we expect to see attackers stopped closer to their source gateway. This changes the firewall task from a defensive mode to an offensive one. By having firewalls working together to seek out and locate or block the attacker at the source gateway, we gain several benefits. The paper proposes that the gateway protocol be modified to include this filtering function.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114714327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance analysis of a person-based mobility management scheme for PCN 基于人员的PCN移动管理方案的性能分析
Anupam Goyal, M. Sundareshan
The concept of person-based number is attractive due to several pressing demands in implementation of current wireless communication systems. Some of these are: sudden proliferation in number of area codes; the need for freedom from number changes due to changes in service provider, location, or area code; and demand for improved and integrated communication service for users. Some important factors that determine the efficiency of a mobility management scheme include fewer number of times that locations need to be updated, reduced amount of overhead data that represents mobility related information, and efficient storage mechanisms that allow for fast storage and retrieval of this information. In this paper, we outline a mobility management scheme that provides a globally unique personal number and offers important benefits in regard to these issues. For an efficient implementation of such a scheme however, an investigation of its performance is required in order to estimate signaling traffic and signaling delays. This paper will focus on some recent studies conducted on an analysis of this scheme by using query and update operations as the metrics for determining average call delay and control data storage and transmission requirements. A comparative analysis is also performed with equivalent cases of query and update in the IS-41 system. This analysis provides a valuable tool to determine network management requirements in a person-based number scheme.
基于人的号码的概念是有吸引力的,因为在当前的无线通信系统的实施几个紧迫的需求。其中包括:区号数量的突然激增;因服务提供者、地点或区号变更而不受号码变更之需要;以及用户对改进和综合通信服务的需求。决定移动性管理方案效率的一些重要因素包括:需要更新位置的次数更少,表示移动性相关信息的开销数据量更少,以及允许快速存储和检索这些信息的高效存储机制。在本文中,我们概述了一个流动性管理方案,该方案提供了一个全球唯一的个人号码,并提供了关于这些问题的重要好处。然而,为了有效地实现这种方案,需要对其性能进行调查,以估计信令流量和信令延迟。本文将重点介绍最近的一些研究,通过使用查询和更新操作作为确定平均呼叫延迟和控制数据存储和传输要求的指标,对该方案进行分析。并与is -41系统中查询和更新的等效案例进行了对比分析。这种分析为确定基于人的号码方案中的网络管理需求提供了一个有价值的工具。
{"title":"Performance analysis of a person-based mobility management scheme for PCN","authors":"Anupam Goyal, M. Sundareshan","doi":"10.1109/PCCC.1999.749426","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749426","url":null,"abstract":"The concept of person-based number is attractive due to several pressing demands in implementation of current wireless communication systems. Some of these are: sudden proliferation in number of area codes; the need for freedom from number changes due to changes in service provider, location, or area code; and demand for improved and integrated communication service for users. Some important factors that determine the efficiency of a mobility management scheme include fewer number of times that locations need to be updated, reduced amount of overhead data that represents mobility related information, and efficient storage mechanisms that allow for fast storage and retrieval of this information. In this paper, we outline a mobility management scheme that provides a globally unique personal number and offers important benefits in regard to these issues. For an efficient implementation of such a scheme however, an investigation of its performance is required in order to estimate signaling traffic and signaling delays. This paper will focus on some recent studies conducted on an analysis of this scheme by using query and update operations as the metrics for determining average call delay and control data storage and transmission requirements. A comparative analysis is also performed with equivalent cases of query and update in the IS-41 system. This analysis provides a valuable tool to determine network management requirements in a person-based number scheme.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130195253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the design of a snoopy coprocessor for dynamic software-fault detection 面向动态软件故障检测的snoopy协处理器的设计
P. Teller, M. Maxwell, A. Gates
Dynamic Monitoring with Integrity Constraints (DynaMICs) is a software-fault monitoring approach in which the constraints are maintained separately from the program. Since the constraints are not entwined in the code, the approach facilitates the maintenance of the application and constraint code. Through code analysis during compilation, the points at which constraint checking should occur are determined. DynaMICs minimizes performance degradation, addressing a problem that has limited the use of runtime software-fault monitoring. This paper presents the preliminary design of a DynaMICs snoopy-coprocessor system, i.e., one that employs a coprocessor that utilizes bus-monitoring hardware to facilitate the concurrent execution of the application and constraint-checking code. In this approach, the coprocessor executes the constraint-checking code while the main processor executes the application code.
带有完整性约束的动态监控(DynaMICs)是一种软件故障监控方法,其中约束与程序分开维护。由于约束没有缠绕在代码中,因此该方法简化了应用程序和约束代码的维护。通过编译期间的代码分析,确定应该进行约束检查的点。动态最小化了性能下降,解决了一个限制运行时软件故障监控使用的问题。本文提出了一个DynaMICs snoopy协处理器系统的初步设计,即使用一个利用总线监控硬件的协处理器来促进应用程序和约束检查代码的并发执行。在这种方法中,协处理器执行约束检查代码,而主处理器执行应用程序代码。
{"title":"Towards the design of a snoopy coprocessor for dynamic software-fault detection","authors":"P. Teller, M. Maxwell, A. Gates","doi":"10.1109/PCCC.1999.749454","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749454","url":null,"abstract":"Dynamic Monitoring with Integrity Constraints (DynaMICs) is a software-fault monitoring approach in which the constraints are maintained separately from the program. Since the constraints are not entwined in the code, the approach facilitates the maintenance of the application and constraint code. Through code analysis during compilation, the points at which constraint checking should occur are determined. DynaMICs minimizes performance degradation, addressing a problem that has limited the use of runtime software-fault monitoring. This paper presents the preliminary design of a DynaMICs snoopy-coprocessor system, i.e., one that employs a coprocessor that utilizes bus-monitoring hardware to facilitate the concurrent execution of the application and constraint-checking code. In this approach, the coprocessor executes the constraint-checking code while the main processor executes the application code.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133685796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance analysis for chipsets and systems 芯片组和系统的性能分析
D. Lutz, B. Kahne
Plasma is a new tool for modeling the timing of chipsets and other system components. Modeling chipsets is in some ways more difficult than modeling processors: the interfaces are more complex and more numerous, the internal queues and buffers are larger, and the traces are much more complicated. We have used Plasma to create a timing model for a modern chipset. The resulting model is fast, flexible, and useful for both design and verification.
等离子体是一种用于对芯片组和其他系统组件的时序进行建模的新工具。在某些方面,对芯片组进行建模比对处理器进行建模要困难得多:接口更复杂,数量更多,内部队列和缓冲区更大,走线也更复杂。我们已经使用Plasma为现代芯片组创建了时序模型。得到的模型快速、灵活,对设计和验证都很有用。
{"title":"Performance analysis for chipsets and systems","authors":"D. Lutz, B. Kahne","doi":"10.1109/PCCC.1999.749470","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749470","url":null,"abstract":"Plasma is a new tool for modeling the timing of chipsets and other system components. Modeling chipsets is in some ways more difficult than modeling processors: the interfaces are more complex and more numerous, the internal queues and buffers are larger, and the traces are much more complicated. We have used Plasma to create a timing model for a modern chipset. The resulting model is fast, flexible, and useful for both design and verification.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127650192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of cluster interconnects for a distributed shared memory 分布式共享内存的集群互连评价
Sumit Roy, V. Chaudhary
Clusters of Symmetrical Multiprocessors (SMPs) have recently become popular as low-cost, high-performance computing solutions. The type of interconnection hardware used in these clusters can become a deciding factor in their overall performance. This paper evaluates the performance of three different communication systems, 10 Mbps Ethernet, 100 Mbps FastEthernet and 155 Mbps ATM, using a multithreaded Distributed Shared Memory system, Strings. The raw performance of each network is first measured using netperf. Ten different applications are then used for performance evaluation, including programs from the SPLASH-2 benchmarks, a medical computing application, and some computational kernels. It is found that half of the programs tested are not significantly affected by changes in the bandwidth. Though the ATM network provides the highest overall bandwidth, the remaining applications show that the increase in latency compared to FastEthernet prevents any performance improvement. On the other hand, applications that require only moderately high bandwidths perform substantially better with FastEthernet.
对称多处理器集群(smp)最近作为低成本、高性能的计算解决方案而流行起来。这些集群中使用的互连硬件类型可能成为影响其整体性能的决定性因素。本文评估了三种不同的通信系统的性能,10 Mbps以太网,100 Mbps快速以太网和155 Mbps ATM,使用多线程分布式共享内存系统,字符串。首先使用netperf测量每个网络的原始性能。然后使用十个不同的应用程序进行性能评估,包括来自SPLASH-2基准测试的程序、一个医疗计算应用程序和一些计算内核。结果发现,一半的测试程序不受带宽变化的显著影响。尽管ATM网络提供了最高的总带宽,但其余的应用程序表明,与FastEthernet相比,延迟的增加阻碍了性能的提高。另一方面,只需要中等高带宽的应用程序使用较快以太网的性能要好得多。
{"title":"Evaluation of cluster interconnects for a distributed shared memory","authors":"Sumit Roy, V. Chaudhary","doi":"10.1109/PCCC.1999.749413","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749413","url":null,"abstract":"Clusters of Symmetrical Multiprocessors (SMPs) have recently become popular as low-cost, high-performance computing solutions. The type of interconnection hardware used in these clusters can become a deciding factor in their overall performance. This paper evaluates the performance of three different communication systems, 10 Mbps Ethernet, 100 Mbps FastEthernet and 155 Mbps ATM, using a multithreaded Distributed Shared Memory system, Strings. The raw performance of each network is first measured using netperf. Ten different applications are then used for performance evaluation, including programs from the SPLASH-2 benchmarks, a medical computing application, and some computational kernels. It is found that half of the programs tested are not significantly affected by changes in the bandwidth. Though the ATM network provides the highest overall bandwidth, the remaining applications show that the increase in latency compared to FastEthernet prevents any performance improvement. On the other hand, applications that require only moderately high bandwidths perform substantially better with FastEthernet.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power-based leader selection in ad-hoc wireless networks 自组织无线网络中基于权力的领导者选择
Mehul J. Shah, P. Flikkema
In this paper, we develop a physical layer-based framework for the organization of an ad-hoc wireless network. The focus is quasi-static environments, such as multimedia classrooms, and situations characterized by real-time services and high traffic loads. In these cases, centralized control may be preferable due to its simplicity and high efficiency. Using a link loss matrix, an approach is proposed for selection of a network leader that takes into consideration link losses and transmitter powers. Both minimax and minisum criteria are developed to determine uplink, downlink, and overall leaders. A QoS-based iterative algorithm for determination of link transmit powers is also proposed, from which leader selection is obtained as a special case. Numerical results are also presented which explore the effect of quantization of feedback information on the iterative algorithm.
在本文中,我们开发了一个基于物理层的自组织无线网络的框架。重点是准静态环境,如多媒体教室,以及以实时服务和高流量负载为特征的情况。在这些情况下,集中控制可能更可取,因为它简单,效率高。利用链路损耗矩阵,提出了一种考虑链路损耗和发射机功率的网络leader选择方法。最小和最小标准都是用来确定上行链路、下行链路和总体引线的。提出了一种基于qos的链路发射功率确定迭代算法,并将此算法作为特例进行leader选择。数值结果探讨了反馈信息量化对迭代算法的影响。
{"title":"Power-based leader selection in ad-hoc wireless networks","authors":"Mehul J. Shah, P. Flikkema","doi":"10.1109/PCCC.1999.749431","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749431","url":null,"abstract":"In this paper, we develop a physical layer-based framework for the organization of an ad-hoc wireless network. The focus is quasi-static environments, such as multimedia classrooms, and situations characterized by real-time services and high traffic loads. In these cases, centralized control may be preferable due to its simplicity and high efficiency. Using a link loss matrix, an approach is proposed for selection of a network leader that takes into consideration link losses and transmitter powers. Both minimax and minisum criteria are developed to determine uplink, downlink, and overall leaders. A QoS-based iterative algorithm for determination of link transmit powers is also proposed, from which leader selection is obtained as a special case. Numerical results are also presented which explore the effect of quantization of feedback information on the iterative algorithm.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
AltiVec/sup TM/: bringing vector technology to the PowerPC/sup TM/ processor family AltiVec/sup TM/:将矢量技术引入PowerPC/sup TM/处理器系列
J. Tyler, Jeff Lent, Anh Mather, Huy Nguyen
Motorola's AltiVec/sup TM/ Technology provides a new, SIMD vector extension to the PowerPC/sup TM/ architecture. AltiVec adds 162 new instructions and a powerful new 128-bit datapath, capable of simultaneously executing up to 16 operations per clock. AltiVec instructions allow parallel operation on either 8, 16 or 32-bit integers, as well as 4 IEEE single-precision floating-point numbers. AltiVec technology includes highly flexible "Permute" instructions, which give the data re-organization power needed to maintain a high level of data parallelism. Fine grained data prefetch instructions are also included, which help hide the memory latency of data hungry multimedia applications. All of these features add up to a dramatic performance improvement with the first implementation of AltiVec technology: routines written with AltiVec instructions can execute significantly faster sometimes by a factor of 10 or more, than traditional scalar PowerPC code. Yet AltiVec technology is flexible enough to be useful in a wide variety of applications.
摩托罗拉的AltiVec/sup TM/ Technology为PowerPC/sup TM/架构提供了一个新的SIMD矢量扩展。AltiVec增加了162条新指令和一个强大的新128位数据路径,每个时钟能够同时执行多达16个操作。AltiVec指令允许并行操作8、16或32位整数,以及4个IEEE单精度浮点数。AltiVec技术包括高度灵活的“Permute”指令,它提供了维持高水平数据并行性所需的数据重组能力。还包括细粒度的数据预取指令,这有助于隐藏需要大量数据的多媒体应用程序的内存延迟。所有这些特性加在一起,使AltiVec技术的首次实现显著提高了性能:使用AltiVec指令编写的例程执行速度有时比传统的标量PowerPC代码快10倍或更多。然而,AltiVec技术足够灵活,可以在各种各样的应用中发挥作用。
{"title":"AltiVec/sup TM/: bringing vector technology to the PowerPC/sup TM/ processor family","authors":"J. Tyler, Jeff Lent, Anh Mather, Huy Nguyen","doi":"10.1109/PCCC.1999.749469","DOIUrl":"https://doi.org/10.1109/PCCC.1999.749469","url":null,"abstract":"Motorola's AltiVec/sup TM/ Technology provides a new, SIMD vector extension to the PowerPC/sup TM/ architecture. AltiVec adds 162 new instructions and a powerful new 128-bit datapath, capable of simultaneously executing up to 16 operations per clock. AltiVec instructions allow parallel operation on either 8, 16 or 32-bit integers, as well as 4 IEEE single-precision floating-point numbers. AltiVec technology includes highly flexible \"Permute\" instructions, which give the data re-organization power needed to maintain a high level of data parallelism. Fine grained data prefetch instructions are also included, which help hide the memory latency of data hungry multimedia applications. All of these features add up to a dramatic performance improvement with the first implementation of AltiVec technology: routines written with AltiVec instructions can execute significantly faster sometimes by a factor of 10 or more, than traditional scalar PowerPC code. Yet AltiVec technology is flexible enough to be useful in a wide variety of applications.","PeriodicalId":211210,"journal":{"name":"1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130899559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1