首页 > 最新文献

2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems最新文献

英文 中文
Where is the tight link in a home wireless broadband environment? 家庭无线宽带环境中的紧密链接在哪里?
Xinyu Xing, Shivakant Mishra
Nowadays, tariffs and packages on offer for broadband worldwide gives a general story of increased speed and reduced prices. As a complementary to fixed-line broadband access, WiFi networks are undoubtedly taking off in many American households. Due to the combination of wireless technology and fixed-line broadband access, prior available bandwidth measurement tools may not be an appropriate solution for a common broadband subscriber. In this paper, we utilize abget in combination with Multi-Router Traffic Grapher (MRTG) to target the tight link of the Internet. Based on the observation that the tight link of the Internet in the context of an in-home wireless broadband access is usually on the edge of the Internet, we then introduce ABODE, a single-end, light-weight tool for estimating available bandwidth in the context of an in-home wireless bandwidth environment. ABODE harnesses ICMP echo request messages to generate stable, rate-controlled traffic flows. Based on the timestamp of ICMP echo reply messages, ABODE performs available bandwidth estimation by calculating the drift of the time centroid over a traffic flow. To verify the accuracy of ABODE, we use MRTG data to compare with the estimation results of ABODE. The measurement shows that ABODE is capable of efficiently estimating available bandwidth in the context of an in-home wireless broadband environment.
如今,全球范围内提供的宽带资费和套餐的总体情况是速度提高了,价格降低了。作为固定宽带接入的补充,WiFi网络无疑在许多美国家庭中开始普及。由于无线技术和固定线路宽带接入的结合,先前可用的带宽测量工具可能不是普通宽带用户的合适解决方案。在本文中,我们利用abget与多路由器流量绘图器(MRTG)相结合来针对互联网的紧密链路。基于对家庭无线宽带接入背景下互联网紧密链接通常位于互联网边缘的观察,我们随后介绍了ABODE,这是一种单端轻量级工具,用于估算家庭无线带宽环境下的可用带宽。ABODE利用ICMP回声请求消息来产生稳定的、速率可控的流量。根据ICMP应答报文的时间戳,通过计算时间质心在流量上的漂移来估计可用带宽。为了验证ABODE的准确性,我们使用MRTG数据与ABODE的估计结果进行比较。测量结果表明,在家庭无线宽带环境下,ABODE能够有效地估计可用带宽。
{"title":"Where is the tight link in a home wireless broadband environment?","authors":"Xinyu Xing, Shivakant Mishra","doi":"10.1109/MASCOT.2009.5366789","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366789","url":null,"abstract":"Nowadays, tariffs and packages on offer for broadband worldwide gives a general story of increased speed and reduced prices. As a complementary to fixed-line broadband access, WiFi networks are undoubtedly taking off in many American households. Due to the combination of wireless technology and fixed-line broadband access, prior available bandwidth measurement tools may not be an appropriate solution for a common broadband subscriber. In this paper, we utilize abget in combination with Multi-Router Traffic Grapher (MRTG) to target the tight link of the Internet. Based on the observation that the tight link of the Internet in the context of an in-home wireless broadband access is usually on the edge of the Internet, we then introduce ABODE, a single-end, light-weight tool for estimating available bandwidth in the context of an in-home wireless bandwidth environment. ABODE harnesses ICMP echo request messages to generate stable, rate-controlled traffic flows. Based on the timestamp of ICMP echo reply messages, ABODE performs available bandwidth estimation by calculating the drift of the time centroid over a traffic flow. To verify the accuracy of ABODE, we use MRTG data to compare with the estimation results of ABODE. The measurement shows that ABODE is capable of efficiently estimating available bandwidth in the context of an in-home wireless broadband environment.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116920071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Time — It's time for a change 时间——是改变的时候了
B. Haverkort
Since the 1970's, the scientific field of model-based performance and dependability evaluation has been flourishing. Starting with breakthroughs in the area of closed queueing networks in the 1970's, the 1980's brought new results on state-based methods, such as those for stochastic Petri nets and matrix-geometric methods, whereas the 1990's introduced process algebra-type models. Since the turn of the century, techniques for stochastic model checking are being introduced, to name just a few major developments. The applicability of all these techniques has been boosted enormously through Moore's law; these days, stochastic models with tens of millions of states can easily be dealt with on a standard desktop or laptop computer. A dozen or so dedicated conferences serve the scientific field, as well as a number of scientific journals. However, for the field as a whole to make progress, it is important to step back, and to consider how all these as-such important developments have really changed the way computer and communication systems are being designed and operated. The answer to this question is most probable rather disappointing. I do observe a rather strong discrepancy between what is being published in top conferences and journals, and what is being used in real practice. Blaming industry for this would be too easy a way out. Currently, we do not see model-based performance and dependability evaluation as key step in the design process for new computer and communication systems. Moreover, in the exceptional cases that we do see performance and dependability evaluation being part of a design practice, the employed techniques are not the ones referred to above, but instead, depending on the application area, techniques like discrete-event simulation on the basis of hand-crafted simulation programs (communication protocols), or techniques based on (non-stochastic) timed-automata or timeless behavioral models (embedded systems). In all these cases, however, the scalability of the employed methods, also for discrete-event simulation, forms a limiting factor. Still, industry is serving the world with ever better, faster and more impressive computing machinery and software! What went wrong? When and why did ”our field” land on a side track? In this presentation I will argue that it is probably time for a change, for a change toward a new way of looking at performance and dependability models and evaluation of computer and communication systems, a way that is, if you like, closer to the way physicists deal with very large scale systems, by applying different type of abstractions. In particular, I will argue that computer scientist should “stop counting things”. Instead, a more fluid way of thinking about system behavior is deemed to be necessary to be able to evaluate the performance and dependability of the next generation of very large scale omnipresent systems. First successes of such new approaches have recently been reported. Will be witness a
自20世纪70年代以来,基于模型的性能和可靠性评估科学领域蓬勃发展。从20世纪70年代封闭排队网络领域的突破开始,80年代带来了基于状态的方法的新成果,例如随机Petri网和矩阵几何方法,而90年代引入了过程代数型模型。自世纪之交以来,随机模型检查的技术被引入,这只是几个主要的发展。摩尔定律极大地提高了所有这些技术的适用性;如今,具有数千万种状态的随机模型可以很容易地在标准台式电脑或笔记本电脑上处理。十几个专门为科学领域服务的会议,以及一些科学期刊。然而,为了使该领域作为一个整体取得进展,重要的是退后一步,并考虑所有这些重要的发展如何真正改变了计算机和通信系统的设计和操作方式。这个问题的答案很可能相当令人失望。我确实注意到,在顶级会议和期刊上发表的内容与在实际实践中使用的内容之间存在相当大的差异。将此归咎于工业是一种过于简单的解决办法。目前,我们并不认为基于模型的性能和可靠性评估是新计算机和通信系统设计过程中的关键步骤。此外,在我们确实看到性能和可靠性评估是设计实践的一部分的特殊情况下,所采用的技术不是上面提到的技术,而是根据应用领域,基于手工制作的仿真程序(通信协议)的离散事件模拟技术,或基于(非随机)时间自动机或永恒行为模型(嵌入式系统)的技术。然而,在所有这些情况下,所采用的方法的可扩展性,也为离散事件模拟,形成了一个限制因素。尽管如此,工业仍在用更好、更快、更令人印象深刻的计算机器和软件为世界服务!出了什么问题?什么时候,为什么“我们的领域”会偏离轨道?在这次演讲中,我将提出,也许是时候做出改变了,以一种新的方式来看待计算机和通信系统的性能和可靠性模型以及评估,这种方式,如果你愿意,更接近物理学家处理超大规模系统的方式,通过应用不同类型的抽象。特别是,我认为计算机科学家应该“停止计数”。相反,对于能够评估下一代非常大规模无所不在的系统的性能和可靠性,一种更灵活的思考系统行为的方式被认为是必要的。最近报道了这种新方法的首次成功。我们将见证未来几年的范式转变吗?
{"title":"Time — It's time for a change","authors":"B. Haverkort","doi":"10.1109/MASCOT.2009.5363146","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5363146","url":null,"abstract":"Since the 1970's, the scientific field of model-based performance and dependability evaluation has been flourishing. Starting with breakthroughs in the area of closed queueing networks in the 1970's, the 1980's brought new results on state-based methods, such as those for stochastic Petri nets and matrix-geometric methods, whereas the 1990's introduced process algebra-type models. Since the turn of the century, techniques for stochastic model checking are being introduced, to name just a few major developments. The applicability of all these techniques has been boosted enormously through Moore's law; these days, stochastic models with tens of millions of states can easily be dealt with on a standard desktop or laptop computer. A dozen or so dedicated conferences serve the scientific field, as well as a number of scientific journals. However, for the field as a whole to make progress, it is important to step back, and to consider how all these as-such important developments have really changed the way computer and communication systems are being designed and operated. The answer to this question is most probable rather disappointing. I do observe a rather strong discrepancy between what is being published in top conferences and journals, and what is being used in real practice. Blaming industry for this would be too easy a way out. Currently, we do not see model-based performance and dependability evaluation as key step in the design process for new computer and communication systems. Moreover, in the exceptional cases that we do see performance and dependability evaluation being part of a design practice, the employed techniques are not the ones referred to above, but instead, depending on the application area, techniques like discrete-event simulation on the basis of hand-crafted simulation programs (communication protocols), or techniques based on (non-stochastic) timed-automata or timeless behavioral models (embedded systems). In all these cases, however, the scalability of the employed methods, also for discrete-event simulation, forms a limiting factor. Still, industry is serving the world with ever better, faster and more impressive computing machinery and software! What went wrong? When and why did ”our field” land on a side track? In this presentation I will argue that it is probably time for a change, for a change toward a new way of looking at performance and dependability models and evaluation of computer and communication systems, a way that is, if you like, closer to the way physicists deal with very large scale systems, by applying different type of abstractions. In particular, I will argue that computer scientist should “stop counting things”. Instead, a more fluid way of thinking about system behavior is deemed to be necessary to be able to evaluate the performance and dependability of the next generation of very large scale omnipresent systems. First successes of such new approaches have recently been reported. Will be witness a ","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128877329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An obstacle-aware human mobility model for ad hoc networks 面向自组织网络的障碍物感知人类移动模型
Christos A. Papageorgiou, Konstantinos Birkos, T. Dagiuklas, S. Kotsopoulos
In this work we present an obstacle-aware human mobility model for ad hoc networks. Typical examples where the nodes of mobile ad hoc networks are human-operated are natural or man-made disasters, military activities or healthcare services. In these scenarios, obstacles are an integral part of the areas where such networks are deployed in order to facilitate communication among the firemen, policemen, medics, soldiers, etc. In the proposed mobility model, the nodes of the network move around the obstacles in a natural and realistic way. A recursive procedure is followed by each node according to which every time an obstacle is encountered between the node's current position and the final destination point, the node moves to the obstacle's vertex that is closest to the destination. This process is repeated until the destination is reached. The obstacles are also taken into account in modeling the signal propagation. When a packet is transmitted through an obstacle, the power at which it is received is attenuated by a certain value representing the physical layer phenomena suffered by the signal. The model is implemented as an add-on module in Network Simulator ns-2. A thorough simulation study conducted highlights the differences of the proposed model with other mobility models, by investigating the properties of the resulting network topologies and their impact on network performance.
在这项工作中,我们提出了一个障碍物感知的自组织网络人类移动模型。移动自组织网络节点由人为操作的典型示例包括自然或人为灾害、军事活动或医疗保健服务。在这些情况下,障碍物是部署这种网络的区域的一个组成部分,以便于消防员、警察、医务人员、士兵等之间的通信。在提出的移动模型中,网络节点以自然和现实的方式绕过障碍物。每个节点遵循递归过程,根据递归过程,每次在节点当前位置和最终目标点之间遇到障碍物时,节点移动到距离目标最近的障碍物顶点。这个过程不断重复,直到到达目的地。在建立信号传播模型时,还考虑了障碍物的影响。当数据包通过障碍物传输时,接收它的功率会衰减到一个特定的值,该值表示信号所遭受的物理层现象。该模型在网络模拟器ns-2中作为附加模块实现。通过研究所得网络拓扑的特性及其对网络性能的影响,进行了全面的仿真研究,突出了所提出的模型与其他移动性模型的差异。
{"title":"An obstacle-aware human mobility model for ad hoc networks","authors":"Christos A. Papageorgiou, Konstantinos Birkos, T. Dagiuklas, S. Kotsopoulos","doi":"10.1109/MASCOT.2009.5366135","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366135","url":null,"abstract":"In this work we present an obstacle-aware human mobility model for ad hoc networks. Typical examples where the nodes of mobile ad hoc networks are human-operated are natural or man-made disasters, military activities or healthcare services. In these scenarios, obstacles are an integral part of the areas where such networks are deployed in order to facilitate communication among the firemen, policemen, medics, soldiers, etc. In the proposed mobility model, the nodes of the network move around the obstacles in a natural and realistic way. A recursive procedure is followed by each node according to which every time an obstacle is encountered between the node's current position and the final destination point, the node moves to the obstacle's vertex that is closest to the destination. This process is repeated until the destination is reached. The obstacles are also taken into account in modeling the signal propagation. When a packet is transmitted through an obstacle, the power at which it is received is attenuated by a certain value representing the physical layer phenomena suffered by the signal. The model is implemented as an add-on module in Network Simulator ns-2. A thorough simulation study conducted highlights the differences of the proposed model with other mobility models, by investigating the properties of the resulting network topologies and their impact on network performance.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129984842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A graph-based algorithm for partitioning of mobile web services 基于图的移动web服务分区算法
M. Asif, S. Majumdar
Web services are getting popular in the domain of business to business electronic commerce and in automating information exchange between business processes because of the interoperability they provide in a distributed heterogeneous environment. Most existing systems use web services that are hosted in fixed infrastructures. Hosting web services on wireless mobile devices is challenging because of their limited resources. The few efforts made by researchers in the past are effective only for hosting of simple web service (WS) applications. However, the existing techniques are not adequate for hosting of WS applications that involve large and complex business processes or invoked by multiple concurrent WS clients. This research proposes to use an application partitioning approach so that the execution of some parts (partitions) of a WS application can be offloaded to a powerful computing node. A critical analysis of existing partitioning approaches for traditional and mobile applications is presented and a graph theory based algorithm for WS application partitioning is proposed. A performance analysis of the algorithm is made through prototyping and measurements.
由于Web服务在分布式异构环境中提供了互操作性,因此Web服务在企业到企业的电子商务领域以及在业务流程之间的信息交换自动化方面变得越来越流行。大多数现有系统使用托管在固定基础设施中的web服务。在无线移动设备上托管web服务是一项挑战,因为它们的资源有限。过去研究人员所做的一些努力仅对简单web服务(WS)应用程序的托管有效。然而,现有的技术并不足以承载涉及大型复杂业务流程或由多个并发WS客户端调用的WS应用程序。本研究建议使用应用程序分区方法,以便WS应用程序的某些部分(分区)的执行可以卸载到功能强大的计算节点上。对传统应用程序和移动应用程序的分区方法进行了分析,提出了一种基于图论的WS应用程序分区算法。通过原型设计和测试,对算法进行了性能分析。
{"title":"A graph-based algorithm for partitioning of mobile web services","authors":"M. Asif, S. Majumdar","doi":"10.1109/MASCOT.2009.5366714","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366714","url":null,"abstract":"Web services are getting popular in the domain of business to business electronic commerce and in automating information exchange between business processes because of the interoperability they provide in a distributed heterogeneous environment. Most existing systems use web services that are hosted in fixed infrastructures. Hosting web services on wireless mobile devices is challenging because of their limited resources. The few efforts made by researchers in the past are effective only for hosting of simple web service (WS) applications. However, the existing techniques are not adequate for hosting of WS applications that involve large and complex business processes or invoked by multiple concurrent WS clients. This research proposes to use an application partitioning approach so that the execution of some parts (partitions) of a WS application can be offloaded to a powerful computing node. A critical analysis of existing partitioning approaches for traditional and mobile applications is presented and a graph theory based algorithm for WS application partitioning is proposed. A performance analysis of the algorithm is made through prototyping and measurements.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simulated annealing approach to optimizing the lifetime of sparse time-driven sensor networks 稀疏时间驱动传感器网络寿命优化的模拟退火方法
M. L. Santamaría, S. Galmés, R. Puigjaner
Time-driven sensor networks are devoted to the continuous reporting of ambient data to the base station. In many cases, these data are provided by nodes that have been deployed in a structured manner, either by selecting strategic locations or by adopting some regular sampling pattern. In either case, the resulting inter-node distances may not be small, and thus additional supporting nodes may be necessary. This suggests that the problem could be better addressed from a network planning perspective. In this sense, a particular approach is proposed and, as part of it, the paper focuses on optimizing the lifetime that can be predicted from the network topology, which is assumed to be a static data gathering tree. It is shown that this problem requires the exploration of all possible spanning trees, since the energy consumed by a node depends on its workload, which in turn depends on how this node is connected to its neighborhood. Because this is an NP-hard problem, the use of a heuristic approach is required. Then, an algorithm based on simulated annealing is proposed, which converges asymptotically to the global optimum. This algorithm is tested on different scenarios and its computational complexity is proved to be linearly dependent on the number of nodes.
时间驱动传感器网络致力于向基站连续报告环境数据。在许多情况下,这些数据是由以结构化方式部署的节点提供的,通过选择战略位置或采用一些常规抽样模式。在任何一种情况下,产生的节点间距离可能都不小,因此可能需要额外的支持节点。这表明可以从网络规划的角度更好地解决这个问题。从这个意义上说,本文提出了一种特殊的方法,作为该方法的一部分,本文侧重于优化可以从网络拓扑预测的生命周期,假设网络拓扑是一个静态数据收集树。结果表明,这个问题需要探索所有可能的生成树,因为节点消耗的能量取决于它的工作负载,而工作负载又取决于该节点如何连接到它的邻居。因为这是一个np困难问题,所以需要使用启发式方法。然后,提出了一种基于模拟退火的算法,该算法渐近收敛到全局最优。在不同的场景下对该算法进行了测试,证明其计算复杂度与节点数呈线性相关。
{"title":"Simulated annealing approach to optimizing the lifetime of sparse time-driven sensor networks","authors":"M. L. Santamaría, S. Galmés, R. Puigjaner","doi":"10.1109/MASCOT.2009.5366170","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366170","url":null,"abstract":"Time-driven sensor networks are devoted to the continuous reporting of ambient data to the base station. In many cases, these data are provided by nodes that have been deployed in a structured manner, either by selecting strategic locations or by adopting some regular sampling pattern. In either case, the resulting inter-node distances may not be small, and thus additional supporting nodes may be necessary. This suggests that the problem could be better addressed from a network planning perspective. In this sense, a particular approach is proposed and, as part of it, the paper focuses on optimizing the lifetime that can be predicted from the network topology, which is assumed to be a static data gathering tree. It is shown that this problem requires the exploration of all possible spanning trees, since the energy consumed by a node depends on its workload, which in turn depends on how this node is connected to its neighborhood. Because this is an NP-hard problem, the use of a heuristic approach is required. Then, an algorithm based on simulated annealing is proposed, which converges asymptotically to the global optimum. This algorithm is tested on different scenarios and its computational complexity is proved to be linearly dependent on the number of nodes.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133138661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On-line monitoring for model-based QoS management in IEEE 802.11 wireless networks IEEE 802.11无线网络中基于模型的QoS管理在线监测
Johannes Semmler, K. Wolter, P. Reinecke
Ensuring Quality of Service (QoS) in wireless networks poses an open problem in many application domains. We propose an automatic on-line QoS monitoring and management infrastructure that can be incorporated into existing network setups. Based on model-based assessment of current and future QoS conditions, our solution will control traffic in the network through a combination of admission control, enforced handover, traffic shaping and transmission parameter adjustments. Correctness of the model is evaluated through experimental evaluation and simulations. We implement a prototype of the proposed system using open-source components.
无线网络的服务质量(QoS)是许多应用领域的一个开放性问题。我们提出了一种自动在线QoS监测和管理基础设施,可以纳入现有的网络设置。基于对当前和未来QoS条件的基于模型的评估,我们的解决方案将通过接纳控制、强制切换、流量整形和传输参数调整的组合来控制网络中的流量。通过实验和仿真验证了模型的正确性。我们使用开源组件实现了该系统的原型。
{"title":"On-line monitoring for model-based QoS management in IEEE 802.11 wireless networks","authors":"Johannes Semmler, K. Wolter, P. Reinecke","doi":"10.1109/MASCOT.2009.5367053","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5367053","url":null,"abstract":"Ensuring Quality of Service (QoS) in wireless networks poses an open problem in many application domains. We propose an automatic on-line QoS monitoring and management infrastructure that can be incorporated into existing network setups. Based on model-based assessment of current and future QoS conditions, our solution will control traffic in the network through a combination of admission control, enforced handover, traffic shaping and transmission parameter adjustments. Correctness of the model is evaluated through experimental evaluation and simulations. We implement a prototype of the proposed system using open-source components.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity bounds for cellular wireless mesh networks 蜂窝式无线网状网络的容量界限
Dong Zhang, R. Bunt, N. Osgood
A wireless transmitter can use a channel to transmit bits over distance per second (in general, either more bits over shorter distance or fewer bits over longer distance). We call this the Channel Transport Capacity. This paper analyzes how the one-hop channel transport capacity limits multi-hop network capacity in cellular wireless mesh networks. The main results of this paper are analytic expressions for capacity bounds for multi-radio, multi-channel, multi-rate, multi-hop and carrier sense based cells in cellular wireless mesh networks. We validated our analytic results with simulations.
无线发射机可以使用信道以每秒的距离传输比特(一般来说,要么在较短的距离上传输更多的比特,要么在较长的距离上传输更少的比特)。我们称之为海峡运输能力。分析了蜂窝无线网状网络中单跳信道传输容量对多跳网络容量的限制。本文的主要结果是蜂窝无线网状网络中基于多无线电、多信道、多速率、多跳和载波感知的单元容量界限的解析表达式。我们用模拟验证了我们的分析结果。
{"title":"Capacity bounds for cellular wireless mesh networks","authors":"Dong Zhang, R. Bunt, N. Osgood","doi":"10.1109/MASCOT.2009.5366701","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366701","url":null,"abstract":"A wireless transmitter can use a channel to transmit bits over distance per second (in general, either more bits over shorter distance or fewer bits over longer distance). We call this the Channel Transport Capacity. This paper analyzes how the one-hop channel transport capacity limits multi-hop network capacity in cellular wireless mesh networks. The main results of this paper are analytic expressions for capacity bounds for multi-radio, multi-channel, multi-rate, multi-hop and carrier sense based cells in cellular wireless mesh networks. We validated our analytic results with simulations.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient tracing and performance analysis for large distributed systems 大型分布式系统的高效跟踪和性能分析
Eric Anderson, Christopher Hoover, Xiaozhou Li, Joseph A. Tucek
Distributed systems are notoriously difficult to implement and debug. One important tool for understanding the behavior of distributed systems is tracing. Unfortunately, effective tracing for modern distributed systems faces several challenges. First, many interesting behaviors in distributed systems only occur rarely, or at full production scale. Hence we need tracing mechanisms which impose minimal overhead, in order to allow always-on tracing of production instances. Second, for high-speed systems, messages can be delivered in significantly less time than the error of traditional time synchronization techniques such as network time protocol (NTP), necessitating time adjustment techniques with much higher precision. Third, distributed systems today may generate millions of events per second systemwide, resulting in traces consisting of billions of events. Such large traces can overwhelm existing trace analysis tools. These challenges make effective tracing difficult. We present techniques that address these three challenges. Our contributions include 1) a low-overhead tracing mechanism, which allows tracing of large systems without impacting their behavior or performance (0.14 μs/event), 2) a post hoc technique for producing highly accurate time synchronization across hosts (within 10 /ts, compared to between 100 μs to 2 ms for NTP), and 3) incremental data processing techniques which facilitate analyzing traces containing billions of trace points on desktop systems. We have successfully applied these techniques to two distributed systems, a cooperative caching system and a distributed storage system, and from our experience, we believe our techniques are applicable to other distributed systems.
众所周知,分布式系统难以实现和调试。了解分布式系统行为的一个重要工具是跟踪。不幸的是,现代分布式系统的有效跟踪面临着几个挑战。首先,分布式系统中许多有趣的行为很少发生,或者在完全生产规模下才会发生。因此,我们需要最小化开销的跟踪机制,以便允许对生产实例进行始终在线的跟踪。其次,对于高速系统,消息可以在比传统时间同步技术(如网络时间协议(NTP))的误差更短的时间内传递,因此需要具有更高精度的时间调整技术。第三,今天的分布式系统可能在系统范围内每秒生成数百万个事件,从而导致由数十亿个事件组成的跟踪。如此大的跟踪可能会压倒现有的跟踪分析工具。这些挑战使得有效追踪变得困难。我们提出了解决这三个挑战的技术。我们的贡献包括1)低开销跟踪机制,允许在不影响其行为或性能的情况下跟踪大型系统(0.14 μs/event), 2)用于在主机之间产生高度精确时间同步的事后技术(在10 /ts内,而NTP在100 μs到2 ms之间),以及3)增量数据处理技术,有助于分析桌面系统上包含数十亿跟踪点的跟踪。我们已经成功地将这些技术应用于两个分布式系统,一个协作缓存系统和一个分布式存储系统,从我们的经验来看,我们相信我们的技术也适用于其他分布式系统。
{"title":"Efficient tracing and performance analysis for large distributed systems","authors":"Eric Anderson, Christopher Hoover, Xiaozhou Li, Joseph A. Tucek","doi":"10.1109/MASCOT.2009.5366158","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366158","url":null,"abstract":"Distributed systems are notoriously difficult to implement and debug. One important tool for understanding the behavior of distributed systems is tracing. Unfortunately, effective tracing for modern distributed systems faces several challenges. First, many interesting behaviors in distributed systems only occur rarely, or at full production scale. Hence we need tracing mechanisms which impose minimal overhead, in order to allow always-on tracing of production instances. Second, for high-speed systems, messages can be delivered in significantly less time than the error of traditional time synchronization techniques such as network time protocol (NTP), necessitating time adjustment techniques with much higher precision. Third, distributed systems today may generate millions of events per second systemwide, resulting in traces consisting of billions of events. Such large traces can overwhelm existing trace analysis tools. These challenges make effective tracing difficult. We present techniques that address these three challenges. Our contributions include 1) a low-overhead tracing mechanism, which allows tracing of large systems without impacting their behavior or performance (0.14 μs/event), 2) a post hoc technique for producing highly accurate time synchronization across hosts (within 10 /ts, compared to between 100 μs to 2 ms for NTP), and 3) incremental data processing techniques which facilitate analyzing traces containing billions of trace points on desktop systems. We have successfully applied these techniques to two distributed systems, a cooperative caching system and a distributed storage system, and from our experience, we believe our techniques are applicable to other distributed systems.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
EXtensible animator for mobile simulations: EXAMS 移动模拟的可扩展动画器:考试
Livathinos S. Nikolaos
One of the most widely used simulation environments for mobile wireless networks is the Network Simulator 2 (NS-2). However NS-2 stores its outcome in a text file, so there is a need for a visualization tool to animate the simulation of the wireless network. The purpose of this tool is to help the researcher examine in detail how the wireless protocol works both on a network and a node basis. It is clear that much of this information is protocol dependent and cannot be depicted properly by a general purpose animation process. Existing animation tools do not provide this level of information nor permit the specific protocol to control the animation at all. EXAMS is an NS-2 visualization tool for mobile simulations which makes possible the portrayal of NS-2's internal information like transmission properties and node's data structures. This is mainly possible due to EXAMS extensible architecture which separates the animation process into a general and a protocol specific part. The latter can be developed independently by the protocol designer and loaded on demand. These and other useful characteristics of the EXAMS tool can be an invaluable help for a researcher in order to investigate and debug a mobile networking protocol.
网络模拟器2 (Network Simulator 2, NS-2)是应用最广泛的移动无线网络仿真环境之一。然而,NS-2将其结果存储在文本文件中,因此需要一个可视化工具来动画化无线网络的模拟。该工具的目的是帮助研究人员详细检查无线协议如何在网络和节点基础上工作。很明显,这些信息中的大部分都依赖于协议,不能通过通用动画过程来适当地描述。现有的动画工具不提供这种级别的信息,也不允许特定的协议来控制动画。EXAMS是一个用于移动模拟的NS-2可视化工具,它可以描绘NS-2的内部信息,如传输属性和节点的数据结构。这主要是由于考试的可扩展架构将动画过程分为一般部分和特定协议部分。后者可以由协议设计者独立开发并按需加载。考试工具的这些和其他有用的特性对于研究人员调查和调试移动网络协议是无价的帮助。
{"title":"EXtensible animator for mobile simulations: EXAMS","authors":"Livathinos S. Nikolaos","doi":"10.1109/MASCOT.2009.5366277","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5366277","url":null,"abstract":"One of the most widely used simulation environments for mobile wireless networks is the Network Simulator 2 (NS-2). However NS-2 stores its outcome in a text file, so there is a need for a visualization tool to animate the simulation of the wireless network. The purpose of this tool is to help the researcher examine in detail how the wireless protocol works both on a network and a node basis. It is clear that much of this information is protocol dependent and cannot be depicted properly by a general purpose animation process. Existing animation tools do not provide this level of information nor permit the specific protocol to control the animation at all. EXAMS is an NS-2 visualization tool for mobile simulations which makes possible the portrayal of NS-2's internal information like transmission properties and node's data structures. This is mainly possible due to EXAMS extensible architecture which separates the animation process into a general and a protocol specific part. The latter can be developed independently by the protocol designer and loaded on demand. These and other useful characteristics of the EXAMS tool can be an invaluable help for a researcher in order to investigate and debug a mobile networking protocol.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying ordinal time series methods to grid workload traces 将有序时间序列方法应用于网格工作负载跟踪
Stefan Podlipnig
Ordinal time series analysis is a simple approach to the investigation of experimental data. The basic idea is to consider the order relations between the values of a time series and not the values themselves. This results in fast and robust algorithms that extract the basic intrinsic structure of the given data series. This paper gives a short overview of this approach and describes the application of simple ordinal time series methods like rank autocorrelation, local rank autocorrelation and permutation entropy to workload traces from large grid computing systems. We show how these methods can be used to extract important correlation information from experimental traces and how these methods outperform traditional methods.
序时间序列分析是研究实验数据的一种简便方法。基本思想是考虑时间序列的值之间的顺序关系,而不是值本身。这就产生了快速而健壮的算法,可以提取给定数据序列的基本内在结构。本文简要介绍了这种方法,并描述了简单的有序时间序列方法,如秩自相关、局部秩自相关和排列熵在大型网格计算系统工作负载跟踪中的应用。我们展示了如何使用这些方法从实验轨迹中提取重要的相关信息,以及这些方法如何优于传统方法。
{"title":"Applying ordinal time series methods to grid workload traces","authors":"Stefan Podlipnig","doi":"10.1109/MASCOT.2009.5367039","DOIUrl":"https://doi.org/10.1109/MASCOT.2009.5367039","url":null,"abstract":"Ordinal time series analysis is a simple approach to the investigation of experimental data. The basic idea is to consider the order relations between the values of a time series and not the values themselves. This results in fast and robust algorithms that extract the basic intrinsic structure of the given data series. This paper gives a short overview of this approach and describes the application of simple ordinal time series methods like rank autocorrelation, local rank autocorrelation and permutation entropy to workload traces from large grid computing systems. We show how these methods can be used to extract important correlation information from experimental traces and how these methods outperform traditional methods.","PeriodicalId":275737,"journal":{"name":"2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125891112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1