首页 > 最新文献

MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems最新文献

英文 中文
Performance study of a multipath routing method for wireless mobile ad hoc networks 无线移动自组网多路径路由方法的性能研究
Kui Wu, J. Harms
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile computers forming a temporary network without any existing wire line infrastructure. Due to the dynamic nature of the network topology and the resource constraints, routing in MANETs is a challenging task. Multipath routing can increase end-to-end throughput and provide load balancing in wired networks. However, its advantage is not obvious in MANETs because the traffic along the multiple paths may interfere with each other . In addition, without accurate knowledge of topology, finding multiple disjoint paths is difficult. We propose an on-demand method to efficiently search for multiple node-disjoint paths and present the criteria for selecting the multiple paths. We also perform a simulation study on the proposed method. The purpose of this paper is to present the advantages as well as some difficulties of deploying multipath routing in MANETs.
移动自组织网络(MANET)是一组无线移动计算机组成的临时网络,没有任何现有的有线基础设施。由于网络拓扑结构的动态性和资源的有限性,在manet中路由是一项具有挑战性的任务。多路径路由可以增加端到端吞吐量,并在有线网络中提供负载平衡。然而,由于多路径通信可能会相互干扰,其优势在manet中并不明显。此外,如果没有准确的拓扑知识,很难找到多条不相交的路径。提出了一种有效搜索多个节点不相交路径的按需方法,并给出了选择多条路径的准则。我们还对所提出的方法进行了仿真研究。本文的目的是介绍在manet中部署多路径路由的优点和一些困难。
{"title":"Performance study of a multipath routing method for wireless mobile ad hoc networks","authors":"Kui Wu, J. Harms","doi":"10.1109/MASCOT.2001.948858","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948858","url":null,"abstract":"A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile computers forming a temporary network without any existing wire line infrastructure. Due to the dynamic nature of the network topology and the resource constraints, routing in MANETs is a challenging task. Multipath routing can increase end-to-end throughput and provide load balancing in wired networks. However, its advantage is not obvious in MANETs because the traffic along the multiple paths may interfere with each other . In addition, without accurate knowledge of topology, finding multiple disjoint paths is difficult. We propose an on-demand method to efficiently search for multiple node-disjoint paths and present the criteria for selecting the multiple paths. We also perform a simulation study on the proposed method. The purpose of this paper is to present the advantages as well as some difficulties of deploying multipath routing in MANETs.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115395684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
HTTP simulator validation using real measurements: a case study 使用真实测量的HTTP模拟器验证:一个案例研究
Brian D. Davison
Simulation is a common technique used by Web researchers and provides many benefits. Verification and validation of a simulator are essential if the results of those simulations are to be believed. Unfortunately, even limited validation of simulators has been uncommon in the Web caching community. In contrast, this paper argues for the validity of a new network and caching simulator by extensively comparing simulated results to both small- and large-scale realworld HTTP traffic. In addition, we describe some of the preparation needed to use a large, well-known trace of Web usage.
仿真是Web研究人员常用的一种技术,它提供了许多好处。如果要相信这些模拟的结果,对模拟器的验证和确认是必不可少的。不幸的是,即使是有限的模拟器验证在Web缓存社区中也很少见。相比之下,本文通过将模拟结果与小型和大规模真实世界的HTTP流量进行广泛比较,论证了新的网络和缓存模拟器的有效性。此外,我们还描述了使用大型的、众所周知的Web使用跟踪所需的一些准备工作。
{"title":"HTTP simulator validation using real measurements: a case study","authors":"Brian D. Davison","doi":"10.1109/MASCOT.2001.948891","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948891","url":null,"abstract":"Simulation is a common technique used by Web researchers and provides many benefits. Verification and validation of a simulator are essential if the results of those simulations are to be believed. Unfortunately, even limited validation of simulators has been uncommon in the Web caching community. In contrast, this paper argues for the validity of a new network and caching simulator by extensively comparing simulated results to both small- and large-scale realworld HTTP traffic. In addition, we describe some of the preparation needed to use a large, well-known trace of Web usage.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
How does TCP generate pseudo-self-similarity? TCP是如何产生伪自相似性的?
Liang Guo, M. Crovella, I. Matta
Long-range dependence has been observed in many recent Internet traffic measurements. In addition, some recent studies have shown that under certain network conditions, TCP itself can produce traffic that exhibits dependence over limited timescales, even in the absence of higher-level variability. In this paper, we use a simple Markovian model to argue that when the loss rate is relatively high, TCP's adaptive congestion control mechanism indeed generates traffic with OFF periods exhibiting power-law shape over several timescales and thus introduces pseudo-long-range dependence into the overall traffic. Moreover, we observe that more variable initial retransmission timeout values for different packets introduces more variable packet inter-arrival times, which increases the burstiness of the overall traffic. We can thus explain why a single TCP connection can produce a time-series that can be misidentified as self-similar using standard tests.
在最近的许多互联网流量测量中都观察到远程依赖性。此外,最近的一些研究表明,在某些网络条件下,TCP本身可以产生在有限时间尺度上表现出依赖性的流量,即使在没有更高级别可变性的情况下也是如此。在本文中,我们使用一个简单的马尔可夫模型来证明,当损失率相对较高时,TCP的自适应拥塞控制机制确实产生了在几个时间尺度上具有幂律形状的关闭周期的流量,从而在总体流量中引入了伪远程依赖。此外,我们观察到,不同数据包的初始重传超时值变化越大,会引入更多的数据包间到达时间变化,从而增加整体流量的突发性。因此,我们可以解释为什么单个TCP连接可以产生一个时间序列,可以使用标准测试错误地识别为自相似。
{"title":"How does TCP generate pseudo-self-similarity?","authors":"Liang Guo, M. Crovella, I. Matta","doi":"10.1109/MASCOT.2001.948871","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948871","url":null,"abstract":"Long-range dependence has been observed in many recent Internet traffic measurements. In addition, some recent studies have shown that under certain network conditions, TCP itself can produce traffic that exhibits dependence over limited timescales, even in the absence of higher-level variability. In this paper, we use a simple Markovian model to argue that when the loss rate is relatively high, TCP's adaptive congestion control mechanism indeed generates traffic with OFF periods exhibiting power-law shape over several timescales and thus introduces pseudo-long-range dependence into the overall traffic. Moreover, we observe that more variable initial retransmission timeout values for different packets introduces more variable packet inter-arrival times, which increases the burstiness of the overall traffic. We can thus explain why a single TCP connection can produce a time-series that can be misidentified as self-similar using standard tests.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123298344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A bit-parallel search algorithm for allocating free space 一种分配空闲空间的位并行搜索算法
R. Burns, W. Hineman
File systems that allocate data contiguously often use bitmaps to represent and manage free space. Increases in the size of storage to be managed creates a need for efficient algorithms for searching these bitmaps. We present an algorithm that exploits bit-parallelism, examining all bits within a processor word at the same time, to improve search performance. Measurements of our implementation show that these techniques lead to a 14 times increase in the rate at which bitmap pages can be searched on a 64-bit processor. Trace-driven experiments indicate that overall allocation performance increases by a factor of 3 to 6 on a 32-bit processor. As processors mature, registers become wider and the degree of bit-level parallelism increases, which makes the performance improvements of our search algorithm more substantial.
连续分配数据的文件系统通常使用位图来表示和管理空闲空间。要管理的存储空间的增加需要高效的算法来搜索这些位图。我们提出了一种利用位并行性的算法,同时检查处理器字中的所有位,以提高搜索性能。对我们实现的测量表明,这些技术使位图页面在64位处理器上的搜索速度提高了14倍。跟踪驱动的实验表明,在32位处理器上,总体分配性能提高了3到6倍。随着处理器的成熟,寄存器变得更宽,位级并行度增加,这使得我们的搜索算法的性能改进更加显著。
{"title":"A bit-parallel search algorithm for allocating free space","authors":"R. Burns, W. Hineman","doi":"10.1109/MASCOT.2001.948881","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948881","url":null,"abstract":"File systems that allocate data contiguously often use bitmaps to represent and manage free space. Increases in the size of storage to be managed creates a need for efficient algorithms for searching these bitmaps. We present an algorithm that exploits bit-parallelism, examining all bits within a processor word at the same time, to improve search performance. Measurements of our implementation show that these techniques lead to a 14 times increase in the rate at which bitmap pages can be searched on a 64-bit processor. Trace-driven experiments indicate that overall allocation performance increases by a factor of 3 to 6 on a 32-bit processor. As processors mature, registers become wider and the degree of bit-level parallelism increases, which makes the performance improvements of our search algorithm more substantial.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Minimizing routing state for light-weight network simulation 最小化轻量级网络模拟的路由状态
Polly Huang, J. Heidemann
We introduce a routing mechanism, referred to as algorithmic routing. It is a viable routing alternative for network simulations with minimal space complexity-O(N). In theory and for simulations the size of the Internet, algorithmic routing has the potential of reducing memory requirements by several orders of magnitude. In practice and through ns-2 simulations on random topologies, we find memory consumption of algorithmic routing exhibits a similar scaling property. However, routes computed by algorithmic routing are not all the shortest. Although we find the relative difference is below 10% for more than 80% of the routes, we are cautious about its applicability to general network simulations. With further discussion on the impacts of the distortion, we derive a set of guidelines and recommend users to apply this technique only when suitable.
我们引入一种路由机制,称为算法路由。对于网络模拟来说,它是一种可行的路由选择,具有最小的空间复杂度(o (N))。在理论上和模拟互联网的规模时,算法路由有可能将内存需求降低几个数量级。在实践中,通过随机拓扑的ns-2模拟,我们发现算法路由的内存消耗具有类似的缩放特性。然而,算法路由计算的路由并不都是最短的。虽然我们发现超过80%的路由的相对差异在10%以下,但我们对其在一般网络模拟中的适用性持谨慎态度。随着对失真影响的进一步讨论,我们得出了一套指导方针,并建议用户仅在合适的情况下应用该技术。
{"title":"Minimizing routing state for light-weight network simulation","authors":"Polly Huang, J. Heidemann","doi":"10.1109/MASCOT.2001.948859","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948859","url":null,"abstract":"We introduce a routing mechanism, referred to as algorithmic routing. It is a viable routing alternative for network simulations with minimal space complexity-O(N). In theory and for simulations the size of the Internet, algorithmic routing has the potential of reducing memory requirements by several orders of magnitude. In practice and through ns-2 simulations on random topologies, we find memory consumption of algorithmic routing exhibits a similar scaling property. However, routes computed by algorithmic routing are not all the shortest. Although we find the relative difference is below 10% for more than 80% of the routes, we are cautious about its applicability to general network simulations. With further discussion on the impacts of the distortion, we derive a set of guidelines and recommend users to apply this technique only when suitable.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Online test system applied in routing protocol test 在线测试系统应用于路由协议测试
Yixin Zhao, Xia Yin, B. Han, Jianping Wu
Based on the analysis and the perception of routing protocols, this paper presents an online test method applicable for the routing protocol test. This method tests the protocol implementation through online observation. It can be performed in the production field without interfering with the network and possesses quite a lot of other beneficial features. With the key techniques worked out, the target and the framework of an online test system (OLTS) are put forward. The OLTS exploits the state synchronization algorithm to test the protocol state machine, and tests the exchange and the manipulation of the routing information through topology analysis and internal process simulation. OLTS provides an intuitionistic and friendly graphical user interface and good flexibility. The prototype of the OLTS has been implemented and the test activity about BGP, OSPF and RIP has been performed.
在对路由协议进行分析和认识的基础上,提出了一种适用于路由协议测试的在线测试方法。该方法通过在线观察来测试协议的实现。它可以在不干扰网络的情况下在生产现场进行,并具有许多其他有益的特点。在确定了关键技术的基础上,提出了在线测试系统的目标和框架。OLTS利用状态同步算法对协议状态机进行测试,并通过拓扑分析和内部过程仿真测试路由信息的交换和操作。OLTS提供了直观友好的图形用户界面和良好的灵活性。实现了OLTS的原型,并进行了BGP、OSPF和RIP的测试活动。
{"title":"Online test system applied in routing protocol test","authors":"Yixin Zhao, Xia Yin, B. Han, Jianping Wu","doi":"10.1109/MASCOT.2001.948884","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948884","url":null,"abstract":"Based on the analysis and the perception of routing protocols, this paper presents an online test method applicable for the routing protocol test. This method tests the protocol implementation through online observation. It can be performed in the production field without interfering with the network and possesses quite a lot of other beneficial features. With the key techniques worked out, the target and the framework of an online test system (OLTS) are put forward. The OLTS exploits the state synchronization algorithm to test the protocol state machine, and tests the exchange and the manipulation of the routing information through topology analysis and internal process simulation. OLTS provides an intuitionistic and friendly graphical user interface and good flexibility. The prototype of the OLTS has been implemented and the test activity about BGP, OSPF and RIP has been performed.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128095382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Generalized processor sharing with long-range dependent traffic input 具有远程依赖流量输入的通用处理器共享
Xiang Yu, I. Thng, Yuming Jiang
We develop an upper bound on the individual session queue length of long range dependent (LRD) traffic under the generalized processor sharing (GPS) scheduling discipline. This work is based on the analysis of the arrival process of LRD traffic, which is demonstrated to be a Weibull bounded burstiness (WBB) process. Decomposing the GPS system into isolated queues and servers, we are able to obtain the bound on the individual session queue length from their arrival processes. Our work proves that, in different scenarios, different parameters of the upper bound of an individual session queue, such as the index, the asymptotic constant and the decay rate can be affected by other flows existing in the GPS system. Under certain conditions, by carefully choosing the weight parameters, an individual session with LRD traffic input can be well isolated from other flows in a GPS system.
在广义处理器共享调度原则下,给出了远程依赖(LRD)业务的单个会话队列长度的上界。本文在分析LRD交通到达过程的基础上,证明了该过程是一个威布尔有界突发(WBB)过程。将GPS系统分解为孤立的队列和服务器,我们能够从它们的到达过程中获得单个会话队列长度的界限。我们的工作证明,在不同的情况下,单个会话队列上界的不同参数,如索引、渐近常数和衰减率,可以受到GPS系统中存在的其他流的影响。在一定条件下,通过仔细选择权重参数,可以很好地将具有LRD流量输入的单个会话与GPS系统中的其他流隔离开来。
{"title":"Generalized processor sharing with long-range dependent traffic input","authors":"Xiang Yu, I. Thng, Yuming Jiang","doi":"10.1109/MASCOT.2001.948872","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948872","url":null,"abstract":"We develop an upper bound on the individual session queue length of long range dependent (LRD) traffic under the generalized processor sharing (GPS) scheduling discipline. This work is based on the analysis of the arrival process of LRD traffic, which is demonstrated to be a Weibull bounded burstiness (WBB) process. Decomposing the GPS system into isolated queues and servers, we are able to obtain the bound on the individual session queue length from their arrival processes. Our work proves that, in different scenarios, different parameters of the upper bound of an individual session queue, such as the index, the asymptotic constant and the decay rate can be affected by other flows existing in the GPS system. Under certain conditions, by carefully choosing the weight parameters, an individual session with LRD traffic input can be well isolated from other flows in a GPS system.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design-why we don't do it right 设计——为什么我们做得不对
J. Hines
Summary form only given, as follows. The design process is discussed as it is done today and the author shows through examples why we do not do it correctly. The place for simulation in the design process is emphasized and how it is not applied very well, consistently, or enough throughout the design process is highlighted.
仅给出摘要形式,如下。设计过程被讨论为今天所做的,作者通过例子说明为什么我们不正确地做它。强调了模拟在设计过程中的地位,并强调了它在整个设计过程中没有得到很好、一致或足够的应用。
{"title":"Design-why we don't do it right","authors":"J. Hines","doi":"10.1109/MASCOT.2001.948866","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948866","url":null,"abstract":"Summary form only given, as follows. The design process is discussed as it is done today and the author shows through examples why we do not do it correctly. The place for simulation in the design process is emphasized and how it is not applied very well, consistently, or enough throughout the design process is highlighted.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tuning of the Checkpointing and Communication Library for optimistic simulation on Myrinet based NOWs 基于Myrinet的NOWs乐观仿真中检查点和通信库的调优
F. Quaglia, Andrea Santoro, B. Ciciani
Recently a Checkpointing and Communication Library (CCL) for optimistic simulation on Myrinet based network of workstations (NOWs) has been presented. CCL offloads checkpoint operations from the CPU by charging them to a programmable DMA engine on the Myrinet network card. CCL includes also functionalities for freezing the simulation application on demand, which can be used for data consistency maintenance (for example when a state buffer needs to be accessed for further modifications while a DMA based checkpoint operation involving it is still in progress). Programming the DMA to perform a checkpoint operation by transferring large data blocks in a single burst allows the latency of any checkpoint operation to be kept low. This reduces the probability for application freezing to really occur On the other hand, transferring large data blocks in a single burst might cause negative interference on communication since that DMA (and other circuitry) cannot be used for communication functionalities until the currently executed data transfer is not yet completed. In this paper we present a detailed identification of the effects of the burst length, from which we outline a set of relevant phenomena to take into account in order to determine a compile time suited value for the burst length itself. We also report measures quantifying these phenomena for the case of a PC cluster. Actually, the data indicate that communication functionalities do not suffer from the use of non-minimal burst lengths for checkpoint operations, thus pointing out how, if well tuned, CCL provides highly effective, CPU off-loaded, checkpointing functionalities.
最近提出了一种用于基于Myrinet的工作站网络(NOWs)乐观仿真的检查点和通信库(CCL)。CCL通过向Myrinet网卡上的可编程DMA引擎收费,从CPU卸载检查点操作。CCL还包括按需冻结模拟应用程序的功能,可用于数据一致性维护(例如,当需要访问状态缓冲区以进行进一步修改时,涉及它的基于DMA的检查点操作仍在进行中)。通过在单个突发中传输大数据块对DMA进行编程以执行检查点操作,可以使任何检查点操作的延迟保持在较低的水平。另一方面,在单个突发中传输大数据块可能会对通信造成负面干扰,因为DMA(和其他电路)不能用于通信功能,直到当前执行的数据传输尚未完成。在本文中,我们对突发长度的影响进行了详细的鉴定,从中我们概述了一组需要考虑的相关现象,以便为突发长度本身确定适合编译时间的值。我们还报告了在PC集群的情况下量化这些现象的措施。实际上,数据表明,通信功能不会因为使用非最小突发长度进行检查点操作而受到影响,从而指出,如果调整得当,CCL如何提供高效的、CPU卸载的检查点功能。
{"title":"Tuning of the Checkpointing and Communication Library for optimistic simulation on Myrinet based NOWs","authors":"F. Quaglia, Andrea Santoro, B. Ciciani","doi":"10.1109/MASCOT.2001.948874","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948874","url":null,"abstract":"Recently a Checkpointing and Communication Library (CCL) for optimistic simulation on Myrinet based network of workstations (NOWs) has been presented. CCL offloads checkpoint operations from the CPU by charging them to a programmable DMA engine on the Myrinet network card. CCL includes also functionalities for freezing the simulation application on demand, which can be used for data consistency maintenance (for example when a state buffer needs to be accessed for further modifications while a DMA based checkpoint operation involving it is still in progress). Programming the DMA to perform a checkpoint operation by transferring large data blocks in a single burst allows the latency of any checkpoint operation to be kept low. This reduces the probability for application freezing to really occur On the other hand, transferring large data blocks in a single burst might cause negative interference on communication since that DMA (and other circuitry) cannot be used for communication functionalities until the currently executed data transfer is not yet completed. In this paper we present a detailed identification of the effects of the burst length, from which we outline a set of relevant phenomena to take into account in order to determine a compile time suited value for the burst length itself. We also report measures quantifying these phenomena for the case of a PC cluster. Actually, the data indicate that communication functionalities do not suffer from the use of non-minimal burst lengths for checkpoint operations, thus pointing out how, if well tuned, CCL provides highly effective, CPU off-loaded, checkpointing functionalities.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124753226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
BRITE: an approach to universal topology generation BRITE:一种通用拓扑生成方法
A. Medina, Anukool Lakhina, I. Matta, J. Byers
Effective engineering of the Internet is predicated upon a detailed understanding of issues such as the large-scale structure of its underlying physical topology, the manner in which it evolves over time, and the way in which its constituent components contribute to its overall function. Unfortunately, developing a deep understanding of these issues has proven to be a challenging task, since it in turn involves solving difficult problems such as mapping the actual topology, characterizing it, and developing models that capture its emergent behavior. Consequently, even though there are a number of topology models, it is an open question as to how representative the generated topologies they generate are of the actual Internet. Our goal is to produce a topology generation framework which improves the state of the art and is based on the design principles of representativeness, inclusiveness, and interoperability. Representativeness leads to synthetic topologies that accurately reflect many aspects of the actual Internet topology (e.g. hierarchical structure, node degree distribution, etc.). Inclusiveness combines the strengths of as many generation models as possible in a single generation tool. Interoperability provides interfaces to widely-used simulation applications such as ns and SSF and visualization tools like otter. We call such a tool a universal topology generator.
有效的Internet工程建立在对诸如其底层物理拓扑的大规模结构、其随时间演变的方式以及其组成组件对其整体功能的贡献方式等问题的详细理解的基础之上。不幸的是,开发对这些问题的深入理解已被证明是一项具有挑战性的任务,因为它反过来涉及到解决困难的问题,例如映射实际拓扑、描述其特征以及开发捕获其紧急行为的模型。因此,尽管有许多拓扑模型,但是它们生成的拓扑在多大程度上代表了实际的Internet,这是一个悬而未决的问题。我们的目标是生成一个拓扑生成框架,它基于代表性、包容性和互操作性的设计原则,提高了当前的技术水平。代表性导致合成拓扑准确反映实际互联网拓扑的许多方面(例如,层次结构,节点度分布等)。包容性在单个生成工具中结合了尽可能多的生成模型的优势。互操作性为广泛使用的仿真应用程序(如ns和SSF)以及可视化工具(如otter)提供了接口。我们称这种工具为通用拓扑生成器。
{"title":"BRITE: an approach to universal topology generation","authors":"A. Medina, Anukool Lakhina, I. Matta, J. Byers","doi":"10.1109/MASCOT.2001.948886","DOIUrl":"https://doi.org/10.1109/MASCOT.2001.948886","url":null,"abstract":"Effective engineering of the Internet is predicated upon a detailed understanding of issues such as the large-scale structure of its underlying physical topology, the manner in which it evolves over time, and the way in which its constituent components contribute to its overall function. Unfortunately, developing a deep understanding of these issues has proven to be a challenging task, since it in turn involves solving difficult problems such as mapping the actual topology, characterizing it, and developing models that capture its emergent behavior. Consequently, even though there are a number of topology models, it is an open question as to how representative the generated topologies they generate are of the actual Internet. Our goal is to produce a topology generation framework which improves the state of the art and is based on the design principles of representativeness, inclusiveness, and interoperability. Representativeness leads to synthetic topologies that accurately reflect many aspects of the actual Internet topology (e.g. hierarchical structure, node degree distribution, etc.). Inclusiveness combines the strengths of as many generation models as possible in a single generation tool. Interoperability provides interfaces to widely-used simulation applications such as ns and SSF and visualization tools like otter. We call such a tool a universal topology generator.","PeriodicalId":375127,"journal":{"name":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1347
期刊
MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1