By Topic

2006 International Workshop on Networking, Architecture, and Storages (IWNAS'06)

Date 1-3 Aug. 2006

Filter Results

Displaying Results 1 - 25 of 45
  • 2006 International Workshop on Networking, Architecture, and Storage

    Publication Year: 2006
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • 2006 International Workshop on Networking, Architecture, and Storages - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • 2006 International Workshop on Networking, Architecture, and Storages - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • 2006 International Workshop on Networking, Architecture, and Storages - Table of contents

    Publication Year: 2006, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Organizers

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Design and Performance Evaluation of IPoIB Gateway

    Publication Year: 2006, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    InfiniBand provides a high-bandwidth, low-latency network, and has been widely adopted in modern storage and computing systems. However, Ethernet fabric is still widely used which has different characteristics in protocol and performance. Therefore, an Ethernet-to-InfiniBand gateway must be built to implement protocol conversion and bandwidth aggregation. This paper introduces a software implement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility Control with Local Views of Neighborhood in Mobile Networks

    Publication Year: 2006, Page(s):9 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. In the work of Goldenberg et al. (2004), it is proved that the optimal positions of the relay nodes along a single active flow must lie entirely on the line between the source and destination with each node spaced evenly along such a line. Based on this, we propose two distributed sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TEA: transmission error approximation for distance estimation between two Zigbee devices

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    This paper proposes a simple and cost-effective method named transmission error approximation (TEA) for estimating the distance between two Zigbee devices. The idea is to measure and analyze statistically packet loss rates for approximate distance estimation. We have implemented an experimental prototype for the TEA using Zigbee protocol. The prototype is built on FreeScale's MCF5208 evaluation bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-similarity in data traffic for object-based storage system

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    With the development of network storage technology, object-based storage (OBS), as the next wave of storage technology and devices, provides the advantages of both file storage and block storage. However, the performance of such network storage hinges on knowing the I/O traffic patterns and optimizing the network for such patterns. Recently the notion of self-similarity has been applied to I/O wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed object tracing system

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (82 KB) | HTML iconHTML

    Trace-based analysis has always been used to guide and motivate more effective hardware and software design. Existing traces available, however, are unsuitable for studying object-based storage system, a very active area of current storage research, because they are collected from the traditional file systems and don't contain information about object. Thus, a kind of distributed object tracing sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queue Network Modeling Approach to Analysis of the Optimal Stripe Unit Size for Disk Arrays under Synchronous I/O Workloads

    Publication Year: 2006, Page(s):36 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    Storage systems represent a growing market. In recent years there has been an explosion of applications that use enormous amounts of data. Disk arrays are today's standard solution for enterprise class storage systems. One of the most crucial parameters in designing a disk array is the size of the striping unit. The paper presents and validates a performance model for RAID level 5. The model is cr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time scheduling algorithm for embedded systems with various resource requirements

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (82 KB) | HTML iconHTML

    The scheduling algorithm is one of the most important portions of embedded operating systems especially for real-time embedded operating systems. The performance of scheduling algorithm influences the performance of the whole system. Real-time embedded operating system needs better response time for real-time process; it is more rigid on response time for hard real-time embedded operating system. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P traffic identification by TCP flow analysis

    Publication Year: 2006
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (63 KB) | HTML iconHTML

    In this paper, we first propose some new and universal features of all kinds of P2P traffic derived from the packet header information of transfer/network layer and present a novel approach for gathering P2P traffic: just from a single host perspective, namely capturing packets from the NIC (network interface card) of one host View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytical study of FairOM: a fair overlay multicast protocol for Internet-scale distributed systems

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    Fairness emerges as an important research issue in overlay multicast because spreading the multicasting load evenly among participants can eliminate potential traffic hot spots, thus improving the system's quality of service (QoS). In this paper, we analyze FairOM and compare it with non-FairOM approaches from two aspects: tree height and number of sessions that can be supported, which measure Fai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new dynamic multicast routing model and its immune optimization algorithm in integrated network

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB) | HTML iconHTML

    A new dynamic multicast routing model was proposed in this paper. Specifically, we firstly considered two possible changes in integrated network: node movements and the change of link delay. Next, a mechanism called local rearrangement is used to handle changes in integrated networks. We designed an artificial immune algorithm based on clone process for optimizing the multicast sub-tree within the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A loop optimization technique for speculative chip multiprocessors

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB) | HTML iconHTML

    According to the characteristics of chip multiprocessors, we propose a loop optimization technique to improve the system performance by reducing the occurrences of dependence violations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Microkernel of Embedded Operating System in SRAM

    Publication Year: 2006, Page(s):57 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB) | HTML iconHTML

    In past time, almost all of embedded operating system are based on SDRAM. With progress of embedded system hardware, embedded system can provide more substrative supports for embedded operating systems. In this paper we present an operating system microkernel for embedded system which can reside in the SRAM on chip View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of integrating military storage resources based on storage virtualization

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    In information warfare (IW), information storage is one of important processes to obtaining information dominance. Existing military storage systems are mostly independent, so they can't provide reliable and effective storage service for users. How to integrate existing military storage systems into a network storage system which have stronger compatibility, higher usability and better cooperation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparisons of three Kalman filter tracking algorithms in sensor network

    Publication Year: 2006
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    This paper compares extended Kalman filters with the P, PV and PVA dynamics models for object tracking in wireless network. Experiments shows that PVA achieves the best and P performs the worst in most cases. In addition, increasing the number of pivots can slightly improve the tracking accuracy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain-Based Storage Management Framework for the WAN

    Publication Year: 2006, Page(s):63 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (45 KB) | HTML iconHTML

    In this paper, we present the design of a domain-based storage management framework for the wide area network (WAN) toward catering for the large-scale and heterogeneous storage environment. In our design, we include the framework architecture, the registration mechanism based on the use of session initiation protocol (SIP), and the storage management initiative specifications (SMI-S) based storag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart file system: embedded file system based on NAND-flash

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB) | HTML iconHTML

    With the prevalence of embedded system, especially mobile system, flash-memory storage which has high capacity and low energy consumption has become the primary external storage for embedded systems. Some file system based on flash memory have been designed and implemented such as JFFS2 and YAFFS2. But they all have some defects: long boot time, high memory consumption and so on. In this paper, Sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic selection of redundancy scheme in cluster-based storage systems

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB) | HTML iconHTML

    Self-management is an attractive work for storage systems. In this paper, we introduce some methods of self-tuning RAID into cluster-based storage system. An iterative approach is used to dynamically select an optimal redundancy scheme for a workload and move data to corresponding storage devices View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical mesh architecture: toward practical applications

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (51 KB) | HTML iconHTML

    Wireless mesh network is considered to be one of the candidates for solving the last mile problem in high speed network services. Traditional mesh network faces the challenge of scalability due to the features of self-organization and multi-hop connection. In this short paper, we propose a hierarchical architecture for large size mesh networks. A mesh network is divided into small networks, which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.