Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 1995. MASCOTS '95., Proceedings of the Third International Workshop on

18-20 Jan. 1995

Filter Results

Displaying Results 1 - 25 of 76
  • Multiple times in systems: a perspective

    Publication Year: 1995
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (39 KB)

    Summary form only given. Time plays a fundamental role in real-time computer controlled systems, in which the system dynamics depend on the temporal behavior of controlling tasks. The temporal behavior of the tasks, in turn, is determined through the system level policies which are designed to execute the tasks in a timely manner by preserving the time constraints on their execution. We show that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MASCOTS '95. Proceedings of the Third International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • Discrete event simulation modelling of concurrent access in ATM-based computer networks

    Publication Year: 1995, Page(s):365 - 369
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    The problem of sharing resources in telecommunications networks has benefited from a rich theoretical development in the area of statistical multiplexing. Integrating data and other very bursty traffic on these networks changes the way of managing the concurrent access to network resources. Discrete event simulation is used in the paper for the quantitative analysis of the trade-off involved in gi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the performance of a distributed simulator

    Publication Year: 1995, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    In a global project devoted to the realization of a distributed network simulator, we have investigated several ways to optimize the performance of our tool. To allow the comparison of different policies of management of the rollback process implied by the distribution of the simulation, we have developed a specific simulation tool (a simulator of the simulator). We analyse here the structure of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple class G-networks with jumps back to zero

    Publication Year: 1995, Page(s):28 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    We consider multiple class G-networks of processor sharing queues with negative customers which destroy all the customers in a queue. We prove that these networks have a product form solution for steady-state distribution. These networks may have some applications in reliability or performability as the negative customers may clearly model breakdown of computer or communication systems. We also sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate performance models of real-time software systems

    Publication Year: 1995, Page(s):163 - 167
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    Design of real-time systems needs to take into account their performance behaviour before their implementation. This goal can be attained by means of queueing network modelling. To process this kind of models normally simulation is used with its inherent costs of debugging and running times. This paper presents the analysis and comparison of several kinds of performance models of a basic software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RECET-a real-time cache evaluation tool

    Publication Year: 1995, Page(s):376 - 381
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Previously used methods to analyse and model the behaviour and performance of various cache configurations have been limited in many ways. Either the method itself produces inaccurate results, or assumptions regarding the memory referencing behaviour of the workload has been made. Many trace-driven simulations have used incomplete traces and have resulted in overoptimistic results. These results h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance aspects of real-time systems

    Publication Year: 1995, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    Design of real-time systems needs to take into account their performance behaviour before their implementation. This goal can be attained by means of queueing network modelling. To process this kind of models normally simulation is used with its inherent costs of debugging and running times. This paper presents the analysis and comparison of analytic (simple queues, decomposition aggregation) and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust heuristic for minimizing cell loss in ATM networks

    Publication Year: 1995, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Limited buffers in ATM network elements will inevitably result in cell loss. We model an ATM network as a tandem network with finite buffers and investigate the performance of a cell-level control policy (the HILO heuristic) that is designed to minimize cell loss rates. The HILO heuristic is based on limited feedback about the cells awaiting transmission in adjacent network nodes. We demonstrate v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-queue polling model with a threshold service policy

    Publication Year: 1995, Page(s):84 - 88
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    We consider a model of two M/M/1 queues, served by a single server. The service policy for this polling model is of threshold type: the server serves queue 1 exhaustively, and does not remain at an empty queue if the other one is non-empty. It switches from queue 2 to queue 1 when the size of the latter queue reaches some level T. All switches are instantaneous. We determine the joint queue length... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance simulation on a multitarget radial remote-positioning system

    Publication Year: 1995, Page(s):319 - 323
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Some performance simulation results of a remote-positioning system on a multitarget real-time context for oceanic instruments tracking are discussed and several indicators are considered to fine-tune the system's design requirements. Results show that, within the particular extent of practical applicability, an equilibrium between the performance indicators considered can be achieved View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority queueing in RAID disk arrays with an NVS cache

    Publication Year: 1995, Page(s):168 - 172
    Cited by:  Papers (4)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    We consider a cached RAID5 disk array which partially consists of non-volatile storage (NVS) providing a fast-write capability. Blocks written in this manner are destaged from the NVS cache onto disk asynchronously and at a lower priority than disk read requests. We consider three queueing disciplines to prioritize read misses with respect to destages: (i) Non-preemptive priorities. (ii) Preemptio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bnet: designing a connectionless broadband data service in an ATM network by simulated annealing

    Publication Year: 1995, Page(s):253 - 256
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The advent of ATM technology combined with the new ideas and principles of broadband communications has made possible efficient transmission of voice, video, data and multimedia services. It also has introduced a lot of new operational issues. One such issue is the internetworking of the more traditional connectionless LANs and MANs across a connection-oriented ATM network. One of the proposed con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time and performance evaluation extensions of specification language LOTOS

    Publication Year: 1995, Page(s):382 - 386
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    The paper contains extensions of specification language LOTOS in three directions: actions with durations, real-time and performance evaluation constructions. We have introduced a time-out as a specific action. An expressive power of this action has been discussed. We have defined such a performance evaluation extension of LOTOS that can be used as a modelling language for performance evaluation o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate analysis of multi-class synchronized closed queueing networks

    Publication Year: 1995, Page(s):23 - 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    Queueing networks with synchronization mechanisms are encountered in the modeling and analysis of parallel computer systems and computer/communication networks. Exact analytical solutions of such networks are not available. In particular, due to the synchronization mechanisms. These networks do not have a product-form solution. As a result approximation methods that can provide accurate estimates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation model for analysis of synchronous digital hierarchy network payload jitter

    Publication Year: 1995, Page(s):275 - 279
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Since pointer processing in SONET/SDH networks is a complex non-linear process, computer simulation is required to accurately characterize the network jitter induced in the underlying PDH payloads. While previous behavioral network models provide accurate results for normal synchronous operation, they do not model the periodic pointer sequences which occur during holdover mode. This paper's method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extensible parallel program performance visualization

    Publication Year: 1995, Page(s):205 - 211
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    Performance bugs have classically been difficult to identify in high performance programs. The problem arises because there is a broad spectrum of causes of performance degradation, and because it may be necessary to apply specialized diagnostics to search the performance space. The prototype tuning environment we are developing enables one to explore the performance space of a program using custo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A short theory of multiprogramming

    Publication Year: 1995, Page(s):2 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    Pressures to use virtual memory are growing. Newer versions of application programs are growing explosively; for example, Microsoft Word, around 400K bytes in Version 3, is 25 megabytes in Version 6. Servers such as those running Windows NT use multiprogramming to share memory among jobs. We may see soon a revival of interest in the theory of multiprogramming as server administrators discover and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPLAT: a standard-to-standard real-time graphical scheduling and code generation tool

    Publication Year: 1995, Page(s):432 - 435
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    The paper reports on the development of a software tool which permits the design of real-time systems with the use of standard CAD software. The real-time software is thus in the form of block diagrams which represent optimized function or macros and allows seamless hardware co-design. By using a cyclo-static scheduling model, kernel-less multirate and parallel C code is produced automatically. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling of object based systems with hidden sorted ECATNets

    Publication Year: 1995, Page(s):307 - 311
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    ECATNets are a kind of high-level net/data model, combining the strengths of Petri nets with those of abstract data types, used for modeling parallel and distributed systems. Their most distinctive feature is that their semantics is defined in terms of rewriting logics, thus allowing us to analyse the built models by prototyping. However a major drawback of this approach is that the achieved proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient algorithm to compute the synchronized product

    Publication Year: 1995, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    Computing all the reachable states of synchronized automata is important in the mechanical verification of concurrent programs. It is however a hard task because this set of states typically grows exponentially in the number of automata involved. We present a new approach that yields interesting experimental results, both an memory requirements and computation times. It uses a new data structure, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotics of the partition function in large closed BCMP networks with bottlenecks

    Publication Year: 1995, Page(s):89 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    We consider a two-chain exponential queueing network with a large number of customers, which consists of one infinite-server (lS) station and two processor-sharing (PS) or FCFS single-server stations. Asymptotic behavior of the partition function is studied for such a network when one or both PS (FCFS) nodes are heavily loaded. The results are derived using methods of multidimensional complex anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance evaluation of asynchronous processor architectures

    Publication Year: 1995, Page(s):100 - 104
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    This paper evaluates and analyses the influence of an asynchronous control paradigm on the performance of processor architectures. The idea of a micronet is introduced which models the datapath as a network of concurrent functional units which communicate with each other asynchronously. This allows the efficient exploitation of fine-grained instruction-level parallelism (ILP). A macronet-based asy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytic performance modeling for a spectrum of multithreaded processor architectures

    Publication Year: 1995, Page(s):110 - 122
    Cited by:  Papers (4)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    The throughput of pipelined processors suffers from delays associated with instruction dependencies and memory latencies. Multithreaded architectures attempt to hide such delays by sharing the processor with multiple instruction streams. In this paper we develop a comprehensive analytic framework to quantitatively evaluate the performance of a wide spectrum of mulithreaded machines, ranging from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PN3-Editor: compositional Petri net editor for protocol specification

    Publication Year: 1995, Page(s):325 - 328
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    The problem of Petri nets application to real-world parallel and distributed systems of industrial size causes developing of the compositionality within the theory of Petri nets. This paper presents a tool which is an attempt to resolve this problem. We suggest a solution based on an algebraic approach, of Petri net representation. Two levels of compositionality are introduced. The first one, alge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.