By Topic

1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)

12-12 Feb. 1999

Filter Results

Displaying Results 1 - 25 of 67
  • 1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (284 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s):vi - ix
    Request permission for commercial reuse | PDF file iconPDF (259 KB)
    Freely Available from IEEE
  • Accelerating ATM: on-line compression of ATM streams

    Publication Year: 1999, Page(s):233 - 239
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB)

    Since ATM switches intended to be simple and inexpensive, a significant part of the network cost is in the cost of the links. A way of increasing the traffic we can send over these expensive links is to transmit compressed ATM cells. This idea, although it seems very simple, is a new one for ATM and in this paper we show that it can significantly increase the bandwidth of a typical ATM network. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contrasting branch characteristics and branch predictor performance of C++ and C programs

    Publication Year: 1999, Page(s):275 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (919 KB)

    In today's superscalar and superpipelined computers, branch instructions are the main culprits that limit the processor from issuing instructions at a peak rate. Although C++, which is an object-oriented programming language, provides great flexibility to help solve complex programming problems, the cost is a penalty in performance when compared to C. This paper compares the intrinsic branch behav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1999, Page(s): 499
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • A high-capacity, scalable video-on-demand system architecture, based on a 3-stage Clos network

    Publication Year: 1999, Page(s):363 - 369
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    We present a high performance, scalable architecture for a video on demand (VoD) system, using a three stage Clos switch. Three stage Clos switching networks have been used in the past in multiprocessor interconnection networks as well as for ATM switching fabrics due to their attractive low latency and fault tolerance properties. The proposed VoD system mainly consists of such a three stage Clos ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equivalent permutation capabilities between time division optical omega network and non-optical extra stage omega network

    Publication Year: 1999, Page(s):356 - 362
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Since optical networks must support crosstalk-free (CF) connections, regular N×N multistage interconnection networks (MINs) cannot be directly used to provide connections between N inputs and N outputs. A solution is to use a 2N×2N Cube-Type MIN to provide the N×N connections. C. Qiao (1993) proposed a time domain approach that divides the N optical inputs into several groups suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An open solution to fault-tolerant Ethernet: design, prototyping, and evaluation

    Publication Year: 1999, Page(s):461 - 468
    Cited by:  Papers (8)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    Presented is an open solution based approach to fault tolerant Ethernet for process control networks. This unique approach provides fault tolerance capability that requires no change of vendor hardware (Ethernet physical link and Network Interface Card) and software (Ethernet driver and protocol), yet it is transparent to control applications. The open fault tolerant Ethernet (OFTE) developed base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring dynamic memory invocations in object-oriented programs

    Publication Year: 1999, Page(s):268 - 274
    Cited by:  Papers (4)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Dynamic memory management has been a high cost component in many software systems. Studies have shown that memory intensive C programs can consume up to 30% of the program runtime in memory allocation and liberation. The OOP language system tends to perform object creation and deletion prolifically. An empirical study shown that C++ programs can have ten times more memory allocation and deallocati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A split input sunshine switch architecture

    Publication Year: 1999, Page(s):349 - 355
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    We present the split input sunshine switch, a new ATM switch architecture based on the sunshine switch, which utilizes two distinct input fabrics, primary and secondary, within a sunshine switch architecture. The primary input fabric is sized at the desired size, N×N, and the secondary switch is sized at N/z × N/z, where z is a non-zero power of two. The introduction of the secondary i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A PowerPC platform full system simulation-from the MOOSE up

    Publication Year: 1999
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Systems simulation is not new. Several instances of varying degrees have appeared over the last few years providing a diverse level of simulation capability. There are also a plethora of simulation kernels and simulation environments available today. Each of these has strengths and weaknesses usually centered around the specific environment to which the simulation is targeted. During the mid-1990s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical routing protocol for large scale ad hoc network

    Publication Year: 1999, Page(s):379 - 385
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The hierarchical network structure significantly reduces the size and maintenance cost of routing table for huge networks. But in ad hoc networks, no fixed host leads to the challenge of the hierarchical structure, since the topology information needs to be updated dynamically due to membership changes caused by mobility. To construct the hierarchical structure of physical locations, we adopt a cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A channel resource management framework for cellular networks

    Publication Year: 1999, Page(s):476 - 479
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Cellular networks provide efficient bandwidth management by allowing frequency reuse. In cellular networks, the radio connection between mobile nodes and base stations, termed `channel', can be viewed as a logic link. The focus of this research is on the management of such logical channels. A lot of research has been conducted in the area of channel resource management. Most of them combine interf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing by distributed recursive computation and information reuse

    Publication Year: 1999, Page(s):393 - 399
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Distributed multimedia applications have quality-of-service (QoS) requirements specified in terms of constraints on various metrics such as bandwidth and delay. The task of QoS routing is to find a path from the source node to the destination node with sufficient resources to support the required end-to-end QoS. We propose several distributed algorithms for the bandwidth-constrained routing and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of one prong network restoration algorithms

    Publication Year: 1999, Page(s):210 - 216
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    To improve the reliability, broadband optical networks require fast restoration from single-link failures, node failures and multiple-link failures. This paper presents two distributed network restoration algorithms based on the one prong approach. DFOP uses a depth first search approach with a time-out mechanism to collect more network topology information. BFOP uses a breadth first search approa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimisation of the performance of a rate-based congestion control system by using fuzzy controllers

    Publication Year: 1999, Page(s):192 - 198
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    This article describes a congestion control protocol, based on the use of fuzzy controllers, for efficient utilisation of the capacity of the network. The basic control mechanism uses rate-based control, closely resembling the one specified by the ATM Forum for the Available Bit Rate (ABR) service category. Fuzzy logic is utilised in the network elements to enhance the required control decisions w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of cluster interconnects for a distributed shared memory

    Publication Year: 1999, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Clusters of Symmetrical Multiprocessors (SMPs) have recently become popular as low-cost, high-performance computing solutions. The type of interconnection hardware used in these clusters can become a deciding factor in their overall performance. This paper evaluates the performance of three different communication systems, 10 Mbps Ethernet, 100 Mbps FastEthernet and 155 Mbps ATM, using a multithre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid TCP-UDP transport for Web traffic

    Publication Year: 1999, Page(s):177 - 184
    Cited by:  Papers (7)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    Most of the web traffic today uses the HyperText Transfer Protocol (HTTP), with Transmission Control Protocol (TCP) as the underlying transport protocol. Unfortunately, TCP is poorly suited for the short conversations that comprise a significant component of web traffic. The overhead of setting up and tearing down TCP state amortizes poorly for these small connections. Moreover, emerging modern we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error control techniques for wireless ATM networks

    Publication Year: 1999, Page(s):104 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Wireless ATM (Asynchronous Transfer Mode) is an emerging technology where cells are transmitted over wireless channels and part(s) of the connection lies in the wireless network. This introduction of ATM in wireless environment creates many interesting challenges including how to deal with wireless links with possible high and variable error rates. The problem arises as ATM was designed for very l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement, analysis and performance improvement of the Apache Web server

    Publication Year: 1999, Page(s):261 - 267
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Performance of Web servers is critical to the success of many corporations and organizations. However, very few results have been published that quantitatively study the server behavior and identify the performance bottlenecks. In this paper we measured and analyzed the behavior of the popular Apache Web server on a uniprocessor system and a 4-CPU SMP (Symmetric Multi-Processor) system running the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sidney and RDS: an evaluation of two persistent storage systems

    Publication Year: 1999, Page(s):337 - 343
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    Comparative experimentation is increasingly important in computer science, but performing such experiments can be challenging. The paper presents a set of experiments that compare the performance of two persistent storage managers, and answer the question of whether the safer storage manager has performance comparable to the less safe one. This comparison was difficult for a number of reasons, amo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On estimating protocol performance from a formal specification

    Publication Year: 1999, Page(s):157 - 163
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    This paper introduces an approach for protocol performance estimation directly from a formal model of the protocol. By using the approach presented in this paper, performance of a protocol can be quickly estimated at an early stage of protocol design. The simplicity of analysis, achieved by deterministic analysis, and the tight integration of the performance model, called the performance reachabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating firewalls outside the LAN perimeter

    Publication Year: 1999, Page(s):493 - 498
    Cited by:  Papers (2)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Firewalls are well known for their task of securing the enterprise intranet from untrusted users attempting to gain access. The concept of firewalls got its start when routers began to be used to balance network load. The effort to balance network traffic load at the transport level was extended to the server operating system where application proxy service and application level filtering is provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing mobility in a wireless ATM network

    Publication Year: 1999, Page(s):90 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The growing fields of wireless networks and asynchronous transfer mode (ATM) are merging to form wireless ATM networks. This paper addresses dynamic bandwidth allocation, connection admission procedures, routing, and location management strategies in wireless ATM. More precisely, we investigate the issue of extending the Private Network to Network Interface, PNNI, protocol to support mobility. PNN... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a general traffic control framework in ATM networks

    Publication Year: 1999, Page(s):240 - 249
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    This paper presents a general traffic control framework for Asynchronous Transfer Mode (ATM) networks with its performance evaluation. The proposed traffic control scheme can incorporate all the recently considered ATM service classes including Constant Bit Rate (CBR), real time Variable Bit Rate (rtVBR), non-real time Variable Bit Rate (nrVBR), Available Bit Rate (ABR) and Unspecified Bit Rate (U... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.