Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)

5-8 Feb. 2000

Filter Results

Displaying Results 1 - 25 of 77
  • Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2000, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):0_3 - 0_4
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Simulating Mobile IP based network environments

    Publication Year: 2000, Page(s):240 - 246
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    In this paper we simulate network environments under Mobile IP. We introduce a model that represents the main features in the basic Mobile IP protocol and its optimization schemes. The model incorporates network components and operations that allow mobile computers equipped with wireless network interface to communicate with computers on the fixed network, We present some important details of an e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new matching algorithm for managing location information in mobile computing

    Publication Year: 2000, Page(s):231 - 239
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    We describe a fully distributed algorithm for location management. It is based on organizing mobile switching stations into a hierarchical network of grids. The interesting properties of this algorithm are symmetric availability for reads and writes, low quorum size, scalability and flexibility. The algorithm is based on a novel solution for the well-known matching problem that is especially suita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the dynamic quality of service in wireless computing environments

    Publication Year: 2000, Page(s):220 - 226
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    This paper considers adaptive and reliable quality of service in a dynamic wireless computing environment. We first develop a quality of service architecture that spans the networking and end-to-end systems software layers. Then, we design resource management algorithms for adaptively sharing the networking resources among applications. Finally, we develop a seamless networking infrastructure inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance model for task and interaction patterns in mobile agent systems

    Publication Year: 2000, Page(s):478 - 484
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Mobile agents involve the migration of code and state, thereby facilitating the establishment of various communication and execution patterns in application programs. Automating the development of distributed systems that involve mobile agents is a nontrivial problem, requiring the developer to explicitly control and manage the complete environment, involving various host platforms and operating s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic and adaptive cache prefetch policies

    Publication Year: 2000, Page(s):509 - 515
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    This paper begins an exploration of the applicability of traditional prefetching policies in multiprocessor architectures. In particular, the effectiveness of prefetching policies as a function of both the quality of the prefetching and the consumption of processor to memory bandwidth is an issue of interest. Addressing this issue, the concept of a dynamic and adaptive cache (DAC), two new prefetc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental results and evaluation of the proactive application management system (PAMS)

    Publication Year: 2000, Page(s):76 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Management of large-scale network-centric systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architectures, lack of coordination and compatibility among heterogeneous network management systems, and the dynamic characteristics of networks and application bandwidth requirements, just to name a few. The goal of our research... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One-way-delay measurements with CM toolset

    Publication Year: 2000, Page(s):41 - 47
    Cited by:  Papers (6)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Internet Quality of Service (QoS) is an actual research topic. The need for more or less guaranteed transmission rates (e.g. for bulk-data transfer applications), upper bounds for transmission delay and jitter (e.g. for real time applications like IP telephony, video-conferencing) stimulated the development of QoS transmission technologies like ATM, IP-RSVP and the actual discussion about Diff-Ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple and effective core placement method for the core based tree multicast routing architecture

    Publication Year: 2000, Page(s):215 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    The Core Base Tree (CBT) multicast routing architecture is a multicast routing protocol for the Internet. The CBT establishes a single shared tree for a multicast connection. The shared tree is rooted at a center node called core. The location of the core may affect the cost and performance of the CBT The core placement method proposed in Lin and Lai (1998) requires the knowledge of the network to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced generation tool of application's network traffic

    Publication Year: 2000, Page(s):471 - 477
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    We introduce a new traffic generation and monitoring tool which was developed for performance evaluation of TCP/IP networks. Our tool, called Agent-Ant, supports a number of TCP/IP applications and new applications of future can also be easily included. Agent-Ant supports multiple connections and can measure different traffic characteristics on the application level. The main concepts, the archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraint adaptive rate allocation scheme for QoS guarantee in packet-switched networks

    Publication Year: 2000, Page(s):561 - 566
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Link sharing models and their implementations address various issues for QoS guarantee. As the service requirements of the network applications are diverse in the integrated service networks, it is required to provide differentiated services to the flows according to their flow characteristics, while guaranteeing the worst case performance of QoS. To meet such requirement, the adaptive rate alloca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fault tolerant ATM switching architecture

    Publication Year: 2000, Page(s):295 - 301
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This paper proposes a new fault-tolerant, self-routing, and high performance switching architecture for ATM networks based on multistage interconnection networks (MINs). It consists of two closely linked Banyan networks. Links are provided at every stage to allow cells to transfer to and from each plane. Reliability analysis shows that this architecture has a much fault-tolerance than some of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MAC protocol supporting TCP in DS-CDMA PCNs

    Publication Year: 2000, Page(s):8 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    A MAC protocol for CDMA PCNs is proposed and studied which is shown to provide a better upper layer performance in the wireless applications. The protocol is based on Preamble Signaling Access which uses a Slotted-ALOHA-like scheme. Markovian chain models are used to analyze the performance of this protocol. Using the modeling, we have provided performance insight comparing the service received by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing instruction prefetching techniques via a cache performance model: effectiveness and limitations

    Publication Year: 2000, Page(s):501 - 508
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Instruction prefetching methods are analyzed using a cache performance model. Improvement in performance achieved by using an instruction prefetching method is classified into two factors: the number of cache misses reduced by prefetching and the average amount of miss penalty reduced by successful prefetches. Conventional instruction prefetching methods are analyzed based on these two factors. Re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Move-to-front and transpose hybrid parallel architectures for high-speed data compression

    Publication Year: 2000, Page(s):67 - 75
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    We give linear systolic array architectures for self organising linear lists using two hybrids schemes of move-to-front and transpose heuristics, attempting to incorporate the best of both methodologies. The arrays provide input every clock cycle and have a number of processors equal to the length of the list n. This design is then implemented to build high-speed lossless data compression hardware... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hint-based acceleration of Web proxy caches

    Publication Year: 2000, Page(s):30 - 37
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    Numerous studies show that proxy cache miss ratios are typically at least 40%-50%. This paper proposes and evaluates a new approach for improving the throughput of proxy caches by reducing cache miss overheads. An embedded system able to achieve significantly better communications performance than a traditional proxy filters the requests directed to a proxy cache, forwarding the hits to the proxy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transport architecture for UMTS/IMT-2000 cellular networks

    Publication Year: 2000, Page(s):208 - 214
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    In this paper we discuss the transport architecture options for the UMTS/IMT-2000, or 3G (3rd Generation), cellular networks. The interfaces between access nodes in a cellular network and the changes incorporated to support packet data services are described. Challenges in selecting one transport technology over another are outlined with reasoning. Requirements to support mobile telephony as well ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power spectral analysis-based QoS evaluation of VBR video and its application to pricing model

    Publication Year: 2000, Page(s):463 - 468
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    Since so many potentials of QoS degradation, it is difficult to predict the QoS degradation of VBR MPEG video application under high-speed network environment. The general procedure of the call admission requires the QoS contract between the users and the network. But, various statistical properties of the source traffic and its hard estimation make it difficult to satisfy the QoS contract. In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of joint per-VC scheduling and credit-based flow control in high-speed ATM WANs

    Publication Year: 2000, Page(s):551 - 557
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Per-VC scheduling and credit-based flow control were studied separately in the past. This paper presents the performance evaluation of joint per-VC scheduling and credit-based flow control in a three-node high-speed ATM wide area network. The traffic types used in the study are a combination of delay-sensitive (DS), delay-insensitive (DI) and best effort (BE) qualities of service. At the network l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance evaluation of fully adaptive wormhole routing including selection function choice

    Publication Year: 2000, Page(s):117 - 123
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Many adaptive routing algorithms have been proposed for wormhole-routed interconnection networks. Comparatively little work, however has been done on determining how the selection function affects the performance of an adaptive routing algorithm. In this paper we present a detailed simulation study of various selection functions for four differentially adaptive wormhole routing algorithms for 2D m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hot spot analysis in wormhole-routed tori

    Publication Year: 2000, Page(s):337 - 343
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Several analytical models of fully adaptive routing have recently been proposed for wormhole-routed tori under the uniform traffic pattern. However, there is no, to our best knowledge, any analytical model reported yet that deals with wormhole-routed direct interconnection networks with non-uniformity in the traffic pattern, such as hot spots. In an effort to fill this gap, this paper describes a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steiner triple systems as multiple erasure correcting codes in large disk arrays

    Publication Year: 2000, Page(s):288 - 294
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    Desirable RAID architectures provide fast performance with minimal overhead costs and short reconstruction times. Increasing the size of a disk array decreases its reliability. Developing new architectures that guarantee no information is lost in the presence of multiple disk failures, therefore, becomes important as disk arrays grow large. One class of 3-erasure correcting codes which have minima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication performance over a gigabit Ethernet network

    Publication Year: 2000, Page(s):181 - 189
    Cited by:  Papers (4)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    Cluster computing imposes heavy demands on the communication network. Gigabit Ethernet technology can provide the required bandwidth to meet these demands. However, it has also shifted the communication bottleneck from network media to protocol processing. In this paper, we present an overview of Gigabit Ethernet technology and study the end-to-end Gigabit Ethernet communication bandwidth and late... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.