By Topic

MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems

15-18 Aug. 2001

Filter Results

Displaying Results 1 - 25 of 51
  • MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (235 KB)
    Freely Available from IEEE
  • High-volume Web servers: traffic patterns, performance implications, and resource management

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB)

    Summary form only given. The control, management and optimization of performance-based measures in high-volume Web sites require a fundamental understanding of the user request patterns and the performance implications of such traffic patterns. We first present an analysis of the request patterns found at various Web server complexes, including high-volume commercial and sporting event Web sites. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design-why we don't do it right

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (38 KB)

    Summary form only given, as follows. The design process is discussed as it is done today and the author shows through examples why we do not do it correctly. The place for simulation in the design process is emphasized and how it is not applied very well, consistently, or enough throughout the design process is highlighted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-line simulation techniques for real-time management of systems

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    Summary form only given, as follows. On-line simulation refers to the use of simulation tools to aid in the management of operational systems. For example, faster-than-real-time simulation of the air transportation network can be used to aid air traffic controllers in managing traffic flows to reduce congestion and improve safety. Live feeds from air traffic control centers are used to build a sit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):431 - 432
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Effect of event orderings on memory requirement in parallel simulation

    Publication Year: 2001, Page(s):41 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    A new formal approach based on partial order set (poset) theory is proposed to analyze the space requirement of discrete-event parallel simulation. We divide the memory required by a simulation problem into memory to model the states of the real-world system, memory to maintain a list of future event occurrences, and memory required to implement the event synchronization protocol. We establish the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PROFS-performance-oriented data reorganization for log-structured file system on multi-zone disks

    Publication Year: 2001, Page(s):285 - 292
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    I/O is a major performance bottleneck in modern computer systems. Modern disks use zone-bit-recording (ZBR) technology to increase the capacity. A direct consequence of ZBR is that outer tracks have higher data transfer rates. Because LFS uses large disk transfers, access times are mainly determined by the data transfer rate. This paper presents a novel performance-oriented data reorganizing schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online test system applied in routing protocol test

    Publication Year: 2001, Page(s):331 - 338
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    Based on the analysis and the perception of routing protocols, this paper presents an online test method applicable for the routing protocol test. This method tests the protocol implementation through online observation. It can be performed in the production field without interfering with the network and possesses quite a lot of other beneficial features. With the key techniques worked out, the ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation analysis of dynamic server selection algorithms for replicated Web services

    Publication Year: 2001, Page(s):371 - 378
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    A practical approach to the provision of responsive Web services is based on introducing redundancy in the service implementation by replicating the service across a number of servers geographically distributed over the Internet. In this paper we compare the user perceived performance of three dynamic server selection algorithms operating at the client side, in order to provide some guidelines for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of finite field arithmetic in an elliptic curve cryptosystem

    Publication Year: 2001, Page(s):249 - 256
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    The computational cost of encryption is a barrier to wider application of a variety of data security protocols. Virtually all research on elliptic curve cryptography (ECC) provides evidence to suggest that ECC can provide a family of encryption algorithms that require fewer computational resources for implementation than do current widely used methods. This efficiency is obtained since ECC allows ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of pools in soft real-time design architectures

    Publication Year: 2001, Page(s):15 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    Architectures for the design of soft real-time systems typically do not facilitate the use of performance tools that will enable a designer to analyse the performance of the system that is being designed. Intercommunication data areas, whose behaviours are characterised by interaction protocols, are the building blocks of many soft real-time systems. The interaction protocols are grouped into fami... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation of grouping techniques for state dissemination in networked multi-user games

    Publication Year: 2001, Page(s):33 - 40
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    In a distributed multi-user game, entities need to communicate their state information to other entities. Usually only a subset of the game's entities are interested in information being disseminated by any particular entity. In a large scale distributed game, broadcasting messages containing each information to all participants and applying a relevance filter at the end host is wasteful in both n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-blocking, localized routing algorithm for balanced energy consumption in mobile ad hoc networks

    Publication Year: 2001, Page(s):117 - 124
    Cited by:  Papers (17)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB) | HTML iconHTML

    As mobile computing requires more computation as well as communication activities, energy efficiency becomes the most critical issue for battery-operated mobile devices. Specifically, in ad hoc networks where each node is responsible for forwarding neighbor nodes' data packets, care has to be taken not only to reduce the overall energy consumption of all relevant nodes but also to balance individu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance study of a multipath routing method for wireless mobile ad hoc networks

    Publication Year: 2001, Page(s):99 - 107
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile computers forming a temporary network without any existing wire line infrastructure. Due to the dynamic nature of the network topology and the resource constraints, routing in MANETs is a challenging task. Multipath routing can increase end-to-end throughput and provide load balancing in wired networks. However, its advantage is no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of timeout-based adaptive wormhole routing

    Publication Year: 2001, Page(s):275 - 282
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    Although many adaptive routing algorithms have been proposed for wormhole-routed networks, it is necessary to have a clear understanding of the factors that affect their potential performance before they can be widely adopted in commercial multicomputers. This paper proposes a new analytical model of an adaptive routing algorithm proposed by Duato (see Future Generation Computer Systems vol.10, no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS for adaptive multimedia in wireless/mobile networks

    Publication Year: 2001, Page(s):81 - 88
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Adaptive multimedia is promising in wireless/mobile networks since it mitigates the fluctuation of resources caused by the mobility in wireless/mobile networks. However, its bandwidth adaptation causes bandwidth degradation. In order to fully characterize the bandwidth degradation and to provide better QoS to service users, we propose two new QoS parameters for adaptive multimedia: the degradation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parameterized mobile action generator for a wireless PCS network

    Publication Year: 2001, Page(s):323 - 330
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collection of such real data is currently difficult and since most activity data is proprietary, researchers need to model this mobile activity data to evaluate their work. Sang-Eon Park and Purdy (see IEEE International Confer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The structural cause of file size distributions

    Publication Year: 2001, Page(s):361 - 370
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    We propose a user model that explains the shape of the distribution of file sizes in local file systems and in the World Wide Web. We examine evidence from 562 file systems, 38 Web clients and 6 Web servers, and find that this model is an accurate description of these systems. We compare this model to an alternative that has been proposed, the Pareto model. Our results cast doubt on the widespread... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and analysis of an ABR flow control algorithm for a virtual source/virtual destination switch

    Publication Year: 2001, Page(s):407 - 414
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    The ABR service class of ATM networks uses a feedback control mechanism to adapt to varying link capacities. The VS/VD technique offers the possibility to segment the otherwise end-to-end ABR control loop into separate loops. The improved feedback delay and the control of ABR traffic inside closed segments provide a better performance for ABR connections. This paper presents the use of classical l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tuning of the Checkpointing and Communication Library for optimistic simulation on Myrinet based NOWs

    Publication Year: 2001, Page(s):241 - 248
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    Recently a Checkpointing and Communication Library (CCL) for optimistic simulation on Myrinet based network of workstations (NOWs) has been presented. CCL offloads checkpoint operations from the CPU by charging them to a programmable DMA engine on the Myrinet network card. CCL includes also functionalities for freezing the simulation application on demand, which can be used for data consistency ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Split protocol stack network simulations using the dynamic simulation backplane

    Publication Year: 2001, Page(s):158 - 165
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    We introduce and discuss a methodology for heterogeneous simulations of computer networks using the dynamic simulation backplane. This methodology allows for exchanging of protocol information between simulators across layers of the protocol stack. For example, the simulationist may wish to construct a simulation using the rich set of TCP models found in the ns network simulator, and at the same t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving ensemble-TCP performance on asymmetric networks

    Publication Year: 2001, Page(s):205 - 214
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    For the World Wide Web, the transmission control protocol (TCP) and the hypertext transfer protocol (HTTP) are two important protocols. However, interactions between these two protocols, combined with the bandwidth asymmetry of network access technologies such as ADSL, can lead to inefficient HTTP/TCP performance. This paper investigates the effects of bandwidth asymmetry on ensemble-TCP, a protoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-parallel algorithms for simulation of multiple access protocols

    Publication Year: 2001, Page(s):49 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    We present time-parallel algorithms for parallel simulation of multiple access protocols for medium access-in particular slotted Aloha and slotted p-persistent CSMA. Two mechanisms are presented-regeneration point-based and fix up-based. Aloha is simulated using both mechanisms and CSMA is simulated using only the first mechanism. An analytical technique is developed to predict speedup for the reg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and validation of a real-time parallel kernel using LOTOS

    Publication Year: 2001, Page(s):7 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    This paper presents and discusses the LOTOS specification of a real-time parallel kernel. The purpose of this specification exercise has been to evaluate LOTOS with respect to its capabilities to model real-time features with a realistic industrial product. LOTOS was used to produce the formal specification of TRANS-RTXC, which is a real-time parallel kernel developed by Intelligent Systems Intern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggregating caches: A mechanism for implicit file prefetching

    Publication Year: 2001, Page(s):293 - 301
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    We introduce the aggregating cache, and demonstrate how it can be used to reduce the number of file retrieval requests made by a caching client, improving storage system performance by reducing the impact of latency. The aggregating cache utilizes predetermined groupings of files to perform group retrievals. These groups are maintained by the server, and built dynamically using observed inter-file... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.