ANALYTICAL MODEL AND PERFORMANCE ANALYSIS OF A NETWORK INTERFACE CARD. Abstract

Size: px
Start display at page:

Download "ANALYTICAL MODEL AND PERFORMANCE ANALYSIS OF A NETWORK INTERFACE CARD. Abstract"

Transcription

1 ANALYTICAL MODEL AND PERFORMANCE ANALYSIS OF A NETWORK INTERFACE CARD Naveen Cherukur 1, Gokul B. Kandraju 2, Natarajan Gautam 3, and Anand Svasubramanam 4 Abstract One of the key concerns for practtoners and academcans s that there are almost no platforms based on analytcal models for testng the mpact of varous archtectural and desgn modfcatons for ntellgent Network Interface Cards (NICs). Smulatons are typcally tme-consumng, especally for expermentng dfferent scenaros and what-f analyss. In ths research, we study the performance of a NIC called Myrnet developed by Myrcom. We develop an open queueng network model to predct ts performance. We compare the analytcal results wth the smulatons. The reason there are very few analytcal models s because of the enormous complexty posed by the performance-analyss problem. In partcular, the problem s a combnaton of: (a) mult-class queueng network wth class swtchng, (b) pollng system wth lmted servce dscplne, and (c) fnte-capacty queues wth blockng. The above three ssues have been treated only n solaton n the lterature. However the problem becomes much harder when all three ssues are smultaneously present. One of the key contrbutons of ths paper s an analytcal approxmaton of ths complex system. From an analytcal modelng standpont, we observe that makng smplfyng assumptons to analyze nodes that are not bottlenecks does not mpact performance greatly. The man fndngs of ths research are the bottlenecks of the queueng network, utlzatons of the varous nodes and performance measures such as the expected delay. The model as well as fndngs can be used to test the performance mpact of varous enhancements to the operaton of NICs. Keywords: Network Interface Cards, Performance Analyss, Queueng Model, Smulaton 1 82 Devonshre Street, #V7B, Boston MA 02109, naveen_ch@hotmal.com 2 Dept. of Computer Scence and Engneerng, Penn State Unv., Unversty Park, PA kandraj@cse.psu.edu 3 Dept. of Industral Engr., 310 Leonhard Bldg, Penn State Unv., Unversty Park, PA ngautam@psu.edu Correspondng Author 4 Dept. of Computer Scence and Engneerng, Penn State Unv., Unversty Park, PA anand@cse.psu.edu

2 1. Introducton Dstrbuted applcatons requre rapd and relable exchange of nformaton across a network to synchronze operatons and/or to share data. The performance and scalablty of these applcatons depend upon an effcent communcaton faclty. In order to connect computers to a network for facltatng communcaton, a network nterface card (NIC) s necessary. The NIC s a computer crcut board or card that s nstalled n a computer. Personal computers and workstatons on a local area network (LAN) typcally contan a NIC specfcally desgned for the LAN transmsson technology, such as Ethernet or token rng. NICs are also used to nterconnect clusters of computers or workstatons such that the cluster can be used for hgh performance or massvely parallel computatons. Although clusters are slowly replacng large supercomputers due to ther low cost, one of the bggest stumble blocks for clusters to reach the performance of supercomputers s that ther NICs are neffcent. To address the neffcences of the NICs, three developments have been consdered: () Usng a processor on the NIC and thereby makng the NIC more ntellgent. These second-generaton ntellgent NICs (ncludng Myrnet [8], Fore Systems SA-200 [18], Gganet's clan [19], etc.) outperform tradtonal NICs (conventonal Ethernet NICs). Myrnet s one of the most popular second generaton NICs n use today. () Movng the network nterface much closer to the applcaton (called Vrtual Interface Archtecture (VIA) [1]). The VIA uses a vrtual nterface mechansm to transfer the most common messages drectly between memory and the NIC. The result s a substantal reducton n processng overhead along the communcaton paths that are crtcal to performance. () Removng the operatng system from the crtcal path of communcaton, User-Level Networkng (ULN) provdes the user wth the drect access to the NIC. The operatng system s used only to setup the protected channels whch can be accessed later durng communcaton wthout the costs of crossng protecton boundares. In ths paper we study such ntellgent VIA NICs that use ULN. Due to the rapd growth of ULN as a hgh-performance cost-effectve soluton wth clusters, ndustry has also taken note of ULNs potental, and attempted to standardze t n the form of a VIA specfcaton [1]. Ths specfcaton was released by a group of companes together called the Vrtual Interface Archtecture Consortum (whch ncludes Mcrosoft, Compaq, Intel). Hardware and software [20, 21, 22] mplementatons of VIA have also been developed and VIA s recevng a lot of attenton both from the ndustry front as well as academa. Hence, research s under way to further mprove the effcency of the NICs. However there s a need for analytcal models for NICs that the researchers could use to quckly test desgn alternatves. In ths paper, analytcal models are derved for the Myrnet [8] NIC, keepng n mnd that, smlar models can be derved for other network nterfaces as well. The lterature on performance modelng for ntellgent NICs s farly lmted. In [23], the NIC throughput s computed usng an average case analyss by modelng the entre system at a much macrogranularty level than what s consdered here. In fact [23] does not consder any detals of the Myrnet NIC. The Myrnet NIC and software system n [24] s modeled at a meso-granularty level (.e., n between the macro-granularty level n [23] and the mcro-granularty level we have consdered here) usng a system of 2 queues such that the processor polls between queues at the software and the hardware layers, thereby ncurrng tme durng the context swtch. However, snce the entre NIC s modeled as a sngle-server queue n [24], t s not clear how varous desgns nsde the NIC can be evaluated. The motvaton for consderng a mcro-granularty level for modelng the Myrnet NIC n ths paper s to test varous NIC desgns and evaluate the performance mprovement across the NIC. In partcular, a multstaton and mult-class open queueng network model s consdered to capture the multtude of operatons and queues nsde the NIC. The complexty of the problem s due to the fact that t s a combnaton of (a) mult-class queueng network wth class swtchng, (b) pollng system wth lmted servce dscplne, and (c) fnte-capacty queues wth blockng. However by dentfyng the bottleneck node and modelng t accurately, and usng approxmatons for the rest of the nodes, we are able to obtan system performance. 2

3 Networks of queues have proven to be useful models to analyze the performance of complex systems such as computer systems, swtches, routers and communcatons networks [2-5]. Ths method has contrbuted to sgnfcant desgn decsons for performance mprovements n varous computer and communcaton systems. Analytcal models are fast n obtanng the results and cost effectve n mplementaton when compared to a smulaton model or an experment. Another mportant advantage of analyss usng a network of queues s the flexblty to choose a wde range of operatng parameters and obtan the performance measures wth lttle effort. Smulatons are developed for benchmarkng and the results are compared wth the performance measures obtaned n the analytcal model. The rest of ths paper s structured as follows. Secton 2 deals wth some prelmnares ncludng a descrpton of the VIA NICs as well as some results from queueng networks. Secton 3 provdes a detaled explanaton of the varous modelng aspects and the smplfcatons used n obtanng the analytcal model. In Secton 4, two smulaton studes performed usng a commercal package ARENA [6] are presented to justfy the approxmatons. In Secton 5, performance of the analytcal model s compared aganst smulaton studes. Ths paper concludes wth hghlghts of the summary of the study, contrbutons from ths research, and recommendatons for future work n Secton Prelmnares We frst present a descrpton of the Myrnet NIC and then descrbe some known results from queueng networks. They consttute some of the prelmnares that are necessary n order to descrbe ths research. 2.1 The Myrnet NIC Fgure 1 [7] shows a Myrnet NIC. Myrnet s popular for deployng clusters because t provdes hgh hardware transmsson rates. The several hardware features that t provdes make VIA mplementatons more effcent. CPU Net Send DMA (NSDMA) Host DMA (HDMA) Memory (SRAM) Net Recv DMA (NRDMA) Control To Network Data From Network Fgure 1: Network Interface Card 3

4 The NIC contans a processor called LANa, a Drect Memory Access (DMA) engne (represented as HDMA) whch s used to transfer the data between the host memory and card buffer (SRAM), a DMA engne (represented as NSDMA) to transfer the data from SRAM onto the network, and another DMA engne (represented as RSDMA) to transfer data on to the SRAM from the network. From a modelng pont of vew, sendng can be translated to appendng a message to a queue n the card buffer and recevng can be translated to removng a message from the card buffer. A NIC provdes an electromechancal attachment of a computer to a network. Under program control, a NIC copes data from memory to the network medum, transmsson, and from the medum to memory, recepton, and mplements a unque destnaton for messages traversng the network. Myrnet NIC nterface comprses of varous physcal components. A descrpton of these components along wth the crtcal data movements s provded n detal below. Doorbells: Send or receve notfcaton to NIC by applcaton processes s done n VIA by a mechansm called doorbells. It s through a doorbell by whch the NIC knows that there s work placed n the work queue. There are two sets of doorbells, one each for send and receve. When an applcaton wants to send or receve a message, t creates a header for t (called a descrptor), makes t accessble to the NIC, and then rngs a doorbell. Descrptors: A Descrptor s a data structure recognzed by the NIC that descrbes a data movement request. It s organzed as a lst of segments. A Descrptor s comprsed of a control segment followed by an optonal address segment and an arbtrary number of data segments. The data segments descrbe a communcaton buffer gather or scatter lst for a NIC data movement operaton. Descrptors contan all the nformaton needed to process a request, such as the type of transfer to make, the status of the transfer and the queue nformaton. Drect Memory Access: There are stuatons n whch data must be moved very rapdly to or from a devce. Interrupt processng of each data transfer would be awkward and slow. Wth all of the bookkeepng nvolved n handlng and nterrupt, data would probably be lost. Drect Memory Access, or DMA, solves ths problem. It s a method for drect communcaton from perpheral to memory wth no programmng nvolved. DMA reduces CPU overhead by provdng a mechansm for data transfers that do not requre montorng by the CPU. The data s moved to memory va the bus, wthout program nterventon. LANa and SRAM: A Myrnet host nterface conssts of two major components: the LANa chp and ts assocated SRAM memory. The LANa s a processor chp that controls the data transfer between the host and the network. Besdes controllng the data transfer, the LANa s also responsble for automatc network mappng and montorng the networks status. SRAM s a precous resource that hosts many queues. The sze of the onboard SRAM ranges from 512 KB to 4 MB. The LANa communcates wth the host s devce drvers or user-level lbrares through work queues resdng n the SRAM. HDMA: Ths s one of the most mportant enttes of a NIC. Once a doorbell s detected, LANa processes the descrptor and then the correspondng data buffer. Allocatng space for too many descrptors can be a waste of precous NIC buffer SRAM. The descrptors are thus kept on the host memory, and HDMA transfers them to the card buffer. Then LANa examnes the descrptor and n the case of send, the HDMA transfers the correspondng data on to SRAM. In the case of receve, the drecton of transfer s reversed,.e., the data s transferred from SRAM nto the host memory. NSDMA: NSDMA (Network Send DMA engne) s a DMA engne n the Myrnet NIC that facltates the data transfer from SRAM on to the network. If NSDMA s dle and there s data on SRAM queued up to be sent on to the network, LANa programs NSDMA to pck t up from the queue (FIFO bass). Then the data goes through the network bus to the perpheral destnaton n the network. NRDMA: NRDMA (Network Receve DMA engne) s a DMA engne n the Myrnet NIC that facltates the data transfer from network on to SRAM. LANa programs NRDMA to pck up a packet from the network. The destnaton d of an ncomng message s extracted usng ths DMA engne and the receve descrptors are checked for a match. If there s a matchng descrptor, then the data transfer up to the host 4

5 can be ntated usng HDMA (dependng on the avalablty). Else, a receve descrptor needs to be brought down before the data can be transferred. Myrnet Control Program (MCP): The MCP (Myrnet Control Program) s the program that runs on the LANa chp on the host nterface board. It s the MCP s job to transfer messages between the host and the network. LANa ntates the followng operatons that are needed to be performed by MCP. Poll doorbell queues for an applcaton s send/receve notfcaton Transfer the descrptor assocated wth the doorbell from the host memory down onto the SRAM usng HDMA Transfer the data assocated wth a send descrptor from host memory to SRAM usng HDMA. Transfer the packet out onto the network usng NSDMA. Pck up packet from the network usng NRDMA. Transfer data from SRAM to the host memory usng HDMA. Transfer completon nformaton (of send/receve) to host memory usng HDMA. Sequence of Operatons: LANa goes through these operatons cyclcally: Pollng the doorbell queue, pollng the descrptor queue on SRAM and pollng the data queue. In addton, t programs NSDMA and NRDMA to send and receve the data to and from the network respectvely. LANa polls the doorbell queue and makes them avalable for HDMA to obtan the correspondng descrptors. Polled doorbells wat n a queue at HDMA to get servced on a FCFS bass. They are processed by HDMA and the correspondng descrptors are stored n the descrptor queue on SRAM. The descrptors n ths queue are polled by LANa and t makes them avalable for HDMA to obtan the correspondng data. In the case of a send descrptor, LANa ntates the transfer of data from the host memory on to the data queue on SRAM usng HDMA. In the case of a receve descrptor, LANa ntates the transfer of data (f any) from the network queue at NRDMA to the data queue on SRAM usng NRDMA. LANa polls the data queue and f the polled data s of type send, t checks whether NSDMA s busy. If not, t ntates the transfer of send data from SRAM data queue to NSDMA. If the polled data s of type receve, t ntates the transfer of data from SRAM data queue to host memory usng HDMA. 2.2 The Queueng Network Analyzer Staton 2 Staton 1 Staton 4 Staton 3 Class 1 Class 2 Class 3 Fgure 2: An example of a Mult-Staton and Mult-Class Open Queueng Network 5

6 We now recaptulate some of the results from the mult-staton and mult-class open queueng network usng the QNA approach by Whtt [9,10]. Fgure 2 s an example of a mult-staton and multclass open queueng network wth three statons and four classes of traffc. It s provded to gve a pctoral dsplay for a mult-staton and mult-class open queueng network. The followng descrpton forms the problem settng for the algorthm. (1) There are N servce statons (nodes) n the open queueng network. The outsde world s denoted by node 0 and the others 1,2 N. (2) There are m servers at node (1 m ), 1 N. (3) The network has multple classes of traffc, and class swtchng s not allowed. (4) Servce tmes of class r customers at node are ndependent and dentcally dstrbuted (d) wth mean 1/µ,r and squared coeffcent of varaton (SCOV) C 2. S, r (5) The servce dscplne s Frst Come Frst Served (FCFS). (6) There s nfnte watng room at each node. (7) Externally, customers of class r arrve at node accordng to a general nter-arrval tme dstrbuton wth mean 1 / λ 0,r and SCOV C 2. A, r (8) When a customer of class r completes servce at node, he or she or t jons the queue at node j (j [0, N]) wth probablty p j,r. (9) of node s the rato of mean arrval rate at node to the maxmum possble servce rate at node. Beng a rato, t has no unts Notaton The notaton that s gven here follows [11] and wll be utlzed for the decomposton algorthm to be presented later n ths secton. R : Total number of classes. λ j,r : Mean arrval rate from node to node j of class r. λ 0,r : Mean arrval rate to node of class r (or mean departure rate from node of class r) p j,r : Fracton of traffc of class r that ext node and jon node j. λ : Mean arrval rate to node. ρ,r : of node due to customers of class r. ρ : of node. µ : Mean servce rate of node. The next fve symbols are used to denote the squared coeffcents of varaton (SCOV) of dfferent parameters. C 2 A, r C 2 A : SCOV of class r nter arrval tmes nto node. : SCOV of arrval tmes nto node. C 2 D : SCOV of nter departure tmes from node. C 2 S : SCOV of servce tme of node. C 2,r j : SCOV of tme between two customers gong from node to node j Decomposton Algorthm The network s broken down nto ndvdual nodes, and analyss s performed on each node as an ndependent GI/G/m queue wth m servers n staton and wth multple classes. The requred parameters are mean arrval and servce rates as well as SCOV of the nterarrval and servce tmes. Obtanng these 6

7 wll be hard when multple streams are merged (superposton) or when traffc flows through a node (flow) or when a sngle stream s forked nto multple streams (splttng). The algorthm supposes that just before enterng a queue, superposton takes place whch results n one stream. Lkewse, t assumes that there s only one stream that gets splt nto multple streams [12, 13]. There are 3 basc steps n the decomposton algorthm. Step 1: Mean arrval rates, utlzatons and aggregate servce rate parameters are calculated usng the gven data n the followng way. λ j,r = λ,r p j,r (1) N λ,r = λ 0,r + λ j, r p j,r (2) R j= 1 λ = λ, r (3) ρ,r = r= 1 λ, r m µ, r R ρ = ρ, r The condton for stablty s ρ <1 (5) µ = r= 1 R r= 1 1 λ, r 1 m µ, r λ λ = ρ C 2 R λ, r µ = S ( C + 1) 2 S, r r= 1 λ mµ, r Step 2: The coeffcent of varaton of nter-arrval tmes at each node s calculated teratvely by ntalzng C 2 j,r and performng superposton, flow and splttng cyclcally. () Superposton: C 2 N 1 2 = A C j, rλ j, r p j, r (8), r λ, r j= 0 C 2 R 1 2 = C A λ r, r (9), A λ r= 1 () Flow 2 2 ρ C 2 ( CS 1) 2 2 = ( 1 ρ )( C A 1) (10) D m () Splttng C 2 j,r = 1 + p j,r (C 2-1) (11) D The splttng formula s exact f the departure process s a renewal process. The expressons for flow and superposton are approxmatons. Step 3: Treatng each queue ndependently, performance measures are obtaned as follows m m ρ + ρ +1 2 Choose α m such that α m = f ρ > 0.7 or ρ f ρ < (4) (6) (7)

8 The mean watng tme for class r customers n the queue (not ncludng servce tme) at node s approxmately 2 2 α m 1 C A + C S W q (12) µ 1 ρ 2m The mean watng tme for class r customers at node (ncludng servce tme) s gven by 1 W = W q + (13) µ The mean queue length for class r customers at node (wthout customers n servce) s gven by Lq = W q λ (14) The mean number of customers at node (ncludng the customers n servce) s gven by L = W λ (15) The performance measures presented n Secton 3 are mean queue length ( L q ) and utlzaton (ρ ) at each node. Note that both are numbers and do not have unts. 3. Analytcal Model LANa NSDMA HDMA Class 1 (doorbells) Class 2 (descrptors) Class 3 (data) Fgure 3: Three-staton and three-class open queueng network model for NIC We model the performance of the NIC of a send staton, where the data flow s from the staton to the network. In essence, the hardware features of NIC consstng of only NSDMA are modeled n an open queueng network. The analyss provded for mult-staton and mult-class open queueng network n Secton 2.2 s used to obtan varous performance measures. Ths smplfed verson of NIC conssts of send doorbell, send descrptor and send data as three classes of traffc n the network. The servers n the network correspond to LANa, HDMA and NSDMA and henceforth wll be referred to as nodes. Fgure 3 shows a three-staton and three-class open queueng network model for the performance analyss of NIC. 8

9 3.1 Descrpton and Analyss The most crtcal assumpton that s requred for the analyss n Secton 2.2 s that class swtchng s not allowed. Strctly speakng, there s a class swtchng here n the form of Class1 to Class2 and Class2 to Class3. Doorbells are processed by HDMA to produce descrptors, and descrptors n turn are processed by HDMA to obtan data. Both the processes nvolve class swtchng: Doorbells to Descrptors and Descrptors to Data. If the performance results can be confrmed wth smulatons, t s a great gan n terms of applcablty of the analytcal model. Devatons can be nvestgated and one of the factors to whch they can be attrbuted wll be class swtchng. However the other assumptons made for the queueng network analyss n Secton 2.2 are vald, vz. (1) Servce tmes of class r customers are ndependent and dentcally dstrbuted (d). (2) The servce dscplne s FCFS, whch s the same for the NIC queues. (3) There s nfnte watng room at each node. The watng room at each node can be translated to the memory space avalable for each type of message on the NIC, and n realty there s a lmtaton. One desgn consderaton s that there are always suffcent doorbells to accommodate the data transfer to make sure that no data s practcally dropped off. It s thus safe to assume that there s nfnte watng room at each node, whch wll serve the purpose the applcaton of ths generc desgn methodology to obtan the performance measures n a qucker and convenent way as opposed to lengthy and costly smulatons. We now descrbe the nodes n detal. Node 1 (LANa) serves all the classes of traffc, namely doorbells, descrptors and data. The servce tme for each class of traffc s gven n the Table 2. All three classes are queued up n dfferent queues n the NIC. LANa polls these queues n an order determned by the Myrnet Control Program (MCP). For the purpose of mathematcal analyss, the physcal locaton of the queue does not matter as long as the orderng of pollng s consstent wth the MCP. A survey of the exstng lterature on the pollng models for any applcable models for determnstc tmes of servce [14-16] shows that an analytcal analyss would be extremely dffcult for a pollng model when the servce tmes are determnstc. Moreover, t s an asymmetrc pollng system wth feedback, nfnte buffers and a fnte swtchover tme, gated servce and cyclc servce order. All these condtons make the problem computatonally ntractable and shft the focus from the man am of gettng the performance measures of the NIC and valdatng them through extensve smulatons. Instead, a dfferent way of analytcal modelng for node LANa s adopted to whch the exstng methods of analyss can be appled. The performance of LANa s mathematcally approxmated as follows. LANa s a node that serves a sngle queue, whch contans three dfferent classes of traffc. The traffc correspondng to dfferent classes s thus pooled up nto a sngle queue, and the queue s served on a Frst Come Frst Served (FCFS) bass. Here les the basc assumpton of the modelng: for the purpose of analytcal analyss to obtan the performance measures under the exstng parameters of operaton, poolng up the class traffc s mmateral. Ths assumpton can be verfed wth smulatons. If all the other desgn s same, the followng two smulaton models can be compared to obtan the effect of poolng up the traffc of all classes nto a sngle queue at node LANa. (1) Smulaton model 1 n whch all the classes are queued up for LANa n the same queue. (2) Smulaton model 2 that has three separate queues for the three classes of traffc at node LANa. The servce tmes for dfferent classes are gven n the Table 2. Node 2 (HDMA) serves the traffc comprsng of Classes 1 and 2, namely, doorbells and descrptors. It models the operaton of HDMA. Classes 1 and 2 arrve nto an FCFS queue accordng to a general arrval process that s equvalent to the departure process from Node 1. HDMA servce effectvely transforms the class of messages. For example, HDMA servce of a doorbell assgns a descrptor and places t n the SRAM, whch n ths model s Node 1. It s modeled as changng a Class 1 message n to a Class 2 message upon departure from Node 2. Thus, after servce completon, Class 1 becomes a Class 9

10 2 and goes nto SRAM (node 1). Lkewse, Class 2 becomes Class 3 and resdes n SRAM to be pcked up by NSDMA. The servce tmes are gven n the Table 2. The servce tme for Class 2 messages s more than double the servce tme for Class 1 messages. Servcng messages of Class 1 n the hardware terms s equvalent to obtanng the descrptor contaned n the doorbell. Ths descrptor provdes the nformaton about the data that s pcked by the NIC and put on the network. The descrptor s processed by HDMA to get the memory locaton detals, and the data s transferred onto the temporary memory to be pcked up by NSDMA. Ths s the hardware level explanaton for the analytcal class swtchng from 2 to 3. Node 3 (NSDMA) has a queue that receves Class 3 messages, namely, data. Ths node models the operaton of the NSDMA. Class 2 messages after gettng served at Node 2, whch models the operaton of HDMA, are put on the SRAM of the NIC. In case there are multple data, they are queued up n the SRAM, and LANa processes them n FCFS bass. The hardware desgn of Myrnet NIC does not allow queueng of messages at NSDMA,.e., the node s effectvely a G/D/1/1 queue wth blockng. As part of the Myrnet Control Program (MCP), LANa checks for the status of the NSDMA and the SRAM queue for any data avalable for transfer. The entre operaton of puttng the data on the network depends on the status of the NSDMA and the avalablty of the data to be transferred on to the network. In all of the scenaros explaned below, data resdes n the SRAM queue, and the data that s to be transferred onto the network s the frst data that s n the queue. Scenaro 1: Data to be transferred on to the network s present n SRAM, and NSDMA s busy Result of MCP: There are no arrvals to NSDMA whle a servce s n progress snce LANa does not pass a message to t f the latter s stll busy. Scenaro 2: Data to be transferred on to the network s present n SRAM, and NSDMA s dle. Result of MCP: LANa passes a message to NSDMA by programmng t to pck up the message from SRAM. Scenaro 3: Data to be transferred on to the network s not present n SRAM, and NSDMA s busy. Result of MCP: Lana does not pass any message and contnues wth the next operaton under MCP. Scenaro 4: Data to be transferred on to the network s not present n SRAM, and NSDMA s dle. Result of MCP: Nothng happens n ths scenaro and LANa proceeds to next operaton under MCP. Table 1 summarzes all of the scenaros and the outcome for each of them. Scenaro Avalablty of Data Status of NSDMA Programmng of NSDMA by LANa 1 Avalable Busy No 2 Avalable Idle Yes 3 Not Avalable Busy No 4 Not Avalable Idle No Table 1 Four dfferent scenaros for programmng of NSDMA by LANa These scenaros have to be captured analytcally, to be ncorporated n our model. It s essentally a status checkng process by LANa. The modelng of NSDMA thus depends on some approxmatons that are stated here. One of the mportant condtons that needs to be satsfed for any network to model t as a mult-staton and mult-class open queueng network s the avalablty of nfnte watng space n the queues at each of ts nodes. For analytcal purposes, an attempt s made here to model NSDMA as a node that has nfnte space. The network s desgned such that the servce tme for messages of Class 3 at Node 1 s an average value that takes nto consderaton of all the four scenaros explaned above. In realty, LANa can program NSDMA only n Scenaro 2, and the tme that t takes to program NSDMA to pck up the data from SRAM s 10 mcroseconds. A way of gettng around ths problem s estmatng the probablty of the occurrence of Scenaro 2 and multplyng t wth the tme that s requred to program NSDMA (10 10

11 mcroseconds) and usng the result as the servce tme for messages of Class 3 at Node 1. It wll provde an average servce tme for servcng the traffc correspondng to Class 3 (data) by LANa. Each tme LANa servces data wth an approxmated servce tme, whch wll reflect the probablty of programmng of NSDMA by LANa. The next paragraph wll propose and explan n detal the approxmaton that s used to acheve the result stated above. Let t be the servce tme for a data message at node NSDMA. Let λ be the arrval rate of data traffc at NSDMA. These two values are avalable from Table 2. From the model, λ s the arrval rate chosen for the doorbells. The servce tme t ( mcroseconds) can be obtaned from the Table 2. Therefore, probablty that NSDMA s busy λ*t and probablty that NSDMA s dle 1 - λ*t. When NSDMA s dle, a message n the data queue on the SRAM mght be present or mght not be present. Assumng equal probablty, p = Probablty that NSDMA s dle and a message s present n SRAM 0.5*(1 - λ*t) Note that ths assumpton s made only for the analytcal model. Ths does not affect the smulatons. Table 2 uses p n the calculaton of estmated servce tme of data messages at node LANa. The average servce tme for the data messages at LANa s approxmately the product of probablty that NSDMA s dle and a message s present n SRAM and the tme that takes for LANa to program NSDMA. Therefore, servce tme for messages of type Class 3 at Node 1 10*0.5*(1 - λ*t) mcroseconds and servce rate for messages of type Class 3 at Node 1 1 / (10*0.5*(1 - λ*t)) mcroseconds. Ths value s used to compute the aggregate servce rate at Node 1. Mean arrval rates and aggregate servce rates are avalable from Table 2 at all of the nodes for the mult-staton and mult-class open queueng network algorthm to calculate the utlzatons at each node. Each class has a determnstc servce tme n each queue namely LANa, HDMA and NSDMA n accordance wth the followng table. Class Node 1 (LANa) Node 2 (HDMA) Node 3 (NSDMA) 1 (doorbells) N/A 2 (descrptors) N/A 3 (data) 10*p N/A Table 2 Servce tmes n mcroseconds measured on a Myrnet NIC In Table 2, f a node does not serve traffc of a class, the term N/A (Not Applcable) s used to ndcate so. All the values are n mcroseconds. The MCP program runnng on the NIC, cycles through all of the destnatons, copes the message data to the NIC buffer, and sends the data n packets to all destnatons n turn. In order to deal effcently wth varable sze fragments, packets do not correspond to fragments, but are fxed sze blocks contanng segments of fragments. Fragments may span block boundares, and a block can contan one or more segments, dependng on fragment szes. The recevng NIC n the cluster network reassembles these segments back nto fragments and adds them to the message queue. To mantan the synchronzaton, the sender NIC s always emt packets, also when there s not enough data avalable for a partcular destnaton, n whch case, the block contans empty segments. Thus, each packet s a fxed sze block contanng segments of fragments. The values n Table 2 assume a block sze of 4 Kbytes, and correspondng transfer tmes at the DMA engnes are computed [17]. Table 2 provdes detals about servce tmes of varous classes of traffc at each node. Arrval rates for descrptors and data are the same as the arrval rate for doorbells. Varous numercal values are chosen for the arrval rate of doorbells. The squared coeffcent of varaton (SCOV) for the servce tmes at each node for each class s ntalzed n conjuncton wth the type of the servce. In the case of determnstc servce tmes as the present analytcal model for NIC, all the values C 2 for =1, 2 and 3 and r = 1, 2 and S, r 3 are ntalzed to zero. All these values are used n the decomposton algorthm n Secton 2.2 and performance measures at each node are obtaned. 11

12 3.2 Summary of the analytcal model Secton 3.1 contaned detaled descrpton of the analytcal model proposed for obtanng the performance of NIC. Pollng by LANa, programmng of NSDMA by LANa, class swtchng from doorbells to descrptors and from descrptors to data make t mpossble to use the decomposton algorthm descrbed n Secton 2.2. There are several assumptons and smplfcatons made n arrvng at the analytcal model for modelng the performance of the NIC. All of the smplfcatons are predcted to be observed and need to be verfed wth extensve smulatons. The most notable smplfcatons are: (1) Mathematcal approxmaton for pollng by LANa: In a NIC, LANa polls three queues, namely, doorbells, descrptors, and data. In the analytcal model, LANa s a node wth a sngle queue wth multple class traffc correspondng to doorbells, descrptors, and data. Ths approxmaton s requred to be able to apply the decomposton algorthm descrbed n Secton 2.2. (2) Mathematcal approxmaton for programmng of NSDMA by LANa: In a NIC, NSDMA s a node wth zero watng space and the servce of data traffc at NSDMA depend on four scenaros outlned n Secton 3.1. Analytcally, NSDMA s modeled as a node wth a sngle queue and nfnte watng space. Ths approxmaton s requred to be able to apply the decomposton algorthm descrbed n Secton 2.2. (3) Estmated probablty for Scenaro 2: An approxmaton s used n estmatng the probablty of Scenaro 2,.e., that there s data avalable n SRAM when NSDMA s dle. Ths approxmaton s needed to obtan an estmated servce tme for data traffc at node LANa and model NSDMA staton as havng a sngle queue wth nfnte watng space. Analytcal results wll be compared wth the smulaton results, where n the analytcal results we use p = 0.5, whch s not done n smulaton. (4) Class swtchng: There s a class swtchng nvolved n the network. After gettng served at node HDMA, doorbells are converted to descrptors. Smlarly, after gettng served at node HDMA, descrptors are converted to data. The decomposton algorthm explaned n Secton 2.2 can be appled only when class swtchng s not present n the queueng network. Secton 3.3 dscusses the numercal results to test the above smplfcatons and abstractons Numercal Results In ths secton, a detaled descrpton of numercal results usng the proposed mult-staton, multclass open queueng network model are presented for the performance analyss of a VIA NIC. The results are computed for sx dfferent test cases. For each case, an arrval rate for the doorbells s chosen n such a way that the sx cases comprse a range of traffc ntenstes. Once the arrval rate of doorbells s chosen, the arrval rate of descrptors and data wll be the same as the arrval rate of doorbells because Classes 2 and 3 are essentally the transformed versons of Class 1 at Node 2. Let ths arrval rate be λ. As explaned n the prevous secton, an estmated probablty of 0.5 s proposed for the probablty of data beng avalable when NSDMA s dle. Snce the servce tmes are determnstc, C 2 for = 1,2 and 3 and r = S, r 1,2 and 3 s zero. Fgure 4 shows the utlzatons of all the three nodes under varous arrval rates. Note that the utlzaton values do not have unts. of node s the rato of mean arrval rate at node to the maxmum possble servce rate at node. s are computed usng (6) n Secton 2.2. results provde valuable nformaton about the message loads that each node s subjected to and are very useful n fndng the bottlenecks n the system, whch forms a crucal part of queueng network analyss. s of the nodes ncrease wth the ncrease n arrval rate. From Fgure 4, at any gven arrval rate, HDMA s the node wth the hghest utlzaton, and LANa s the node wth the lowest utlzaton. The utlzaton of HDMA lnearly ncreases wth the ncrease n arrval rate and wll be 1 when 12

13 the mean arrval rate at node HDMA s equal to the mean servce rate of node HDMA. Compared to t, the utlzatons of the other two nodes are consderably less. Thus, HDMA s the bottleneck node n the NIC. Hence sgnfcant mprovements n the performance of NIC can be obtaned by mprovng the performance of HDMA rather than by mprovng the performance of the other nodes. For the purpose of analytcal approxmatons, t may be necessary to accurately model only the bottleneck node. s of the nodes usng analytcal model Arrval Rate LANa HDMA NSDMA Fgure 4: s of the nodes usng the analytcal model Arrval Rate λ Queue Length at LANa Queue Length at HDMA Queue Length at NSDMA Table 3 Mean queue lengths at the nodes usng the analytcal model Based on the mult-staton and mult-class open queueng network analyss n Secton 2.2, Table 3 provdes the mean queue lengths at the three nodes for dfferent arrval rates. Mean queue lengths are computed usng (14) n Secton 2.2. Note that mean queue length s a number and does not have unts. Mean queue lengths of the nodes ncrease wth the ncrease n the arrval rate. From Table 3, the length of the queue for HDMA s ncreasng rapdly wth the ncrease n the arrval rate and would approach nfnty as the queue becomes unstable at HDMA wth the ncreasng arrval rate. The percentage of ncrease n the queue length of HDMA s very large compared to the other nodes snce t s the bottleneck node n the network. It makes sense because HDMA s the node wth the hghest utlzaton n the network. The queue lengths at LANa and NSDMA are comparatvely nsgnfcant. Mean queue lengths depend upon the mean servce tmes and the mean arrval rate at each node and the assumptons summarzed n Secton 3.2 are not the reasons for the nsgnfcance of mean queue lengths of LANa and NSDMA. 4. Smulatons Ths secton deals wth the smulaton models that are developed to valdate the analytcal model. The smulatons are performed usng a commercal-off-the-shelf smulaton software package ARENA [6]. It s crucal to note that two dfferent smulaton models are desgned to mmc the performance of a NIC. Both smulaton models are desgned wth zero watng space at the NSDMA server (.e., they permt 13

14 blockng and LANa checks). The frst smulaton model depcts the archtecture of a NIC n whch all the messages are queued up n a sngle queue for LANa and t serves the messages n the order of arrval (FCFS). Ths s dentcal to the scenaro n the analytcal model wth respect to the operaton of LANa. The man purpose s to verfy the accuracy of the analytcal model. The second smulaton model depcts the archtecture of a NIC n whch LANa polls dfferent queues correspondng to varous components of NIC. Ths s a software smulaton of the exact NIC operaton, so that the analytcal model performance can use ths as a benchmark for comparson. The performance measures (mean queue length and utlzaton at each node) for both the smulaton models are obtaned and compared for accuracy. The assumpton nvolved n the analytcal model that the poolng-up of the messages n a sngle queue for LANa s a smplfcaton for the actual Myrnet NIC s checked wth the smulatons. We frst present the two smulaton models (Sectons 4.1 and 4.2) and then compare the models (Secton 4.3). 4.1 Frst Smulaton Model The model has 3 nodes, one correspondng to each of the LANa, HDMA and NSDMA. The three classes of traffc are doorbells, descrptors, and data. LANa s modeled as a node that serves all the three dfferent types of messages pooled up n to a sngle queue wth nfnte watng space. HDMA s modeled as a node that serves a queue that conssts of two types of messages: doorbells and descrptors. The queue has nfnte watng space. The performance of NSDMA s modeled n the exact way as n the NIC. The NSDMA node processes messages of type data but does not serve them from a queue. If NSDMA s free and f there s a message of type data avalable, LANa programs NSDMA to pck up the data and the servce for that partcular message wll be started at node NSDMA. A check for the avalablty of the resource NSDMA s placed n the smulaton model to detect ths scenaro. If NSDMA s busy, the message wll wat n the queue for LANa. Ths frst smulaton model conssts of one mathematcal approxmaton that s used n the analytcal model,.e., LANa serves messages from a sngle queue nto whch all three types of messages are pooled-up. Referrng to Secton 3.3 regardng the assumptons made n the analytcal model, modelng the performance of NSDMA n exact way as n NIC removes the necessty of usng the estmated probablty Second Smulaton Model Ths smulaton model captures the exact behavor of the NIC. In addton to the frst smulaton model dscussed n Secton 4.1, t removes the mathematcal approxmaton for LANa that t serves a sngle queue, whch contans multple class traffc. Instead t uses three dfferent queues: one for each of doorbells, descrptors, and data. Node LANa now serves these queues n cyclc order and wthn each queue; the order of servce s FCFS. The servce tmes are same as that are gven n Table 2. The second smulaton model s the only model among the three that provdes nformaton about the lengths of queues on SRAM correspondng to doorbells, descrptors, and data (see Table 4). Arrval Rate λ Doorbell Queue Length Descrptor Queue Length Data Queue Length Table 4 Mean queue lengths at the nodes usng the second smulaton model 14

15 4.3 Comparson of the Two Smulaton Models The dfference between both the smulaton models s the modelng of performance of LANa. The frst smulaton model has LANa servng all types of messages pooled-up n to a sngle queue on FCFS bass. The second smulaton model conssts of three separate queues, one for each of the doorbells, descrptors and data. The two smulaton models are compared n order to verfy the assumpton of poolng dfferent SRAM queues n to a sngle queue. If the results show a match, modelng NIC analytcally usng a mult-staton and mult-class open queueng network s justfed. Table 5 compares the two smulaton models wth respect to the utlzatons of the dfferent nodes. The utlzatons of HDMA and NSDMA are exactly the same n both smulaton models. In the case of node LANa (the only node where the two smulaton models dffer), the utlzatons are nearly same wth the maxmum error equal to 1.38% at the largest arrval rate among the sx numercal values chosen. Mathematcal approxmaton of node LANa practcally dd not affect the utlzaton values of the nodes n the network. To obtan the performance measures of the network, t s a very useful result that supports the assumpton that for the gven parameters of Myrnet NIC, LANa servng a sngle queue whch has all the types of messages pooled up s equvalent to LANa servng dfferent queue whch are present n SRAM. Arrval Rate λ of LANa n model 1 of LANa n model 2 of HDMA n model 1 of HDMA n model 2 of NSDMA n model 1 of NSDMA n model Table 5 Comparson of the two smulaton models for the utlzatons of nodes Arrval Rate λ Length of HDMA Queue n model 1 Length of HDMA Queue n model Table 6 Comparson of the two smulaton models for mean queue lengths of HDMA Arrval Rate λ Queue Length at node LANa n model 1 Sum of the lengths of three ndvdual queues whch LANa polls n model Table 7 Comparson of mean queue lengths at LANa n the two smulaton models 15

16 Table 6 and 7 compare the mean queue lengths of node HDMA and LANa respectvely n the two smulaton models. Table 7 shows a maxmum dfference of 6.76%. Strctly speakng, these values cannot be compared because the second smulaton model does not have a sngle LANa queue. They are presented here for the completeness of comparson of the both smulaton models. The most notable result that s obtaned by comparng the two smulaton models s that for the gven parameters of NIC, LANa can be mathematcally abstracted to be a node that polls a sngle queue n FCFS manner n to whch all of the dfferent knds of messages (doorbells, descrptors and data) are pooled up. 5. Comparson of Analytcal and Smulaton Models Arrval Rate λ Analytcal of LANa Smulated of LANa Analytcal of HDMA Smulated of HDMA Analytcal of NSDMA Smulated of NSDMA Table 8 Comparson of utlzatons of nodes n analytcal and smulaton models Ths secton presents a comparson between analytcal and smulaton results. There are two types of smulaton results avalable, and the second smulaton model results are used to check the accuracy of the analytcal model. The second smulaton model s chosen because t represents the true behavor of NIC, and n ths secton t wll be henceforth referred to as the smulaton model. The effects of all the assumptons that are made n the analytcal model are observed. Table 8 shows the comparson between the analytcal and the smulaton models for the utlzaton of dfferent nodes. Mean queue lengths at HDMA n analytcal and smulaton models for dfferent arrval rates Queue Length Arrval Rate HDMA n analytcal model HDMA n smulaton model Fgure 5: Mean queue lengths at HDMA n analytcal and smulaton models The utlzaton results match very closely for HDMA and NSDMA nodes, wth the maxmum error percentage beng The devaton n the utlzaton values for the node LANa (maxmum error percentage s 26.81) s due to the approxmaton nvolved n the estmated probablty of 0.5 that s 16

17 chosen for the probablty of messages beng present n the data queue when NSDMA s dle. The devaton n the utlzaton of node LANa s not a crtcal result for two reasons. Frstly, the LANa node s a mathematcal abstracton for the performance of LANa, and secondly HDMA s the bottleneck node n the network. Nonetheless, the approxmaton nvolved n the estmated probablty value s bound to nfluence the mean queue length of HDMA, whch s the other performance measure of nterest n the present study. Fgure 5 compares the mean queue lengths of HDMA n the two models for dfferent arrval rates. The analytcal queue length of queue that the NSDMA serves cannot be compared wth the smulaton because n smulaton, the NSDMA does not serve any queue. The queue length of node LANa can be compared by summng up the lengths of the queues that are polled by LANa n the smulaton model (see Table 9). Arrval Rate λ Analytcal queue length of node LANa Sum of lengths of three ndvdual queues that LANa polls (smulaton) Table 9 Mean queue lengths at LANa n analytcal and smulaton models Summarzng the comparson between the analytcal and smulaton performance measures, (1) In most cases, analytcal performance measures are less than smulated performance measures. (2) values of HDMA and NSDMA match n both models. (3) values of LANa n analytcal model are lower than the values n smulaton model. (4) The analytcal model predcts the mean queue length of the bottleneck node n the network (HDMA) wthn an average error of 14% and a peak-utlzaton error of 20-25%, whch are farly good estmates. At lower utlzatons, the model predcts the mean queue length of HDMA wth hgher accuracy. The estmated probablty for Scenaro 2 explaned n Secton 3.1 affects the utlzaton value for LANa n the analytcal model. For all other performance values, the devatons are attrbuted to varous smplfyng assumptons under whch analytcal model s obtaned: class-swtchng, mathematcal abstracton for programmng NSDMA and the estmated probablty for Scenaro 2 n Secton Concludng Remarks and Future Work Ths secton summarzes ths research work and provdes ponters to future developments possble n ths area. Secton 6.1 provdes a short synopss of modelng, smulaton and the comparson between both of them to check the valdty. Secton 6.2 hghlghts the research accomplshments, and Secton 6.3 presents concludng remarks of the work wth possble enhancements that can be made and possble other research opportuntes that le ahead. 6.1 Summary of the Research Work A mult-staton and mult-class queueng network model s appled to study the performance of Myrnet NIC. The statons correspond to LANa and the DMA engnes. Dfferent messages n the system, whch are doorbells, descrptors and data, are modeled as dfferent classes of traffc n the queueng network. Varous smplfyng assumptons are made whch are essental for applyng the proposed 17

18 analytcal model. From the pont of vew of desgn, two mathematcal abstractons (modelng LANa as a node where as n realty t s a processor whch vsts certan number of queues n a predetermned order, and modelng the programmng of NSDMA by LANa to pck the avalable data messages on SRAM when t s dle) are needed to develop a mathematcally tractable model. Important performance measures for the desgn of NIC are obtaned analytcally. The bottleneck node of the system s HDMA. Two smulaton models are presented as part of the study. They dffer n the desgn of node LANa. LANa n the frst smulaton model servces on a FCFS bass a sngle queue n whch all the three classes of messages are pooled up. LANa n the second model polls cyclcally three queues correspondng to doorbells, descrptors and data, whch resde on SRAM. Results of the two smulaton models are almost dentcal, and the basc assumpton for the valdty of analytcal model that poolng up of the three classes nto a sngle queue s not gong to affect the performance s verfed. The major dfference between the analytcal and the smulaton models s the desgn of programmng NSDMA by LANa. The analytcal model uses an estmated probablty for the case of NSDMA beng dle and a data message beng avalable on SRAM. NSDMA serves a queue wth nfnte watng space n the analytcal model. The smulatons desgned the programmng by LANa n exactly the same way as n a NIC. NSDMA does not serve any queue and a resource status check s used for NSDMA to know whether t s busy or dle. The analytcal model predcts the mean queue length of the HDMA reasonably well. 6.2 Contrbutons from ths Research Work The contrbutons from ths research work are as follows. (1) Applyng the exstng queueng modelng prncples to obtan the performance measures of a NIC. It provdes an alternatve to obtanng performance measures by testng or by smulatons, whch may be expensve and computatonally tme ntensve. (2) Ablty to study varous desgn alternatves for the components of NIC quckly. Ths ablty s a very mportant feature of analytcal modelng. It provdes the ablty to evaluate alternate desgns wthout gong for smulatons or experments that are expensve and tme-consumng. For example, changng the order of servce for LANa s not gong to affect the performance. The analyss presented n Secton 2.2 wll hold good for any dstrbuton and for any knd of dscplne as long as t s work conservng. (3) Provdng a general framework for analyss of NIC that can be referred for future work. (4) Identfyng the bottleneck n the system to be HDMA, the man drect memory access DMA engne for processng doorbells and descrptors. (5) Reducng the effort n computaton to obtan the performance measures approxmately n a much easer and faster way. Once the requred parameter values are put n the algorthm for a NIC, the analytcal results are obtaned n less than a second. Table 10 provdes the tme taken for the pollng smulaton model at varous arrval rates. Arrval Rate λ Tme taken n mnutes for smulaton model Table 10 Tme taken n mnutes for the second smulaton model to run 18

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory U J.T. (: 33- (pr. 0 Optmzaton of Local Routng for Connected odes wth Sngle Output Ports - Part I: Theory Dobr tanassov Batovsk Faculty of Scence and Technology ssumpton Unversty Bangkok Thaland E-mal:

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Modelling a Queuing System for a Virtual Agricultural Call Center

Modelling a Queuing System for a Virtual Agricultural Call Center 25-28 July 2005, Vla Real, Portugal Modellng a Queung System for a Vrtual Agrcultural Call Center İnc Şentarlı, a, Arf Orçun Sakarya b a, Çankaya Unversty, Department of Management,06550, Balgat, Ankara,

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Computer Communications

Computer Communications Computer Communcatons 3 (22) 3 48 Contents lsts avalable at ScVerse ScenceDrect Computer Communcatons journal homepage: www.elsever.com/locate/comcom On the queueng behavor of nter-flow asynchronous network

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

Analysis of a Polling System Modeling QoS Differentiation in WLANs

Analysis of a Polling System Modeling QoS Differentiation in WLANs Analyss of a Pollng System Modelng QoS Dfferentaton n WLANs T.J.M. Coenen Unversty of Twente Department of Appled Mathematcs Enschede, The Netherlands t.j.m.coenen@utwente.nl J.L. van den Berg TNO Informaton

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007 Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Bu gra Gedk College of Computng, GaTech bgedk@cc.gatech.edu Kun-Lung Wu, Phlp Yu T.J. Watson Research, IBM {klwu,psyu}@us.bm.com Lng Lu College of Computng,

More information

A Sub-Critical Deficit Round-Robin Scheduler

A Sub-Critical Deficit Round-Robin Scheduler A Sub-Crtcal Defct ound-obn Scheduler Anton Kos, Sašo Tomažč Unversty of Ljubljana, Faculty of Electrcal Engneerng, Ljubljana, Slovena E-mal: anton.kos@fe.un-lj.s Abstract - A scheduler s an essental element

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Buğra Gedk, Kun-Lung Wu, Phlp S. Yu, Lng Lu College of Computng, Georga Tech Atlanta GA 333 {bgedk,lnglu}@cc.gatech.edu IBM T. J. Watson Research Center Yorktown

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms On Achevng Farness n the Jont Allocaton of Buffer and Bandwdth Resources: Prncples and Algorthms Yunka Zhou and Harsh Sethu (correspondng author) Abstract Farness n network traffc management can mprove

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Preconditioning Parallel Sparse Iterative Solvers for Circuit Simulation

Preconditioning Parallel Sparse Iterative Solvers for Circuit Simulation Precondtonng Parallel Sparse Iteratve Solvers for Crcut Smulaton A. Basermann, U. Jaekel, and K. Hachya 1 Introducton One mportant mathematcal problem n smulaton of large electrcal crcuts s the soluton

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

A Statistical Model Selection Strategy Applied to Neural Networks

A Statistical Model Selection Strategy Applied to Neural Networks A Statstcal Model Selecton Strategy Appled to Neural Networks Joaquín Pzarro Elsa Guerrero Pedro L. Galndo joaqun.pzarro@uca.es elsa.guerrero@uca.es pedro.galndo@uca.es Dpto Lenguajes y Sstemas Informátcos

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Control strategies for network efficiency and resilience with route choice

Control strategies for network efficiency and resilience with route choice Control strateges for networ effcency and reslence wth route choce Andy Chow Ru Sha Centre for Transport Studes Unversty College London, UK Centralsed strateges UK 1 Centralsed strateges Some effectve

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information