Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 39, Issue 2September 2011Special Issue on IFIP PERFORMANCE 2011- 29th International Symposium on Computer Performance, Modeling, Measurement and Evaluation
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0163-5999
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Reflects downloads up to 28 Jan 2025Bibliometrics
Skip Table Of Content Section
COLUMN: Regular papers
research-article
SIMROT: a scalable inter-domain routing toolbox

BGP plays a crucial role in the global communications infrastructure, and there is a strong need for tools that can be used for analyzing its performance under different scenarios. The size and complexity of the inter-domain routing system often makes ...

research-article
CloudBridge: on integrated hardware-software consolidation

Data center consolidation has emerged as an important tool to improve the hardware utilization of data centers and reduce delivery costs. Consolidation has traditionally used virtualization to consolidate multiple workloads as different virtual machines ...

COLUMN: Short papers
short-paper
Exploiting network effects in the provisioning of large scale systems

Online services today are characterized by a highly congestion sensitive user base, that also experiences strong positive network effects. A majority of these services are supported by advertising and are offered for free to the end user. We study the ...

short-paper
Performance evaluation of scalable video streaming in multihomed mobile networks

In this paper, we empirically investigate the performance of path selection and packet scheduling algorithms for the delivery of H.264/SVC scalable video streams to users in multihomed mobile networks. These algorithms use the aggregated bandwidth of ...

short-paper
Delay performance of backlog based random access

Backlog-based CSMA strategies provide a popular mechanism for distributed medium access control in wireless networks. When suitably designed, such strategies offer the striking capability to match the optimal throughput performance of centralized ...

short-paper
Comparing slotted and continuous CSMA: throughputs and fairness

Carrier-Sense Multiple-Access (CSMA) protocols form a popular class of random-access schemes for regulating node activity in wireless networks. We compare the continuous and the time-slotted versions of this protocol in the saturated regime, and show ...

short-paper
Analytical model of IEEE 802.11s MCCAbased streaming in the presence of noise

In the paper, we present an analytical study of multimedia stream transmission with the reservation-based channel access method called MCCA in IEEE 802.11s mesh networks. Various aspects of MCCA have been already studied under the assumption that the ...

short-paper
Heavy traffic analysis of the discriminatory randomorderofservice discipline

We study the steady-state queue-length vector in a multiclass single-server queue with relative priorities. Upon service completion, the probability that the next customer to be served is from class k is controlled by class-dependent weights. Once a ...

short-paper
Queueing networks with a single shared server: light and heavy traffic

We study a queueing network with a single shared server, that serves the queues in a cyclic order according to the gated service discipline. External customers arrive at the queues according to independent Poisson processes. After completing service, a ...

short-paper
Fixed-point approximations of bandwidth sharing networks with rate constraints

Bandwidth sharing networks are important flow level models of communication networks. We focus on the fact that it takes a significant number of users to saturate a link, necessitating the inclusion of individual rate constraints. In particular we ...

short-paper
Improving path failure detection in SCTP using adaptive heartbeat time intervals

Path failure detection in the Stream Control Transmission Protocol (SCTP) is a key point to determine its viability as a transport protocol for mobile applications in wireless environments. Whereas most works have focused on how to optimize SCTP failure ...

short-paper
In the network: sandy bridge versus nehalem

The increasing performance of commodity computer hardware has spawned new use cases for the personal computer. Specialized, cost effective network devices, such as firewalls and intrusion detection systems can be implemented with off the shelf ...

short-paper
On the efficiency of perfect simulation in monotone queueing networks

We consider Jackson queueing networks (JQN) with finite capacity constraints and analyze the temporal computational complexity of sampling from their stationary distribution. In the context of perfect sampling, the monotonicity of JQNs ensures that it ...

short-paper
CAUCHY localization: a distributed computation of WSNs

The localization problem of a wireless sensor network (WSN) is posed as a distributed computation performed by the sensors alone. A relatively small number of the nodes along the boundary of the WSN are initialized with their exact locations, which ...

short-paper
On the impact of the flow size distribution's tail index on network performance with TCP connections

In this paper, we study the impact of the flow-size distribution on network performance in the case of a single bottle-neck with finite buffer. To tackle the case where flows are transmitted with the TCP protocol, we use real experiments and ns-2 ...

short-paper
Load balancing and the power of preventive probing

Consider a randomized load balancing problem consisting of a large number n of server sites each equipped with K servers. Under the greedy policy, clients randomly probe a site to check whether there is still a server available. If not, d -- 1 other ...

POSTER SESSION: Posters
poster
Poster: performance study of clustering of Zigbee devices in OPNET

ZigBee, known as IEEE 802.15.4 standard, is designed for Wireless Sensor Network (WSN) due to low power consumption and high reliability. The network layer can support star, tree and mesh topologies. In this work, cluster tree and mesh topologies are ...

poster
Poster: on the capacity delay error tradeoff of source coding

In this note we present a statistical, non-equilibrium envelope model that, based on Legendre transforms, characterizes source coders and transmission channels by their capacity-delay-error-tradeoff. The model is proven to have the desirable property of ...

poster
poster
Poster: skewness variance approximation for dynamic rate MultiServer queues with abandonment

Large scale systems such as customer contact centers, like telephone call centers, as well as healthcare centers, like hospitals, have customer inflow-outflow dynamics with many common features. The customer arrival patterns may have time of day or ...

Subjects

Comments