Rapid growth in wireless communication systems motivates the development of technology supporting the simulation of large-scale wireless systems. However, it is widely recognized that wireless communications do not ha...
详细信息
ISBN:
(纸本)9780769516080
Rapid growth in wireless communication systems motivates the development of technology supporting the simulation of large-scale wireless systems. However, it is widely recognized that wireless communications do not have substantial "lookahead" needed by conservative synchronization protocols. This paper focuses on identifying and exploiting lookahead for such models. We find lookahead in three ways, exploiting characteristics of low power networks, the transceiver logic, and the way in which protocol stacks are typically constructed. We show how these observations allow a variety of conservative synchronization protocols to take advantage of lookahead, describe a synchronization method we use, and empirically examine the performance this method offers on a large-scale simulation of a sensor network intended for homeland defense scenarios
Recent papers have shown that the performance of Time Warp simulators can be improved by appropriately selecting the positions of checkpoints, instead of taking them on a periodic basis. In this paper, we present a ch...
详细信息
Recent papers have shown that the performance of Time Warp simulators can be improved by appropriately selecting the positions of checkpoints, instead of taking them on a periodic basis. In this paper, we present a checkpointing technique in which the selection of the positions of checkpoints is based on a checkpointing-recovery cost model. Given the current state S, the model determines the convenience of recording S as a checkpoint before the next event is executed. This is done by taking into account the position of the last taken checkpoint, the granularity (i.e., the execution time) of intermediate events, and using an estimate of the probability that S will have to be restored due to rollback in the future of the execution. A synthetic benchmark in different configurations is used for evaluating and comparing this approach to classical periodic techniques. As a testing environment we used a cluster of PCs connected through a Myrinet switch coupled with a fast communication layer specifically designed to exploit the potential of this type of switch. The obtained results point out that our solution allows faster execution and, in some cases, exhibits the additional advantage that less memory is required for recording state vectors. This possibly contributes to further performance improvements when memory is a critical resource for the specific application. A performance study for the case of a cellular phone system simulation is finally reported to demonstrate the effectiveness of this solution for a real world application.
Sandia National Laboratories has the role of system integrator in the US Department of Energy's Nuclear Weapons Complex (NWC) and the responsibility for maintaining the nuclear stockpile. Maintenance is a complex ...
详细信息
Sandia National Laboratories has the role of system integrator in the US Department of Energy's Nuclear Weapons Complex (NWC) and the responsibility for maintaining the nuclear stockpile. Maintenance is a complex task that involves a great number of geographically distributed functions, and a variety of analysis tools and models are used to plan operations, assess capabilities and guide political decisions. We are developing a framework for modeling the NWC unde interactive human control. The framework consists of a simulation system whose users and components are distributed across the entire United States. The purpose of the system is to support decisions about questions ranging from low-level operational matters involving only a sub-component of the complex to high-level policy issues requiring simulation of the entire complex. The system integrates multiple domain-specific legacy models and policy models and allows simulation at varying levels of detail. To provide such a framework, we have had to address a number of technical problems, whose solution is the focus of this paper. The three most fundamental problems are to provide geographically distributed, synchronized human participation in the simulation;to provide distributed ownership and security in such a way that the facility hosting a domain-specific model retains all rights to provide or deny a user access to its information;and to integrate legacy models written in a variety of tools or languages and executed on different platforms. Key features of our approach are the use of the Java language and the coordination of the simulation through a new parallel discrete-event simulation system. (C) 2000 Elsevier Science B.V. All rights reserved.
parallel discrete-event simulation systems (PDES) are used to simulate large-scale applications such as modeling telecommunication networks, transportation grids, and battlefield scenarios. While a large amount of PDE...
详细信息
parallel discrete-event simulation systems (PDES) are used to simulate large-scale applications such as modeling telecommunication networks, transportation grids, and battlefield scenarios. While a large amount of PDES research has focused on employing multiprocessors and multicomputers, the use of networks of workstations interconnected through Ethernet or ATM has evolved into a popular effective platform for PDES. Nonetheless, the development of efficient PDES systems in network computing environments is not without obstacles that severely degrade simulator performance. To better understand how these factors degrade performance as well as develop new algorithms to mitigate them, we investigate the use of graphical visualization to provide insight into performance evaluation and simulator execution. We began with a general-purpose network computing visualization system, PVaniM, and used it to investigate the execution of an advanced version of Time Warp, called Georgia Tech Time Warp (GTW), which executes in network computing environments. Because PDES systems such as GTW are essentially middleware that support their own applications, we soon realized these systems require their own middleware-specific visualization support. To this end we have extended PVaniM into a new system, called PVaniM-GTW by adding middleware-specific views. Our experiences with PVaniM-GTW indicates that these enhancements enable one to better satisfy the needs of PDES middleware than general-purpose visualization systems while also not requiring the development of application-specific visualizations by the end-user. (C) 1999 Elsevier Science B.V. All rights reserved.
Long-lived parallel applications running on workstation clusters are vulnerable to single-node or multiple-node failures. Fault recovery is therefore important in avoiding immature program termination. However, much o...
详细信息
Long-lived parallel applications running on workstation clusters are vulnerable to single-node or multiple-node failures. Fault recovery is therefore important in avoiding immature program termination. However, much of the runtime overhead imposed by fault tolerance schemes is generally due to the cost of transferring the checkpoint states of applications by disk I/O operations. In this paper, we propose a fault tolerant model in which disk I/O operations are not required because checkpoint states are transferred between replicated parallel applications. We also describe how the resource consumption of the replicated applications can be effective. To achieve this, applications are constructed as computation agents that can reconfigure dynamically according to resource availability. The fault tolerant model has been implemented and tested on a workstation cluster and a Fujitsu AP3000 multiprocessor machine. The measurements of our experiments have showed that efficient fault tolerance can be achieved by replicating parallel applications on workstation clusters. (C) 1999 Elsevier Science Inc. All rights reserved.
Can parallelsimulations efficiently exploit a network of workstations? Why haven't PDES models followed standard modeling methodologies? Will the field of PDES survive, and if so, in what form? Researchers in the...
详细信息
ISBN:
(纸本)9780818671203
Can parallelsimulations efficiently exploit a network of workstations? Why haven't PDES models followed standard modeling methodologies? Will the field of PDES survive, and if so, in what form? Researchers in the PDES field have addressed these questions and others in a series of papers published in the last few years [1,2,3,4]. The purpose of this paper is to shed light on these questions, by documenting an actual case study of the development of an optimistically synchronized PDES application on a network of workstations. This paper is unique in that its focus is not necessarily on performance, but on the whole process of developing a model, from the physical system being simulated, through its conceptual design, validation, implementation, and, of course, its performance. This paper also presents the first reported performance results indicating the impact of risk on performance. The results suggest that the optimal value of risk is sensitive to the latency parameters of the communications network.
In this paper we propose a new approach to parallel and distributed simulation of discreteevent systems. Most parallel and distributed discreteeventsimulation algorithms are concerned with the simulation of one “l...
详细信息
We examine a primitive that allows application programs to explicitly retract previously scheduled events in Time Warp. Specifically, a simple mechanism for retracting messages is defined, and a correctness proof is p...
详细信息
暂无评论