• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,742
Next 10 →

Table 3: Network bandwidth consumption for common file-system operations. Shows the total number of bytes transmitted between all the nodes for each operation. Overhead shows the percentage of the bandwidth used by harbingers and duplicate updates.

in Taming aggressive replication in the Pangaea wide-area file system
by Yasushi Saito , Christos Karamanolis, Magnus Karlsson, Mallik Mahalingam 2002
"... In PAGE 11: ... Instead, its network usage is near- optimal, with less than 2% of the bandwidth wasted. Table3 shows network bandwidth consumption for com- mon file-system update operations. Operations such as cre- ating a file or writing one byte show a high percentage of overhead, since they are sent directly without harbingers, but they have only a minor impact on the overall wasted bandwidth since their size is small.... ..."
Cited by 90

Table 3: Network bandwidth consumption for common file-system operations. Shows the total number of bytes transmitted between all the nodes for each operation. Overhead shows the percentage of the bandwidth used by harbingers and duplicate updates.

in Taming aggressive replication in the Pangaea wide-area file system
by Yasushi Saito , Christos Karamanolis, Magnus Karlsson, Mallik Mahalingam
"... In PAGE 11: ... Instead, its network usage is near- optimal, with less than 2% of the bandwidth wasted. Table3 shows network bandwidth consumption for com- mon file-system update operations. Operations such as cre- ating a file or writing one byte show a high percentage of overhead, since they are sent directly without harbingers, but they have only a minor impact on the overall wasted bandwidth since their size is small.... ..."

Table 3: Network bandwidth consumption for common file-system operations. Shows the total number of bytes transmitted between all the nodes for each operation. Overhead shows the percentage of the bandwidth used by harbingers and duplicate updates.

in Taming aggressive replication in the Pangaea wide-area file system
by Yasushi Saito, Christos Karamanolis, Magnus Karlsson, Mallik Mahalingam
"... In PAGE 11: ... Instead, its network usage is near- optimal, with less than 2% of the bandwidth wasted. Table3 shows network bandwidth consumption for com- mon file-system update operations. Operations such as cre- ating a file or writing one byte show a high percentage of overhead, since they are sent directly without harbingers, but they have only a minor impact on the overall wasted bandwidth since their size is small.... ..."

Table 4: Comparing the number of messages transmitted and number of replicated copies available for di erent coherence protocols on a network with 5 sites. Control (cntl) messages are used to send update or invalidation messages. Data messages are used to send the entire page data to another site.

in Fault Tolerance and Scalability in DSM Coherence Protocols -- A Simulation Approach
by Sachin Kirit Shah 1997
"... In PAGE 59: ...Table4 along with the number of replicated copies of a page (per operation). The total number of copies that exist is one plus the number of replicated copies.... In PAGE 59: ... As a result, the page remains in write mode, and invariant (1) is not enforced. Table4 compares the behavior of WB, WI, BR(2,5), and BR(3,5) for the same sequence of read and write operations as shown in Figure 8. The number of messages transmitted and replicated copies available are shown.... In PAGE 60: ... 1. Competitive operation costs - By inspecting the total number of messages transmitted by the di erent protocols in Table4 , we observe that BR costs as much as WI and WB. After having scaled the network to a larger size, Table 5 shows that BR transmits less messages than WB and only a few more control messages than WI.... ..."
Cited by 1

Table 1: An excerpt of server packet trace At the start of this episode, cwnd = 2; ssthresh = 1; cong count = 2, the server sends a fresh cwnd of packets out with the retransmission timer set for packet 1. The transmit queue includes packets 1 and 2. After some time, the ACK for packet 1 arrives and cwnd, ssthresh, and cong count are updated accordingly. RTT estimation and RTO computation are performed with RTO value updated to 390ms. New data packets 3 and 4 are sent out. The transmit queue is shifted and now it consists of packets 2, 3, and 4. The retransmission timer for packet 2 is set to 0.390 second. When this timer goes o at time 12.729123 + 0.390 second, cwnd, ssthresh, and cong count are recomputed, and packet 2 is resent with timer set to 0.780 second.

in The Implication of Network Performance on Service Quality
by Yu Zhang, Jia Wang, Srinivasan Keshav 1999
"... In PAGE 19: ... We need to know when an ACK (as a separate packet or piggybacked) arrives in order to trigger the update of cwnd related information and the shift of the transmit queue. An excerpt of server side tcpdump trace ( Table1 ) illustrates the e ect of transmit queue. This episode is part of the trace when transferring 50KB le with delay = 0 and loss rate = 21%.... ..."
Cited by 2

Table 1. Performance statistics network connection between the client and the server is slower. However, the size of the data transmitted and recorded in the remote tests appears to be smaller. This is because the RFB client is adaptive to its computing environment, i.e. when it detects a slower connection, it sends less update requests to the RFB server. In other words, there exists a trade-off between the network bandwidth and the granularity of the frame buffer updates.

in What You See Is What I Saw: Applications of Stateless Client Systems in Asynchronous CSCW
by S. F. Li, A. Hopper 1998
"... In PAGE 4: ... In other words, there exists a trade-off between the network bandwidth and the granularity of the frame buffer updates. For comparison, we have recorded the tasks using the equivalent MPEG video, and the results are as listed in the last two rows of Table1 . The X Time is the time taken by the same user to complete the same tasks on a local X display and the MPEG Size is the size of the resulting MPEG stream generated by an MPEG encoder [16].... In PAGE 4: ... When the screen images are not complex, as in Task1 and Task2, our medium can save up to 80% of the storage space. We observe that it takes a longer time to complete the tasks with our applications than with a local X display, sometimes three times as much ( Table1 ). This is partially because of the heavy traffic involved between the RFB client/server, and partially because of the slow drawing mechanism of the Java programming language [6].... ..."
Cited by 6

Table 1. Performance statistics network connection between the client and the server is slower. However, the size of the data transmitted and recorded in the remote tests appears to be smaller. This is because the RFB client is adaptive to its computing environment, i.e. when it detects a slower connection, it sends less update requests to the RFB server. In other words, there exists a trade-off between the network bandwidth and the granularity of the frame buffer updates.

in What You See Is What I Saw: Applications of Stateless Client Systems
by S. F. Li 1998
"... In PAGE 4: ... In other words, there exists a trade-off between the network bandwidth and the granularity of the frame buffer updates. For comparison, we have recorded the tasks using the equivalent MPEG video, and the results are as listed in the last two rows of Table1 . The X Time is the time taken by the same user to complete the same tasks on a local X display and the MPEG Size is the size of the resulting MPEG stream generated by an MPEG encoder [16].... In PAGE 4: ... When the screen images are not complex, as in Task1 and Task2, our medium can save up to 80% of the storage space. We observe that it takes a longer time to complete the tasks with our applications than with a local X display, sometimes three times as much ( Table1 ). This is partially because of the heavy traffic involved between the RFB client/server, and partially because of the slow drawing mechanism of the Java programming language [6].... ..."
Cited by 6

Table 3 Percentage of transmitted packets for DPS run with different time series forecasting methods

in sensor
by Yann-ae¨l Le Borgne A, Silvia Santini B, Gianluca Bontempi A
"... In PAGE 7: ...1. Gains in update rate Table3 reports the percentage of packets sent when running the DPS with the CM and AR models with orders from 1 to 5 (AR1; .... In PAGE 8: ...Table3 contains the model that yielded the lowest update rate, and that was consequently selected by the AMS procedure. 5.... ..."

Table 4: Number of messages transmitted per hour for ICP and Cache Digests. Of course, Cache Digests require signi cantly fewer messages. Cache Digests use about one message per digest update. For this experiment, digests were expired with one hour intervals. Thus the number of digests received is approximately the number of cache peers that support Cache Digests. We send more digest messages than we receive because some messages go to peers which are either dead or do not have Cache Digest support.

in Cache Digests
by Alex Rousskov, Duane Wessels 1998
Cited by 83

Table 4: Number of messages transmitted per hour for ICP and Cache Digests. Of course, Cache Digests require signi cantly fewer messages. Cache Digests use about one message per digest update. For this experiment, digests were expired with one hour intervals. Thus the number of digests received is approximately the number of cache peers that support Cache Digests. We send more digest messages than we receive because some messages go to peers which are either dead or do not have Cache Digest support.

in Cache Digests
by Alex Rousskov, Duane Wessels 1998
Cited by 83
Next 10 →
Results 1 - 10 of 7,742
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University