Academia.eduAcademia.edu

Buffer Management

description928 papers
group3 followers
lightbulbAbout this topic
Buffer management is the process of overseeing and controlling buffer stocks in production and supply chain systems to optimize flow, reduce lead times, and minimize inventory costs. It involves strategic decision-making regarding the allocation, replenishment, and utilization of buffers to enhance operational efficiency and responsiveness to demand fluctuations.
lightbulbAbout this topic
Buffer management is the process of overseeing and controlling buffer stocks in production and supply chain systems to optimize flow, reduce lead times, and minimize inventory costs. It involves strategic decision-making regarding the allocation, replenishment, and utilization of buffers to enhance operational efficiency and responsiveness to demand fluctuations.
Femtocells deployment has become a new paradigm in improving the mobile network’s services for indoor users, by providing better data rates and coverage. Femtocells deployment results to a heterogeneous network that requires two layers of... more
In today's highly competitive manufacturing landscape, optimizing job shop scheduling has become vital for maximizing operational efficiency and minimizing production delays. This study explores the dual challenge of makespan minimization... more
Emerging application domains such as interactive vi- sion, animation, and multimedia collaboration display dy- namic scalable parallelism, and high computational re- quirements, making them good candidates for executing on parallel... more
In this paper we present experimental results evaluating the performance and fairness of FAST TCP in a series of tests involving realistic low rate network access scenarios. Links both using the DOCSIS cable modem medium access control... more
The SHRIMP multicomputer provides virtual memory-mapped communication (VMMC), which supports protected, user-level message passing, allows user programs to perform their own buffer management, and separates data transfers from control... more
This paper examines how VI-based interconnects can be used to improve IIO path performance between a database server and the storage subsystem. We design and implement a software layer, DSA, that is layered between the application and VI.... more
Cellular IP networks deal with the concepts of micro-mobility. Buffer management in Cellular IP networks is very crucial as its proper usage not only increases the throughput of the network but also results in the reduction of the call... more
Much computational power on state-of-the-art multicomputers like the Paragon is wasted with porting applications. Using networks of workstations is an attempt to withdraw this workload from multicomputer systems. Therefore an environment... more
The behavior of IP based network traffic has been the subject of several works. In this paper we compare two modeling approaches and their ability to capture two basic traffic features: packet size distribution and interarrival times.... more
In this paper we propose a communication benchmark suite: BTU(Bits To the User). In the BTU benchmarking process, the vendor supplies a workstation running a UNIX* operating system, we install our benchmark program and connect the... more
Efficient routing of messages is critical to the performance of direct network systems. The popular wormhole routing technique faces several challengesparticularly flow control and deadlock avoidance.
We propose a new space priority mechanism, and analyze its performance in a single Constant Bit Rate (CBR) server. The arrival process is derived from the superposition of two types of traffics, each in turn results from the superposition... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
The buffer pool manager is a central component of ADABAS, a high performance scaleable database system for OLTP processing. High efficiency and scalability of the buffer pool manager is mandatory for ADABAS on all supported platforms. In... more
With the advent of large-scale parallel computing systems, making parallel programs fault-tolerant becomes an important problem, be- cause the probability of a failure increases with the number of proces- sors. In this paper, we describe... more
Mechanisms for managing message buffers in Time Warp parallel simulations executing on cache-coherent shared-memory multiprocessors are studied. Two simple buffer management strategies called the sender pool and receiver pool mechanisms... more
As buffer cache is used to overcome the speed gap between processor and storage devices, performance of buffer cache is a deciding factor in verifying the system performance. Need of improved buffer cache hit ratio and inabilities of the... more
In recent times, the data generation and storage modules in several organizations have seen a shift from the centralized approach to a parallel and distributed architecture. Also, the nature of data is changing from the static tables in... more
We consider the problem of interconnecting low speed LANs over a high-speed shared-memory ATM switch. A bottleneck is formed when more than one source originate traffic to the same destination LAN. In this case, a congestion may be... more
Climate change, rapid urbanization, and population growth have intensified global water scarcity, increasing reliance on groundwater resources. One of the most effective solutions to this crisis is artificial groundwater recharge through... more
Vehicular Delay-Tolerant Networking (VDTN) is a Delay-Tolerant Network (DTN) based architecture concept for transit networks, where vehicles movement and their bundle relaying service is opportunistically exploited to enable non-real time... more
Pointer swizzling improves the performance of OODBMSs by reducing the number of table lookups. However, the object replacement incurs the unswizzling overhead. In this paper, we propose a new pointer swizzling strategy, the dynamic... more
In spite of the larger performance gain such as higher throughput and almost zero packet retransmissions compared to TCP Reno, TCP Vegas still has a few obstacles for it to be deployed in the Internet. Studies have shown unfair treatment... more
While it has been shown that TCP Vegas provides better performance compared to TCP Reno, studies have identified various issues associated with the protocol. We propose modifications to the congestion avoidance mechanism of the TCP Vegas... more
In a Main Memory Database (MMDB) the primary copy of the database resides in volatile main memory. This makes MMDB systems more vulnerable to failures compared to the traditional Disk Resident Databases (DRDB). A backup copy of the... more
Frequent Itemset Mining (FIM) is a critical data mining operation, but the computational overhead increases in the presence of large data sets and deteriorates the efficiency of FIM computation. In this paper, we explore algorithms based... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application secrets but also to mount timing inference based attacks. Much effort has been put into improving real-time system predictability with the... more
Abstract: We study the buffering requirements for zero cell loss for TCP/IP over satellite links using the available bit rate (ABR) and unspecified bit rate (UBR) services of asynchronous transfer mode (ATM) networks. For the ABR service,... more
Real time audio transmission over the internet has become increasingly popular in many application areas, in particular in the commercial and entertainment sectors. However, the most challenging problem of end-to-end delay over an IP... more
Complex objects to support non-standard database applications require the use of substantial computing resources because their powerful operations must be performed and maintained in an interactive environment. Since the exploitation of... more
New database applications, primarily in the areas of engineering and knowledge-based systems, refer to complex objects (e.g. representation of a CAD workpiece or a VLSI chip) while performing their tasks. Retrieval, maintenance, and... more
Support for temporal data continues to be a requirement posed by many applications. We show that a complex object data model is an appropriate means for handling temporal data. Firstly, we describe the main features of temporal databases... more
❑ Propagation delay: 24 ms❑ Avg packetization delays: 6 ms+ 6 ms (PCM)❑ Assuming 5 switches on a typical path, delay variation allowed at each switch=(100-24-6-6)/5= 12.8 ms❑ For single switch bottleneck case, End-to-end delay= 12.8+ 24=... more
Voice in its inherent nature is variable. It is natural to use the VBR class for voice, and transmit voice in its bursty form. On an average, human voice has an speech activity factor of about 42%. This allows us to multiplex a lot of... more
Background: Sorghum is an important source of fodder in the semi-arid areas of Kenya. However, its biomass yield has remained low due to the low soil moisture content which is associated with low rainfall. Objective: To evaluate the... more
The objective of extensible DBMSs is to ease the construction of specialized DBMSs for nontraditional applications. Although much work has been done in providing various levels of extensibility (e.g., extensibility of data types and... more
In this paper, we propose a novel external-memory algorithm to support view-dependent simplification for datasets much larger than main memory. In the preprocessing phase, we use a new spanned sub-meshes simplification technique to build... more
Recently, several external memory techniques have been developed for a wide variety of graphics and visualization problems, including surface simplification, volume rendering, isosurface generation, ray tracing, surface reconstruction,... more
The performance of the proposed algorithm, FSAMAC, is compared with the TDFQ scheme. The simulation results are presented in the following section 6.5 EXPERIMENTAL RESULTS 6.5.1 Based on No. Of Flows In the experiment the numbers of flows... more
Effective buffering of optical packets is essential to the efficient working of optical packet switches. In this paper three new schemes, which involve sorting and finding the least occupied buffer, are proposed. Their performance is... more
En 3G UMTS, deux canaux principaux de transport ont été crées pour la transmission de données sur le lien descendant : un canal commun FACH et un canal dédié DCH. Le performance de TCP en UMTS dépend beaucoup de la politique de... more
The long term impact of contour trenching tends to be that more runoff turns into groundwater recharge. In 2008, the contribution of recharge at a contour trench plot was determined as potential and not quite visible. Recharge has not... more
Download research papers for free!