Trace File Example

Keyword(s):  
Author(s):  
Curtis L. Janssen ◽  
Helgi Adalsteinsson ◽  
Scott Cranford ◽  
Joseph P. Kenny ◽  
Ali Pinar ◽  
...  

Efficient design of hardware and software for large-scale parallel execution requires detailed understanding of the interactions between the application, computer, and network. The authors have developed a macro-scale simulator (SST/macro) that permits the coarse-grained study of distributed-memory applications. In the presented work, applications using the Message Passing Interface (MPI) are simulated; however, the simulator is designed to allow inclusion of other programming models. The simulator is driven from either a trace file or a skeleton application. Trace files can be either a standard format (Open Trace Format) or a more detailed custom format (DUMPI). The simulator architecture is modular, allowing it to easily be extended with additional network models, trace file formats, and more detailed processor models. This paper describes the design of the simulator, provides performance results, and presents studies showing how application performance is affected by machine characteristics.


Author(s):  
Ratish Agarwal ◽  
Piyush Kumar Shukla ◽  
Sachin Goyal

Communication is a very important area of research in the present era. Expansion of globalization and reduction in the cost of electronic devices has made communication very effective. A large number of researchers from academics and industries are involved in the research on communication and networks. Any novel idea has to be verified on the simulator. A number of simulators are available for network simulations such as Network Simulator (NS2 and NS3), OPNET, NetSim, OMNeT++, REAL, J-Sim and QualNet. NS is an open-source simulation tool that runs on Linux. It is a discreet event simulator for networking research and provides substantial support for simulation of routing, multicast and IP protocols. This chapter provides an overview of NS in a much simpler way. At the completion of this chapter readers will be able to write tcl script to simulate a scenario of network. Every simulation on NS generates a huge trace file; the study of this can be done with the help of AWK script.


2021 ◽  
Vol 6 (64) ◽  
pp. 3457
Author(s):  
Sacha Schutz ◽  
Charles Monod-Broca ◽  
Anne-Sophie Denommé-Pichon
Keyword(s):  

2020 ◽  
Author(s):  
Khattab M. Ali Alheeti ◽  
Duaa Al_Dosary ◽  
Salah Sleibi Al-Rawi

An intelligent wheelchair application is required which is equipped with the MEMSs which are magnetometer, gyroscope, and accelerometer sensors. The generated process of ICMetrics number is heavily based on magnetometer, gyroscope, and accelerometer sensors. In addition, this number can be utilised to provide the identification of device. Our proposed system passed through three phases. The first phase is bias reading that was extracted from MEMSs (gyroscope, magnetometer, and accelerometers) sensors; whereas, in the second phase, ICMetric number is generated by using the sensor bias readings that was extracted in the first phase. Therefore, this number is non-stored and can be utilised to provide identification of device. In the third phase, the security system is tested/evaluated to measure its effectivity. In other words, it is tested with dataset that was extracted from the trace file of ns-2. In this phase, performance metrics are calculated, which are rate of error, confused metrics, and accuracy.


Sign in / Sign up

Export Citation Format

Share Document