average latency
Recently Published Documents


TOTAL DOCUMENTS

107
(FIVE YEARS 48)

H-INDEX

12
(FIVE YEARS 2)

2022 ◽  
Vol 27 (1) ◽  
pp. 1-30
Author(s):  
Mengke Ge ◽  
Xiaobing Ni ◽  
Xu Qi ◽  
Song Chen ◽  
Jinglei Huang ◽  
...  

Brain network is a large-scale complex network with scale-free, small-world, and modularity properties, which largely supports this high-efficiency massive system. In this article, we propose to synthesize brain-network-inspired interconnections for large-scale network-on-chips. First, we propose a method to generate brain-network-inspired topologies with limited scale-free and power-law small-world properties, which have a low total link length and extremely low average hop count approximately proportional to the logarithm of the network size. In addition, given the large-scale applications, considering the modularity of the brain-network-inspired topologies, we present an application mapping method, including task mapping and deterministic deadlock-free routing, to minimize the power consumption and hop count. Finally, a cycle-accurate simulator BookSim2 is used to validate the architecture performance with different synthetic traffic patterns and large-scale test cases, including real-world communication networks for the graph processing application. Experiments show that, compared with other topologies and methods, the brain-network-inspired network-on-chips (NoCs) generated by the proposed method present significantly lower average hop count and lower average latency. Especially in graph processing applications with a power-law and tightly coupled inter-core communication, the brain-network-inspired NoC has up to 70% lower average hop count and 75% lower average latency than mesh-based NoCs.


2021 ◽  
Vol 9 (2) ◽  
pp. 252-267
Author(s):  
Saifudin Usman ◽  
Idris Winarno ◽  
Amang Sudarsono

Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusions. We design and deploy DDoS attack defense systems in virtualization environments based on Software-defined Networking (SDN) by combining signature-based Network Intrusion Detection Systems (NIDS) and sampled flow (sFlow). These techniques are practically tested and evaluated on the Proxmox production Virtualization Environment testbed, adding High Availability capabilities to the Controller. The evaluation results show that it promptly detects several types of DDoS attacks and mitigates their negative impact on network performance. Moreover, it also shows good results on Quality of Service (QoS) parameters such as average packet loss about 0 %, average latency about 0.8 ms, and average bitrate about 860 Mbit/s.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Weifeng Zhang

The COVID-19 pandemic has become one of the biggest major health crises reported due its massive impact on many countries. From mental health experts, we know that we cannot lose sight of an equally alarming issue which is the long-term mental health impact the pandemic is going to leave on the society. The rapid spread of the pandemic gives little chance to prepare for or even process all that has happened in terms of job losses and the complete uprooting of everyday life and relationships. It is understandable that students may feel irritable, frustrated, or sad sometimes. Loneliness, confusion, and anxiety are also common, but the issue is how we can know if students’ emotions are a normal reaction to an abnormal situation. Therefore, online mental health education has become pretty important for students during the pandemic. Furthermore, it is important to evaluate the quality of online mental health education through microlessons. In this paper, based on Q-learning algorithm, the real-time adaptive bitrate (ABR) configuration parameters mechanism is proposed to detect the changes of network state constantly and select the optimal precalculated configuration according to the current network state. The simulation results show that the proposed algorithm based on Q-learning outperforms other baselines in average latency, average bitrate, and Mean Opinion Score (MOS) on Chrome DevTools and Clumsy. Meanwhile, the experimental results also reveal that the average number of identified mental health problems of the proposed mechanism has always been the best with the bandwidth from 10 Mbit/s to 500 Mbit/s.


2021 ◽  
Vol 11 (24) ◽  
pp. 12056
Author(s):  
Tong Min Kim ◽  
Taehoon Ko ◽  
Yoon-sik Yang ◽  
Sang Jun Park ◽  
In-Young Choi ◽  
...  

Electronic medical record (EMR) data vary between institutions. These data should be converted into a common data model (CDM) for multi-institutional joint research. To build the CDM, it is essential to integrate the EMR data of each hospital and load it according to the CDM model, considering the computing resources of each hospital. Accordingly, this study attempts to share experiences and recommend computing resource-allocation designs. Here, two types of servers were defined: combined and separated servers. In addition, three database (DB) setting types were selected: desktop application (DA), online transaction processing (OLTP), and data warehouse (DW). Scale, TPS, average latency, 90th percentile latency, and maximum latency were compared across various settings. Virtual memory (vmstat) and disk input/output (disk) statuses were also described. Transactions per second (TPS) decreased as the scale increased in all DB types; however, the average, 90th percentile and maximum latencies exhibited no tendency according to scale. When compared with the maximum number of clients (DA client = 5, OLTP clients = 20, DW clients = 10), the TPS, average latency, 90th percentile latency, and maximum latency values were highest in the order of OLTP, DW, and DA. In vmstat, the amount of memory used for the page cache field and free memory currently available for DA, OLTP, and DW were large compared to other fields. In the disk, DA, OLTP, and DW all recorded the largest value in the average size of write requests, followed by the largest number of write requests per second. In summary, this study presents recommendations for configuring CDM settings. The configuration must be tuned carefully, considering the hospital’s resources and environment, and the size of the database must consider concurrent client connections, architecture, and connections.


Micromachines ◽  
2021 ◽  
Vol 12 (10) ◽  
pp. 1196
Author(s):  
Samuel da Silva Oliveira ◽  
Bruno Motta de Carvalho ◽  
Márcio Eduardo Kreutz

Network-on-Chip is a good approach to working on intra-chip communication. Networks with irregular topologies may be better suited for specific applications because of their architectural nature. A good design space exploration can help the design of the network to obtain more optimized topologies. This paper proposes a way of optimizing networks with irregular topologies through the use of a genetic algorithm. The network proposed here has heterogeneous routers that aim to optimize the network and support applications with real-time tasks. The goal is to find networks that are optimized for average latency and percentage of real-time packets delivered within the deadline. The results show that we have been able to find networks that can deliver all the real-time packets, obtain acceptable latency values, and shrink the chip area.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-26
Author(s):  
Baoquan Zhang ◽  
David H. C. Du

Computer systems utilizing byte-addressable Non-Volatile Memory ( NVM ) as memory/storage can provide low-latency data persistence. The widely used key-value stores using Log-Structured Merge Tree ( LSM-Tree ) are still beneficial for NVM systems in aspects of the space and write efficiency. However, the significant write amplification introduced by the leveled compaction of LSM-Tree degrades the write performance of the key-value store and shortens the lifetime of the NVM devices. The existing studies propose new compaction methods to reduce write amplification. Unfortunately, they result in a relatively large read amplification. In this article, we propose NVLSM, a key-value store for NVM systems using LSM-Tree with new accumulative compaction. By fully utilizing the byte-addressability of NVM, accumulative compaction uses pointers to accumulate data into multiple floors in a logically sorted run to reduce the number of compactions required. We have also proposed a cascading searching scheme for reads among the multiple floors to reduce read amplification. Therefore, NVLSM reduces write amplification with small increases in read amplification. We compare NVLSM with key-value stores using LSM-Tree with two other compaction methods: leveled compaction and fragmented compaction. Our evaluations show that NVLSM reduces write amplification by up to 67% compared with LSM-Tree using leveled compaction without significantly increasing the read amplification. In write-intensive workloads, NVLSM reduces the average latency by 15.73%–41.2% compared to other key-value stores.


2021 ◽  
Vol 13 (16) ◽  
pp. 8921
Author(s):  
Nishant Jha ◽  
Deepak Prashar ◽  
Osamah Ibrahim Khalaf ◽  
Youseef Alotaibi ◽  
Abdulmajeed Alsufyani ◽  
...  

Conventional crop insurance systems are complex and often not economically feasible. Farmers are often reluctant to be covered for their crops due to lack of trust in insurance firms and the fear of delayed or non-payment of claims. In this paper, a blockchain based crop insurance solution is suggested. The solution suggested in this paper is an affordable, efficient, low cost crop insurance solution which will ensure many farmers are insured and benefiting from timely crop insurance. Currently the cost of administering insurance is an essential barrier to accessing this facility. With the proper use of blockchain based on ethereum this expense can be reduced dramatically. We have conducted various tests on platforms such as Google Cloud and found that the least throughput is 165 transactions. Upon analysis we have found that the time taken by the block formation is directly proportional to the timing of processing. The end-to-end average latency of the system was achieved as 31.2 s, which was quite effective for the infrastructure what we are using. Upon conducting acceptance testing, we found that the system suggested in the paper is effective and we are planning to release the application on open source platforms for future improvements.


2021 ◽  
Author(s):  
Renu Dalal ◽  
Manju Khari

Abstract Frequent disconnection, high end-to-end latency, dynamic topology, sparse node density, lack of pre-existing infrastructure, and opportunistic message transmission on wireless link, makes routing difficult in Opportunistic network (Oppnet). In present scenario, Oppnet allows the people to interact with contrasting ways like with diverse mobility, groups, and etc. During transmission of messages in such network security and trust performs major role. Delay Tolerant Network (DTN) are much prone of having inherent risk of attack. Malicious node, selfish node, and attacks are major impact on deteriorating network performance. To prevent the network from such deteriorating factors, this paper introduces the new platform to provide reliable and authentic transmission of message in opportunistic network. Blockchain-based Routing in Opportunistic Network (BRON) uses the concept of Blockchain through which each node work as an authentic node and transmit the secure messages in Oppnet. Opportunistic Network Environment (ONE) tool is used to implement BRON. This protocol generates 36% reduced packet drops ratio, 57% enhanced delivery ratio, 55% lesser overhead ratio, 35.2% reduced average latency, and 65% lesser average buffer time as compared to direct delivery ratio with respect to number of nodes.


2021 ◽  
Vol 2 (3) ◽  
pp. 1-24
Author(s):  
Chih-Kai Huang ◽  
Shan-Hsiang Shen

The next-generation 5G cellular networks are designed to support the internet of things (IoT) networks; network components and services are virtualized and run either in virtual machines (VMs) or containers. Moreover, edge clouds (which are closer to end users) are leveraged to reduce end-to-end latency especially for some IoT applications, which require short response time. However, the computational resources are limited in edge clouds. To minimize overall service latency, it is crucial to determine carefully which services should be provided in edge clouds and serve more mobile or IoT devices locally. In this article, we propose a novel service cache framework called S-Cache , which automatically caches popular services in edge clouds. In addition, we design a new cache replacement policy to maximize the cache hit rates. Our evaluations use real log files from Google to form two datasets to evaluate the performance. The proposed cache replacement policy is compared with other policies such as greedy-dual-size-frequency (GDSF) and least-frequently-used (LFU). The experimental results show that the cache hit rates are improved by 39% on average, and the average latency of our cache replacement policy decreases 41% and 38% on average in these two datasets. This indicates that our approach is superior to other existing cache policies and is more suitable in multi-access edge computing environments. In the implementation, S-Cache relies on OpenStack to clone services to edge clouds and direct the network traffic. We also evaluate the cost of cloning the service to an edge cloud. The cloning cost of various real applications is studied by experiments under the presented framework and different environments.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Qing Ji ◽  
Xin Li

Depression not only threatens the health and quality of life of patients but also brings a huge mental and economic burden to the patients’ families. This paper mainly studies the mechanism of dopaminergic neurotransmission in different doses of morphine addiction and stress-induced depression. In the experiment, 40 male SD rats were selected. The experiment established a rat model of chronic stress depression. The rats used in this model are all raised in a single cage, and there will be various stimuli every day for 21 days, but high-intensity continuous stimuli must be avoided, and the same stimuli will not appear continuously. The experiment established a depression animal model through chronic unpredictable mild stress (CUMS), combined with the conditioned position preference (CPP) model of morphine addiction to detect the establishment of CPP in such animals, so as to explore certain stress stimuli or depression, the influence on morphine addiction, and the relationship between them. The second or third branches of pyramidal neurons were selected to analyze the PL and CA3 regions. When analyzing the density of dendrites, each animal selected at least 8 dendrites in order to count the number of dendrites and selected a length of 20 μm on each branch to record the number of dendrites. All measured values are expressed as average ± standard deviation and analyzed by SPSS17.0 statistical software, and Levene test is used in the scattered consistency test. The average NIV of PEN before injection was 11.92 ± 2.90 Hz, and the average latency was 0.16 ± 0.03 s. The results indicate that CUMS may reduce the conditioned learning and memory ability by damaging the learning loop, rather than affecting the reward loop to weaken the establishment of morphine-dependent CPP.


Sign in / Sign up

Export Citation Format

Share Document