70 research outputs found

    A Comparison of the Memory Management sub-systems in FreeBSD and Linux

    Get PDF
    In this article we seek to compare the memory management sub-systems of two popular and freely available operating systems - FreeBSD and Linux. First a framework is developed, spelling out the components of a generic and modern memory management system. The framework is then used in a design level comparison of memory management in the two operating systems. (Also cross-referenced as UMIACS-TR-98-45

    Learning for Interval Prediction of Electricity Demand: A Cluster-based Bootstrapping Approach

    Full text link
    Accurate predictions of electricity demands are necessary for managing operations in a small aggregation load setting like a Microgrid. Due to low aggregation, the electricity demands can be highly stochastic and point estimates would lead to inflated errors. Interval estimation in this scenario, would provide a range of values within which the future values might lie and helps quantify the errors around the point estimates. This paper introduces a residual bootstrap algorithm to generate interval estimates of day-ahead electricity demand. A machine learning algorithm is used to obtain the point estimates of electricity demand and respective residuals on the training set. The obtained residuals are stored in memory and the memory is further partitioned. Days with similar demand patterns are grouped in clusters using an unsupervised learning algorithm and these clusters are used to partition the memory. The point estimates for test day are used to find the closest cluster of similar days and the residuals are bootstrapped from the chosen cluster. This algorithm is evaluated on the real electricity demand data from EULR(End Use Load Research) and is compared to other bootstrapping methods for varying confidence intervals

    Improving NFS Performance over Wireless Links

    Get PDF
    NFS is a widely used remote file access protocol that has been tuned to perform well on traditional LANs which exhibit low error rates. Users migrating to mobile-hosts would like to continue to use NFS for remote file accesses. However, low bandwidth and high error-rates degrade performance on mobile-hosts using wireless links thus hindering the use of NFS. In this paper, we present two mechanisms to improve NFS performance over wireless links : an aggressive NFS client and link-level retransmissions. Our experiments show that these mechanisms improve throughput by up to 200%, which brings the performance to within 5% of that obtained in zero error conditions. (Also cross-referenced as UMIACS-TR-95-126

    Avoiding Instability during Graceful Shutdown of OSPF

    No full text
    Many recent router architectures decouple the routing engine from the forwarding engine, so that packet forwarding can continue even when the routing process is not active. This opens up the possibility of using the forwarding capability of a router even when its routing process is down, thus avoiding the route flaps that normally occur when the routing process goes down. Unfortunately, current routing protocols, such as BGP, OSPF and IS-IS do not support this behavior. In this paper, we describe an enhancement to OSPF, called the IBB (I'll Be Back) capability, that enables other routers to use a router whose OSPF process is inactive for forwarding traffic for a certain period of time. The IBB capability can be used for avoiding route flaps that occur when the OSPF process is brought down in a router to facilitate protocol software upgrade, operating system upgrade, router ID change, AS and interface renumbering, etc

    Indexing Techniques in Object Oriented Databases

    No full text
    Object Oriented Database systems (OODBs) need efficient indexing techniques just like other Database systems. However, B -trees which work very well for Relational Database systems are not good enough for OODBs. Several alternate indexing techniques have been proposed, amongst them H-trees. This report analyses indexing techniques for OODBs, in particular H-trees. Contents 1 Introduction 4 2 CH-trees 5 3 S-trees 6 4 H-trees 10 4.1 Structure : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 10 4.2 Nesting : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 11 5 H-trees : Implementation Details 13 5.1 Node Headers : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 13 5.2 Build : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 14 5.3 Search : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 15 5.4 Insert : : : : : : : : : : : : : : : : : : : : : : ..

    Reducing Router-Crossings in a Mobile Intranet

    Get PDF
    Current general purpose mobility solutions like Mobile-IP involve multiple routercrossings even when the mobile host moves within an intranet from one subnet of a router to another. An environment consisting of a large number of mobile hosts would congest the router causing hosts to experience high latency and jitter. This paper presents a mechanism to eliminate multiple router-crossings in a mobile intranet, which reduces the load on the routers and the hand-o and data latency at the mobile hosts

    BGP Scaling Techniques Revisited

    No full text
    Introduction This note adds definitions and clarification to "A Comparison of Scaling Techniques for BGP" [1], corrects some minor errors and clarifies points which may not have been clear in the original paper. It also adds a new analysis of the scaling properties of routereflectors and confederations, leading to a new conclusion that route-reflection and confederations scale equally well in the general case and that the choice of the scaling technique employed by a network needs to be made on a basis other than the scalability metric we have analyzed. 2 Terminology [1] measures "scaling" in terms of the maximum number of BGP sessions any given router in the network must support. This is probably the best gross metric of how a BGP network scales. For convenience, we term this scaling metric the "BGP session degree" of a network. In addition, we introduce the term "CBGP" to mean "confederation-EBGP". 3 Corrections 3.1 Tree Topologies [1] states in Section 2.2 (paragraph 2) tha
    corecore