Hierarchical analysis approach for high performance computing and communication applications

Salim Hariri, Pramod Kumar Varshney, Luying Zhou, Haibo Xu, Shihab Ghaya

Research output: Chapter in Book/Entry/PoemConference contribution

3 Scopus citations

Abstract

The design, analysis and development of parallel and distributed applications on High Performance Computing and Communication (HPCC) Systems are still very challenging tasks. Therefore, there is a great need for an integrated multilevel analysis methodology to assist in designing and analyzing the performance of both existing and proposed new HPCC systems. Currently, there are no comprehensive analysis methods that address such diverse needs. This paper presents a three-level hierarchical modeling approach for analyzing the end-to-end performance of an application running on an HPCC system. The overall system is partitioned into application level, protocol level and network level. Functions at each level are modeled using queueing networks. This approach enables the designer to study system performance for different types of networks and protocols and different design strategies. In this paper we use video-on-demand as an application example to show how our approach can be used to analyze the performance of such an application.

Original languageEnglish (US)
Title of host publicationProceedings of the Hawaii International Conference on System Sciences
PublisherIEEE Computer Society
Pages91
Number of pages1
StatePublished - 1999
Externally publishedYes
EventProceedings of the 1999 32nd Annual Hawaii International Conference on System Sciences, HICSS-32 - Maui, HI, USA
Duration: Jan 5 1999Jan 8 1999

Other

OtherProceedings of the 1999 32nd Annual Hawaii International Conference on System Sciences, HICSS-32
CityMaui, HI, USA
Period1/5/991/8/99

ASJC Scopus subject areas

  • Software
  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Hierarchical analysis approach for high performance computing and communication applications'. Together they form a unique fingerprint.

Cite this