• Title/Summary/Keyword: Memory traffic

Search Result 191, Processing Time 0.022 seconds

Cache Simulator Design for Optimizing Write Operations of Nonvolatile Memory Based Caches (비휘발성 메모리 기반 캐시의 쓰기 작업 최적화를 위한 캐시 시뮬레이터 설계)

  • Joo, Yongsoo;Kim, Myeung-Heo;Han, In-Kyu;Lim, Sung-Soo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.2
    • /
    • pp.87-95
    • /
    • 2016
  • Nonvolatile memory (NVM) is being considered as an alternative of traditional memory devices such as SRAM and DRAM, which suffer from various limitations due to the technology scaling of modern integrated circuits. Although NVMs have advantages including nonvolatility, low leakage current, and high density, their inferior write performance in terms of energy and endurance becomes a major challenge to the successful design of NVM-based memory systems. In order to overcome the aforementioned drawback of the NVM, extensive research is required to develop energy- and endurance-aware optimization techniques for NVM-based memory systems. However, researchers have experienced difficulty in finding a suitable simulation tool to prototype and evaluate new NVM optimization schemes because existing simulation tools do not consider the feature of NVM devices. In this article, we introduce a NVM-based cache simulator to support rapid prototyping and evaluation of NVM-based caches, as well as energy- and endurance-aware NVM cache optimization schemes. We demonstrate that the proposed NVM cache simulator can easily prototype PRAM cache and PRAM+STT-RAM hybrid cache as well as evaluate various write traffic reduction schemes and wear leveling schemes.

Hardware based set-associative IP address lookup scheme (하드웨어 기란 집합연관 IP 주소 검색 방식)

  • Yun Sang-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.541-548
    • /
    • 2005
  • IP lookup and forwarding process becomes the bottleneck of packet transmission as IP traffic increases. Previous hardware-based IP address lookup schemes using an index-based table are not memory-efficient due to sparse distribution of the routing prefixes. In this paper, we propose memory-efficient hardware based IP lookup scheme called set-associative IP address lookup scheme, which provides the same IP lookup speed with much smaller memory requirement. In the proposed scheme, an NHA entry stores the prefix and next hop together. The IP lookup procedure compares a destination IP address with eight entries in a corresponding set simultaneously and finds the longest matched prefix. The memory requirement of the proposed scheme is about $42\%$ of that of Lin's scheme. Thus, the set-associative IP address lookup scheme is a memory-efficient hardware based IP address lookup scheme.

Empirical Analysis on Bitcoin Price Change by Consumer, Industry and Macro-Economy Variables (비트코인 가격 변화에 관한 실증분석: 소비자, 산업, 그리고 거시변수를 중심으로)

  • Lee, Junsik;Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.195-220
    • /
    • 2018
  • In this study, we conducted an empirical analysis of the factors that affect the change of Bitcoin Closing Price. Previous studies have focused on the security of the block chain system, the economic ripple effects caused by the cryptocurrency, legal implications and the acceptance to consumer about cryptocurrency. In various area, cryptocurrency was studied and many researcher and people including government, regardless of country, try to utilize cryptocurrency and applicate to its technology. Despite of rapid and dramatic change of cryptocurrencies' price and growth of its effects, empirical study of the factors affecting the price change of cryptocurrency was lack. There were only a few limited studies, business reports and short working paper. Therefore, it is necessary to determine what factors effect on the change of closing Bitcoin price. For analysis, hypotheses were constructed from three dimensions of consumer, industry, and macroeconomics for analysis, and time series data were collected for variables of each dimension. Consumer variables consist of search traffic of Bitcoin, search traffic of bitcoin ban, search traffic of ransomware and search traffic of war. Industry variables were composed GPU vendors' stock price and memory vendors' stock price. Macro-economy variables were contemplated such as U.S. dollar index futures, FOMC policy interest rates, WTI crude oil price. Using above variables, we did times series regression analysis to find relationship between those variables and change of Bitcoin Closing Price. Before the regression analysis to confirm the relationship between change of Bitcoin Closing Price and the other variables, we performed the Unit-root test to verifying the stationary of time series data to avoid spurious regression. Then, using a stationary data, we did the regression analysis. As a result of the analysis, we found that the change of Bitcoin Closing Price has negative effects with search traffic of 'Bitcoin Ban' and US dollar index futures, while change of GPU vendors' stock price and change of WTI crude oil price showed positive effects. In case of 'Bitcoin Ban', it is directly determining the maintenance or abolition of Bitcoin trade, that's why consumer reacted sensitively and effected on change of Bitcoin Closing Price. GPU is raw material of Bitcoin mining. Generally, increasing of companies' stock price means the growth of the sales of those companies' products and services. GPU's demands increases are indirectly reflected to the GPU vendors' stock price. Making an interpretation, a rise in prices of GPU has put a crimp on the mining of Bitcoin. Consequently, GPU vendors' stock price effects on change of Bitcoin Closing Price. And we confirmed U.S. dollar index futures moved in the opposite direction with change of Bitcoin Closing Price. It moved like Gold. Gold was considered as a safe asset to consumers and it means consumer think that Bitcoin is a safe asset. On the other hand, WTI oil price went Bitcoin Closing Price's way. It implies that Bitcoin are regarded to investment asset like raw materials market's product. The variables that were not significant in the analysis were search traffic of bitcoin, search traffic of ransomware, search traffic of war, memory vendor's stock price, FOMC policy interest rates. In search traffic of bitcoin, we judged that interest in Bitcoin did not lead to purchase of Bitcoin. It means search traffic of Bitcoin didn't reflect all of Bitcoin's demand. So, it implies there are some factors that regulate and mediate the Bitcoin purchase. In search traffic of ransomware, it is hard to say concern of ransomware determined the whole Bitcoin demand. Because only a few people damaged by ransomware and the percentage of hackers requiring Bitcoins was low. Also, its information security problem is events not continuous issues. Search traffic of war was not significant. Like stock market, generally it has negative in relation to war, but exceptional case like Gulf war, it moves stakeholders' profits and environment. We think that this is the same case. In memory vendor stock price, this is because memory vendors' flagship products were not VRAM which is essential for Bitcoin supply. In FOMC policy interest rates, when the interest rate is low, the surplus capital is invested in securities such as stocks. But Bitcoin' price fluctuation was large so it is not recognized as an attractive commodity to the consumers. In addition, unlike the stock market, Bitcoin doesn't have any safety policy such as Circuit breakers and Sidecar. Through this study, we verified what factors effect on change of Bitcoin Closing Price, and interpreted why such change happened. In addition, establishing the characteristics of Bitcoin as a safe asset and investment asset, we provide a guide how consumer, financial institution and government organization approach to the cryptocurrency. Moreover, corroborating the factors affecting change of Bitcoin Closing Price, researcher will get some clue and qualification which factors have to be considered in hereafter cryptocurrency study.

Design of Traffic Metering System using Embedded Linux (임베디드 리눅스를 이용한 트래픽 미터링 시스템 설계)

  • Lee, Heung-Jae;Jeon, Hee-Jin;Choe, Jin-Kyu;Lee, Kyou-Ho
    • Journal of IKEEE
    • /
    • v.9 no.2 s.17
    • /
    • pp.79-86
    • /
    • 2005
  • Increasing network traffic and multimedia application services need realtime analysis of network traffic for improvement of QoS and effective management of network resource. Because difficulty of measurement based on software method, study of meter architecture for efficient capture function is necessary. Therefore we design and implement hardware metering system for efficient packet capture using embedded linux. And we analyze required bandwidth of system bus and memory for 10Gbps traffic through simulation.

  • PDF

A comparative study on the Air Traffic Controller's performance and cognitive imbalance (관제사 수행의 인지적 균형과 불균형의 관계고찰)

  • Shin, H.-Sam
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.105-134
    • /
    • 2003
  • This paper describes generic cognitive aspects of the air traffic controller's performance and perceptive activities unveiled through the past literature study. which underlines mental modelling and mental picture presented in the middle of complicated situational awareness and decision making process when air traffic controller comes to determine the distance between aircraft under control to maintain air traffic in a safe, orderly and expeditious way. It also describes human limit in terms of human memory in conjunction with relative workloads and environmental factor. In conclusion, It suggest that ATC authority will take into account the qualitatiive adjustment of training requirement necessary for ATC facility rating and refresher training to allow them more preparedness for better situational awareness and optimal decision making. In this paper controller's behavioral activators affecting their job performance are addressed in perspective of aviation safety.

  • PDF

Flow Labeling Method for Realtime Detection of Heavy Traffic Sources (대량 트래픽 전송자의 실시간 탐지를 위한 플로우 라벨링 방법)

  • Lee, KyungHee;Nyang, DaeHun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.10
    • /
    • pp.421-426
    • /
    • 2013
  • As a greater amount of traffic have been generated on the Internet, it becomes more important to know the size of each flow. Many research studies have been conducted on the traffic measurement, and mostly they have focused on how to increase the measurement accuracy with a limited amount of memory. In this paper, we propose an explicit flow labeling technique that can be used to find out the names of the top flows and to increase the counting upper bound of the existing scheme. The labeling technique is applied to CSM (Counter Sharing Method), the most recent traffic measurement algorithm, and the performance is evaluated using the CAIDA dataset.

User Interface Satisfaction of the Air Traffic Control System (항공교통관제시스템에 대한 사용자 인터페이스 만족도 조사)

  • Song, Chang-Sun;Sohn, Young-Woo;Kwon, Hyuk-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.4
    • /
    • pp.1-7
    • /
    • 2014
  • The purpose of study is to investigate the current user interface level of air traffic control system with the usability analysis and satisfaction survey questionnaire on user satisfaction. Think aloud protocol is used to identify not only task analysis, but also the level of user-friendliness of the FIMS and ASDE system, and the user interface questionnaires was conducted by QUIS. We collected data from 6 controllers for Think aloud protocol and 15 controllers for QUIS in Incheon airport. The results showed that the system was the valuable tool for ensuring human performance with the support of memory and the facilitation of decision-making tasks. It helps air traffic controllers perform better and minimize errors in a congested time. The human-computer interface system design, however, was not applied, which led to the increase of workload. Air traffic controller participation in software development provided excellent examples for applications in terms of software in FIMS. Based on these results, the study provided that the usability of system interface was necessary to take into account human factors. The development and design of system was discussed in User Interface environment.

Expert-novice differences in visual information processing in air traffic control (항공관제 전문가와 훈련관제사의 시각정보처리 차이)

  • Kwon, Hyok-Jin;Ham, Seong-Soo;Kim, Hye-Jeong;Han, Jung-Won;Sohn, Young-Woo
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.1
    • /
    • pp.72-82
    • /
    • 2010
  • This study investigated how air traffic controllers (ATCs) perceive the visual information on radar screen and examined quantitative and qualitative differences as a function of expertise. Little research has shown that how much information is processed by ATC visually and perceptually, how ATCs represent the information, and what difference exists between experts and novices. Participants were asked to draw representing visual information on the blank sector map after a 5-second exposure. Data were analyzed by a superimposing method to identify correctly represented information. Results showed that the expert group had much larger size of chunking and their pattern was wider and more accurate than the novice group. The practical application and methodological implications are also discussed for further research.

Implementation of Policing Algorithm in ATM network (ATM 망에서의 감시 알고리즘 구현)

  • 이요섭;권재우;이상길;최명렬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.181-189
    • /
    • 2001
  • In this thesis, a policing algorithm is proposed, which is one of the traffic management function in ATM networks. The proposed algorithm minimizes CLR(Cell Loss patio) of high priority cells and solves burstiness problem of the traffic caused by multiplexing and demultiplexing process. The proposed algorithm has been implemented with VHDL and is divided into three parts, which are an input module, an UPC module, and an output module. In implementation of the UPC module\`s memory access, memory address is assigned according to VCI\`s LSB(Lowest Significant Byte) of ATM header for convenience. And the error of VSA operation from counter\`s wrap-around can be recovered by the proposed method. ANAM library 0.25 $\mu\textrm{m}$ and design compiler of Synopsys are used for synthesis of the algorithm and Synopsys VSS tool is used for VHDL simulation of it

  • PDF

Improved LC-trie for Efficient IP Address Lookup (효율적인 IP 주소 검색을 위한 개선된 LC-trie)

  • Kim, Jin-Soo;Kim, Jung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.50-59
    • /
    • 2007
  • IP address lookup is one of the most important and complex functions in the router. In this paper, we propose an improved technique of LC-trie to increase the performance of IP address lookup in the high performance router. We effectively apply the prefix pruning method, which is used for the compression of the forwarding table in TCAM((Ternary Content Addressable Memory), to the LC-trie. This technique can decrease the number of memory accesses and upgrade the lookup speed. Moreover, through the real forwarding table and the real traffic distribution, we evaluate the performance of our scheme in terms of the lookup time and the number of memory access, comparing with that of the previous LC-trie.