261 |
On the Performance of the Solaris Operating System under the Xen Security-enabled HypervisorBavelski, Alexei January 2007 (has links)
<p>This thesis presents an evaluation of the Solaris version of the Xen virtual machine monitor and a comparison of its performance to the performance of Solaris Containers under similar conditions. Xen is a virtual machine monitor, based on the paravirtualization approach, which provides an instruction set different to the native machine environment and therefore requires modifications to the guest operating systems. Solaris Zones is an operating system-level virtualization technology that is part of the Solaris OS. Furthermore, we provide a basic performance evaluation of the security modules for Xen and Zones, known as sHype and Solaris Trusted Extensions, respectively.</p><p>We evaluate the control domain (know as Domain-0) and the user domain performance as the number of user domains increases. Testing Domain-0 with an increasing number of user domains allows us to evaluate how much overhead virtual operating systems impose in the idle state and how their number influences the overall system performance. Testing one user domain and increasing the number of idle domains allows us to evaluate how the number of domains influences operating system performance. Testing concurrently loaded increasing numbers of user domains we investigate total system efficiency and load balancing dependent on the number of running systems.</p><p>System performance was limited by CPU, memory, and hard drive characteristics. In the case of CPU-bound tests Xen exhibited performance close to the performance of Zones and to the native Solaris performance, loosing 2-3% due to the virtualization overhead. In case of memory-bound and hard drive-bound tests Xen showed 5 to 10 times worse performance.</p>
|
262 |
Design and Performance Evaluation of Service Discovery Protocols for Vehicular NetworksAbrougui, Kaouther 28 September 2011 (has links)
Intelligent Transportation Systems (ITS) are gaining momentum among researchers. ITS encompasses several technologies, including
wireless communications, sensor networks, data and voice communication, real-time driving assistant systems, etc. These states of the art technologies are expected to pave the way for a plethora of vehicular network applications. In fact, recently we have witnessed a growing interest in Vehicular Networks from both the research community and industry. Several potential applications
of Vehicular Networks are envisioned such as road safety and security, traffic monitoring and driving comfort, just to mention a few. It is critical that the existence of convenience or driving comfort services do not negatively affect the performance of safety services. In essence, the dissemination of safety services or the discovery of convenience applications requires the communication among service providers and service requesters through constrained bandwidth resources. Therefore, service discovery techniques for vehicular networks must efficiently use the available common resources.
In this thesis, we focus on the design of bandwidth-efficient and scalable service discovery protocols for Vehicular Networks. Three types of service discovery architectures are introduced: infrastructure-less, infrastructure-based, and hybrid architectures.
Our proposed algorithms are network layer based where service discovery messages are integrated into the routing messages for a
lightweight discovery. Moreover, our protocols use the channel diversity for efficient service discovery. We describe our algorithms and discuss their implementation. Finally, we present the main results of the extensive set of simulation experiments that have been used in order to evaluate their performance.
|
263 |
Design and Performance Evaluation of Service Discovery Protocols for Vehicular NetworksAbrougui, Kaouther 28 September 2011 (has links)
Intelligent Transportation Systems (ITS) are gaining momentum among researchers. ITS encompasses several technologies, including
wireless communications, sensor networks, data and voice communication, real-time driving assistant systems, etc. These states of the art technologies are expected to pave the way for a plethora of vehicular network applications. In fact, recently we have witnessed a growing interest in Vehicular Networks from both the research community and industry. Several potential applications
of Vehicular Networks are envisioned such as road safety and security, traffic monitoring and driving comfort, just to mention a few. It is critical that the existence of convenience or driving comfort services do not negatively affect the performance of safety services. In essence, the dissemination of safety services or the discovery of convenience applications requires the communication among service providers and service requesters through constrained bandwidth resources. Therefore, service discovery techniques for vehicular networks must efficiently use the available common resources.
In this thesis, we focus on the design of bandwidth-efficient and scalable service discovery protocols for Vehicular Networks. Three types of service discovery architectures are introduced: infrastructure-less, infrastructure-based, and hybrid architectures.
Our proposed algorithms are network layer based where service discovery messages are integrated into the routing messages for a
lightweight discovery. Moreover, our protocols use the channel diversity for efficient service discovery. We describe our algorithms and discuss their implementation. Finally, we present the main results of the extensive set of simulation experiments that have been used in order to evaluate their performance.
|
264 |
Warehouse Redesign Process: A case study at Enics Sweden ABDaraei, Maryam January 2013 (has links)
Nowadays warehousing became one of the most important and critical part in supply chain systems due to the fact that it consumes a considerable part of logistic cost. Designing phase of warehousing system is the most important part in warehousing since most of the strategic and tactical decisions should be taken in this phase. Majority of academic papers are primarily analysis oriented and does not give a systematic method and techniques as a basis for warehouse redesign. So there is a need to develop a structured procedure that can be applied for different type of warehouses. Therefore the purpose of this thesis is to develop a process for redesigning production warehouses, and analyzing major problems during redesign steps. The thesis is designed as a case study, and a mix of quantitative and qualitative methods were used for data collection and data analysis. The methodology focuses around the warehousing process and redesign steps as described in the literature. Results of the thesis develop a seven steps procedure for redesigning of the production warehouse, also different problems and challenges are faced during redesign steps. It was tried to choose the best redesigning method which fit with the characteristics of the warehouse, in order to cover the space reduction of the warehouse with the consideration of existing facilities and reducing of cost. In addition, the performance of the current warehouse system was evaluated based on current design of the warehouse in order to avoid repeating of same mistake in redesign process. Storage assignment policy as one of the redesign steps was discussed and a framework for storage system of the components were suggested. The findings of the thesis to some extent can be applicable to other production warehouses. Further research is suggested for more specific results and new developed redesign methods for all types of warehouses.
|
265 |
Impact of Mobility and Wireless Channel on the Performance of Wireless NetworksGhaderi, Majid January 2006 (has links)
This thesis studies the impact of mobility and wireless channel characteristics, i. e. , variability and high bit-error-rate, on the performance of integrated voice and data wireless systems from network, transport protocol and application perspectives. <br /><br /> From the network perspective, we study the impact of user mobility on radio resource allocation. The goal is to design resource allocation mechanisms that provide seamless mobility for voice calls while being fair to data calls. In particular, we develop a distributed admission control for a general integrated voice and data wireless system. We model the number of active calls in a cell of the network as a Gaussian process with time-dependent mean and variance. The Gaussian model is updated periodically using the information obtained from neighboring cells about their load conditions. We show that the proposed scheme guarantees a prespecified dropping probability for voice calls while being fair to data calls. Furthermore, the scheme is stable, insensitive to user mobility process and robust to load variations. <br /><br /> From the transport protocol perspective, we study the impact of wireless channel variations and rate scheduling on the performance of elastic data traffic carried by TCP. We explore cross-layer optimization of the rate adaptation feature of cellular networks to optimize TCP throughput. We propose a TCP-aware scheduler that switches between two rates as a function of TCP sending rate. We develop a fluid model of the steady-state TCP behavior for such a system and derive analytical expressions for TCP throughput that explicitly account for rate variability as well as the dependency between the scheduler and TCP. The model is used to choose RF layer parameters that, in conjunction with the TCP-aware scheduler, improve long-term TCP throughput in wireless networks. A distinctive feature of our model is its ability to capture variability of round-trip-time, channel rate and packet error probability inherent to wireless communications. <br /><br /> From the application perspective, we study the performance of wireless messaging systems. Two popular wireless applications, the short messaging service and multimedia messaging service are considered. We develop a mathematical model to evaluate the performance of these systems taking into consideration the fact that each message tolerates only a limited amount of waiting time in the system. Using the model, closed-form expressions for critical performance parameters such as message loss, message delay and expiry probability are derived. Furthermore, a simple algorithm is presented to find the optimal temporary storage size that minimizes message delay for a given set of system parameters.
|
266 |
Simulation-based Performance Evaluation of MANET Backbone Formation AlgorithmsAlmahrog, Khalid January 2007 (has links)
As a result of the recent advances in the computation and communications industries,
wireless communications-enabled computing devices are ubiquitous nowadays.
Even though these devices are introduced to satisfy the user’s mobile computing
needs, they are still unable to provide for the full mobile computing functionality
as they confine the user mobility to be within certain regions in order to benefit
from services provided by fixed network access points.
Mobile ad hoc networks (MANETs) are introduced as the technology that potentially
will make the nowadays illusion of mobile computing a tangible reality.
MANETs are created by the mobile computing devices on an ad hoc basis, without
any support or administration provided by a fixed or pre-installed communications
infrastructure.
Along with their appealing autonomy and fast deployment properties, MANETs
exhibit some other properties that make their realization a very challenging task.
Topology dynamism and bandwidth limitations of the communication channel adversely
affect the performance of routing protocols designed for MANETs, especially
with the increase in the number of mobile hosts and/or mobility rates.
The Connected Dominating Set (CDS), a.k.a. virtual backbone or Spine, is
proposed to facilitate routing, broadcasting, and establishing a dynamic infrastructure
for distributed location databases. Minimizing the CDS produces a simpler
abstracted topology of the MANET and allows for using shorter routes between
any pair of hosts. Since it is NP-complete to find the minimum connected dominating
set, MCDS, researchers resorted to approximation algorithms and heuristics
to tackle this problem.
The literature is rich of many CDS approximation algorithms that compete in
terms of CDS size, running time, and signaling overhead. It has been reported
that localized CDS creation algorithms are the fastest and the lightest in terms of
signaling overhead among all other techniques. Examples of these localized CDS
algorithms are Wu and Li algorithm and its Stojmenovic variant, the MPR algorithm,
and Alzoubi algorithm. The designers of each of these algorithms claim
that their algorithm exhibits the highest degree of localization and hence incurs the lowest cost in the CDS creation phase. However, these claims are not supported
by any physical or at least simulation-based evidence. Moreover, the cost of maintaining
the CDS (in terms of the change in CDS size, running time, and signaling
overhead), in the presence of unpredictable and frequent topology changes, is an
important factor that has to be taken into account -a cost that is overlooked most
of the time.
A simulation-based comparative study between the performance of these algorithms
will be conducted using the ns2 network simulator. This study will focus
on the total costs incurred by these algorithms in terms of CDS size, running time,
and signaling overhead generated during the CDS creation and maintenance phases.
Moreover, the effects of mobility rates, network size, and mobility models on the
performance of each algorithm will be investigated. Conclusions regarding the pros
and cons of each algorithm will be drawn, and directions for future research work
will be recommended.
|
267 |
Impact of Mobility and Wireless Channel on the Performance of Wireless NetworksGhaderi, Majid January 2006 (has links)
This thesis studies the impact of mobility and wireless channel characteristics, i. e. , variability and high bit-error-rate, on the performance of integrated voice and data wireless systems from network, transport protocol and application perspectives. <br /><br /> From the network perspective, we study the impact of user mobility on radio resource allocation. The goal is to design resource allocation mechanisms that provide seamless mobility for voice calls while being fair to data calls. In particular, we develop a distributed admission control for a general integrated voice and data wireless system. We model the number of active calls in a cell of the network as a Gaussian process with time-dependent mean and variance. The Gaussian model is updated periodically using the information obtained from neighboring cells about their load conditions. We show that the proposed scheme guarantees a prespecified dropping probability for voice calls while being fair to data calls. Furthermore, the scheme is stable, insensitive to user mobility process and robust to load variations. <br /><br /> From the transport protocol perspective, we study the impact of wireless channel variations and rate scheduling on the performance of elastic data traffic carried by TCP. We explore cross-layer optimization of the rate adaptation feature of cellular networks to optimize TCP throughput. We propose a TCP-aware scheduler that switches between two rates as a function of TCP sending rate. We develop a fluid model of the steady-state TCP behavior for such a system and derive analytical expressions for TCP throughput that explicitly account for rate variability as well as the dependency between the scheduler and TCP. The model is used to choose RF layer parameters that, in conjunction with the TCP-aware scheduler, improve long-term TCP throughput in wireless networks. A distinctive feature of our model is its ability to capture variability of round-trip-time, channel rate and packet error probability inherent to wireless communications. <br /><br /> From the application perspective, we study the performance of wireless messaging systems. Two popular wireless applications, the short messaging service and multimedia messaging service are considered. We develop a mathematical model to evaluate the performance of these systems taking into consideration the fact that each message tolerates only a limited amount of waiting time in the system. Using the model, closed-form expressions for critical performance parameters such as message loss, message delay and expiry probability are derived. Furthermore, a simple algorithm is presented to find the optimal temporary storage size that minimizes message delay for a given set of system parameters.
|
268 |
Simulation-based Performance Evaluation of MANET Backbone Formation AlgorithmsAlmahrog, Khalid January 2007 (has links)
As a result of the recent advances in the computation and communications industries,
wireless communications-enabled computing devices are ubiquitous nowadays.
Even though these devices are introduced to satisfy the user’s mobile computing
needs, they are still unable to provide for the full mobile computing functionality
as they confine the user mobility to be within certain regions in order to benefit
from services provided by fixed network access points.
Mobile ad hoc networks (MANETs) are introduced as the technology that potentially
will make the nowadays illusion of mobile computing a tangible reality.
MANETs are created by the mobile computing devices on an ad hoc basis, without
any support or administration provided by a fixed or pre-installed communications
infrastructure.
Along with their appealing autonomy and fast deployment properties, MANETs
exhibit some other properties that make their realization a very challenging task.
Topology dynamism and bandwidth limitations of the communication channel adversely
affect the performance of routing protocols designed for MANETs, especially
with the increase in the number of mobile hosts and/or mobility rates.
The Connected Dominating Set (CDS), a.k.a. virtual backbone or Spine, is
proposed to facilitate routing, broadcasting, and establishing a dynamic infrastructure
for distributed location databases. Minimizing the CDS produces a simpler
abstracted topology of the MANET and allows for using shorter routes between
any pair of hosts. Since it is NP-complete to find the minimum connected dominating
set, MCDS, researchers resorted to approximation algorithms and heuristics
to tackle this problem.
The literature is rich of many CDS approximation algorithms that compete in
terms of CDS size, running time, and signaling overhead. It has been reported
that localized CDS creation algorithms are the fastest and the lightest in terms of
signaling overhead among all other techniques. Examples of these localized CDS
algorithms are Wu and Li algorithm and its Stojmenovic variant, the MPR algorithm,
and Alzoubi algorithm. The designers of each of these algorithms claim
that their algorithm exhibits the highest degree of localization and hence incurs the lowest cost in the CDS creation phase. However, these claims are not supported
by any physical or at least simulation-based evidence. Moreover, the cost of maintaining
the CDS (in terms of the change in CDS size, running time, and signaling
overhead), in the presence of unpredictable and frequent topology changes, is an
important factor that has to be taken into account -a cost that is overlooked most
of the time.
A simulation-based comparative study between the performance of these algorithms
will be conducted using the ns2 network simulator. This study will focus
on the total costs incurred by these algorithms in terms of CDS size, running time,
and signaling overhead generated during the CDS creation and maintenance phases.
Moreover, the effects of mobility rates, network size, and mobility models on the
performance of each algorithm will be investigated. Conclusions regarding the pros
and cons of each algorithm will be drawn, and directions for future research work
will be recommended.
|
269 |
Ethics Affecting Business : -Improving Ethical PerformanceIsidorsson, Gustav January 2010 (has links)
Ethics as a subject is investigated in this paper and in particular how ethics can be analyzed in different organizations. The paper investigates how the generic ethical performance (EPE) evaluation model can help organizations to evaluate their ethical performance. The base for the empirical material is collected through qualitative interviews with staff on four different international organizations. The results proclaim that the EPE model can help organizations to narrow down focus and to categorize results, which help organizations to analyze ethical behavior. If the EPE model is complemented with an improvement model (the Deming cycle) an ethical improvement model is created. Conclusions are that evaluating ethical performance is not simple and the results can be ambiguous. The EPE model should be seen as a tool in generic cases and not as the only way of evaluating ethics. If ethics is processed according to the Deming cycle small steps of continuous improvement should help organizations to improve ethical performance. The more you study something the more you realize the complexity of it. Opening doors to new knowledge is like finding yourself in a labyrinth. Some ways are leading to dead ends and sometime you get lost. But when you have been walking in the labyrinth for a while you tend to recognize how the different paths are connected and a web is revealed. This study reveals a gap between theoretical knowledge and knowledge about how to implement and use theories of ethics in “real life” situations. The paper ends with ideas for future possible research, the Ethical Improvement Model (EIM) created in this paper is brought forward as a suggestion.
|
270 |
Cost Accounting for Internal Decision Making and Evaluation : A Case StudyFogelkvist, Marcus, Axelsson, David January 2011 (has links)
This study addresses the importance of cost accounting and performance evaluation for organizations. Further, this study explains the purposes of cost accounting and performance evaluation. The chosen method is a single case study which investigates how product costing is made within a food manufacturing company, called Omega in this study. Interviews have been an important tool for collecting data; data used to create a snapshot of Omega’s current operations. Cost concepts, cost allocation methods, and performance evaluation theories are presented and later compared with the snapshot of Omega. Dissatisfaction concerning product costing in Omega was first expressed by a business unit manager. Search revealed that the issue concerning product costing was not a problem per se; instead it was a symptom of a more fundamental issue. The more fundamental issue is Omega’s cost accounting and financial performance evaluation used throughout the organization. Omega evaluates its business units using financial operating results measures based on information from its cost accounting system. Uncertainty within Omega has been observed concerning a performance measure called operational result. Search has revealed that the business units within Omega do not have the ability to control costs upon which they are evaluated, and further that all costs are not relevant for business unit performance evaluation. Three cost categories for cost accounting have been constructed with the purpose of serving as a base for financial performance evaluation. Treating costs differently based upon their characteristics enables organizations to form a well-functioning financial performance evaluation system which can lead the organization in the right direction. Ultimately, a well-functioning financial performance evaluation system enhances motivation and commitment in business units as well as it gives the top management a correct performance indicator.
|
Page generated in 0.1421 seconds