The search functionality is under construction.

Keyword Search Result

[Keyword] emulation(25hit)

1-20hit(25hit)

  • A Software-based NVM Emulator Supporting Read/Write Asymmetric Latencies

    Atsushi KOSHIBA  Takahiro HIROFUCHI  Ryousei TAKANO  Mitaro NAMIKI  

     
    PAPER-Computer System

      Pubricized:
    2019/07/06
      Vol:
    E102-D No:12
      Page(s):
    2377-2388

    Non-volatile memory (NVM) is a promising technology for low-energy and high-capacity main memory of computers. The characteristics of NVM devices, however, tend to be fundamentally different from those of DRAM (i.e., the memory device currently used for main memory), because of differences in principles of memory cells. Typically, the write latency of an NVM device such as PCM and ReRAM is much higher than its read latency. The asymmetry in read/write latencies likely affects the performance of applications significantly. For analyzing behavior of applications running on NVM-based main memory, most researchers use software-based emulation tools due to the limited number of commercial NVM products. However, these existing emulation tools are too slow to emulate a large-scale, realistic workload or too simplistic to investigate the details of application behavior on NVM with asymmetric read/write latencies. This paper therefore proposes a new NVM emulation mechanism that is not only light-weight but also aware of a read/write latency gap in NVM-based main memory. We implemented the prototype of the proposed mechanism for the Intel CPU processors of the Haswell architecture. We also evaluated its accuracy and performed case studies for practical benchmarks. The results showed that our prototype accurately emulated write-latencies of NVM-based main memory: it emulated the NVM write latencies in a range from 200 ns to 1000 ns with negligible errors from 0.2% to 1.1%. We confirmed that the use of our emulator enabled us to successfully estimate performance of practical workloads for NVM-based main memory, while an existing light-weight emulation model misestimated.

  • Emulation Testbed for IEEE 802.15.4 Networked Systems

    Razvan BEURAN  Junya NAKATA  Yasuo TAN  Yoichi SHINODA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:9
      Page(s):
    2892-2905

    IEEE 802.15.4 based devices are a key component for mobile and pervasive computing. However, their small dimensions and reduced resources, together with the intrinsic properties of wireless communication, make it difficult to evaluate such networked systems through real-world trials. In this paper we present an emulation testbed intended for the evaluation of IEEE 802.15.4 networked systems. The testbed builds on the generic framework of the wireless network testbed QOMB, and adds IEEE 802.15.4 network, processor and sensing emulation functionality. We validated the testbed through a series of experiments carried out both through real-world trials in a smart home environment, and through emulation experiments on our testbed. Our results show that one can accurately, and in real time, execute IEEE 802.15.4 network applications on our testbed in an emulated environment that reproduces closely the real scenario.

  • A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude

    Gregory BLANC  Youki KADOBAYASHI  

     
    PAPER

      Vol:
    E94-D No:11
      Page(s):
    2159-2166

    Modern web applications incorporate many programmatic frameworks and APIs that are often pushed to the client-side with most of the application logic while contents are the result of mashing up several resources from different origins. Such applications are threatened by attackers that often attempts to inject directly, or by leveraging a stepstone website, script codes that perform malicious operations. Web scripting based malware proliferation is being more and more industrialized with the drawbacks and advantages that characterize such approach: on one hand, we are witnessing a lot of samples that exhibit the same characteristics which make these easy to detect, while on the other hand, professional developers are continuously developing new attack techniques. While obfuscation is still a debated issue within the community, it becomes clear that, with new schemes being designed, this issue cannot be ignored anymore. Because many proposed countermeasures confess that they perform better on unobfuscated contents, we propose a 2-stage technique that first relieve the burden of obfuscation by emulating the deobfuscation stage before performing a static abstraction of the analyzed sample's functionalities in order to reveal its intent. We support our proposal with evidence from applying our technique to real-life examples and provide discussion on performance in terms of time, as well as possible other applications of proposed techniques in the areas of web crawling and script classification. Additionally, we claim that such approach can be generalized to other scripting languages similar to JavaScript.

  • An Arbitrary Digital Power Noise Generator Using 65 nm CMOS Technology

    Tetsuro MATSUNO  Daisuke FUJIMOTO  Daisuke KOSAKA  Naoyuki HAMANISHI  Ken TANABE  Masazumi SHIOCHI  Makoto NAGATA  

     
    PAPER

      Vol:
    E93-C No:6
      Page(s):
    820-826

    An arbitrary noise generator (ANG) is based on time-series charging of divided parasitic capacitance (TSDPC) and emulates power supply noise generation in a CMOS digital circuit. A prototype ANG incorporates an array of 32 x 32 6-bit TSDPC cells along with a 128-word vector memory and occupies 2 x 2 mm2 in a 65 nm 1.2 V CMOS technology. Digital noise emulation of functional logic cores such as register arrays is demonstrated with chip-level waveform monitoring at power supply, ground, as well as substrate nodes.

  • Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set

    Mio SUZUKI  Hiroaki HAZEYAMA  Daisuke MIYAMOTO  Shinsuke MIWA  Youki KADOBAYASHI  

     
    PAPER-Network Architecture and Testbed

      Vol:
    E92-D No:10
      Page(s):
    1877-1887

    Building an experimental network within a testbed has been a tiresome process for experimenters, due to the complexity of the physical resource assignment and the configuration overhead. Also, the process could not be expedited across testbeds, because the syntax of a configuration file varies depending on specific hardware and software. Re-configuration of an experimental topology for each testbed wastes time, an experimenter could not carry out his/her experiments during the limited lease time of a testbed at worst. In this paper, we propose the AnyBed: the experimental network-building system. The conceptual idea of AnyBed is "If experimental network topologies can be portable across any kinds of testbed, then, it would expedite building an experimental network on a testbed while manipulating experiments by each testbed support tool". To achieve this concept, AnyBed divide an experimental network configuration into the logical and physical network topologies. Mapping these two topologies, AnyBed can build intended logical network topology on any PC clusters. We have evaluated the AnyBed implementation using two distinct clusters. The evaluation result shows a BGP topology with 150 nodes can be constructed on a large scale testbed in less than 113 seconds.

  • Introduction to the Functional Architecture of NGN Open Access

    Naotaka MORITA  Hideo IMANAKA  

     
    INVITED PAPER

      Vol:
    E90-B No:5
      Page(s):
    1022-1031

    In July 2006, International Telecommunication Union-Telecommunication Standardization Sector (ITU-T) Study Group 13 initiated the approval process for a batch of framework Recommendations on the Next Generation Network (NGN) Release 1. One of the new Recommendations, Y.2012, illustrates the NGN from the viewpoint of a functional architecture consisting of various functional blocks, namely functional entities. In conjunction with this Recommendation, this paper explains how the NGN can be built and how the NGN utilizes functional entities to provide expected services and required capabilities. This paper also identifies open issues for extending the functional architecture towards Release 2.

  • Fast FPGA-Emulation-Based Simulation Environment for Custom Processors

    Yuichi NAKAMURA  Kouhei HOSOKAWA  

     
    PAPER-Simulation and Verification

      Vol:
    E89-A No:12
      Page(s):
    3464-3470

    This paper describes a new method for the simulation environment for a custom processor. It is generally very hard to develop an accurate simulator for a custom processor rapidly, even if simple instruction-set-level simulator (ISS). The proposed method uses a field-programmable-gate-array emulator with a PCI interface and debugging GUI software on a PC. Since the emulator implements the processor design at the register-transfer or net-list level, the emulation results are almost the same as the results obtained with the actual processor. To support rich debugging functions like those provided by the conventional software simulator, we use a debugging buffer and break-control circuits. Experimental results show that a simulator constructed by the proposed method can be constructed within several hours and that it can break the processor operation at any specified point and observe the internal signals when the emulated system is running at 1-30 MHz. The accuracy of the constructed simulator is the same as that of RTL simulation and much higher than that of software ISS simulation. We show that we can provide a fast, accurate, and useful simulator for any processor design specified at the register-transfer level.

  • A Parallel Network Emulation Method for Evaluating the Correctness and Performance of Applications

    Yue LI  Chunxiao XING  Ying HE  

     
    PAPER

      Vol:
    E89-D No:12
      Page(s):
    2897-2906

    Network emulation system constructs a virtual network environment which has the characteristics of controllable and repeatable network conditions. This makes it possible to predict the correctness and performance of proposed new technology before deploying to Internet. In this paper we present a methodology for evaluating the correctness and performance of applications based on the PARNEM, a parallel discrete event network emulator. PARNEM employs a BSP based real-time event scheduling engine, provides flexible interactive mechanism and facilitates legacy network models reuse. PARNEM allows detailed and accurate study of application behavior. Comprehensive case studies covering bottleneck bandwidth measurement and distributed cooperative web caching system demonstrate that network emulation technology opens a wide range of new opportunities for examining the behavior of applications.

  • Instruction Based Synthesizable Testbench Architecture

    Ho-Seok CHOI  Hae-Wook CHOI  Sin-Chong PARK  

     
    LETTER-Integrated Electronics

      Vol:
    E89-C No:5
      Page(s):
    653-657

    This paper presents a synthesizable testbench architecture based on a defined instruction for standalone mode verification. A set of instructions describes transitions of a signal. The set of instructions can be changed easily to describe different signal transitions by loading the different set of instructions on emulator's memory. The proposed testbench enables a fast emulation and increases flexibility and reusability by using an instruction set. To prove the performance of instruction based synthesizable testbench, we verified Bluetooth and IEEE 802.11a PHY baseband systems and compared their performance with those of co-sim mode and modified co-sim mode emulation.

  • Adaptive Clock Recovery Method Utilizing Proportional-Integral-Derivative (PID) Control for Circuit Emulation

    Youichi FUKADA  Takeshi YASUDA  Shuji KOMATSU  Koichi SAITO  Yoichi MAEDA  Yasuyuki OKUMURA  

     
    PAPER

      Vol:
    E89-B No:3
      Page(s):
    690-695

    This paper describes a novel adaptive clock recovery method that uses proportional-integral-derivative (PID) control. The adaptive clock method is a clock recovery technique that synchronizes connected terminals via packet networks, and will be indispensable for circuit emulation services in the next generation Ethernet. Our adaptive clock method simultaneously achieves a short starting-time, accuracy, stable recovery clock frequency, and few buffer delays using the PID control technique. We explain the numerical simulations, experimental results, and circuit designs.

  • A Development of Circuit Emulation System on TDM over Ethernet Comprising OAM and Protection Function

    Akihiko TANAKA  Atsushi IWAMURA  Masahiko MIZUTANI  Yoshihiro ASHI  

     
    PAPER

      Vol:
    E89-B No:3
      Page(s):
    668-674

    The Ethernet network is widely used and adopted to the access portion or metro area for the reason of new applications for native Ethernet services or its economical advantage. Apart from these applications for native Ethernet, an encapsulation technology to transport legacy services over Ethernet, i.e. TDM over Ethernet, is focused on. In order to apply it to the carrier networks, it is necessary to meet Quality of Service (QoS) requirements, and the consideration of operation, administration and maintenance (OAM) aspects are indispensable. Furthermore, in order for higher reliability, it is required to apply protection function to the networks. We have studied the encapsulation method of TDM signals applied to circuit emulator accommodating TDM signals over Ethernet. In addition, the OAM mechanism and the protection function are studied. This paper shows the frame format, the detail of the OAM mechanism and the protection function, and introduces a developed circuit for adaptation of TDM over Ethernet.

  • Communication Scheme for a Highly Collision-Resistive RFID System

    Yohei FUKUMIZU  Shuji OHNO  Makoto NAGATA  Kazuo TAKI  

     
    PAPER

      Vol:
    E89-A No:2
      Page(s):
    408-415

    A highly collision-resistive RFID system multiplexes communications between thousands of tags and a single reader in combination with time-domain multiplexing code division multiple access (TD-CDMA), CRC error detection, and re-transmission for error recovery. The collision probability due to a random selection of CDMA codes and TDMA channels bounds the number of IDs successfully transmitted to a reader during a limited time frame. However, theoretical analysis showed that the re-transmission greatly reduced the collision probability and that an ID error rate of 2.510-9 could be achieved when 1,000 ID tags responded within a time frame of 400 msec in ideal communication channels. The proposed collision-resistive communication scheme for a thousand multiplexed channels was modeled on a discrete-time digital expression and an FPGA-based emulator was built to evaluate a practical ID error rate under the presence of background noise in communication channels. To achieve simple anti-noise communication in a multiple-response RFID system, as well as unurged re-transmission of ID data, adjusting of correlator thresholds provides a significant improvement to the error rate. Thus, the proposed scheme does not require a reader to request ID transmission to erroneously responding tags. A reader also can lower noise influence by using correlator thresholds, since the scheme multiplexes IDs by CDMA-based communication. The effectiveness of the re-transmission was confirmed experimentally even in noisy channels, and the ID error rate derived from the emulation was 1.910-5. The emulation was useful for deriving an optimum set of RFID system parameters to be used in the design of mixed analog and digital integrated circuits for RFID communication.

  • DCLUE: A Distributed Cluster Emulator

    Krishna KANT  Amit SAHOO  Nrupal JANI  

     
    PAPER-Parallel/Distributed Programming Models, Paradigms and Tools

      Vol:
    E89-D No:2
      Page(s):
    433-440

    Given the availability of high-speed Ethernet and HW based protocol offload, clustered systems using a commodity network fabric (e.g., TCP/IP over Ethernet) are expected to become more attractive for a range of e-business and data center applications. In this paper, we describe a comprehensive simulation to study the performance of clustered database systems using such a fabric. The simulation model currently supports both TCP and SCTP as the transport protocol and models an Oracle 9i like clustered DBMS running a TPC-C like workload. The model can be used to study a wide variety of issues regarding the performance of clustered DBMS systems including the impact of enhancements to network layers (transport, IP, MAC), QoS mechanisms or latency improvements, and cluster-wide power control issues.

  • Multidimensional Characterization of the Impact of Faulty Drivers on the Operating Systems Behavior

    João DURÃES  Henrique MADEIRA  

     
    PAPER-Dependable Software

      Vol:
    E86-D No:12
      Page(s):
    2563-2570

    This paper presents the results of a continuing research work on the practical characterization of operating systems (OS) behavior in the presence of software faults in OS components, such as faulty device drivers. The methodology used is based on the emulation of software faults in device drivers and observation of the behavior of the overall system regarding a comprehensive set of failure modes, analyzed according to different dimensions related to multiple user perspectives. The emulation of the software faults is done through the injection of specific mutations at machine-code level that reproduce the code generated by compilers when typical programming errors occur in the high level language code. Two important aspects of this methodology are the independence of source code availability and the use of simple and established practices to evaluate operating systems failure modes, thus allowing its use as a dependability benchmarking technique. The generalization of the methodology to any software system built of discrete and identifiable components is also discussed.

  • REX: A Reconfigurable Experimental System for Evaluating Parallel Computer Systems

    Yuetsu KODAMA  Toshihiro KATASHITA  Kenji SAYANO  

     
    PAPER

      Vol:
    E86-D No:10
      Page(s):
    2016-2024

    REX is a reconfigurable experimental system for evaluating and developing parallel computer systems. It consists of large-scale FPGAs, and enables the systems to be reconfigured from their processors to the network topology in order to support their evaluation and development. We evaluated REX using several implementations of parallel computer systems, and showed that it had enough scalability of gates, memory throughput and network throughput. We also showed that REX was an effective tool because of its emulation speed and reconfigurability to develop systems.

  • Fault-Tolerant Ring- and Toroidal Mesh-Connected Processor Arrays Able to Enhance Emulation of Hypercubes

    Nobuo TSUDA  

     
    PAPER

      Vol:
    E84-D No:11
      Page(s):
    1452-1461

    An advanced spare-connection scheme for K-out-of-N redundancy is proposed for constructing fault-tolerant ring- or toroidal mesh-connected processing-node arrays able to enhance emulation of binary hypercubes by using bypass networks. With this scheme, a component redundancy configuration for a base array with a fixed number of primary nodes, such as that for 8-node ring or 32-node toroidal mesh, can be constructed by using bypass links with a segmented bus structure to selectively connect the primary nodes to a spare node in parallel. These bypass links are allocated to the primary nodes by graph-node coloring with a minimum inter-node distance of three in order to use the bypass links as the hypercube connections as well as to attain strong fault tolerance for reconfiguring the base array with the primary network topology. An extended redundancy configuration for a large fault-tolerant array can be constructed by connecting the component configurations by using external switches of a hub type provided at the bus nodes of the bypass links. This configuration has a network topology of the parallel star-connections of sub-hypercubes whose diameter is smaller than that of the regular hypercube.

  • DESC: A Hardware-Software Codesign Methodology for Distributed Embedded Systems

    Trong-Yen LEE  Pao-Ann HSIUNG  Sao-Jie CHEN  

     
    PAPER-VLSI Systems

      Vol:
    E84-D No:3
      Page(s):
    326-339

    The hardware-software codesign of distributed embedded systems is a more challenging task, because each phase of codesign, such as copartitioning, cosynthesis, cosimulation, and coverification must consider the physical restrictions imposed by the distributed characteristics of such systems. Distributed systems often contain several similar parts for which design reuse techniques can be applied. Object-oriented (OO) codesign approach, which allows physical restriction and object design reuse, is adopted in our newly proposed Distributed Embedded System Codesign (DESC) methodology. DESC methodology uses three types of models: Object Modeling Technique (OMT) models for system description and input, Linear Hybrid Automata (LHA) models for internal modeling and verification, and SES/workbench simulation models for performance evaluation. A two-level partitioning algorithm is proposed specifically for distributed systems. Software is synthesized by task scheduling and hardware is synthesized by system-level and object-oriented techniques. Design alternatives for synthesized hardware-software systems are then checked for design feasibility through rapid prototyping using hardware-software emulators. Through a case study on a Vehicle Parking Management System (VPMS), we depict each design phase of the DESC methodology to show benefits of OO codesign and the necessity of a two-level partitioning algorithm.

  • Quality of Service Guarantee in a Combined Input Output Queued Switch

    Tsern-Huei LEE  Yaw-Wen KUO  Jyh-Chiun HUANG  

     
    PAPER-ATM Switch and System Development

      Vol:
    E83-B No:2
      Page(s):
    190-195

    Combined input output queued (CIOQ) architecture such as crossbar with speedup has recently been proposed to build a large capacity switch for broadband integrated services networks. It was shown that, for a speedup factor of 2, a CIOQ switch can achieve 100% throughput with a simple maximal matching algorithm. Achieving 100% throughput, however, is not sufficient for per-connection quality of service (QoS) guarantee. In [2],[3], it is proved that a CIOQ switch with a speedup factor of 2 can exactly emulate an output queued (OQ) switch if stable matching is adopted. Unfortunately, the complexity of currently known algorithms makes stable matching impractical for high-speed switches. In this paper, we propose a new matching algorithm called the least cushion first/most urgent first (LCF/MUF) algorithm and formally prove that a CIOQ switch with a speedup factor of 2 can exactly emulate an OQ switch which adopts any service discipline for cell transmission. A potential implementation of our proposed matching algorithm for strict priority service discipline is also presented.

  • Traffic Control Approaches for Voice over ATM Networks

    Yaw-Chung CHEN  Chia-Tai CHAN  Shuo-Cheng HU  Pi-Chung WANG  

     
    PAPER-QoS Control and Traffic Control

      Vol:
    E81-B No:12
      Page(s):
    2380-2391

    In this paper we present two traffic control approaches, a circuit emulation traffic control (CETC) and an adaptive priority traffic control (APTC) for supporting voice services in ATM networks. Most voice services can be handled as CBR traffic, this causes a lot of wasted bandwidth. Sending voice through VBR (variable bit rate) may be a better alternative, because it allows the network to allocate voice bandwidth on demand. In CETC, the service discipline guarantees the quality of service (QOS) for voice circuits. Through mathematical analysis, we show that CETC features an adequate performance in delay-jitter. Moreover, it is feasible in implementation. We also present an APTC approach which uses a dynamic buffer allocation scheme to adjust the buffer size based on the real traffic need, as well as employs an adaptive priority queuing technique to handle various delay requirements for VBR voice traffic. It provides an adequate QOS for voice circuits in addition to improving the multiplexing gain. Simulation results show that voice traffic get satisfied delay performance using our approaches. It may fulfill the emerging needs of voice service over ATM networks.

  • ATM LAN Emulation for Mobile Cellular Networks

    Nen-Fu HUANG  Yao-Tzung WANG  

     
    PAPER-Switching and Communication Processing

      Vol:
    E81-B No:6
      Page(s):
    1171-1187

    In this paper, the design issues of ATM LAN emulation (LANE) in a mobile environment are addressed and investigated. One of the most important issues is to support the transparent services for mobile stations. We show that the wireline LANE model, defined by the ATM Forum, for the legacy LANs (Ethernet/FDDI/token ring) is not efficient enough to handle a handoff. On occurring a handoff, the ATM network has to maintain network connections and reroute data to the new location of mobile stations. Combined with the conventional cellular handoff schemes, the wireline LANE-based data rerouting is performed at the base station. As a result, a communication path between two mobile stations may become inefficient when the station moves, e. g. , the path elongates and incurs extra processing overheads. To overcome this problem, we suggest maintaining a separate connection for each pair of mobile stations instead of each pair of LANs (as defined in the ATM Forum). Following on this suggestion, an extensive cellular handoff scheme is proposed for an ATM-based wireless network. In the proposal, the rerouting decision is furnished at the ATM switch. It shows that this scheme not only meets the basic handoff requirements (data continuity and transparency), but also offers smaller handoff latency and a shorter path. A path migration scheme is also suggested to migrate an inefficient path to a better one, if any. The effectiveness of the proposed handoff scheme for the wireless LAN emulation service is evaluated by analysis. Some implementation issues and the cost/performance tradeoffs between additional connections (one for each pair of mobile stations) required and bandwidth waste caused by path elongation are studied.

1-20hit(25hit)