Results 1 - 10
of
2,079
Table 2: Latency hiding benchmark in a LAN: Two SPARCstation10 connected via Ethernet, with marshaling of messages (copying of single double values). Whereas the variance of the measurements in our Ethernet LAN is small, timings in the In- ternet are hardly reproducible, and easily vary by a factor of two. Therefore, the latency hiding 11
"... In PAGE 10: ... Storage for vectors ~x and ~ y is allocated elsewhere. Table 1 and Table2 list the results of this benchmark for a LAN con guration consisting of two SPARCstation10 connected via Ethernet. Two processes exchange messages simultaneously with payloads varying from 4 KByte to 1 MByte.... In PAGE 10: ... The send daxpy counts are generated with the benchmark program given above, and the receive daxpy counts with the message continuation parametrized with the receive message (rmid). The di erence between Table 1 and Table2 is the application of marshaling: For the measure- ments presented in Table 1, an array of size payload is transferred without marshaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table 2 are generated with mar- shaling, where double arrays of size payload are marshaled by copying each double value into and out of the message.... In PAGE 10: ... The di erence between Table 1 and Table 2 is the application of marshaling: For the measure- ments presented in Table 1, an array of size payload is transferred without marshaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table2 are generated with mar- shaling, where double arrays of size payload are marshaled by copying each double value into and out of the message. This gives a notion of the overhead for marshaling dynamic data structures.... ..."
Table 1: Power Requirements of the Lucent WaveLAN PCMCIA Wireless Ethernet card.
Table 1 Power requirements of the Lucent WaveLAN PCMCIA wireless Ethernet card.
Table 1: Power Requirements of the Lucent WaveLAN PCMCIA Wireless Ethernet card.
Table 1: Latency hiding benchmark in a LAN: Two SPARCstation10 connected via Ethernet, without marshaling of messages.
1996
"... In PAGE 5: ... Storage for vectors ~ x and ~y is allocated elsewhere. Table1 and Table 2 list the results of this benchmark for a LAN configuration consisting of two Sun SPARC- station10 connected via Ethernet. The payloads of the si- multaneously exchanged messages varies from 4 KByte to 1 MByte.... In PAGE 5: ... The send-daxpy counts are generated with the benchmark program given above, and the receive- daxpy counts with the message continuation parameterized with the receive message (rmid). The difference between Table1 and Table 2 is the appli- cation of marshaling: For the measurements presented in Table 1, an array of size payload is transferred without mar- shaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table 2 are generated with marshaling.... In PAGE 5: ... The send-daxpy counts are generated with the benchmark program given above, and the receive- daxpy counts with the message continuation parameterized with the receive message (rmid). The difference between Table 1 and Table 2 is the appli- cation of marshaling: For the measurements presented in Table1 , an array of size payload is transferred without mar- shaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table 2 are generated with marshaling.... In PAGE 6: ... Furthermore, the band- width of the Ethernet is almost optimally utilized. For in- stance, according to Table1 , two 1 MByte messages are exchanged via the Ethernet within 1.849 seconds, which corresponds to a throughput of 9.... ..."
Cited by 5
Table 1: Latency hiding benchmark in a LAN: Two SPARCstation10 connected via Ethernet, whithout marshaling of messages.
"... In PAGE 10: ... Storage for vectors ~x and ~ y is allocated elsewhere. Table1 and Table 2 list the results of this benchmark for a LAN con guration consisting of two SPARCstation10 connected via Ethernet. Two processes exchange messages simultaneously with payloads varying from 4 KByte to 1 MByte.... In PAGE 10: ... The send daxpy counts are generated with the benchmark program given above, and the receive daxpy counts with the message continuation parametrized with the receive message (rmid). The di erence between Table1 and Table 2 is the application of marshaling: For the measure- ments presented in Table 1, an array of size payload is transferred without marshaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table 2 are generated with mar- shaling, where double arrays of size payload are marshaled by copying each double value into and out of the message.... In PAGE 10: ... The send daxpy counts are generated with the benchmark program given above, and the receive daxpy counts with the message continuation parametrized with the receive message (rmid). The di erence between Table 1 and Table 2 is the application of marshaling: For the measure- ments presented in Table1 , an array of size payload is transferred without marshaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table 2 are generated with mar- shaling, where double arrays of size payload are marshaled by copying each double value into and out of the message.... In PAGE 11: ... Furthermore, the bandwidth of the Ethernet is almost optimally utilized. For instance, according to Table1 , two 1 MByte messages are exchanged over the Ethernet within 1.849 seconds, which corresponds to a throughput of 9.... ..."
Table 7. LAN Emulation Data Frame Format for IEEE 802.3/Ethernet Frames
"... In PAGE 52: ...n LE Client that conforms to this specification. The first is based on ISO 8802.3/CSMA-CD (IEEE 802.3) and has the format shown in Table7 below. The minimum LAN Emulation AAL5 SDU length for IEEE 802.... ..."
Table 5 are reported, for each platform, the measured values of latency, bandwidth and of the two coefficients and . The reader can find a similar approach to benchmarking the performance of several message-passing API over an ATM LAN in [7]. For instance, for the decomposition reported in Table 2, and assuming that the processors have the same tmult = 3:75 s, and that the interconnection used is the Ethernet LAN, we have:
"... In PAGE 5: ...49 1690 2. 023 Table5 . Characterization of the communication performance on the two platforms.... ..."
Table 2: Latency hiding benchmark in a LAN: Two SPARCstation10connected via Ethernet, with marshaling of messages (copying of single double values).
1996
"... In PAGE 5: ... Storage for vectors ~ x and ~y is allocated elsewhere. Table 1 and Table2 list the results of this benchmark for a LAN configuration consisting of two Sun SPARC- station10 connected via Ethernet. The payloads of the si- multaneously exchanged messages varies from 4 KByte to 1 MByte.... In PAGE 5: ... The send-daxpy counts are generated with the benchmark program given above, and the receive- daxpy counts with the message continuation parameterized with the receive message (rmid). The difference between Table 1 and Table2 is the appli- cation of marshaling: For the measurements presented in Table 1, an array of size payload is transferred without mar- shaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table 2 are generated with marshaling.... In PAGE 5: ... The difference between Table 1 and Table 2 is the appli- cation of marshaling: For the measurements presented in Table 1, an array of size payload is transferred without mar- shaling (marshal = unmarshal = (void *) NULL). In contrast, the values shown in Table2 are generated with marshaling. Here arrays of double precision numbers of size payload are marshaled by copying each double preci- sion value into and out of the message.... ..."
Cited by 5
Table 5.8: Ten Most Popular Hosts on the Campus Ethernet Hosts Number of Percent Number of Conversations of Total Internet LANs
1994
Cited by 3
Results 1 - 10
of
2,079