Warren Harrop Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Warren Harrop Thesis Using immersive real-time collaboration environments to manage IP networks A thesis submitted for the degree of Doctor of Philosophy Warren Harrop, BEng(Hons)(Telecommunications and Internet Technologies) & BAppSc(Multimedia Technologies) (Swinburne University), Centre for Advanced Internet Architectures, Faculty of Science, Engineering and Technology, Swinburne University of Technology, Melbourne, Victoria, Australia. August 21, 2014 Declaration This thesis contains no material which has been accepted for the award to the candidate of any other degree or diploma, except where due reference is made in the text of the examinable outcome. To the best of the candidate’s knowledge this thesis contains no material previously published or written by another person except where due reference is made in the text of the examinable outcome; and where the work is based on joint research or publications, discloses the relative contributions of the respective workers or authors. Warren Harrop Centre for Advanced Internet Architectures (CAIA) - Faculty of Science, Engineering and Technology Swinburne University of Technology August 21, 2014 iii Publications arising from this thesis Some preliminary results and discussions in this thesis have been previously published in peer- reviewed literature: W. Harrop and G. Armitage, “Intuitive Real-Time Network Monitoring Using Visually Orthog- onal 3D Metaphors,” in Australian Telecommunications Networks & Applications Conference 2004 (ATNAC 2004), Sydney, Australia, 8-10 December 2004, pp. 276–282. [Online]. Available: http: //caia.swin.edu.au/pubs/ATNAC04/harrop-armitage-ATNAC2004.pdf W. Harrop and G. Armitage, “Modifying first person shooter games to perform real time network monitoring and control tasks,” in NetGames ’06: Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games. New York, NY, USA: ACM, 2006, p. 10. W. Harrop and G. Armitage, “Real-time collaborative network monitoring and control using 3D game engines for representation and interaction,” in VizSEC ’06: Proceedings of the 3rd international work- shop on Visualization for computer security. New York, NY, USA: ACM, 2006, pp. 31–40. The development of Greynets, the motivating use case for visualisation, is documented in: W. Harrop and G. Armitage, “Defining and evaluating greynets (sparse darknets),” in LCN ’05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary. IEEE Computer Society, 2005, pp. 344–350. W. Harrop and G. Armitage, “Greynets: a definition and evaluation of sparsely populated darknets,” in MineNet ’05: Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data. New York, NY, USA: ACM Press, 2005, pp. 171–172. F. Baker, W. Harrop, and G. Armitage, “IPv4 and IPv6 Greynets,” RFC 6018 (Informational), In- ternet Engineering Task Force, Sep. 2010. [Online]. Available: http://www.ietf.org/rfc/ rfc6018.txt v Acknowledgements My supervisor Professor Grenville Armitage & associate supervisor Dr. Philip Branch, for providing valuable guidance and feedback throughout the creation of this thesis. Mitchell Harrop and Sebastian Zander for their feedback. Many thanks to all CAIA members past and present for creating an excellent research environ- ment. The following people helped greatly in recruiting usability experimentation participants: Mitchell Harrop, Bettina Harrop, Juniris Harrop and Peter Harrop. Thanks go to Daniel Trembath for creation of software to aid in data entry. This code saved numerous hours and allowed the accurate conversion of the approximately 200 pages of paper answer sheets to digital form. The Cisco University Research Program Fund provided support funding for the project “Anoma- lous Traffic Detection and Collaborative Network Configuration Using 3D Multiplayer Game En- gines”, Project Leader and Participants Grenville Armitage, Warren Harrop & Cisco Project Cham- pion, Fred Baker. This funding enabled the production of L3DGEWorld and thanks go to Lucas Parry for his year of software engineering on the project. (http://www.caia.swin.edu.au/urp/l3dge/) The Cisco Network Topology Icons are used in many diagrams in this thesis. (http://www.cisco.com/web/about/ac50/ac47/2.html) The auDA Foundation supplied a supporting grant for the development of the CAIA Greynets Toolkit – greynetd. (http://caia.swin.edu.au/greynets/) Trace file data of multi-player Quake III Arena game play from Chapter 6 is taken from data publicly available in the SONG collection, created by the Centre for Advanced Internet Architectures, Swinburne University of Technology (http://caia.swin.edu.au/sitcrc/song/). Monika Dieker for being there from start to finish. vii Contents Abstract 1 1 Introduction 3 1.1 A real-time collaborative environment . 6 1.2 Usability experimentation . 9 1.3 Network resource consumption . 9 1.4 Thesis outline . 10 2 Techniques for Immersive and Collaborative Management 11 2.1 The role of visualisation . 12 2.1.1 Reasons for the visualisation of data networks . 13 2.1.2 Past and present . 14 2.2 The diversity of metering, transfer and collection methods . 15 2.2.1 Network observation points - collecting frames . 16 2.2.2 Network layers - example network metrics . 16 2.3 The diversity of network control & service discovery methods . 19 2.3.1 Example network control methods . 19 2.4 Network data interpretation . 21 2.4.1 Text based . 22 2.4.2 2D – static and interactive . 22 2.4.3 3D – static and interactive . 22 2.4.4 3D – immersive . 23 2.5 Collaboration . 23 2.6 Taxonomy . 24 2.6.1 User control over presented information . 24 ix x CONTENTS 2.6.2 Real-time dynamic update of data into a system . 24 2.6.3 Historical data access . 25 2.6.4 Interaction with running network configuration . 25 2.6.5 Visual presentations and metaphors used . 25 2.6.6 Concurrent presentation of network variables . 25 2.6.7 Collaboration . 26 2.6.8 Scalability . 26 2.7 Network visualisation evolution – a review of notable examples . 26 2.7.1 Textual visualisations . 27 2.7.2 Static 2D visualisations . 30 2.7.3 Interactive 2D visualisations . 35 2.7.4 Interactive 3D visualisations . 38 2.7.5 Immersive 3D visualisations . 41 2.8 Visualisations using game engines . 44 2.9 Conclusion . 45 3 Proposal & Methodology 46 3.1 Leveraging a FPS game engine . 48 3.2 Historical data access . 49 3.3 Evaluation Methodology . 50 3.3.1 Usability experiments . 50 3.3.2 Network resource consumption experimentation . 52 4 Towards a Visual Environment 54 4.1 Motivating use case – visualising greynet data . 54 4.2 Early prototyping - 3VEN . 56 4.3 Cube engine . 57 4.4 Example usage . 58 4.4.1 Multiple monitoring points . 58 4.5 L3DGEWorld . 60 4.5.1 Collaboration . 61 4.5.2 Drill down . 63 4.6 Experiment architecture . 64 CONTENTS xi 4.7 L3DGEWorld extensions/modifications . 65 4.8 Conclusion . 67 5 Usability Evaluation 68 5.1 Methodology . 69 5.2 Results & Discussion . 73 5.2.1 Participant demographics & experience . 73 5.2.2 Navigation within L3DGEWorld . 74 5.2.3 Object movements and the concepts they convey . 76 5.2.4 Visual orthogonality . 79 5.2.5 Participants’ ability to detect in-world events . 81 5.2.6 Participants’ in-world positions . 82 5.2.7 Participant’s sensitivity to latency . 82 5.2.8 Final open-ended questions . 83 5.2.9 Professional network administrators . 83 5.3 Conclusion . 84 6 Network Resource Consumption 85 6.1 Experiment setup . 86 6.2 Client connection establishment and teardown . 87 6.3 Data propagation process . 88 6.4 Continuous operation traffic . 90 6.4.1 Attribute update affect on snapshot size . 91 6.5 L3DGEWorld server data propagation delay . 92 6.6 Multiple client L3DGEWorld - usability traffic analysis . 93 6.6.1 Command traffic . 94 6.6.2 Snapshot traffic . 95 6.7 L3DGEWorld limitations . 98 6.7.1 Under-sampling . 98 6.7.2 Packet loss . 98 6.7.3 Acknowledgments . 99 6.8 L3DGEWorld performance over uncontrolled paths . 99 6.9 Conclusion . 101 xii CONTENTS 7 Conclusion 104 7.1 L3DGEWorld . 105 7.2 Usability . 105 7.3 Network Resource Consumption . 106 A Ethics clearance 108 B Questionnaire 110 C Answer sheets 124 D Hardware accuracy 129 D.1 Methodology . 129 D.2 Results . 130 D.2.1 Alloy 8 port switch (GS-08DXI) . 130 D.2.2 Alloy 5 port switch (NS-05CR) . 131 E Synthetic Packet Pairs 132 References 133 List of Figures 2.1 A section of the modern London underground map - still based on Beck’s original 1933 design . ..
Recommended publications
  • 2 | 2013 2 | Volume Issue ISSN 2190-3387 Law
    2 | 2013 Volume 4 (2013) Issue 2 ISSN 2190-3387 Law and Electronic Commerce Information Technology, Intellectual Property, Journal of Articles Online Sexual Harassment: Issues & Solutions by Mohamed Chawki, Yassin el Shazly Breathing Space for Cloud-Based Business Models: Exploring the Matrix of Copyright Limitations, Safe Harbours and Injunctions by Martin Senftleben A Model Framework for publishing Grey Literature in Open Access by Matěj Myška, Jaromír Šavelka Injunctions against innocent Third Parties: The Case of Website Blocking by Martin Husovec Evaluation of the Role of Access Providers Discussion of Dutch Pirate Bay Case Law and Introducing Principles on Directness, Effectiveness, Costs, Relevance and Time by Arno R. Lodder, Nicole S. van der Meule Das Verhältnis zwischen Urheberrecht und Wissenschaft: Auf die Perspektive kommt es an! by Alexander Peukert Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Journal of Intellectual Property, Information Technology and Table Of Contents Electronic Commerce Law Volume 4 Issue 2, August 2013 Articles www.jipitec.eu [email protected] Online Sexual Harassment: Issues & Solutions A joint publication of: by Mohamed Chawki, Yassin el Shazly 71 Prof. Dr. Thomas Dreier, M. C. J., Karlsruhe Institute of Technology, Vincenz-Prießnitz-Str. 3, Breathing Space for Cloud-Based Business Models: 76131 Karlsruhe Exploring the Matrix of Copyright Limitations, Safe Prof. Dr. Axel Metzger, LL. M., Harbours and Injunctions Exploring the Matrix of Institute for Legal Informatics,
    [Show full text]
  • C:\Andrzej\PDF\ABC Nagrywania P³yt CD\1 Strona.Cdr
    IDZ DO PRZYK£ADOWY ROZDZIA£ SPIS TREFCI Wielka encyklopedia komputerów KATALOG KSI¥¯EK Autor: Alan Freedman KATALOG ONLINE T³umaczenie: Micha³ Dadan, Pawe³ Gonera, Pawe³ Koronkiewicz, Rados³aw Meryk, Piotr Pilch ZAMÓW DRUKOWANY KATALOG ISBN: 83-7361-136-3 Tytu³ orygina³u: ComputerDesktop Encyclopedia Format: B5, stron: 1118 TWÓJ KOSZYK DODAJ DO KOSZYKA Wspó³czesna informatyka to nie tylko komputery i oprogramowanie. To setki technologii, narzêdzi i urz¹dzeñ umo¿liwiaj¹cych wykorzystywanie komputerów CENNIK I INFORMACJE w ró¿nych dziedzinach ¿ycia, jak: poligrafia, projektowanie, tworzenie aplikacji, sieci komputerowe, gry, kinowe efekty specjalne i wiele innych. Rozwój technologii ZAMÓW INFORMACJE komputerowych, trwaj¹cy stosunkowo krótko, wniós³ do naszego ¿ycia wiele nowych O NOWOFCIACH mo¿liwoYci. „Wielka encyklopedia komputerów” to kompletne kompendium wiedzy na temat ZAMÓW CENNIK wspó³czesnej informatyki. Jest lektur¹ obowi¹zkow¹ dla ka¿dego, kto chce rozumieæ dynamiczny rozwój elektroniki i technologii informatycznych. Opisuje wszystkie zagadnienia zwi¹zane ze wspó³czesn¹ informatyk¹; przedstawia zarówno jej historiê, CZYTELNIA jak i trendy rozwoju. Zawiera informacje o firmach, których produkty zrewolucjonizowa³y FRAGMENTY KSI¥¯EK ONLINE wspó³czesny Ywiat, oraz opisy technologii, sprzêtu i oprogramowania. Ka¿dy, niezale¿nie od stopnia zaawansowania swojej wiedzy, znajdzie w niej wyczerpuj¹ce wyjaYnienia interesuj¹cych go terminów z ró¿nych bran¿ dzisiejszej informatyki. • Komunikacja pomiêdzy systemami informatycznymi i sieci komputerowe • Grafika komputerowa i technologie multimedialne • Internet, WWW, poczta elektroniczna, grupy dyskusyjne • Komputery osobiste — PC i Macintosh • Komputery typu mainframe i stacje robocze • Tworzenie oprogramowania i systemów komputerowych • Poligrafia i reklama • Komputerowe wspomaganie projektowania • Wirusy komputerowe Wydawnictwo Helion JeYli szukasz ]ród³a informacji o technologiach informatycznych, chcesz poznaæ ul.
    [Show full text]
  • SGI® Opengl Multipipe™ User's Guide
    SGI® OpenGL Multipipe™ User’s Guide Version 2.3 007-4318-012 CONTRIBUTORS Written by Ken Jones and Jenn Byrnes Illustrated by Chrystie Danzer Production by Karen Jacobson Engineering contributions by Craig Dunwoody, Bill Feth, Alpana Kaulgud, Claude Knaus, Ravid Na’ali, Jeffrey Ungar, Christophe Winkler, Guy Zadicario, and Hansong Zhang COPYRIGHT © 2000–2003 Silicon Graphics, Inc. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted to copy, distribute, or create derivative works from the contents of this electronic documentation in any manner, in whole or in part, without the prior written permission of Silicon Graphics, Inc. LIMITED RIGHTS LEGEND The electronic (software) version of this document was developed at private expense; if acquired under an agreement with the USA government or any contractor thereto, it is acquired as "commercial computer software" subject to the provisions of its applicable license agreement, as specified in (a) 48 CFR 12.212 of the FAR; or, if acquired for Department of Defense units, (b) 48 CFR 227-7202 of the DoD FAR Supplement; or sections succeeding thereto. Contractor/manufacturer is Silicon Graphics, Inc., 1600 Amphitheatre Pkwy 2E, Mountain View, CA 94043-1351. TRADEMARKS AND ATTRIBUTIONS Silicon Graphics, SGI, the SGI logo, InfiniteReality, IRIS, IRIX, Onyx, Onyx2, OpenGL, and Reality Center are registered trademarks and GL, InfinitePerformance, InfiniteReality2, IRIS GL, Octane2, Onyx4, Open Inventor, the OpenGL logo, OpenGL Multipipe, OpenGL Performer, Power Onyx, Tezro, and UltimateVision are trademarks of Silicon Graphics, Inc., in the United States and/or other countries worldwide. MIPS and R10000 are registered trademarks of MIPS Technologies, Inc.
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Computing @SERC Resources,Services and Policies
    Computing @SERC Resources,Services and Policies R.Krishna Murthy SERC - An Introduction • A state-of-the-art Computing facility • Caters to the computing needs of education and research at the institute • Comprehensive range of systems to cater to a wide spectrum of computing requirements. • Excellent infrastructure supports uninterrupted computing - anywhere, all times. SERC - Facilities • Computing - – Powerful hardware with adequate resources – Excellent Systems and Application Software,tools and libraries • Printing, Plotting and Scanning services • Help-Desk - User Consultancy and Support • Library - Books, Manuals, Software, Distribution of Systems • SERC has 5 floors - Basement,Ground,First,Second and Third • Basement - Power and Airconditioning • Ground - Compute & File servers, Supercomputing Cluster • First floor - Common facilities for Course and Research - Windows,NT,Linux,Mac and other workstations Distribution of Systems - contd. • Second Floor – Access Stations for Research students • Third Floor – Access Stations for Course students • Both the floors have similar facilities Computing Systems Systems at SERC • ACCESS STATIONS *SUN ULTRA 20 Workstations – dual core Opteron 4GHz cpu, 1GB memory * IBM INTELLISTATION EPRO – Intel P4 2.4GHz cpu, 512 MB memory Both are Linux based systems OLDER Access stations * COMPAQ XP 10000 * SUN ULTRA 60 * HP C200 * SGI O2 * IBM POWER PC 43p Contd... FILE SERVERS 5TB SAN storage IBM RS/6000 43P 260 : 32 * 18GB Swappable SSA Disks. Contd.... • HIGH PERFORMANCE SERVERS * SHARED MEMORY MULTI PROCESSOR • IBM P-series 690 Regatta (32proc.,256 GB) • SGI ALTIX 3700 (32proc.,256GB) • SGI Altix 350 ( 16 proc.,16GB – 64GB) Contd... * IBM SP3. NH2 - 16 Processors WH2 - 4 Processors * Six COMPAQ ALPHA SERVER ES40 4 CPU’s per server with 667 MHz.
    [Show full text]
  • Darknet As a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks
    Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks Claude Fachkha A Thesis in The Department of Electrical and Computer Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy at Concordia University Montreal, Quebec, Canada November 2015 c Claude Fachkha, 2015 CONCORDIA UNIVERSITY SCHOOL OF GRADUATE STUDIES This is to certify that the thesis prepared By: Claude Fachkha Darknet as a Source of Cyber Threat Intelligence: Entitled: Investigating Distributed and Reflection Denial of Service Attacks and submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final examining committee: 'U'HERUDK'\VDUW*DOH Chair 'U0RKDPPDG=XONHUQLQH External Examiner 'U-RH\3DTXHW External to Program 'U5DFKLGD'VVRXOL Examiner 'U5RFK+*OLWKR Examiner 'U0RXUDG'HEEDEL Thesis Supervisor Approved by 'U$EGHO5D]LN6HEDN Chair of Department or Graduate Program Director 'U$PLU$VLI Dean of Faculty ABSTRACT Cyberspace has become a massive battlefield between computer criminals and com- puter security experts. In addition, large-scale cyber attacks have enormously ma- tured and became capable to generate, in a prompt manner, significant interruptions and damage to Internet resources and infrastructure. Denial of Service (DoS) attacks are perhaps the most prominent and severe types of such large-scale cyber attacks. Furthermore, the existence of widely available encryption and anonymity techniques greatly increases the difficulty of the surveillance and investigation of cyber attacks. In this context, the availability of relevant cyber monitoring is of paramount im- portance.
    [Show full text]
  • DS0122 1007 FISE:DS0100 0605 FT EE.Qxd.Qxd
    FaceTime Internet Security Edition™ Total Control for Web and Real-Time Internet Communications About FaceTime Internet Security FaceTime Internet Security Edition is the next generation Internet security solution, providing Edition total control over web usage and real-time communications. For the first time, enterprises FaceTime Internet Security Edition can enable, secure and manage all Internet channels – web browsing, IM, P2P, Skype, and enables the safe and productive use chat - with unified policy management through a single access point. FaceTime Internet of the Internet including web brows- Security Edition combines state-of-the-art IM & P2P security with an industry leading URL ing, IM, P2P, Skype and other real- filtering database and award winning gateway anti-spyware solution. time communications applications. Purpose-built and integrated to pro- Real-time Communications in the Enterprise vide total visibility and control, Internet communications have evolved from point-to-point channels such as email to real- FaceTime Internet Security Edition time, presence-oriented communications like IM, P2P file-sharing, Skype, and web confer- allows organizations to implement encing. For the new generation of workers, access to real-time communications is an powerful policies that detect, assumption; if it’s not available, they will download it to their computer regardless of policy, secure, manage and enable real- because they know what a positive impact these applications can have on effectiveness and time collaborative applications while efficiency. preventing malware threats, mini- mizing information leakage, and FaceTime terms these real-time communications applications ‘greynets’ – often installed by control employee Internet use. end users without the permission or knowledge of the IT department and use highly evasive techniques to circumvent the existing security infrastructure.
    [Show full text]
  • Verhalten, Kommunikation Und Interaktion in Virtuellen 3D-Umgebungen
    Verhalten, Kommunikation und Interaktion in Virtuellen 3D-Umgebungen DISSERTATION der Fakultät für Informatik der Eberhard-Karls-Universität Tübingen zur Erlangung des Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) vorgelegt von DIPL.-BIOL.JÜRGEN FECHTER aus Sigmaringen Tübingen 1999 Tag der mündlichen Qualifikation: 7. Juli 1999 Dekan: Prof. Dr. Klaus-Jörn Lange 1. Berichterstatter: Prof. Dr. Wolfgang Straßer 2. Berichterstatter: Prof. Dr. Wolfgang Rosenstiel Zusammenfassung Zu Beginn der Arbeit 1993 mußten zuerst die Grundlagen und die Basis für den Bereich der Virtuellen Realität erarbeitet werden. Es werden deshalb 3D-Geräte, Grundlagen und Techniken, Formen der Interaktion sowie angrenzende Bereiche, wie beispielsweise Netzwerkprotokolle, behandelt. Im Kern stellt diese Arbeit erstmalig ein generisches Konzept für den Austausch von Nachrichten zwischen 3D-Objekten vor. Es werden die Möglichkeiten und Grenzen dieses Modells, das allgemein Messageconcept genannt wurde, aufgezeigt. Ferner wird die Adaption des Messageconcept auf verschiedene andere Einsatzebenen dargestellt. Besonders wird hier auf eine VRML-basierte Lösung eingegangen, die auch als Vorschlag dem VRML-Konsortium eingereicht wurde. Der Austausch der Nachrichten ist nicht auf eine Applikation beschränkt, sondern kann auch netzwerktransparent erfolgen. Auf die enthaltenen Multi-User-Erweiterungen wird im Zusammenhang mit dieser Arbeit nicht eingegangen. Für die Verifikation des allgemeinen Messageconcept wurde eine Anwendung aus dem medizinischen Bereich, ein sogenannter Lichtkasten (engl. Alternator), an dem Röntgenaufnahmen befestigt werden, inklusive dazugehörigem Raum, verwendet. Im Gegensatz zu industriellen Lösungen, welche die Umgebung der Radiologen auf die Darstellung der zweidimensionalen medizinischen Bilder beschränken, bildet diese Applikation den dreidimensionalen Arbeitsraum ab. Neben dem Vorteil, daß diese Abbildung aus der realen Welt für einen nicht-computererfahrenen Mediziner intuitiv verständlich ist, steht der Nachteil des höheren Eingabeaufwands.
    [Show full text]
  • Parallel Maximum-Likelihood Inversion for Estimating Wavenumber-Ordered Spectra in Emission Spectroscopy
    Parallel Maximum-Likelihood Inversion for Estimating Wavenumber-Ordered Spectra in Emission Spectroscopy Hoda El-Sayed Marc Salit John Travis [email protected] [email protected] Judith Devaney William George [email protected] [email protected] National Institute of Standards and Technology Gaithersburg, Maryland USA Abstract distributes the signal-carried noise to the signal, preventing the masking of small spectral features by the signal-carried We introduce a parallelization of the maximum- noise from the large spectral features. The spectral esti- likelihood cosine transform. This transform consists of a mates obtained using maximum-likelihood inversion have computationally intensive iterative fitting process, but is another potentially useful property—a line-shape which is readily decomposed for parallel processing. The parallel burdened with a less distorting transform-function than the implementation is not only scalable, but has also brought sinc function of the Fourier transform. the execution time of this previously intractable problem to In this paper we present a parallel implementation of the feasible levels using contemporary and cost-efficient high- maximum-likelihood inversion method. It will be shown performance computers, including an SGI Origin 2000, an that the parallel implementation is not only scalable, but SGI Onyx, and a cluster of Intel-based PCs. has also brought the execution time of this problem to feasible levels using contemporary and cost-efficient high- Key words : parallel processing, emission spectroscopy, performance computers including Origin 2000, SGI Onyx, cosine transform, maximum-likelihood inversion, perfor- and PC clusters. By parallelizing this application, we were mance evaluation, DParLib, MPI. able to reduce the running time of the program to seconds rather than hours.
    [Show full text]
  • CXFSTM Administration Guide for SGI® Infinitestorage
    CXFSTM Administration Guide for SGI® InfiniteStorage 007–4016–020 CONTRIBUTORS Written by Lori Johnson Illustrated by Chrystie Danzer Production by Karen Jacobson Engineering contributions to the book by Rich Altmaier, Neil Bannister, François Barbou des Places, Ken Beck, Felix Blyakher, Laurie Costello, Mark Cruciani, Dave Ellis, Brian Gaffey, Philippe Gregoire, Dean Jansa, Erik Jacobson, Dennis Kender, Chris Kirby, Ted Kline, Dan Knappe, Kent Koeninger, Linda Lait, Bob LaPreze, Steve Lord, Aaron Mantel, Troy McCorkell, LaNet Merrill, Terry Merth, Nate Pearlstein, Bryce Petty, Alain Renaud, John Relph, Elaine Robinson, Dean Roehrich, Eric Sandeen, Wesley Smith, Kerm Steffenhagen, Paddy Sreenivasan, Andy Tran, Rebecca Underwood, Connie Waring, Geoffrey Wehrman COPYRIGHT © 1999–2004 Silicon Graphics, Inc. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted to copy, distribute, or create derivative works from the contents of this electronic documentation in any manner, in whole or in part, without the prior written permission of Silicon Graphics, Inc. LIMITED RIGHTS LEGEND The electronic (software) version of this document was developed at private expense; if acquired under an agreement with the USA government or any contractor thereto, it is acquired as "commercial computer software" subject to the provisions of its applicable license agreement, as specified in (a) 48 CFR 12.212 of the FAR; or, if acquired for Department of Defense units, (b) 48 CFR 227-7202 of
    [Show full text]
  • IRIX® Admin System Configuration and Operation
    IRIX® Admin System Configuration and Operation Document Number 007-2859-005 CONTRIBUTORS Written by Charlotte Cozzetto, Jeffrey B. Zurschmeide, and John Raithel Production by Heather Hermstad St. Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © 1992 - 1998 Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94043-1389. Silicon Graphics, the Silicon Graphics logo, CHALLENGE, Indigo, IRIS, IRIX, and Onyx are registered trademarks, and Crimson, Extent File System, Indigo2, IRIS FailSafe, IRIS InSight, IRIS WorkSpace, IRIX Networker, Origin, Origin2000, POWER CHALLENGE, POWER Indigo2, POWER Onyx, and XFS are trademarks, of Silicon Graphics, Inc. Indy is a registered trademark, used under license in the United States and owned by Silicon Graphics, Inc. in other countries worldwide. CRAY is a registered trademark, and CrayLink is a trademark, of Cray Research, Inc. R4000 and R8000 are registered trademarks of MIPS Technologies, Inc.
    [Show full text]
  • Introduction to UPC
    Introduction to UPC Presenter: Rajesh Nishtala (UC Berkeley) Advisor: Katherine Yelick Joint work with Berkeley UPC and Titanium Groups Lawrence Berkeley Nat’l Labs & UC Berkeley Some slides adapted from Katherine Yelick and Tarek El- Ghazawi Berkeley UPC: http://upc.lbl.gov 1 Titanium: http://titanium.cs.berkeley.edu Context • Most parallel programs are written using either: – Message passing with a SPMD model • Usually for scientific applications with C++/Fortran • Scales easily – Shared memory with threads in OpenMP, Threads+C/C++/F or Java • Usually for non-scientific applications • Easier to program, but less scalable performance • Global Address Space (GAS) Languages take the best of both – global address space like threads (programmability) – SPMD parallelism like MPI (performance) – local/global distinction, i.e., layout matters (performance) Berkeley UPC: http://upc.lbl.gov 2 Titanium: http://titanium.cs.berkeley.edu Partitioned Global Address Space Languages • Explicitly-parallel programming model with SPMD parallelism – Fixed at program start-up, typically 1 thread per processor • Global address space model of memory – Allows programmer to directly represent distributed data structures • Address space is logically partitioned – Local vs. remote memory (two-level hierarchy) • Programmer control over performance critical decisions – Data layout and communication • Performance transparency and tunability are goals – Initial implementation can use fine-grained shared memory • Multiple PGAS languages: UPC (C), CAF (Fortran), Titanium
    [Show full text]