Virtual Network Mapping based on Subgraph Isomorphism Detection. Jens Lischka, Holger Karl Paderborn University
|
|
- Edward Neal
- 5 years ago
- Views:
Transcription
1 Virtual Network Mapping based on Subgraph Isomorphism Detection Jens Lischka, Holger Karl Paderborn University Jens Lischka 1
2 VNM Problem 2 VNR 1(t 0, 10) PN 6 2 G B C 1 0 α γ 0 0 αa D γe αf 2 VNR 2(t,) VNR (t 6,) 1 α α Jens Lischka 2
3 Overview 2stage VNM algorithm Subgraph Isomorphism Detection based VNM Experimental results Jens Lischka
4 2stage Algorithm 1. First stage: find suitable mapping nodes 2. Second stage: find a link mapping (k shortest paths, multi commodity flow). No paths for virtual links >γ!. Problem: first stage does not take connectivity of VNs into account 6 VN 6 G PN 0 Bγ 0 C 1 10 α γ 0 0 Aα D E 1 0 F Jens Lischka
5 2stage vs. vnmflib 2stage vnmflib Map nodes Map single node n No Map ninks No Map links connected to n valid Done! Yes complete Yes Done! Yes valid No Track back to last valid mapping Jens Lischka
6 Example: vnmflib 1. Compute set of candidates C. 2. Compute a set of mapping candidates M.. Add α to the subgraph and map it onto A.. Map all links connecting α with the subgraph onto the PN. Check validity. Subgraph Mapping C={α,γ,} 6 M={A} 6 G B C 1 γ F α Aα D E Jens Lischka 6
7 Example: vnmflib 1. Compute C and M. 2. Add γ to the subgraph and map it onto B.. Map all links connecting γ with the subgraph onto the PN.. Check validity. Subgraph Mapping C={γ,} 6 M={B,E,F} 6 0 G γb C 1 α γ 0 Aα 2 D E F Jens Lischka
8 Example: vnmflib 1. Compute C and M. 2. Add to the subgraph and map it onto G.. Map all links connecting with the subgraph onto the PN.. Check validity. Subgraph Mapping C={} M={G,E,F} G γb C 1 cγ 2 2 F aα 0 Aα D E Jens Lischka
9 Example: vnmflib 1. Choose next node E of M. 2. Map onto E.. Map all links connecting with the subgraph onto the PN.. Check validity. Subgraph Mapping C={b} M={G,E,F} G γb C 1 cγ 2 0 F aα 0 Aα D E Jens Lischka 9
10 Example: vnmflib 1. Track back to the last valid mapping solution. 2. Choose next node E.. Map γ onto E.. Map all links connecting γ with the subgraph onto the PN.. Check validity. Subgraph Mapping C={γ,} M={B,E} 6 6 G B C 1 cγ F aα 0 Aα D Eγ Jens Lischka 10
11 Example: vnmflib 1. Compute C and M. 2. Add to the subgraph and map it onto B.. Map all links connecting with the subgraph onto the PN.. Check validity. Subgraph Mapping C={} M={B,F,G} G B C 1 cγ 0 0 F aα 0 Aα D Eγ Jens Lischka 11
12 Path Splitting Split up path into multiple paths α VNR 6 G B C 1 A D E αf Jens Lischka 12
13 Experimental Results Network setup similar to previous work[1] with GT ITM tool: PN: 100 nodes and 00 links CPU at the nodes, Bandwidth at the links follow uniform distribution from units VNs: 20 0 nodes, each pair of nodes connected with probability 0. CPU and Bandwidth follow a uniform distribution from 0 to beta units. Compared our algorithm with the two stage VN Mapper of [1]. [1]Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration. SIGCOMM Comput. Commun. Rev., (2):1 29, 200. Source code available: Jens Lischka 1
14 Experimental results Jens Lischka 1
15 Experimental Results Jens Lischka 1
16 Summary Introduced new VNM method based on SID SID based VNM performs better than the 2stage approach Especially for higher beta values and bigger networks Currently we are implementing the mapper on the PlanetLabTestbed infrastructure as part of the OneLab2 project Jens Lischka 16
17 Thank You Questions? Jens Lischka 1
18 VNM Algorithms 2stage: Rethinking Virtual Network Embedding: Support for Path Splitting and Migration. SIGCOMM, 200. Algorithms for Assigning Substrate Network Resources to Virtual Network Components, INFOCOMM, A Multi Commodity Flow Based Approach to Virtual Network Resource Allocation. GLOBECOMM, 200. Simulated Annealing: A Solver for the Network Testbed Mapping Problem. Computer Communications Review (2), 200. Mixed Integer Quadratic Program Efficient Mapping of Virtual Networks onto a shared Substrate. Technical Report, Washington University Jens Lischka 1
19 VNM Algorithms Virtual Network Embedding with Coordinated Node and Link Mapping. In Proceedings of the 2 th Conference on Computer Communications (IEEE INFOCOMM), April Jens Lischka 19
20 SID based VNM Idea: Map Nodes and Links alternately based on vflibsubgraph Isomorphism Detection algorithm. Build a subgraph S of VN by successively adding nodes of VN to S and map S onto PN until S fully covers VN. Difference to vflib: Allow mapping of virtual links onto paths Check capacity constraints Jens Lischka 20
Minimizing bottleneck nodes of a substrate in virtual network embedding
Minimizing bottleneck nodes of a substrate in virtual network embedding Adil Razzaq, Peter Sjödin, Markus Hidell School of ICT, KTH-Royal Institute of Technology Stockholm, Sweden {arazzaq, psj, mahidell}@
More informationVirtual Network Embedding with Substrate Support for Parallelization
Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya
More informationTopology-Awareness and Reoptimization Mechanism for Virtual Network Embedding
Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Nabeel Farooq Butt 1, Mosharaf Chowdhury 2, and Raouf Boutaba 13 1 David R. Cheriton School of Computer Science University
More informationA Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost
A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost Enrique Dávalos 1 and Benjamín Barán Universidad Nacional de Asunción, Facultad Politécnica
More informationA Distributed, Parallel, and Generic Virtual Network Embedding Framework
A Distributed, Parallel, and Generic Virtual Network Embedding Framework Michael Till Beck, Andreas Fischer, Hermann de Meer University of Passau, Passau, Germany {michael.beck,andreas.fischer,demeer}@uni-passau.de
More informationResource Allocation in the Network Operator's Cloud: A Virtualization Approach
Resource Allocation in the Network Operator's Cloud: A Virtualization Approach J. Soares,2, J. Carapinha, M. Melo,2 Portugal Telecom Inovação Aveiro, Portugal {joao-m-soares, jorgec, marcio-mmelo}@ptinovacao.pt
More informationOpportunistic Bandwidth Sharing for Virtual Network Mapping
Opportunistic Bandwidth Sharing for Virtual Network Mapping Sheng Zhang, Zhuzhong Qian, Bin Tang, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department
More informationModeling Service Applications for Optimal Parallel Embedding
Modeling Service Applications for Optimal Parallel Embedding Changcheng Huang Department of Systems and Computer Engineering Carleton University Ottawa, Canada huang@sce.carleton.ca Jiafeng Zhu Huawei
More informationEfficient Mapping of Virtual Networks onto a Shared Substrate
Efficient Mapping of Virtual Networks onto a Shared Substrate Jing Lu and Jonathan Turner Department of Computer Science and Engineering Washington University in St. Louis St. Louis, MO 63130 Email: {jl1,
More informationReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck
ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding
More informationModification of an energy-efficient virtual network mapping method for a load-dependent power consumption model
Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science
More informationAlgebras. A General Survey. Riley Chien. May 4, University of Puget Sound. Algebras
A General Survey May 4, 2015 What is an Algebra? Definition: An Algebra, A, is a set, S, under a set of operations. Definition: An n-ary operation on a set,s, f, takes n elements of S, (a 1, a 2,..., a
More informationVNE-Sim: A Virtual Network Embedding Simulator
VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,
More informationVirtual Network Reconfiguration with Load Balancing and Migration Cost Considerations
Virtual Network Reconfiguration with Load Balancing and Migration Cost Considerations Lingnan Gao a, George N. Rouskas a,b a Department of Computer Science, North Carolina State University, Raleigh, NC,
More informationSurvivable Virtual Network Embedding
Survivable Virtual Network Embedding Muntasir Raihan Rahman 1, Issam Aib 1, and Raouf Boutaba 1,2 1 David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1
More informationMath 778S Spectral Graph Theory Handout #2: Basic graph theory
Math 778S Spectral Graph Theory Handout #: Basic graph theory Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved the Königsberg Bridge problem: Is it possible
More informationthe projective completion of the affine plane with four points
Math 3181 Dr. Franz Rothe November 23, 20 1 Test Name: 50 Problem 1.1. Here are once more: a highly symmetric illustration for the Fano plane based on an equilateral triangle the projective completion
More informationReliability Support in Virtual Infrastructures
Reliability Support in Virtual Infrastructures 2 nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, 2010 RESO Guilherme Koslovski (INRIA University of Lyon) Wai-Leong
More informationModeling and Optimization of Resource Allocation in Cloud
PhD Thesis Progress First Report Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering January 8, 2015 Outline 1 Introduction 2 Studies Time Plan
More informationSurvivable Virtual Infrastructure Mapping in Virtualized Data Centers
Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 6-212 Survivable Virtual Infrastructure Mapping in Virtualized Data Centers Jielong Xu
More informationNew Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants
New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants Haiying Shen and Zhuozhao Li Dept. of Electrical and Computer Engineering Clemson University, SC,
More informationNeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding Algorithm
Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich NeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding Algorithm Andreas Blenk*
More informationRethinking Virtual Network Embedding in Reconfigurable Networks
Rethinking Virtual Network Embedding in Reconfigurable Networks Max Curran, Md. Shaifur Rahman, Himanshu Gupta and Vyas Sekar Department of Computer Science, Stony Brook University, NY, USA. Department
More informationNETWORK virtualization enables multiple virtual instances
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. XX, NO. XX, APRIL 2015 1 VINEA: An Architecture for Virtual Network Embedding Policy Programmability Flavio Esposito, Member, IEEE, Ibrahim Matta,
More informationBoost Online Virtual Network Embedding: Using Neural Networks for Admission Control
Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Boost Online Virtual Network Embedding: Using Neural Networks for Admission Control Andreas
More informationA Path Generation Approach to Embedding of Virtual Networks
This is the author s version of an article that has been published in IEEE Transactions on Network and Service Management. Changes were made to this version by the publisher prior to publication. The final
More informationClustering-based energy-aware virtual network embedding
Research Article Clustering-based energy-aware virtual network embedding International Journal of Distributed Sensor Networks 2017, Vol. 13(8) Ó The Author(s) 2017 DOI: 10.1177/1550147717726714 journals.sagepub.com/home/ijdsn
More informationResource analysis of network virtualization through user and network
Resource analysis of network virtualization through user and network P.N.V.VAMSI LALA, Cloud Computing, Master of Technology, SRM University, Potheri. Mr.k.Venkatesh, Asst.Professor (Sr.G), Information
More informationSURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017
SURVIVABLE VNE By Sedef Savas Networks Lab, May 25, 2017 1 SURVEY ON SURVIVABLE VIRTUAL NETWORK EMBEDDING PROBLEM AND SOLUTIONS Sandra Herker, Ashiq Khan, Xueli An DOCOMO Communications Laboratories Europe
More informationInteractive Realtime Multimedia Applications on SOIs
Interactive Realtime Multimedia Applications on SOIs Advance Reservations for Distributed Real-Time Workflows with Probabilistic Service Guarantees Tommaso Cucinotta Real-Time Systems Laboratory Scuola
More informationA Prediction-based Dynamic Resource Management Approach for Network Virtualization
A Prediction-based Dynamic Resource Management Approach for Network Virtualization Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xuesong Qiu State Key Laboratory of Networking and Switching Technology
More informationDynamic Virtual Network Traffic Engineering with Energy Efficiency in Multi-Location Data Center Networks
Dynamic Virtual Network Traffic Engineering with Energy Efficiency in Multi-Location Data Center Networks Mirza Mohd Shahriar Maswood 1, Chris Develder 2, Edmundo Madeira 3, Deep Medhi 1 1 University of
More informationRandomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.
Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming
More informationConnectivity-aware Virtual Network Embedding
Connectivity-aware Virtual Network Embedding Nashid Shahriar, Reaz Ahmed, Shihabur R. Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba Jeebak Mitra, Feng Zeng Outline Survivability in Virtual Network Embedding
More informationJoint Backup Capacity Allocation and Embedding for Survivable Virtual Networks
Joint Backup Capacity Allocation and Embedding for Survivable Virtual Networks Nashid Shahriar, Shihabur R. Chowdhury, Reaz Ahmed, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding
More informationCLOUD computing provides on-demand IT services via
402 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 9, NO. 4, AUGUST 207 Optimized Provisioning of SDN-enabled Virtual Networks in Geo-distributed Cloud Computing Datacenters Khaled Alhazmi, Abdallah Shami,
More informationScalable Constraint-based Virtual Data Center Allocation
Scalable Constraint-based Virtual Data Center Allocation Sam Bayless Nodir Kodirov Ivan Beschastnikh Holger H. Hoos Alan J. Hu Computer Science University of British Columbia Data centers, data centers,
More informationA Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note December 2002
A Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note 22-5 December 22 Revised version to appear in ACM SIGCOMM Computer Communications Review (CCR), issue dated
More informationDSNRA: a Dynamic Substrate Network Reconfiguration Algorithm
DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm Xinliang LV, Xiangwei ZHENG, and Hui ZHANG School of Information Science and Engineering Shandong Normal University, 250014, Jinan, CHINA Abstract
More informationArithmetic in Quaternion Algebras
Arithmetic in Quaternion Algebras 31st Automorphic Forms Workshop Jordan Wiebe University of Oklahoma March 6, 2017 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras March 6, 2017
More informationSymbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management
Hashing Symbol Table Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management In general, the following operations are performed on
More informationNetwork Protection Design for MPLS Networks
Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science
More informationCompetitive and Deterministic Embeddings of Virtual Networks
Competitive and Deterministic Embeddings of Virtual Networks Guy Even (Tel Aviv Uni) Moti Medina (Tel Aviv Uni) Gregor Schaffrath (T-Labs Berlin) Stefan Schmid (T-Labs Berlin) The Virtual Network Embedding
More informationOn the Migration of the Scientific Code Dyana from SMPs to Clusters of PCs and on to the Grid
On the Migration of the Scientific Code Dyana from SMPs to Clusters of PCs and on to the Grid Michela Taufer Gérard Roos Thomas Stricker Peter Güntert Institute for Computer Systems Institute for Molecular
More informationThis is a repository copy of Cloud Virtual Network Embedding: Profit, Power and Acceptance.
This is a repository copy of Cloud Virtual Network Embedding: Profit, Power and Acceptance. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/8899/ Version: Accepted Version
More informationCapturing Topology in Graph Pattern Matching
Capturing Topology in Graph Pattern Matching Shuai Ma, Yang Cao, Wenfei Fan, Jinpeng Huai, Tianyu Wo University of Edinburgh Graphs are everywhere, and quite a few are huge graphs! File systems Databases
More informationSurvivable Virtual Network Embedding
Survivable Virtual Network Embedding Muntasir Raihan Rahman, Issam Aib, Raouf Boutaba To cite this version: Muntasir Raihan Rahman, Issam Aib, Raouf Boutaba. Survivable Virtual Network Embedding. Mark
More informationNovel Decentralized Node Failure Recovery Scheme in Virtualized Networks
Novel Decentralized Node Failure Recovery Scheme in Virtualized Networks by Habib Abid Thesis submitted to the Faculty of Graduate and Postdoctoral Studies In partial fulfillment of the requirements For
More informationLecture 17. Edited from slides for Operating System Concepts by Silberschatz, Galvin, Gagne
Lecture 17 Edited from slides for Operating System Concepts by Silberschatz, Galvin, Gagne Page Replacement Algorithms Last Lecture: FIFO Optimal Page Replacement LRU LRU Approximation Additional-Reference-Bits
More informationENTERPRISES nowadays are embracing a new computing
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TCC.26.253525,
More informationPredicting Lattice reduction
Predicting Lattice reduction Nicolas Gama, Phong Nguyen Ecole Normale Supérieure,CNRS,INRIA, France. April 14, 2008 Nicolas Gama, Phong Nguyen (Ecole Normale Supérieure,CNRS,INRIA, Predicting Lattice reduction
More informationAutomated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University
D u k e S y s t e m s Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University Motivation We address challenges for controlling elastic applications, specifically storage.
More informationSlice Embedding Solutions for Distributed Service Architectures
1 Slice Embedding Solutions for Distributed Service Architectures Flavio Esposito Ibrahim Matta Vatche Ishakian flavio@cs.bu.edu matta@cs.bu.edu visahak@cs.bu.edu Computer Science Department Boston University
More informationTopology-aware Virtual Network Embedding Using Multiple Characteristics
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 1, Jan. 2014 145 Topology-aware Virtual Network Embedding Using Multiple Characteristics Jianxin Liao 1*, Min Feng 1, Tonghong Li 2, Jingyu
More informationContext-free grammars
Context-free grammars Section 4.2 Formal way of specifying rules about the structure/syntax of a program terminals - tokens non-terminals - represent higher-level structures of a program start symbol,
More informationDoctoral Written Exam in Networking, Fall 2008
Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December
More informationDeploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017
Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Virtual Network Function (VNF) Service Chain (SC) 2 Multiple VNF SC Placement and
More informationCounting Triangles & The Curse of the Last Reducer. Siddharth Suri Sergei Vassilvitskii Yahoo! Research
Counting Triangles & The Curse of the Last Reducer Siddharth Suri Yahoo! Research Why Count Triangles? 2 Why Count Triangles? Clustering Coefficient: Given an undirected graph G =(V,E) cc(v) = fraction
More informationCompiler Construction: Parsing
Compiler Construction: Parsing Mandar Mitra Indian Statistical Institute M. Mitra (ISI) Parsing 1 / 33 Context-free grammars. Reference: Section 4.2 Formal way of specifying rules about the structure/syntax
More informationBuilding a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster
Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster 1 Network Virtualization Network virtualization enables many virtual networks to share the same physical network
More informationTechnical Report CS : Incorporating Trust in Network Virtualization
Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE
More informationHaLoop Efficient Iterative Data Processing on Large Clusters
HaLoop Efficient Iterative Data Processing on Large Clusters Yingyi Bu, Bill Howe, Magdalena Balazinska, and Michael D. Ernst University of Washington Department of Computer Science & Engineering Presented
More informationTopology Hmwk 3 All problems are from Allen Hatcher Algebraic Topology (online) ch 1
Topology Hmwk 3 All problems are from Allen Hatcher Algebraic Topology (online) ch Andrew Ma December 23, 203 This assignment has been corrected post - grading...6 (a) Proof. Assume for a contradiction
More informationSEA: Stable Resource Allocation in Geographically Distributed Clouds
SEA: Stable Resource Allocation in Geographically Distributed Clouds Sheng Zhang, Zhuzhong Qian, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department
More informationNotes on Using the Beta VMware Importer Tool on Your Mac VMware Importer 1 Beta 2
Notes on Using the Beta VMware Importer Tool on Your Mac VMware Importer 1 Beta 2 The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your
More informationSupporting Distributed Shared Memory. Axel Jantsch Xiaowen Chen, Zhonghai Lu Royal Institute of Technology, Sweden September 16, 2009
Supporting Distributed Shared Memory Axel Jantsch Xiaowen Chen, Zhonghai Lu Royal Institute of Technology, Sweden September 16, 2009 Memory content in today s SoCs 3 Elements in SoC Processing: Well understood;
More informationLecture 7: Data Center Networks
Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE
More informationNETWORK VIRTUALIZATION: PRESENT AND FUTURE
1 NETWORK VIRTUALIZATION: PRESENT AND FUTURE Wednesday, May 21, 2008 Mosharaf Chowdhury Member, envy Project What is Network Virtualization? 2 Network virtualization is a networking environment that allows
More informationA novel approach to include limited equipment connectivity in State-Task Network models
OSE SEMINAR 2011 A novel approach to include limited equipment connectivity in State- Network models Mikael Nyberg CENTER OF EXCELLENCE IN OPTIMIZATION AND SYSTEMS ENGINEERING AT ÅBO AKADEMI UNIVERSITY
More informationCloud Networking: An Overview of Virtual Network Embedding Strategies
Cloud Networking: An Overview of Virtual Network Embedding Strategies Ilhem Fajjari, Nadjib Aitsaadi and Guy Pujolle VIRTUOR: 4 Residence de Galande, 92320 Chatillon, France LiSSi - University of Paris
More information1. Research in Networking at University of Canterbury 2. Experimental Networking Facilities in Japan
1. Research in Networking at University of Canterbury 2. Experimental Networking Facilities in Japan Harsha Sirisena Krys Pawlikowski University of Canterbury Evaluation of search algorithms in structured
More informationEnhancing Survivability in Virtualized Data Centers: A Service-aware Approach
Enhancing Survivability in Virtualized Data Centers: A Service-aware Approach Jielong Xu, Jian Tang Member, IEEE, Kevin Kwiat, Weiyi Zhang, Member, IEEE, and Guoliang Xue, Fellow, IEEE Abstract In this
More informationStaying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing
Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing Nesime Tatbul Uğur Çetintemel Stan Zdonik Talk Outline Problem Introduction Approach Overview Advance Planning with an
More informationSensor Tasking and Control
Sensor Tasking and Control Outline Task-Driven Sensing Roles of Sensor Nodes and Utilities Information-Based Sensor Tasking Joint Routing and Information Aggregation Summary Introduction To efficiently
More informationOn the Design of Reliable Virtual Networks
On the Design of Reliable Virtual Networks Raouf Boutaba David R. Cheriton School of Computer Science University of Waterloo Outline Network Virtualization Virtual Networks Virtual Network Embedding Reliability
More informationArithmetic in Quaternion Algebras
Arithmetic in Quaternion Algebras Graduate Algebra Symposium Jordan Wiebe University of Oklahoma November 5, 2016 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras November 5, 2016
More informationAlex Schaefer. April 9, 2017
Department of Mathematics Binghamton University April 9, 2017 Outline 1 Introduction 2 Cycle Vector Space 3 Permutability 4 A Characterization Introduction Outline 1 Introduction 2 Cycle Vector Space 3
More informationMining Summaries for Knowledge Graph Search
Mining Summaries for Knowledge Graph Search Qi Song 1 Yinghui Wu 1 Xin Luna Dong 2 1 2 Sponsored by: Searching real world graph data Knowledge Graph G: used to represent knowledge bases Graph query Q:
More informationHardware Evolution in Data Centers
Hardware Evolution in Data Centers 2004 2008 2011 2000 2013 2014 Trend towards customization Increase work done per dollar (CapEx + OpEx) Paolo Costa Rethinking the Network Stack for Rack-scale Computers
More informationNew Optimal Load Allocation for Scheduling Divisible Data Grid Applications
New Optimal Load Allocation for Scheduling Divisible Data Grid Applications M. Othman, M. Abdullah, H. Ibrahim, and S. Subramaniam Department of Communication Technology and Network, University Putra Malaysia,
More informationAutomatic Drawing for Tokyo Metro Map
Automatic Drawing for Tokyo Metro Map Masahiro Onda 1, Masaki Moriguchi 2, and Keiko Imai 3 1 Graduate School of Science and Engineering, Chuo University monda@imai-lab.ise.chuo-u.ac.jp 2 Meiji Institute
More informationProactive admission control and dynamic resource management in SDN-based. virtualized networks
Loughborough University Institutional Repository Proactive admission control and dynamic resource management in SDN-based virtualized networks This item was submitted to Loughborough University's Institutional
More informationStar Forests, Dominating Sets and Ramsey-type Problems
Star Forests, Dominating Sets and Ramsey-type Problems Sheila Ferneyhough a, Ruth Haas b,denis Hanson c,1 and Gary MacGillivray a,1 a Department of Mathematics and Statistics, University of Victoria, P.O.
More informationOptimal ILP and Register Tiling: Analytical Model and Optimization Framework
Optimal ILP and Register Tiling: Analytical Model and Optimization Framework Lakshminarayanan. Renganarayana, Upadrasta Ramakrishna, Sanjay Rajopadhye Computer Science Department Colorado State University
More informationInsensitive Traffic Splitting in Data Networks
Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages
More informationIEEE TRANS. ON NETWORK AND SERVICE MANAGEMENT, SPECIAL ISSUE ON ADVANCES IN MANAGEMENT OF SOFTWARIZED NETWORKS 1
IEEE TRANS. ON NETWORK AND SERVICE MANAGEMENT, SPECIAL ISSUE ON ADVANCES IN MANAGEMENT OF SOFTWARIZED NETWORKS 1 Towards a Cost Optimal Design for a G Mobile Core Network based on SDN and NFV Arsany Basta,
More informationTowards Min- Cost Virtual Infrastructure Embedding
IEEE GLOBECOM 20, San Diego, CA Arizona State University Yu, ue and Zhang ({ruozhouy, xue, xzhan229}@asu.edu) are all with Arizona State University, Tempe, AZ 828. All correspondences should be addressed
More informationLRU. Pseudo LRU A B C D E F G H A B C D E F G H H H C. Copyright 2012, Elsevier Inc. All rights reserved.
LRU A list to keep track of the order of access to every block in the set. The least recently used block is replaced (if needed). How many bits we need for that? 27 Pseudo LRU A B C D E F G H A B C D E
More informationMultiple sequence alignment accuracy estimation and its role in creating an automated bioinformatician
Multiple sequence alignment accuracy estimation and its role in creating an automated bioinformatician Dan DeBlasio dandeblasio.com danfdeblasio StringBio 2018 Tunable parameters!2 Tunable parameters Quant
More informationOn the Utility of Inference Mechanisms
On the Utility of Inference Mechanisms Ethan Blanton Sonia Fahmy Greg N. Frederickson June 23, 2009 On the Utility of Inference Mechanisms We present an algorithm for determining when and if an inference
More informationUtilizing Datacenter Networks: Centralized or Distributed Solutions?
Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such
More informationPrototyping and Evaluation of Mobility First Architecture
Prototyping and Evaluation of Mobility First Architecture Kiran Nagaraja, Ivan Seskar Rutgers, The State University of New Jersey Contact: nkiran (at) winlab (dot) rutgers (dot) edu NSF FIA MobilityFirst
More informationMATLAB Based Optimization Techniques and Parallel Computing
MATLAB Based Optimization Techniques and Parallel Computing Bratislava June 4, 2009 2009 The MathWorks, Inc. Jörg-M. Sautter Application Engineer The MathWorks Agenda Introduction Local and Smooth Optimization
More informationvs. state-space search Algorithm A Algorithm B Illustration 1 Introduction 2 SAT planning 3 Algorithm S 4 Experimentation 5 Algorithms 6 Experiments
1 2 vs. state-space search 3 4 5 Algorithm A Algorithm B Illustration 6 7 Evaluation Strategies for Planning as Satisfiability Jussi Rintanen Albert-Ludwigs-Universität Freiburg, Germany August 26, ECAI
More informationVirtual Networks: Host Perspective
Networks: Host Perspective IETF-77 Anaheim, CA Network Research Group March 23rd, 2010 Sunay Tripathi Sunay.Tripathi@Oracle.Com 1 Evolving ization Landscape Physical OS Hypervisor Server Server Server
More informationActive contour: a parallel genetic algorithm approach
id-1 Active contour: a parallel genetic algorithm approach Florence Kussener 1 1 MathWorks, 2 rue de Paris 92196 Meudon Cedex, France Florence.Kussener@mathworks.fr Abstract This paper presents an algorithm
More informationNetwork-Aware Resource Allocation in Distributed Clouds
Dissertation Research Summary Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering E-mail: aralat@itu.edu.tr April 4, 2016 Short Bio Research and
More informationA SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang
More informationOutline. Introduction to SFC/NFV SFC and service decomposition SFC orchestration. Performance evaluation Enhancements towards a scalable orchestrator
Scalable Architecture for Service Function Chain Orchestration Sahel Sahhaf, Wouter Tavernier, Janos Czentye, Balazs Sonkoly Pontus Skoldstrom, David Jocha, Jokin Garay 30/09/2015- EWSDN 2015 3/10/2015
More informationModeling with Uncertainty Interval Computations Using Fuzzy Sets
Modeling with Uncertainty Interval Computations Using Fuzzy Sets J. Honda, R. Tankelevich Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, CO, U.S.A. Abstract A new method
More information