Coded Caching for Hierarchical Networks with a Different Number of Layers
|
|
- Iris Perkins
- 5 years ago
- Views:
Transcription
1 Coded Caching for Hierarchical Networks with a Different Number of Layers Makoto Takita, Masanori Hirotomo, Masakatu Morii Kobe University, Saga University November 20, 2017 ASON 17@Aomori
2 Outline 1 1. Introduction 2. Caching scheme 3. Coded caching scheme 4. Coded Caching for Hierarchical Networks with a Different Number of Layers 1. Program setting 2. Three basic schemes 3. Combination scheme 4. Lower bound 5. Numerical result 5. Conclusion
3 Background: Consumer internet traffic 2 PB per Month 250, , , ,000 Internet video Web, , and data Online gaming File sharing 50, Source: Cisco VNI, 2017 IP traffic will grow at a Compound Annual Growth Rate of 24% from 2016 to IP video traffic will be 82% of all consumer Internet traffic by 2021, up from 73% in Cisco Visual Networking Index: Forecast and Methodology, (September 15, 2017)
4 Purpose: Reduce the peak network load 3 Normalized network load Time The network traffic has high time variability Caching is recognized as one solution to reduce the peak network load Users store popular contents in the cache memories during the off-peak time Users can recover their requests by the stored contents during the peak time Caching can effectively use the network resources during off-peak time
5 Caching scheme: Placement phase 4 server shared link caches user Users store popular contents in the cache memories during the off-peak time. The problem is what contents are stored in the memories. The limitation is the memory capacity.
6 Caching scheme: Delivery phase 5 server shared link 1 request 2 delivery caches user 3 recover 1 Each user requests one content in the database 2 Server delivers messages based on the users requests and the stored contents 3 Each user recovers its request by the messages and the stored contents The problem is what messages to send users and the size of message The limitation is the network load
7 Coded caching: Difference to uncoded scheme 6 N = 2 files, K = 2 users, cache size M = 1 Uncoded caching Coded caching A 1, A 2 A 1, A 2 B 1, B 2 B 1, B 2 A 2 B 2 R = 1 A 2 B 1 R = 1 2 A B A B A 1 B 1 A 1 B 1 A 1 B 1 A 2 B 2 Placement Delivery Store same content Uncoded multicast Use cache locally Store different contents Coded multicast Use cache global
8 Coded caching: Related works 7 Single layer network with nonuniform demand [5]-[7] Centralized [2] Decentralized [3] with heterogeneous cache sizes [8] with distinct file sizes[9] and more Hierarchical network Two-layer network [4] [This work] Two-layer and single layer network
9 This work 8 The network with the two layer and single layer of cache at same time. We propose three basic coded caching schemes Scheme A: divide the caching problem into three blocks Scheme B: ignore the capabilities of the mirror servers Scheme C: divide the caching problem into two blocks We also propose the combination scheme by combining the scheme B and C discuss the combining parameter α and β show comparison with lower bound α 1 α Rate R 1 N files Scheme B Scheme C β 1 β Size M 1 Rate R 2 Size M 2 combination scheme
10 Problem setting: Two-layer and single-layer network model 9 Origin server N files Error-free broadcast link? rate R 1 K 1 mirror servers? size M 1 Error-free broadcast link? rate R 2 K 1 K 2 + K 3 memories???? size M 2 K 1 K 2 + K 3 users What contents are stored in the memories? What messages is sent users in response to users requests? The relation between memory size and message size?
11 Proposed scheme: Basic scheme A 10 Divide the caching problem into three blocks Apply the single-layer caching algorithm to each block Decentralized scheme for single layer R N, K, M = K 1 M N 1 1 MΤN K KM/N (a) (c) N files K 2 R N, K 1, M 1 + R N, K 3, M 2 Rate R 1A (b) R N, K 2, M 2 Rate R 2A Rate R 2A
12 Proposed scheme: Basic scheme B 11 The mirror servers are only used to forward messages Apply the single-layer algorithm for all of user Decentralized scheme for single layer R N, K, M = K 1 M N 1 1 MΤN K KM/N N files Rate R 1B R N, K 1 K 2 + K 3, M 2 ignore the capabilities of the mirror servers R N, K 2, M 2 Rate R 2B Rate R 2B
13 Proposed scheme: Basic scheme C 12 Divide the caching problem into two blocks Block (a) need to consider different cache size Apply the zero-padding solution [8] to the block (a) (a) Decentralized scheme for single layer R N, K, M = K 1 M N 1 1 MΤN K KM/N The rate for different cache size R N, K 1, K 3, M 1, M 2 = R N, K 3, M M K 3 2 R N, K N 1, M 1 (b) Rate R 1C N files R N, K 1, K 3, M 1, M 2 + K 2 1 R N, K 1, M 1 Rate R 2C Rate R 2C R N, K 2, M 2
14 Comparison: The rate R 1 of each basic scheme 13 Number of Files N 35 Number of Mirrors K 1 5 Number of Mirror users K 2 5 Number of origin users K 3 3, 5, 10 memory size of user M 2 1 Scheme C is better than Scheme A regardless of K 3. Scheme C is better than Scheme B with large M 1. Scheme B is constant even if M 1 increases
15 Proposed scheme: Combination scheme 14 Want to have good performance with any memory size of mirror Combining the scheme C and B to use resources of the mirror. Origin server α 1 α N files Scheme B Scheme C Rate R 1 K 1 mirror servers Size M 1 β 1 β Rate R 2 K 1 K 2 + K 3 memories K 1 K 2 + K 3 users Size M 2 What is the optimal fix parameters α and β?
16 Combination scheme: How to find optimal parameter 15 Optimal parameters α, β They are minimize rate R 1 depend on other parameters N, Ks,Ms. Method 1 (Brute-force) For given parameters, the exact optimal values of α and β are obtained by the brute force method. Method 2 (formulating) For given parameters, the almost optimal values of α and β are formulated by other parameter. We determined the formulated parameters α and β empirically from some numerical simulations. α, β = M 1 N, 0 M 1, 0 M 1 + K 3 M 2 if M 1 + M 2 K 3 N otherwise
17 Comparison: Brute-force and formulating 16 Number of Files N 30 Number of Mirrors K 1 5 Number of Mirror users K 2 5 Number of origin users K 3 5 memory size of user M 2 3 The combination scheme with formulated α, β is almost same as with optimal α, β. The formulating method is getting worse with the large M 1
18 Combination scheme: Achievable rate 17 The rates of the combination scheme are given in term of the function R N, K, M. R N, K, M is the rate of the decentralized coded caching algorithm. The achievable rates of decentralized algorithm are given in [3]. R N, K, M = ቐ min K, N M 1 if M N 1 0 otherwise Achievable rate of the combination scheme with the formulated parameters α β R 1 α, β min K 1 K 2 + K 3, M 1 N min K 3, N + 1 M 1 N K 1K 2 + K 3, N M 1 M 2 M 1 N M 1 K 2 + K M 1 + K 3 M 2 M 1 + K 3 M 3 + K 3M 2 K 3 N M 1 2 M 1 + K 3 M 2 2 if M 1 + M 2 K 3 N otherwise R 2 α, β M 1 N min K 2, N + 1 M 1 N K 2, N M 1 M 2 min K 2, N M 2 if M 1 + M 2 K 3 N otherwise
19 Our problem setting: Lower bound 18 We provide lower bounds based on cut-set bound [11]. Theorem 1(Lower bound) For N N files and K 1 N mirrors each with memory of size 0 M 1 N, K 2 N mirror users and K 3 N origin users each with the memory of size 0 M 2 N, where N is the set of natural numbers, the lower bounds of the rates R 1 and R 2 are given by R 1 max s 1 0,1,,K 1 s 2 0,1,,K 2 s 3 0,1,,K 3 max s 1 s 2 + s 3 s 1M 1 + s 1 s 2 + s 3 M 2, N s 1M 1 s 1 s 2 + s 3 M 2 NΤ s 1 s 2 + s 3 N/(s 1 s 2 + s 3 ) R 2 max max t tm 2 t 1,2,,K 2 NΤt, N tm 2 NΤt [11]T. M. Cover and J. A. Thomas, Elements of Information Theory, New York, NY, USA: Wiley, 1991.
20 Comparison: Combination scheme and lower bound 19 Number of Files N 30 Number of Mirrors K 1 5 Number of Mirror users K 2 5 Number of origin users K 3 5 memory size of user M 2 3 The combination scheme shows better performance than basic scheme. But, our lower bound is loose. We focus on how to realize a coded caching scheme for our network model. So, our lower bounds are not tight.
21 Conclusion 20 The network with the two layer and single layer of cache at same time. We propose three basic coded caching schemes. Scheme B is better with small memory of mirrors. Scheme C is better with large memory of mirrors. We also propose the combination scheme by combining scheme B and C. We discuss the combining parameter α and β. We formulated α and β that have almost same performance as optimal α and β. We show comparison with lower bound. Our lower bound is loose, so tighter bound is need. Future work Derivation of the tight bound More layers of caches Realistic simulations Size M 2 β 1 β α Rate R 2 Size M 1 1 α Rate R 1 N files Scheme B Scheme C
22 21
Coded Caching for a Large Number Of Users
Coded Caching for a Large Number Of Users 1 Mohammad Mohammadi Amiri, Qianqian Yang, and Deniz Gündüz Abstract arxiv:1605.01993v1 [cs.it] 6 May 2016 Information theoretic analysis of a coded caching system
More informationNetwork Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13
Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 *Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.J.; Ramchandran, K. "Network Coding for Distributed
More informationHierarchical Coded Caching
Hierarchical Coded Caching ikhil Karamchandani, Urs iesen, Mohammad Ali Maddah-Ali, and Suhas Diggavi Abstract arxiv:403.7007v2 [cs.it] 6 Jun 204 Caching of popular content during off-peak hours is a strategy
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationNovel Decentralized Coded Caching through Coded Prefetching
ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu
More informationCache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK)
Cache Management for TelcoCDNs Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) d.tuncer@ee.ucl.ac.uk 06/01/2017 Agenda 1. Internet traffic: trends and evolution
More informationin a Zettabyte World 10/18/ th Anniversary Robert Pepper Vice President Global Technology Policy CITI October 2011
1/18/211 Wireless Ultra-Broadband in a Zettabyte World Robert Pepper Vice President Global Technology Policy CITI October 211 211 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 5 th Anniversary
More informationFundamental Limits of Caching: Improved Bounds For Small Buffer Users
Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Zhi Chen Member, IEEE Pingyi Fan Senior Member, IEEE and Khaled Ben Letaief Fellow, IEEE 1 Abstract arxiv:1407.1935v2 [cs.it] 6 Nov
More informationBenefits of Coded Placement for Networks with Heterogeneous Cache Sizes
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering
More informationQUARTERLY FORECAST REPORT 1ST QUARTER
QUARTERLY FORECAST REPORT 1ST QUARTER 216 77 Sundial Ave. Manchester, NH 313 E-mail: ptda@itreconomics.com Table of Contents Definitions & Methodology.... 3 MTI Total Sales... 4 Monthly Data Record...
More informationResource Allocation for LTE Multicast (embms): Group Partitioning and Dynamics
Resource Allocation for LTE Multicast (embms): Group Partitioning and Dynamics Jiasi Chen*, Mung Chiang*, Jeffrey Erman +, Guangzhi Li +, K. K. Ramakrishnan 1, Rakesh K Sinha + *Princeton University, +
More informationClass #8 - Oct 31, 2017
4520 - Class #8 - Oct 31, 2017 Today s agenda Quiz #2 - results Cisco VNI Report #1 - ISP profile Homework for Tue Nov 7 Quiz #2 - TCP/IP - 3-pointers answer 5/6-25 min class mean = 9.2/15 = 61% 1. application
More informationCache-Aided Coded Multicast for Correlated Sources
Cache-Aided Coded Multicast for Correlated Sources P. Hassanzadeh A. Tulino J. Llorca E. Erkip arxiv:1609.05831v1 [cs.it] 19 Sep 2016 Abstract The combination of edge caching and coded multicasting is
More informationCorrelation-Aware Distributed Caching and Coded Delivery
Correlation-Aware Distributed Caching and Coded Delivery P. Hassanzadeh, A. Tulino, J. Llorca, E. Erkip arxiv:1609.05836v1 [cs.it] 19 Sep 2016 Abstract Cache-aided coded multicast leverages side information
More informationOptimization of Heterogeneous Caching Systems with Rate Limited Links
IEEE ICC Communication Theory Symposium Optimization of Heterogeneous Caching Systems with Rate Limited Links Abdelrahman M Ibrahim, Ahmed A Zewail, and Aylin Yener Wireless Communications and Networking
More informationBlock Crossings in Storyline Visualizations
Block Crossings in Storyline Visualizations Thomas van Dijk, Martin Fink, Norbert Fischer, Fabian Lipp, Peter Markfelder, Alexander Ravsky, Subhash Suri, and Alexander Wolff 3/15 3/15 block crossing 3/15
More informationCloud Processing and Edge Caching in HetNets: A Delivery Time Perspective
Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Aydin Sezgin Joint work with: Jaber Kakar, Soheil Gherekhloo and Zohaib Hassan Awan Institute for Digital Communication Systems
More informationA Scalable Framework for Content Replication in Multicast-Based Content Distribution Networks
A Scalable Framework for Content Replication in Multicast-Based Content Distribution Networks Yannis Matalas 1, Nikolaos D. Dragios 2, and George T. Karetsos 2 1 Digital Media & Internet Technologies Department,
More informationA New Combinatorial Design of Coded Distributed Computing
A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA
More informationCoding and Scheduling for Efficient Loss-Resilient Data Broadcasting
Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting Kevin Foltz Lihao Xu Jehoshua Bruck California Institute of Technology Department of Computer Science Department of Electrical Engineering
More informationCisco Visual Networking Index (VNI) Global IP Traffic Forecast Update;
Cisco Visual Networking Index (VNI) Global IP Traffic Forecast Update; 2010 Presented by Mark Nowell Senior Director Engineering, Cisco IEEE 802.3 Bandwidth Advisory Ad-hoc, Sept 2011 Cisco Public 1 5
More informationThe Internet of Things is Now: M2M Devices Forecast
The Internet of Things is Now: M2M Devices Forecast 2013-2018 Cisco Visual Networking Index 2014 Forecast Robert Pepper Vice President, Global Technology Policy October 2014 VNI Projections and Actuals
More informationEfficient Universal Recovery in Broadcast Networks
Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 1 / 19 System Model and Problem
More informationCoded Caching with Heterogenous Cache Sizes
Coded Caching with Heterogenous Cache Sizes Sinong Wang, Wenxin Li, Xiaohua Tian, Hui Liu Department of Electronic Engineering, Shanghai Jiao Tong University {snwang,xtian,huiliu}@sjtu.edu.cn arxiv:1504.0113v3
More informationComputing over Multiple-Access Channels with Connections to Wireless Network Coding
ISIT 06: Computing over MACS 1 / 20 Computing over Multiple-Access Channels with Connections to Wireless Network Coding Bobak Nazer and Michael Gastpar Wireless Foundations Center Department of Electrical
More informationA Communication Architecture for Large Heterogeneous Wireless Networks
A Communication Architecture for Large Heterogeneous Wireless Networks Urs Niesen Bell Laboratories, Alcatel-Lucent Murray Hill, NJ 07974 urs.niesen@alcatel-lucent.com Piyush upta Bell Laboratories, Alcatel-Lucent
More informationPROGRAM EFFICIENCY & COMPLEXITY ANALYSIS
Lecture 03-04 PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS By: Dr. Zahoor Jan 1 ALGORITHM DEFINITION A finite set of statements that guarantees an optimal solution in finite interval of time 2 GOOD ALGORITHMS?
More informationOutline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting
Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer
More informationA Light-weight Content Distribution Scheme for Cooperative Caching in Telco-CDNs
A Light-weight Content Distribution Scheme for Cooperative Caching in Telco-CDNs Takuma Nakajima, Masato Yoshimi, Celimuge Wu, Tsutomu Yoshinaga The University of Electro-Communications 1 Summary Proposal:
More informationApplication Layer Multicast Algorithm
Application Layer Multicast Algorithm Sergio Machado Universitat Politècnica de Catalunya Castelldefels Javier Ozón Universitat Politècnica de Catalunya Castelldefels Abstract This paper presents a multicast
More informationFundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off
Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off Mohammad Mohammadi Amiri, Student Member, IEEE and Deniz Gündüz, Senior Member, IEEE Abstract A centralized coded caching
More informationDraft Notes 1 : Scaling in Ad hoc Routing Protocols
Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function
More informationGlobal Smartphone 3D Sensing Market: Size, Trends & Forecasts ( ) September 2017
Global Smartphone 3D Sensing Market: Size, Trends & Forecasts (2017-2021) September 2017 Global Smartphone 3D Sensing Market Report Scope of the Report The report entitled Global Smartphone 3D Sensing
More informationNetwork Layer (Routing)
Network Layer (Routing) Topics Network service models Datagrams (packets), virtual circuits IP (Internet Protocol) Internetworking Forwarding (Longest Matching Prefix) Helpers: ARP and DHCP Fragmentation
More informationTime-related replication for p2p storage system
Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,
More informationMultihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks
Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are
More informationTraffic Trend 4.1 General 4.2 Communication traffic growth and traffic nature trend Communication traffic growth
4 Traffic Trend 4.1 General This chapter provides an analysis of the latest communication traffic trends. For the past years, considerable increase of communication traffic has been observed and several
More informationCisco Visual Networking Index: Forecast and Methodology,
Cisco Visual Networking Index: Forecast and Methodology, June 6, 2017 This forecast is part of the Cisco Visual Networking Index (Cisco VNI ), an ongoing initiative to track and forecast the impact of
More informationME 391Q Network Flow Programming
ME 9Q Network Flow Programming Final Exam, Summer 00. ( Points) The figure below shows an undirected network. The parameters on the edges are the edge lengths. Find the shortest path tree using Dijkstra
More informationFinding a winning strategy in variations of Kayles
Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened
More informationEntering the Zettabyte Era
White Paper Entering the Zettabyte Era June 1, 2011 This document is part of the Cisco Visual Networking Index (VNI), an ongoing initiative to track and forecast the impact of visual networking applications.
More informationSelfish Caching in Distributed Systems: A Game-Theoretic Analysis
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,
More informationRouting in Variable Topology Networks
Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed
More informationLecture 19 Subgradient Methods. November 5, 2008
Subgradient Methods November 5, 2008 Outline Lecture 19 Subgradients and Level Sets Subgradient Method Convergence and Convergence Rate Convex Optimization 1 Subgradients and Level Sets A vector s is a
More informationBANDWIDTH GROWTH VEHICULAR ETHERNET
BANDWIDTH GROWTH VEHICULAR ETHERNET Steve Carlson, High Speed Design John D Ambrosia, Dell IEEE 802 Nov 2013 Plenary Dallas, TX, USA Introduction Vehicular Ethernet IEEE 802.3bp RTPGE IEEE 802.3 PoDL People
More informationKyle M. Tarplee 1, Ryan Friese 1, Anthony A. Maciejewski 1, H.J. Siegel 1,2. Department of Electrical and Computer Engineering 2
Efficient and Scalable Computation of the Energy and Makespan Pareto Front for Heterogeneous Computing Systems Kyle M. Tarplee 1, Ryan Friese 1, Anthony A. Maciejewski 1, H.J. Siegel 1,2 1 Department of
More informationQ3 FY17 Connections Update 12 April 2017
Q3 FY17 Connections Update 12 April 2017 Q3 FY17 OVERVIEW > Total fixed line connections declined by 39k to 1,639,000 and total broadband connections declined by 15k to 1,199,000 local fibre companies
More informationGraph Algorithms Maximum Flow Applications
Chapter 5 Graph Algorithms Maximum Flow Applications Algorithm Theory WS 202/3 Fabian Kuhn Maximum Flow Applications Maximum flow has many applications Reducing a problem to a max flow problem can even
More informationTesting Isomorphism of Strongly Regular Graphs
Spectral Graph Theory Lecture 9 Testing Isomorphism of Strongly Regular Graphs Daniel A. Spielman September 26, 2018 9.1 Introduction In the last lecture we saw how to test isomorphism of graphs in which
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationModeling and Detecting Community Hierarchies
Modeling and Detecting Community Hierarchies Maria-Florina Balcan, Yingyu Liang Georgia Institute of Technology Age of Networks Massive amount of network data How to understand and utilize? Internet [1]
More informationOptimal Cache Allocation for Content-Centric Networking
Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,
More informationMathematical Modelling: Its Role in Squeezing the Most out of 5G for the IoT
Mathematical Modelling: Its Role in Squeezing the Most out of 5G for the IoT Attahiru Sule Alfa (Acknowledgements: Dr. AbuGhazaleh & Dr. Awoyemi) Attahiru Sule Alfa 5G Systems May 3 rd, 2017 1 / 33 Presentation
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More informationChapter 3, Algorithms Algorithms
CSI 2350, Discrete Structures Chapter 3, Algorithms Young-Rae Cho Associate Professor Department of Computer Science Baylor University 3.1. Algorithms Definition A finite sequence of precise instructions
More informationFlexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract
Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,
More informationPerformance and cost effectiveness of caching in mobile access networks
Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff
More informationA First Look at Colocation Demand Response
A First Look at Colocation Demand Response Shaolei Ren and M. A. Islam Florida International University 1 Load Demand response program Market-based program Reduce peak energy usage 0.35 0.3 0.25 0.2 0.15
More informationNC-CELL: Network Coding-based Content Distribution in Cellular Networks for Cloud Applications
-CELL: Network Coding-based Content Distribution Introduction Results Mobile cloud applications is one of the fastest growing markets: Mobile data traffic will rise up to 15 EB per month by 218 By 217
More informationOn the construction of nested orthogonal arrays
isid/ms/2010/06 September 10, 2010 http://wwwisidacin/ statmath/eprints On the construction of nested orthogonal arrays Aloke Dey Indian Statistical Institute, Delhi Centre 7, SJSS Marg, New Delhi 110
More informationFor personal use only
Chorus Limited Level 10, 1 Willis Street P O Box 632 Wellington 6140 New Zealand Email: company.secretary@chorus.co.nz 12 April 2017 Chorus Q3 FY17 overview Total fixed line connections declined by 39k
More informationEE/CSCI 451: Parallel and Distributed Computation
EE/CSCI 451: Parallel and Distributed Computation Lecture #8 2/7/2017 Xuehai Qian Xuehai.qian@usc.edu http://alchem.usc.edu/portal/xuehaiq.html University of Southern California 1 Outline From last class
More informationMPC: Popularity-based Caching Strategy for Content Centric Networks
MPC: Popularity-based Caching Strategy for Content Centric Networks César Bernardini Thomas Silverston Olivier Festor INRIA Nancy Université de Lorraine, France cesar.bernardini@inria.fr ICC 2013 - June
More informationHeuristic Search Methodologies
Linköping University January 11, 2016 Department of Science and Technology Heuristic Search Methodologies Report on the implementation of a heuristic algorithm Name E-mail Joen Dahlberg joen.dahlberg@liu.se
More informationSome Problems of Fuzzy Modeling of Telecommunications Networks
Some Problems of Fuzzy Modeling of Telecommunications Networks Kirill Garbuzov Novosibirsk State University Department of Mechanics and Mathematics Novosibirsk, Russia, 630090, Email: gartesk@rambler.ru
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationCabling to support ac and beyond. Nate Herring Sr. Product Manager Hubbell Premise Wiring
Cabling to support 802.11ac and beyond Nate Herring Sr. Product Manager Hubbell Premise Wiring IP Traffic Continues to Increase Globally, IP traffic will grow 3-fold from 2014 to 2019, a compound annual
More informationUbiquitous Mobile Host Internetworking
Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity
More informationDDOS-GUARD Q DDoS Attack Report
DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%
More informationPrinciples of Network Economics
Hagen Bobzin Principles of Network Economics SPIN Springer s internal project number, if known unknown Monograph August 12, 2005 Springer Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Contents
More informationFinding a Needle in a Haystack. Facebook s Photo Storage Jack Hartner
Finding a Needle in a Haystack Facebook s Photo Storage Jack Hartner Paper Outline Introduction Background & Previous Design Design & Implementation Evaluation Related Work Conclusion Facebook Photo Storage
More informationIntelligent Placement of Datacenters for Internet Services. Íñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres, and Ricardo Bianchini
Intelligent Placement of Datacenters for Internet Services Íñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres, and Ricardo Bianchini 1 Motivation Internet services require thousands of servers Use multiple
More informationMore Realistic Adversarial Settings. Virginia Tech CS5804 Introduction to Artificial Intelligence Spring 2015
More Realistic Adversarial Settings Virginia Tech CS5804 Introduction to Artificial Intelligence Spring 2015 Review Minimax search How to adjust for more than two agents, for non-zero-sum Analysis very
More informationOn the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics
More informationA Network Topology With Efficient Balanced Routing
A Network Topology With Efficient Balanced Routing Dionysios Kountanis Vatsal Sharadbhai Gandhi Wasim El-Hajj Ghassen Ben Brahim email: {kountan, vsgandhi, welhajj, gbenbrah}@cs.wmich.edu Department of
More informationLecture 25 November 26, 2013
CS 229r: Algorithms for Big Data Fall 2013 Prof. Jelani Nelson Lecture 25 November 26, 2013 Scribe: Thomas Steinke 1 Overview Tody is the last lecture. We will finish our discussion of MapReduce by covering
More informationACIP: An Access Control and Information Protocol for Ethernet-based Broadband Access Networks
ACIP: An Access Control and Information Protocol for Ethernet-based Broadband Access Networks Daniel Duchow and Dirk Timmermann University of Rostock, 18051 Rostock, Germany Tel/Fax: ++49 381 498-7276/52
More informationSimply Top Talkers Jeroen Massar, Andreas Kind and Marc Ph. Stoecklin
IBM Research - Zurich Simply Top Talkers Jeroen Massar, Andreas Kind and Marc Ph. Stoecklin 2009 IBM Corporation Motivation and Outline Need to understand and correctly handle dominant aspects within the
More informationDynamic Content Allocation for Cloudassisted Service of Periodic Workloads
Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads György Dán Royal Institute of Technology (KTH) Niklas Carlsson Linköping University @ IEEE INFOCOM 2014, Toronto, Canada, April/May
More informationParallel Packet Copies for Multicast
Do you really need multicast? At line rates? Less is More J Parallel Packet Copies for Multicast J.1 Introduction Multicasting is the process of simultaneously sending the same data to multiple destinations
More informationA Class of Submodular Functions for Document Summarization
A Class of Submodular Functions for Document Summarization Hui Lin, Jeff Bilmes University of Washington, Seattle Dept. of Electrical Engineering June 20, 2011 Lin and Bilmes Submodular Summarization June
More informationEnhanced Parity Packet Transmission for Video Multicast using R-DSTC
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip
More informationBenchmarking the UB-tree
Benchmarking the UB-tree Michal Krátký, Tomáš Skopal Department of Computer Science, VŠB Technical University of Ostrava, tř. 17. listopadu 15, Ostrava, Czech Republic michal.kratky@vsb.cz, tomas.skopal@vsb.cz
More informationIntroduction to Machine Learning
Introduction to Machine Learning Maximum Margin Methods Varun Chandola Computer Science & Engineering State University of New York at Buffalo Buffalo, NY, USA chandola@buffalo.edu Chandola@UB CSE 474/574
More informationIPTV Bandwidth Demands in Metropolitan Area Networks
IPTV Bandwidth Demands in Metropolitan Area Networks LANMAN 27 Jesse Simsarian and Marcus Duelk Bell Laboratories, Alcatel-Lucent, Holmdel, NJ 7733, email: jesses@alcatel-lucent.com June 11, 27 Introduction
More informationOn the multiple unicast network coding conjecture
On the multiple unicast networ coding conjecture The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Langberg,
More informationShortest Path Computation in Multicast Network with Multicast Capable and Incapable Delay Associated Nodes
Shortest Path Computation in Multicast Network with Multicast Capable and Incapable elay Associated Nodes Sonal Yadav, Sharath Naik Abstract Multicast transmission results in a bandwidth and cost efficient
More informationMedia & Telco Conference: 2011 and beyond 31 January 2011
Media & Telco Conference: 2011 and beyond 31 January 2011 Convergence The Holy Grail Gavin Patterson, CEO BT Retail Convergence is nothing new Multicast - c.1900 Online multiplayer gaming - c.1935 Convergence
More informationTraffic Types and Growth in Backbone Networks
Traffic Types and Growth in Backbone Networks Alexandre Gerber, Robert Doverspike AT&T Labs Research Outline Overview of a US carrier inter-city backbone optical network: Services running on ROADMs Breakdown
More informationNetwork Design. Overview. CDS with Vaults and Streamers CHAPTER
CHAPTER 2 This chapter describes the different network topologies for the Cisco TV CDS, the different network connections of the CDS servers, the CDS workflow, and network configuration considerations.
More informationComputing List of Ordered Pairs from Disjoint Closed Interval to compute a most Probable Delay Path:NP- Hard in polynomial time
Computing List of Ordered Pairs from Disjoint Closed Interval to compute a most Probable Delay Path:NP- Hard in polynomial time Sujit P Nale 1, S.P Sonavane 2 Dept. of Computer Science, Walchand College
More informationBehavioral Data Mining. Lecture 9 Modeling People
Behavioral Data Mining Lecture 9 Modeling People Outline Power Laws Big-5 Personality Factors Social Network Structure Power Laws Y-axis = frequency of word, X-axis = rank in decreasing order Power Laws
More informationReduction of Periodic Broadcast Resource Requirements with Proxy Caching
Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota
More informationFrom Internet Data Centers to Data Centers in the Cloud
From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs
More informationNear Optimal Broadcast with Network Coding in Large Sensor Networks
in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA
More informationCongestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem
Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases
More informationDegrees of Freedom in Cached Interference Networks with Limited Backhaul
Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information
More informationMobile Data Trends and Networks Fit for Purpose
Mobile Data Trends and Networks Fit for Purpose Focus on SEE Robert Pepper Vice President Global Technology Policy 20 March 2013 SEE Mobility Summit 2013 Cisco and/or its affiliates. All rights reserved.
More information