Coded Caching for Hierarchical Networks with a Different Number of Layers

Size: px
Start display at page:

Download "Coded Caching for Hierarchical Networks with a Different Number of Layers"

Transcription

1 Coded Caching for Hierarchical Networks with a Different Number of Layers Makoto Takita, Masanori Hirotomo, Masakatu Morii Kobe University, Saga University November 20, 2017 ASON 17@Aomori

2 Outline 1 1. Introduction 2. Caching scheme 3. Coded caching scheme 4. Coded Caching for Hierarchical Networks with a Different Number of Layers 1. Program setting 2. Three basic schemes 3. Combination scheme 4. Lower bound 5. Numerical result 5. Conclusion

3 Background: Consumer internet traffic 2 PB per Month 250, , , ,000 Internet video Web, , and data Online gaming File sharing 50, Source: Cisco VNI, 2017 IP traffic will grow at a Compound Annual Growth Rate of 24% from 2016 to IP video traffic will be 82% of all consumer Internet traffic by 2021, up from 73% in Cisco Visual Networking Index: Forecast and Methodology, (September 15, 2017)

4 Purpose: Reduce the peak network load 3 Normalized network load Time The network traffic has high time variability Caching is recognized as one solution to reduce the peak network load Users store popular contents in the cache memories during the off-peak time Users can recover their requests by the stored contents during the peak time Caching can effectively use the network resources during off-peak time

5 Caching scheme: Placement phase 4 server shared link caches user Users store popular contents in the cache memories during the off-peak time. The problem is what contents are stored in the memories. The limitation is the memory capacity.

6 Caching scheme: Delivery phase 5 server shared link 1 request 2 delivery caches user 3 recover 1 Each user requests one content in the database 2 Server delivers messages based on the users requests and the stored contents 3 Each user recovers its request by the messages and the stored contents The problem is what messages to send users and the size of message The limitation is the network load

7 Coded caching: Difference to uncoded scheme 6 N = 2 files, K = 2 users, cache size M = 1 Uncoded caching Coded caching A 1, A 2 A 1, A 2 B 1, B 2 B 1, B 2 A 2 B 2 R = 1 A 2 B 1 R = 1 2 A B A B A 1 B 1 A 1 B 1 A 1 B 1 A 2 B 2 Placement Delivery Store same content Uncoded multicast Use cache locally Store different contents Coded multicast Use cache global

8 Coded caching: Related works 7 Single layer network with nonuniform demand [5]-[7] Centralized [2] Decentralized [3] with heterogeneous cache sizes [8] with distinct file sizes[9] and more Hierarchical network Two-layer network [4] [This work] Two-layer and single layer network

9 This work 8 The network with the two layer and single layer of cache at same time. We propose three basic coded caching schemes Scheme A: divide the caching problem into three blocks Scheme B: ignore the capabilities of the mirror servers Scheme C: divide the caching problem into two blocks We also propose the combination scheme by combining the scheme B and C discuss the combining parameter α and β show comparison with lower bound α 1 α Rate R 1 N files Scheme B Scheme C β 1 β Size M 1 Rate R 2 Size M 2 combination scheme

10 Problem setting: Two-layer and single-layer network model 9 Origin server N files Error-free broadcast link? rate R 1 K 1 mirror servers? size M 1 Error-free broadcast link? rate R 2 K 1 K 2 + K 3 memories???? size M 2 K 1 K 2 + K 3 users What contents are stored in the memories? What messages is sent users in response to users requests? The relation between memory size and message size?

11 Proposed scheme: Basic scheme A 10 Divide the caching problem into three blocks Apply the single-layer caching algorithm to each block Decentralized scheme for single layer R N, K, M = K 1 M N 1 1 MΤN K KM/N (a) (c) N files K 2 R N, K 1, M 1 + R N, K 3, M 2 Rate R 1A (b) R N, K 2, M 2 Rate R 2A Rate R 2A

12 Proposed scheme: Basic scheme B 11 The mirror servers are only used to forward messages Apply the single-layer algorithm for all of user Decentralized scheme for single layer R N, K, M = K 1 M N 1 1 MΤN K KM/N N files Rate R 1B R N, K 1 K 2 + K 3, M 2 ignore the capabilities of the mirror servers R N, K 2, M 2 Rate R 2B Rate R 2B

13 Proposed scheme: Basic scheme C 12 Divide the caching problem into two blocks Block (a) need to consider different cache size Apply the zero-padding solution [8] to the block (a) (a) Decentralized scheme for single layer R N, K, M = K 1 M N 1 1 MΤN K KM/N The rate for different cache size R N, K 1, K 3, M 1, M 2 = R N, K 3, M M K 3 2 R N, K N 1, M 1 (b) Rate R 1C N files R N, K 1, K 3, M 1, M 2 + K 2 1 R N, K 1, M 1 Rate R 2C Rate R 2C R N, K 2, M 2

14 Comparison: The rate R 1 of each basic scheme 13 Number of Files N 35 Number of Mirrors K 1 5 Number of Mirror users K 2 5 Number of origin users K 3 3, 5, 10 memory size of user M 2 1 Scheme C is better than Scheme A regardless of K 3. Scheme C is better than Scheme B with large M 1. Scheme B is constant even if M 1 increases

15 Proposed scheme: Combination scheme 14 Want to have good performance with any memory size of mirror Combining the scheme C and B to use resources of the mirror. Origin server α 1 α N files Scheme B Scheme C Rate R 1 K 1 mirror servers Size M 1 β 1 β Rate R 2 K 1 K 2 + K 3 memories K 1 K 2 + K 3 users Size M 2 What is the optimal fix parameters α and β?

16 Combination scheme: How to find optimal parameter 15 Optimal parameters α, β They are minimize rate R 1 depend on other parameters N, Ks,Ms. Method 1 (Brute-force) For given parameters, the exact optimal values of α and β are obtained by the brute force method. Method 2 (formulating) For given parameters, the almost optimal values of α and β are formulated by other parameter. We determined the formulated parameters α and β empirically from some numerical simulations. α, β = M 1 N, 0 M 1, 0 M 1 + K 3 M 2 if M 1 + M 2 K 3 N otherwise

17 Comparison: Brute-force and formulating 16 Number of Files N 30 Number of Mirrors K 1 5 Number of Mirror users K 2 5 Number of origin users K 3 5 memory size of user M 2 3 The combination scheme with formulated α, β is almost same as with optimal α, β. The formulating method is getting worse with the large M 1

18 Combination scheme: Achievable rate 17 The rates of the combination scheme are given in term of the function R N, K, M. R N, K, M is the rate of the decentralized coded caching algorithm. The achievable rates of decentralized algorithm are given in [3]. R N, K, M = ቐ min K, N M 1 if M N 1 0 otherwise Achievable rate of the combination scheme with the formulated parameters α β R 1 α, β min K 1 K 2 + K 3, M 1 N min K 3, N + 1 M 1 N K 1K 2 + K 3, N M 1 M 2 M 1 N M 1 K 2 + K M 1 + K 3 M 2 M 1 + K 3 M 3 + K 3M 2 K 3 N M 1 2 M 1 + K 3 M 2 2 if M 1 + M 2 K 3 N otherwise R 2 α, β M 1 N min K 2, N + 1 M 1 N K 2, N M 1 M 2 min K 2, N M 2 if M 1 + M 2 K 3 N otherwise

19 Our problem setting: Lower bound 18 We provide lower bounds based on cut-set bound [11]. Theorem 1(Lower bound) For N N files and K 1 N mirrors each with memory of size 0 M 1 N, K 2 N mirror users and K 3 N origin users each with the memory of size 0 M 2 N, where N is the set of natural numbers, the lower bounds of the rates R 1 and R 2 are given by R 1 max s 1 0,1,,K 1 s 2 0,1,,K 2 s 3 0,1,,K 3 max s 1 s 2 + s 3 s 1M 1 + s 1 s 2 + s 3 M 2, N s 1M 1 s 1 s 2 + s 3 M 2 NΤ s 1 s 2 + s 3 N/(s 1 s 2 + s 3 ) R 2 max max t tm 2 t 1,2,,K 2 NΤt, N tm 2 NΤt [11]T. M. Cover and J. A. Thomas, Elements of Information Theory, New York, NY, USA: Wiley, 1991.

20 Comparison: Combination scheme and lower bound 19 Number of Files N 30 Number of Mirrors K 1 5 Number of Mirror users K 2 5 Number of origin users K 3 5 memory size of user M 2 3 The combination scheme shows better performance than basic scheme. But, our lower bound is loose. We focus on how to realize a coded caching scheme for our network model. So, our lower bounds are not tight.

21 Conclusion 20 The network with the two layer and single layer of cache at same time. We propose three basic coded caching schemes. Scheme B is better with small memory of mirrors. Scheme C is better with large memory of mirrors. We also propose the combination scheme by combining scheme B and C. We discuss the combining parameter α and β. We formulated α and β that have almost same performance as optimal α and β. We show comparison with lower bound. Our lower bound is loose, so tighter bound is need. Future work Derivation of the tight bound More layers of caches Realistic simulations Size M 2 β 1 β α Rate R 2 Size M 1 1 α Rate R 1 N files Scheme B Scheme C

22 21

Coded Caching for a Large Number Of Users

Coded Caching for a Large Number Of Users Coded Caching for a Large Number Of Users 1 Mohammad Mohammadi Amiri, Qianqian Yang, and Deniz Gündüz Abstract arxiv:1605.01993v1 [cs.it] 6 May 2016 Information theoretic analysis of a coded caching system

More information

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 *Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.J.; Ramchandran, K. "Network Coding for Distributed

More information

Hierarchical Coded Caching

Hierarchical Coded Caching Hierarchical Coded Caching ikhil Karamchandani, Urs iesen, Mohammad Ali Maddah-Ali, and Suhas Diggavi Abstract arxiv:403.7007v2 [cs.it] 6 Jun 204 Caching of popular content during off-peak hours is a strategy

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Novel Decentralized Coded Caching through Coded Prefetching

Novel Decentralized Coded Caching through Coded Prefetching ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu

More information

Cache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK)

Cache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) Cache Management for TelcoCDNs Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK) d.tuncer@ee.ucl.ac.uk 06/01/2017 Agenda 1. Internet traffic: trends and evolution

More information

in a Zettabyte World 10/18/ th Anniversary Robert Pepper Vice President Global Technology Policy CITI October 2011

in a Zettabyte World 10/18/ th Anniversary Robert Pepper Vice President Global Technology Policy CITI October 2011 1/18/211 Wireless Ultra-Broadband in a Zettabyte World Robert Pepper Vice President Global Technology Policy CITI October 211 211 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 5 th Anniversary

More information

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Zhi Chen Member, IEEE Pingyi Fan Senior Member, IEEE and Khaled Ben Letaief Fellow, IEEE 1 Abstract arxiv:1407.1935v2 [cs.it] 6 Nov

More information

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering

More information

QUARTERLY FORECAST REPORT 1ST QUARTER

QUARTERLY FORECAST REPORT 1ST QUARTER QUARTERLY FORECAST REPORT 1ST QUARTER 216 77 Sundial Ave. Manchester, NH 313 E-mail: ptda@itreconomics.com Table of Contents Definitions & Methodology.... 3 MTI Total Sales... 4 Monthly Data Record...

More information

Resource Allocation for LTE Multicast (embms): Group Partitioning and Dynamics

Resource Allocation for LTE Multicast (embms): Group Partitioning and Dynamics Resource Allocation for LTE Multicast (embms): Group Partitioning and Dynamics Jiasi Chen*, Mung Chiang*, Jeffrey Erman +, Guangzhi Li +, K. K. Ramakrishnan 1, Rakesh K Sinha + *Princeton University, +

More information

Class #8 - Oct 31, 2017

Class #8 - Oct 31, 2017 4520 - Class #8 - Oct 31, 2017 Today s agenda Quiz #2 - results Cisco VNI Report #1 - ISP profile Homework for Tue Nov 7 Quiz #2 - TCP/IP - 3-pointers answer 5/6-25 min class mean = 9.2/15 = 61% 1. application

More information

Cache-Aided Coded Multicast for Correlated Sources

Cache-Aided Coded Multicast for Correlated Sources Cache-Aided Coded Multicast for Correlated Sources P. Hassanzadeh A. Tulino J. Llorca E. Erkip arxiv:1609.05831v1 [cs.it] 19 Sep 2016 Abstract The combination of edge caching and coded multicasting is

More information

Correlation-Aware Distributed Caching and Coded Delivery

Correlation-Aware Distributed Caching and Coded Delivery Correlation-Aware Distributed Caching and Coded Delivery P. Hassanzadeh, A. Tulino, J. Llorca, E. Erkip arxiv:1609.05836v1 [cs.it] 19 Sep 2016 Abstract Cache-aided coded multicast leverages side information

More information

Optimization of Heterogeneous Caching Systems with Rate Limited Links

Optimization of Heterogeneous Caching Systems with Rate Limited Links IEEE ICC Communication Theory Symposium Optimization of Heterogeneous Caching Systems with Rate Limited Links Abdelrahman M Ibrahim, Ahmed A Zewail, and Aylin Yener Wireless Communications and Networking

More information

Block Crossings in Storyline Visualizations

Block Crossings in Storyline Visualizations Block Crossings in Storyline Visualizations Thomas van Dijk, Martin Fink, Norbert Fischer, Fabian Lipp, Peter Markfelder, Alexander Ravsky, Subhash Suri, and Alexander Wolff 3/15 3/15 block crossing 3/15

More information

Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective

Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Cloud Processing and Edge Caching in HetNets: A Delivery Time Perspective Aydin Sezgin Joint work with: Jaber Kakar, Soheil Gherekhloo and Zohaib Hassan Awan Institute for Digital Communication Systems

More information

A Scalable Framework for Content Replication in Multicast-Based Content Distribution Networks

A Scalable Framework for Content Replication in Multicast-Based Content Distribution Networks A Scalable Framework for Content Replication in Multicast-Based Content Distribution Networks Yannis Matalas 1, Nikolaos D. Dragios 2, and George T. Karetsos 2 1 Digital Media & Internet Technologies Department,

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting

Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting Kevin Foltz Lihao Xu Jehoshua Bruck California Institute of Technology Department of Computer Science Department of Electrical Engineering

More information

Cisco Visual Networking Index (VNI) Global IP Traffic Forecast Update;

Cisco Visual Networking Index (VNI) Global IP Traffic Forecast Update; Cisco Visual Networking Index (VNI) Global IP Traffic Forecast Update; 2010 Presented by Mark Nowell Senior Director Engineering, Cisco IEEE 802.3 Bandwidth Advisory Ad-hoc, Sept 2011 Cisco Public 1 5

More information

The Internet of Things is Now: M2M Devices Forecast

The Internet of Things is Now: M2M Devices Forecast The Internet of Things is Now: M2M Devices Forecast 2013-2018 Cisco Visual Networking Index 2014 Forecast Robert Pepper Vice President, Global Technology Policy October 2014 VNI Projections and Actuals

More information

Efficient Universal Recovery in Broadcast Networks

Efficient Universal Recovery in Broadcast Networks Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 1 / 19 System Model and Problem

More information

Coded Caching with Heterogenous Cache Sizes

Coded Caching with Heterogenous Cache Sizes Coded Caching with Heterogenous Cache Sizes Sinong Wang, Wenxin Li, Xiaohua Tian, Hui Liu Department of Electronic Engineering, Shanghai Jiao Tong University {snwang,xtian,huiliu}@sjtu.edu.cn arxiv:1504.0113v3

More information

Computing over Multiple-Access Channels with Connections to Wireless Network Coding

Computing over Multiple-Access Channels with Connections to Wireless Network Coding ISIT 06: Computing over MACS 1 / 20 Computing over Multiple-Access Channels with Connections to Wireless Network Coding Bobak Nazer and Michael Gastpar Wireless Foundations Center Department of Electrical

More information

A Communication Architecture for Large Heterogeneous Wireless Networks

A Communication Architecture for Large Heterogeneous Wireless Networks A Communication Architecture for Large Heterogeneous Wireless Networks Urs Niesen Bell Laboratories, Alcatel-Lucent Murray Hill, NJ 07974 urs.niesen@alcatel-lucent.com Piyush upta Bell Laboratories, Alcatel-Lucent

More information

PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS

PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS Lecture 03-04 PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS By: Dr. Zahoor Jan 1 ALGORITHM DEFINITION A finite set of statements that guarantees an optimal solution in finite interval of time 2 GOOD ALGORITHMS?

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

A Light-weight Content Distribution Scheme for Cooperative Caching in Telco-CDNs

A Light-weight Content Distribution Scheme for Cooperative Caching in Telco-CDNs A Light-weight Content Distribution Scheme for Cooperative Caching in Telco-CDNs Takuma Nakajima, Masato Yoshimi, Celimuge Wu, Tsutomu Yoshinaga The University of Electro-Communications 1 Summary Proposal:

More information

Application Layer Multicast Algorithm

Application Layer Multicast Algorithm Application Layer Multicast Algorithm Sergio Machado Universitat Politècnica de Catalunya Castelldefels Javier Ozón Universitat Politècnica de Catalunya Castelldefels Abstract This paper presents a multicast

More information

Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off

Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off Mohammad Mohammadi Amiri, Student Member, IEEE and Deniz Gündüz, Senior Member, IEEE Abstract A centralized coded caching

More information

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Draft Notes 1 : Scaling in Ad hoc Routing Protocols Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function

More information

Global Smartphone 3D Sensing Market: Size, Trends & Forecasts ( ) September 2017

Global Smartphone 3D Sensing Market: Size, Trends & Forecasts ( ) September 2017 Global Smartphone 3D Sensing Market: Size, Trends & Forecasts (2017-2021) September 2017 Global Smartphone 3D Sensing Market Report Scope of the Report The report entitled Global Smartphone 3D Sensing

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Topics Network service models Datagrams (packets), virtual circuits IP (Internet Protocol) Internetworking Forwarding (Longest Matching Prefix) Helpers: ARP and DHCP Fragmentation

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are

More information

Traffic Trend 4.1 General 4.2 Communication traffic growth and traffic nature trend Communication traffic growth

Traffic Trend 4.1 General 4.2 Communication traffic growth and traffic nature trend Communication traffic growth 4 Traffic Trend 4.1 General This chapter provides an analysis of the latest communication traffic trends. For the past years, considerable increase of communication traffic has been observed and several

More information

Cisco Visual Networking Index: Forecast and Methodology,

Cisco Visual Networking Index: Forecast and Methodology, Cisco Visual Networking Index: Forecast and Methodology, June 6, 2017 This forecast is part of the Cisco Visual Networking Index (Cisco VNI ), an ongoing initiative to track and forecast the impact of

More information

ME 391Q Network Flow Programming

ME 391Q Network Flow Programming ME 9Q Network Flow Programming Final Exam, Summer 00. ( Points) The figure below shows an undirected network. The parameters on the edges are the edge lengths. Find the shortest path tree using Dijkstra

More information

Finding a winning strategy in variations of Kayles

Finding a winning strategy in variations of Kayles Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened

More information

Entering the Zettabyte Era

Entering the Zettabyte Era White Paper Entering the Zettabyte Era June 1, 2011 This document is part of the Cisco Visual Networking Index (VNI), an ongoing initiative to track and forecast the impact of visual networking applications.

More information

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,

More information

Routing in Variable Topology Networks

Routing in Variable Topology Networks Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed

More information

Lecture 19 Subgradient Methods. November 5, 2008

Lecture 19 Subgradient Methods. November 5, 2008 Subgradient Methods November 5, 2008 Outline Lecture 19 Subgradients and Level Sets Subgradient Method Convergence and Convergence Rate Convex Optimization 1 Subgradients and Level Sets A vector s is a

More information

BANDWIDTH GROWTH VEHICULAR ETHERNET

BANDWIDTH GROWTH VEHICULAR ETHERNET BANDWIDTH GROWTH VEHICULAR ETHERNET Steve Carlson, High Speed Design John D Ambrosia, Dell IEEE 802 Nov 2013 Plenary Dallas, TX, USA Introduction Vehicular Ethernet IEEE 802.3bp RTPGE IEEE 802.3 PoDL People

More information

Kyle M. Tarplee 1, Ryan Friese 1, Anthony A. Maciejewski 1, H.J. Siegel 1,2. Department of Electrical and Computer Engineering 2

Kyle M. Tarplee 1, Ryan Friese 1, Anthony A. Maciejewski 1, H.J. Siegel 1,2. Department of Electrical and Computer Engineering 2 Efficient and Scalable Computation of the Energy and Makespan Pareto Front for Heterogeneous Computing Systems Kyle M. Tarplee 1, Ryan Friese 1, Anthony A. Maciejewski 1, H.J. Siegel 1,2 1 Department of

More information

Q3 FY17 Connections Update 12 April 2017

Q3 FY17 Connections Update 12 April 2017 Q3 FY17 Connections Update 12 April 2017 Q3 FY17 OVERVIEW > Total fixed line connections declined by 39k to 1,639,000 and total broadband connections declined by 15k to 1,199,000 local fibre companies

More information

Graph Algorithms Maximum Flow Applications

Graph Algorithms Maximum Flow Applications Chapter 5 Graph Algorithms Maximum Flow Applications Algorithm Theory WS 202/3 Fabian Kuhn Maximum Flow Applications Maximum flow has many applications Reducing a problem to a max flow problem can even

More information

Testing Isomorphism of Strongly Regular Graphs

Testing Isomorphism of Strongly Regular Graphs Spectral Graph Theory Lecture 9 Testing Isomorphism of Strongly Regular Graphs Daniel A. Spielman September 26, 2018 9.1 Introduction In the last lecture we saw how to test isomorphism of graphs in which

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

Modeling and Detecting Community Hierarchies

Modeling and Detecting Community Hierarchies Modeling and Detecting Community Hierarchies Maria-Florina Balcan, Yingyu Liang Georgia Institute of Technology Age of Networks Massive amount of network data How to understand and utilize? Internet [1]

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

Mathematical Modelling: Its Role in Squeezing the Most out of 5G for the IoT

Mathematical Modelling: Its Role in Squeezing the Most out of 5G for the IoT Mathematical Modelling: Its Role in Squeezing the Most out of 5G for the IoT Attahiru Sule Alfa (Acknowledgements: Dr. AbuGhazaleh & Dr. Awoyemi) Attahiru Sule Alfa 5G Systems May 3 rd, 2017 1 / 33 Presentation

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Chapter 3, Algorithms Algorithms

Chapter 3, Algorithms Algorithms CSI 2350, Discrete Structures Chapter 3, Algorithms Young-Rae Cho Associate Professor Department of Computer Science Baylor University 3.1. Algorithms Definition A finite sequence of precise instructions

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

Performance and cost effectiveness of caching in mobile access networks

Performance and cost effectiveness of caching in mobile access networks Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff

More information

A First Look at Colocation Demand Response

A First Look at Colocation Demand Response A First Look at Colocation Demand Response Shaolei Ren and M. A. Islam Florida International University 1 Load Demand response program Market-based program Reduce peak energy usage 0.35 0.3 0.25 0.2 0.15

More information

NC-CELL: Network Coding-based Content Distribution in Cellular Networks for Cloud Applications

NC-CELL: Network Coding-based Content Distribution in Cellular Networks for Cloud Applications -CELL: Network Coding-based Content Distribution Introduction Results Mobile cloud applications is one of the fastest growing markets: Mobile data traffic will rise up to 15 EB per month by 218 By 217

More information

On the construction of nested orthogonal arrays

On the construction of nested orthogonal arrays isid/ms/2010/06 September 10, 2010 http://wwwisidacin/ statmath/eprints On the construction of nested orthogonal arrays Aloke Dey Indian Statistical Institute, Delhi Centre 7, SJSS Marg, New Delhi 110

More information

For personal use only

For personal use only Chorus Limited Level 10, 1 Willis Street P O Box 632 Wellington 6140 New Zealand Email: company.secretary@chorus.co.nz 12 April 2017 Chorus Q3 FY17 overview Total fixed line connections declined by 39k

More information

EE/CSCI 451: Parallel and Distributed Computation

EE/CSCI 451: Parallel and Distributed Computation EE/CSCI 451: Parallel and Distributed Computation Lecture #8 2/7/2017 Xuehai Qian Xuehai.qian@usc.edu http://alchem.usc.edu/portal/xuehaiq.html University of Southern California 1 Outline From last class

More information

MPC: Popularity-based Caching Strategy for Content Centric Networks

MPC: Popularity-based Caching Strategy for Content Centric Networks MPC: Popularity-based Caching Strategy for Content Centric Networks César Bernardini Thomas Silverston Olivier Festor INRIA Nancy Université de Lorraine, France cesar.bernardini@inria.fr ICC 2013 - June

More information

Heuristic Search Methodologies

Heuristic Search Methodologies Linköping University January 11, 2016 Department of Science and Technology Heuristic Search Methodologies Report on the implementation of a heuristic algorithm Name E-mail Joen Dahlberg joen.dahlberg@liu.se

More information

Some Problems of Fuzzy Modeling of Telecommunications Networks

Some Problems of Fuzzy Modeling of Telecommunications Networks Some Problems of Fuzzy Modeling of Telecommunications Networks Kirill Garbuzov Novosibirsk State University Department of Mechanics and Mathematics Novosibirsk, Russia, 630090, Email: gartesk@rambler.ru

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Cabling to support ac and beyond. Nate Herring Sr. Product Manager Hubbell Premise Wiring

Cabling to support ac and beyond. Nate Herring Sr. Product Manager Hubbell Premise Wiring Cabling to support 802.11ac and beyond Nate Herring Sr. Product Manager Hubbell Premise Wiring IP Traffic Continues to Increase Globally, IP traffic will grow 3-fold from 2014 to 2019, a compound annual

More information

Ubiquitous Mobile Host Internetworking

Ubiquitous Mobile Host Internetworking Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity

More information

DDOS-GUARD Q DDoS Attack Report

DDOS-GUARD Q DDoS Attack Report DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%

More information

Principles of Network Economics

Principles of Network Economics Hagen Bobzin Principles of Network Economics SPIN Springer s internal project number, if known unknown Monograph August 12, 2005 Springer Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Contents

More information

Finding a Needle in a Haystack. Facebook s Photo Storage Jack Hartner

Finding a Needle in a Haystack. Facebook s Photo Storage Jack Hartner Finding a Needle in a Haystack Facebook s Photo Storage Jack Hartner Paper Outline Introduction Background & Previous Design Design & Implementation Evaluation Related Work Conclusion Facebook Photo Storage

More information

Intelligent Placement of Datacenters for Internet Services. Íñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres, and Ricardo Bianchini

Intelligent Placement of Datacenters for Internet Services. Íñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres, and Ricardo Bianchini Intelligent Placement of Datacenters for Internet Services Íñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres, and Ricardo Bianchini 1 Motivation Internet services require thousands of servers Use multiple

More information

More Realistic Adversarial Settings. Virginia Tech CS5804 Introduction to Artificial Intelligence Spring 2015

More Realistic Adversarial Settings. Virginia Tech CS5804 Introduction to Artificial Intelligence Spring 2015 More Realistic Adversarial Settings Virginia Tech CS5804 Introduction to Artificial Intelligence Spring 2015 Review Minimax search How to adjust for more than two agents, for non-zero-sum Analysis very

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

A Network Topology With Efficient Balanced Routing

A Network Topology With Efficient Balanced Routing A Network Topology With Efficient Balanced Routing Dionysios Kountanis Vatsal Sharadbhai Gandhi Wasim El-Hajj Ghassen Ben Brahim email: {kountan, vsgandhi, welhajj, gbenbrah}@cs.wmich.edu Department of

More information

Lecture 25 November 26, 2013

Lecture 25 November 26, 2013 CS 229r: Algorithms for Big Data Fall 2013 Prof. Jelani Nelson Lecture 25 November 26, 2013 Scribe: Thomas Steinke 1 Overview Tody is the last lecture. We will finish our discussion of MapReduce by covering

More information

ACIP: An Access Control and Information Protocol for Ethernet-based Broadband Access Networks

ACIP: An Access Control and Information Protocol for Ethernet-based Broadband Access Networks ACIP: An Access Control and Information Protocol for Ethernet-based Broadband Access Networks Daniel Duchow and Dirk Timmermann University of Rostock, 18051 Rostock, Germany Tel/Fax: ++49 381 498-7276/52

More information

Simply Top Talkers Jeroen Massar, Andreas Kind and Marc Ph. Stoecklin

Simply Top Talkers Jeroen Massar, Andreas Kind and Marc Ph. Stoecklin IBM Research - Zurich Simply Top Talkers Jeroen Massar, Andreas Kind and Marc Ph. Stoecklin 2009 IBM Corporation Motivation and Outline Need to understand and correctly handle dominant aspects within the

More information

Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads

Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads Dynamic Content Allocation for Cloudassisted Service of Periodic Workloads György Dán Royal Institute of Technology (KTH) Niklas Carlsson Linköping University @ IEEE INFOCOM 2014, Toronto, Canada, April/May

More information

Parallel Packet Copies for Multicast

Parallel Packet Copies for Multicast Do you really need multicast? At line rates? Less is More J Parallel Packet Copies for Multicast J.1 Introduction Multicasting is the process of simultaneously sending the same data to multiple destinations

More information

A Class of Submodular Functions for Document Summarization

A Class of Submodular Functions for Document Summarization A Class of Submodular Functions for Document Summarization Hui Lin, Jeff Bilmes University of Washington, Seattle Dept. of Electrical Engineering June 20, 2011 Lin and Bilmes Submodular Summarization June

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Benchmarking the UB-tree

Benchmarking the UB-tree Benchmarking the UB-tree Michal Krátký, Tomáš Skopal Department of Computer Science, VŠB Technical University of Ostrava, tř. 17. listopadu 15, Ostrava, Czech Republic michal.kratky@vsb.cz, tomas.skopal@vsb.cz

More information

Introduction to Machine Learning

Introduction to Machine Learning Introduction to Machine Learning Maximum Margin Methods Varun Chandola Computer Science & Engineering State University of New York at Buffalo Buffalo, NY, USA chandola@buffalo.edu Chandola@UB CSE 474/574

More information

IPTV Bandwidth Demands in Metropolitan Area Networks

IPTV Bandwidth Demands in Metropolitan Area Networks IPTV Bandwidth Demands in Metropolitan Area Networks LANMAN 27 Jesse Simsarian and Marcus Duelk Bell Laboratories, Alcatel-Lucent, Holmdel, NJ 7733, email: jesses@alcatel-lucent.com June 11, 27 Introduction

More information

On the multiple unicast network coding conjecture

On the multiple unicast network coding conjecture On the multiple unicast networ coding conjecture The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Langberg,

More information

Shortest Path Computation in Multicast Network with Multicast Capable and Incapable Delay Associated Nodes

Shortest Path Computation in Multicast Network with Multicast Capable and Incapable Delay Associated Nodes Shortest Path Computation in Multicast Network with Multicast Capable and Incapable elay Associated Nodes Sonal Yadav, Sharath Naik Abstract Multicast transmission results in a bandwidth and cost efficient

More information

Media & Telco Conference: 2011 and beyond 31 January 2011

Media & Telco Conference: 2011 and beyond 31 January 2011 Media & Telco Conference: 2011 and beyond 31 January 2011 Convergence The Holy Grail Gavin Patterson, CEO BT Retail Convergence is nothing new Multicast - c.1900 Online multiplayer gaming - c.1935 Convergence

More information

Traffic Types and Growth in Backbone Networks

Traffic Types and Growth in Backbone Networks Traffic Types and Growth in Backbone Networks Alexandre Gerber, Robert Doverspike AT&T Labs Research Outline Overview of a US carrier inter-city backbone optical network: Services running on ROADMs Breakdown

More information

Network Design. Overview. CDS with Vaults and Streamers CHAPTER

Network Design. Overview. CDS with Vaults and Streamers CHAPTER CHAPTER 2 This chapter describes the different network topologies for the Cisco TV CDS, the different network connections of the CDS servers, the CDS workflow, and network configuration considerations.

More information

Computing List of Ordered Pairs from Disjoint Closed Interval to compute a most Probable Delay Path:NP- Hard in polynomial time

Computing List of Ordered Pairs from Disjoint Closed Interval to compute a most Probable Delay Path:NP- Hard in polynomial time Computing List of Ordered Pairs from Disjoint Closed Interval to compute a most Probable Delay Path:NP- Hard in polynomial time Sujit P Nale 1, S.P Sonavane 2 Dept. of Computer Science, Walchand College

More information

Behavioral Data Mining. Lecture 9 Modeling People

Behavioral Data Mining. Lecture 9 Modeling People Behavioral Data Mining Lecture 9 Modeling People Outline Power Laws Big-5 Personality Factors Social Network Structure Power Laws Y-axis = frequency of word, X-axis = rank in decreasing order Power Laws

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Near Optimal Broadcast with Network Coding in Large Sensor Networks in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information

Degrees of Freedom in Cached Interference Networks with Limited Backhaul

Degrees of Freedom in Cached Interference Networks with Limited Backhaul Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information

More information

Mobile Data Trends and Networks Fit for Purpose

Mobile Data Trends and Networks Fit for Purpose Mobile Data Trends and Networks Fit for Purpose Focus on SEE Robert Pepper Vice President Global Technology Policy 20 March 2013 SEE Mobility Summit 2013 Cisco and/or its affiliates. All rights reserved.

More information