Using Network Measure to Reduce State Space Enumeration in Resilient Networks

Size: px
Start display at page:

Download "Using Network Measure to Reduce State Space Enumeration in Resilient Networks"

Transcription

1 Using Network Measure to Reduce State Space Enumeration in Resilient Networks M. Todd Gardner 2 Federal Aviation Administration Kansas City, Missouri, USA todd.gardner@faa.gov Abstract Resilient network design has become a prominent research topic in the wake of recent disasters in Japan and the United States. Often communications networks that are designed to be highly reliable have significant outages when rare but important events occur. Finding rare events is generally difficult because it may require an exhaustive search of the network state space. Mission critical systems have specific qualities that enable enumerating the network space for important events more efficient. In this work, we use mission critical system qualities and requirements to create a tractable approach to evaluate a network for resiliency. With specific system requirements, the Self-Pruning Network State Generation algorithm is able to completely evaluate the failure modes of a network by examining approximately 90,000 events as opposed to an exhaustive search requiring 5.5 x events. In addition, a network resiliency metric is proposed that considers not only failure mode probability but also system impact. These approaches are also flexible, working with multiple network measures and network types. Keywords network reliability, resilient networks, survivability, reliable topology design I. INTRODUCTION One of the concerns with the design of mission critical networks is that a rare event may have catastrophic effects on the mission of that network. This affects many networks including telecommunications, transportation, and air traffic control. Examples of rare events include natural disasters, submarine cable cuts, and weather events. Sterbenz et al. provide a good description of many such rare events that had catastrophic network effects [8]. For example, a fire at the Hinsdale Illinois Bell switching office in 1988 caused disruptions in telecommunications and Air Traffic Control at both Midway and O Hare airports in Chicago. Although that network had been designed to be redundant, it was not resilient. This work focuses on the search for the elusive rare but important network events. The word rare is the reason that the problem is not trivial. However, the word important provides us with information that can be used to make the problem easier to solve. Traditional approaches (like enumerating most probable events) may not find rare events. If one were to conduct an exhaustive search in a network that has N components (either links or nodes), there would be 2 N possible failure modes if This work is supported in part by NSF under Grant No. CNS and by Federal Aviation Administration under Cooperative Agreement No. 11-G Cory Beard 2, Deep Medhi 1 Computer Science Electrical Engineering University of Missouri-Kansas City Kansas City, Missouri USA beardc@umkc.edu, dmedhi@umkc.edu each component has two modes (active and failed). In large networks, it is not tractable to evaluate 2 N states. Using simulation has the same type of problems. Because of the stochastic nature of random number generation, a simulation may not find the rare event without additional information. This paper presents the Self-Pruning Network State Generation algorithm, which is a resilient network evaluation method that uses characteristics of the network, network demands, and potential failure modes to search the network state space and find all failure modes within the constraints defined for the network. This approach provides insight to the problem of finding rare but important network events before they occur. With specific network requirements (like maximum hop count or maximum geographic radius of failures), a network evaluation on a 39 node network was performed by evaluating approximately 90,000 events as opposed to an exhaustive search requiring 5.5 x events. A network resiliency metric is also presented that evaluates resilience by focusing on impact rather than services lost. Advantages of this method are that they can be used with nodes or links (or both), they can be used in multilayer networks as long as a network measure can be tied to failure modes, and multiple network measures can be used to evaluate networks. The following observations inspired this work: Stochastically (and practically) speaking, all possible failure modes are not possible. They will be bounded by probability, geographic event, or other network characteristics. A mission critical network is typically considered functional with a smaller set of its services in an emergency situation, shedding less important traffic temporarily. Mission critical networks typically do not have highly connected uniform topologies (frequently for cost reasons). It is more likely, that they are sparsely connected groups of highly connected nodes. These observations enable us to make assumptions that allow analyses that are not possible otherwise. The rest of the paper is organized as follows. First we will take a look at related network state enumeration methods. Next, we look at a network resiliency metric followed by the network state generation approach. Finally, we demonstrate the approach on

2 a large U.S. reference test network and analyze some of the findings. II. OVERVIEW OF RESILIENT NETWORKS Performability is one of the metrics used to evaluate mission critical networks. From Medhi [1], performability uses the probability of network events and the network performance associated with that event to calculate an average network performance. This is shown in (1), where S i is the system state, X[S i ] is the network measure at state S i, and Pr[S i ] is the probability of network state S i. N is the number of network elements. The problem with this approach is that if X[S i ] is linear, high probability events tend to dominate performability and thus the design of the network. With mission critical networks, we are primarily interested in survivability and resilience rather than performability alone. We explore the concept of inversely relating network impact to network measure.! P =!!!! Pr S! Χ S! (1) Colbourn [5][6] defined network resiliency as the expected number of communicating pairs in a network. While this definition gives the possibility that a network will be able to meet its service requirements without taking into account the actual requirements, it is not sufficient. The definition that Sterbenz [8] uses relates the ability of the network to provide an acceptable level of service during network challenges, which can be simple faults to widespread events. Using this definition, we can construct a method to search a network for events that cause the network to not be able to provide an acceptable level of service. There are several surveys of network resiliency and network state space enumeration for purposes of calculating resiliency, availability, reliability and a variety of other metrics. Colbourn, Ball, and Provan [4][5] summarized several methods of state space enumeration, including exact computation, Monte Carlo methods, and a discussion of most relevant state methods. Cholda et al. [9] survey methods of providing resiliency, focusing on approaches related to resiliency differentiation. Our work bridges the gap between the types of work in these surveys, as we use differentiation of service to reduce the network state space. Network state space enumeration have been addressed in [4][10][11][12]. Li and Sylvester [2] was one of the first to propose using most probable state algorithms to calculate bounds for network reliability. Others that order network states based on most probable states (including multimode states) include [13][15][16]. Dotson and Gobien [14] calculate 2- terminal reliability by generating new states based on De Morgan s law. This allows network state pruning to be used when the 2-terminal test fails. If the probability of failure of each component is equal, the network states are generated in order of decreasing probability. We use a variation of this method to generate states in our work. Gardner, Beard, and Medhi [17][18] also use De Morgan s Law to compute geographically correlated vulnerabilities in networks. Related work includes papers that enumerate states based on the importance of the state instead of the probability of the state. Jarvis and Shier [15] improved the concept of ordering network states based on probability to include link capacity. They were able to generate states in order of non-increasing unmet demand. Colbourn and Farley [7] presented several metrics to represent reliability and resilience. These were all based loosely on the concept of the expected value of a metric given network state probabilities (1). These metrics generally were related to node connectivity. In 2009, Heegaard and Trivedi [3] extended the idea by using continuous time Markov chains (CTMC) to create performance models representing various failure modes. The concern with both of these models is that they are not flexible from a network measure perspective, being limited to the types of network measures that can be employed. To our knowledge, an approach to find rare but important states in a network has not been proposed except where the approach was specific to the network measure. Our contribution is a tractable method to find those important states for a subset of large complex network with multiple network measures. A metric to evaluate these networks for resiliency is also proposed. III. NETWORK RESILIENCE METRIC If an individual node is failed, we refer to that node as down and if the node if functioning, we refer to it as up. From (1), the network measure X[S i ] is related to the ability of the network to perform its function. Typically X[S i ] ranges from 0.0 (failed) to 1.0 (fully functioning). To see the impact we define Y[S i ] as shown in (2). A small delta (ε) is used to provide a maximum impact if X[S i ] is zero. S 0 represents the all nodes up state. α is an exponential scaling factor that can be used to adjust the shape of the impact curve. A higher value of α is required for networks that have only very rare events that cause high impact. Network resilience (R) can then be defined as shown in (3) where N is the number of network elements. Since high values of α may cause large values of R, we can normalize R using the network in a baseline or reference mode. The R found using the reference network (with Γ = 1) is used as the normalization constant (Γ) for topology changes to the reference network. R is then 1.0 for the reference network. Resiliency improvements to the reference network decrease R while degradation to the resilience increases R. Y S! = Illustration 0 i = 0 (no failures) 1 X S! + ε i > 0 R = Pr S! Y S! Γ (2) (!!!!)!!! (3) To illustrate this definition of network resilience, we define X[S i ] as the percentage of services functioning under failure state S i where Pr[S i ] is shown in (4). p is the probability of a node down and q=1.0-p. k i is the number of nodes down independently in state S i.

3 Fig. 1. R versus Average Node Degree (10 node network) Pr S! = p!!q (!!!!) (4) A random 10 node network with increasing connectivity is used for this illustration. The demands were simple connectivity from every node to every other node. The probability of a node down is defined as p = ε is defined as Fig. 1 shows R versus average node degree (indicating network density). If α is small, Pr[S i ] may dominate R (and not Y[S i ]). If α is large, the high impact states will have a larger impact on R helping to differentiate between more resilient networks. If we have a high density network, the probability of a failure that causes high impact is very small. The impact Y[S i ] must be large to be significant. This can be seen in Fig. 1. When the nodal degree increases from 6.0 to 6.8, the change in R becomes small even when α is 2.0. With α set to 8.0, the improvement in resiliency is noticeable. The exponential impact of α enables very small likelihood events to be significant. IV. NETWORK STATE GENERATION In order to understand the network state enumeration problem, we start with the definition of a network state. Definition 1. Network State. We define a network state S m as [s 1 s 2 s N ] where s i is 1 if the network component i is up and s i is 0 if the network component is down. Enumerating all network states without repetition, this creates 2 N unique network states. We further define S 0 = [1 1 1] in the case where all components are up. We assume ordering of the states is based on the number of 0 components and then lexicographic ordering. Another common way to express s i is s! if the component is failed and s i if it is up. Fig. 2 shows the lexicographic network state ordering for a 5 element network. With one network component down there are N states. With two simultaneous network components down, there are N(N-1)/2 network states, which is the number of combinations Fig. 2. Lexicographic Network State Ordering Fig. 3. Number of Network States versus Simultaneous Nodes Down in 39 Node Network of N components selected k at a time where k is the number of down components. The general equation is shown in (5). Fig. 3 shows the number of network states for a 39 node network versus the number of simultaneous components down. This is the reason many analysis techniques only look for a finite number of simultaneous nodes down. If the components have equal probability of failure, ordering the states by most probable to least probable is equivalent to starting from the left and working to the right as network states grow. Network States = N k =!!!!!!!! For example, in a 39 node network the total number of states is 2 N = 5.50 x network states. However, there are several ways to reduce the number of states. Using 1, 2, or 3 simultaneous components down, we have a total of 9919 network states to consider. In a geographic example, consider the case that at most 8 nodes could be affected simultaneously by a geographic event. There would be a maximum of 39 x 2 8 = 9984 network states that need to be evaluated. To take advantage of these improvements, we need an approach to evaluate only the network states related to both our network measure and node down possibilities which leads us to the definition of a relevant state. Definition: Relevant State. We define a relevant state as a network state that is considered a feasible network state and fails the established network measure. A. Self-Pruning Network State Generation To develop a more efficient approach to enumerate the relevant states possible with a given network, we make the following assumptions: Assumption 1 If a network state with node k down S i = [1 0 k 1] causes the network to be non-functional, X(S i ) < failed threshold (f ), then any S j that contains node k down will cause X(S j ) X(S i ). Therefore, S j does not need to be examined. This can be extended to any network state that contains all of the same nodes down as a non-functional state. Assumption 2 It is possible that if a node is not used in a solution for a demand in a large network, that node will not be used for that demand during a failure condition (even with rerouting). We see this with networks with only one connection between clusters of nodes and a demand that resides within one cluster. (5)

4 N C New_Nodes S i B i Q W X[S i] F TABLE I. NOTATION Number of Network Components Set of active nodes Set of nodes used in solution not contained in C. Network state i Base state used to create S i Event List of network states/base states to be analyzed New State List to be added to Q Network Measure Network Measure threshold As discussed in Section II, Dotson used De Morgan s Law (6) to reduce the search space necessary to calculate reliability [14]. We use a similar approach to create a state generation algorithm. if P = then P = (6) We first test the state S 0 = [ ]. If it is successful (which it should be), the nodes used in the solution are now the set of active nodes C. Considering only the nodes in C, we add the complement of S 0 to a list to test for both feasibility and if that state contains a previously failed state. This would include S 1 = [ ], S 2 =[ ], etc (if nodes 1, 2, are in C). We note the exact complement does not always specify the state of all network nodes. For example, {1 2} refers to [ ]. Even though the network state is filled with up nodes, we remember the original base that created the state. This is to allow us to capture all combinations given the base. Use of De Morgan s law allows the current state to generate the next level of states to be tested. Pruning of network states occurs during network state generation and addition to the event list. After state S 0 is tested and new network states are generated, the new states are tested for feasibility. Examples of the feasibility check include the maximum number of simultaneous down nodes that are possible or that all simultaneous down nodes must be related geographically. Then the new states are checked to confirm that the down nodes in previously failed states are not contained in the new state (also making it a failed state). The remaining new states are then added to the Event List. As the algorithm progresses, if new nodes (not in C) are used as the solution. The new nodes are added to C and the state is reset to S 0 (which starts the iteration again). The algorithm stops when the event list is empty and no new states are waiting to be added. The progression of the algorithm examines single node failures before simultaneous double node failures and double node failures before simultaneous triple node failures. Algorithm 1 provides a technical description of the Self-Pruning Network Event Generation algorithm. B. Network State Generation Analysis In the following two theorems, we show that the algorithm enumerates all relevant states. For this, we introduce the following definition: Definition: Network Space Classification. We define the network space classification as a representation of all network states as Non-Feasible, Success, and Failed such that: Algorithm 1 Self-Pruning Network State Generation C {} Node_set {} S 0 = [1 1 1] B 0 = {} Q <S 0, B 0 > while (Q {}) do while (Q {} New_Nodes = 0) do <S i, B i > Q 1 Q i Q i+1 if X[S i ] > f then if C X[S i ]{nodes_used} if S 1..k = Complement of B i then for i = 1:length{C-B i } do if S i feasible 1 then W W+<S i, B i > else Success Success + S i else New_Nodes = 1 C C U {nodes_used} S 0 = [1 1 1] B 0 = {} Q <S 0, B 0 > else Failed Failed + S i if (New_Nodes = 0) then while (W {}) do <S i, B i > W 1 W i W i+1 InFail = 0 for j = 1:size(Failed) do if (Failed j S i ) then InFail = 1 if InFail = 0 then Q Q + <S i, B i > for i=1:size(failed) do R = R + (Pr[Failed i ]*Y[Failed i ]) Notes: 1: feasible denotes the feasibility test. A Failed network state causes the network measure for the network at that state to be less than a preset threshold that defines minimum network function. X(Si) < f (Network Measure Threshold). A network state that contains the same down nodes (or components) as an already classified failed network state will itself fail and therefore its network space is also classified as Failed per Assumption 1. A network state that contains the same down nodes (or components) as an already classified Non-Feasible network state will itself be Non-Feasible (for the same reason that the first network state is Non-Feasible) and therefore its network space is classified as Non- Feasible.

5 A network space that is classified as Success is a single network state. Since that state can always suffer more nodes (components) down (except for the all nodes down network state), states that contain at least the same failed nodes (components) as a previously classified Success state cannot be assigned the same designation. In fact, the space must be divided further and analyzed. Theorem 1. Using Algorithm 1, the network space represented by the nodes in C, is classified as either 1) Non- Feasible, 2) Success, or 3) Failed. Proof: From De Morgan s Law, we know that S 0 = [1 1 1] and its complement {S 1 + S S M } where M is the number of nodes in C, represents the entire set of network states. S 0 is classified as Successful or Failed. If S 0 is Failed, the network with no nodes down is Failed. The complement would be failed also. If S 0 classified as Success, the remaining states that exist is the complement of S 0 also per De Morgan s law. S 1, S 2,, S M are analyzed next. Each state S i is classified as Non-Feasible, Failed, Success. Per Definition 1, if the state is classified as Non-Feasible or Failed no further analysis is necessary because any states generated by that state would contain the same failed nodes that earned the previous classification. If S i contains all of the down nodes that a previously Non-Feasible or Failed classified state contains, S i would not need to be classified since it is a part of the previously classified network space. If S i is classified as Success, and its complement does not exist, then no subset of S i that contains additional down nodes is possible. If S i is classified as Success and its complement does exist, its complement is added to the list to be analyzed. By induction, the entire network space is classified as Non-Feasible, Failed, or Success which concludes the proof. Theorem 2. Using Algorithm 1 and Theorem 1, the entire network space is classified as either 1) Non-Feasible, 2) Successful, or 3) Failed. Assumption 3: We assume that the network will effectively reroute around down network components to satisfy a network measure if that path exists among up components that allows it to do so. Proof: Since Algorithm 1 enumerates the network space associated with any set of nodes C and per Assumption 3, we know that the network will attempt to route around any down nodes (components) using any nodes if it is possible. Any nodes used for the solution that are not contained in C are added to C and the analysis is started over, therefore all nodes that would ever be needed to meet the requirements of the network measure are eventually included in C and enumerated for classification as Non-Feasible, Failed, or Success per Theorem 1. The only exception is if a network state is enumerated with a new set of nodes C that contain the same down nodes as a previously Non-Feasible or Failed classified state. Per definition, this state can also be classified as the previously classified state. This completes the proof. V. EXPERIMENTAL RESULTS The test network was chosen from [19] and is shown in Figure 4. Table 2 shows the nodes and US cities in which they Fig Node JANOS-US-CA Reference Network [19] are paired. For this set of experiments, we used two types of network measures. The first was simple connectivity between the demands shown in Table 3. The network measure was implemented using breadth first shortest path algorithms (BFS) to provision the demands in Table 3. If all 9 demands (or less if that was the test) were provisioned, then the network measure was successful. The second network measure was provisioning the demands listed in Table 3 across a capacitated network. All links in the network was assumed to be 200 MB/s TABLE II. JANOS-US-CA REFERENCE NETWORK NODES [19] Node City Node City Node City 1 Los 14 Houston 27 Philadelphia 2 New 15 Indianapolis 28 Portland 3 Atlanta 16 Kansas City 29 Sacramento 4 Boston 17 Las Vegas 30 St. Louis 5 Calgary 18 Memphis 31 Salt Lake City 6 Charlotte 19 Miami 32 San Diego 7 Chicago 20 Minneapolis 33 San Francisco 8 Cincinnati 21 Montreal 34 Seattle 9 Cleveland 22 Nashville 35 Tampa 10 Dallas 23 New Orleans 36 Toronto 11 Denver 24 Oklahoma City 37 Vancouver 12 Detroit 25 Phoenix 38 Washington 13 El Paso 26 Pittsburgh 39 Winnipeg TABLE III. JANOS-US-CA REFERENCE NETWORK NODES [19] Demand From To Bandwidth From City To City Node Node Required 1 1 Los Angeles 2 New York 50 MB/s 2 2 New York 34 Seattle 50 MB/s 3 2 New York 33 San Francisco 50 MB/s 4 2 New York 7 Chicago 50 MB/s 5 2 New York 3 Atlanta 50 MB/s 6 1 Los Angeles 3 Atlanta 50 MB/s 7 1 Los Angeles 33 San Francisco 50 MB/s 8 1 Los Angeles 7 Chicago 50 MB/s 9 1 Los Angeles 34 Seattle 50 MB/s TABLE IV. CONFIGURABLE SETTINGS Feasibility Type Possible Values Default Value Max Simultaneous Node Failures Geographically Correlated Distance miles 300 miles Network Measure Possible Values Default Value Demand Connectivity Demand Bandwidth 1-9 x 50 MB 9 x 50 MB Max Hops in Solution success threshold

6 (a) (b) (c) Fig. 5. Number of Demands vs. (a) Number of Events (b) Computation Time (c) Number of Failed States links. This was also implemented using BFS algorithm to look for the needed bandwidth. If paths with enough bandwidth were available for all required demands then the network measure was successful. Both network measures could be constrained to allow a maximum number of hops in the path. The network state feasibility checks that were used in these experiments include maximum number of simultaneous node failures or maximum distance failed nodes could be located from each other (geographically correlated failures). Table 4 shows default values for these checks and network measures. The algorithm was run using Octave [20] on a laptop computer with an Intel Core I7 processor (2.4 GHz). A. Test 1- Variable Number of Demands As we can see from Fig. 5(a)-(c), the following observations can be made. First, as the number of demands increased, the number of events processed decreased and reached a floor at approximately demand 5. The processing time decreased with the addition of demands 4 and 5 and then increased linearly. A similar decrease was noted in the number of failed states when demands 4 and 5 were added. Demands 4 and 5 were New York to Chicago and New York to Atlanta. Both of these demands have finite hop counts and generally regional routing. Since all demands are required to be considered a success (per the success_threshold = 0.90) the elimination of the Chicago node would have caused an immediate failure and thus Chicago could not have participated in any of the two node down scenarios that crossed the country. The algorithm would have pruned any failure modes that included the Chicago node, which is what occurred. To test this theory, the success_threshold was set to 0.75 (allowing for a couple of demands to not be met) to see the effect on the solutions generated. The computation time was 483 seconds and there were 90 failed network states. Since Chicago could now be down (and the network still be viable), network states that include Chicago were now included which increased the number of failed states. There also seems to be a point when the demands cover enough of the network that increases in the number of failed states and events processed cease. It is likely that this is related to the number of nodes being examined also stabilizing. When demand 5 was added, the number of nodes used grew to 37 (out of 39) and this did not change through demand 9. B. Test 2 Variable Maximum Hop Count in Solution Looking at Fig. 6(a)-(c), we noticed that as the maximum number of hops increased from 14 to 15, the computation time and number of failed states and total events decreased. This was not expected. The assumption was that if the maximum number of hops increased so would the number and complexity of solutions received. As we reviewed the failed states, we noticed that when the maximum number of hops was 14, nodes were included in failure states that were not included when the maximum was 15. An example was the failure state = [ ]. This combination was not included when the maximum was 15. This was because when the maximum hop count was increased but the maximum number of simultaneous failures (3) was unchanged, node 10 no longer was able to cause failures in the networks (reroutes become feasible). Additionally, looking at the number of events processed during the last iteration for max_hop = 14 and max_hop = 15 was similar (37780 vs ). However, the total number of (a) (b) (c) Fig. 6. Maximum Number of Hops in Solution vs. (a) Number of Events (b) Computation Time (c) Number of Failed States

7 (a) (b) (c) Fig. 7. Geographically Correlated Distance (miles) vs. (a) Number of Events (b) Computation Time (c) Number of Failed States events during the entire algorithm was vs This indicates that there was interaction as new nodes were added when max_hop = 14 that did not occur when max_hop = 15. C. Test 3 Variable Maximum Simultaneous Node Failures Of the tests that were conducted, the results from the variable maximum simultaneous node down tests were the most predictable ranging from 33 seconds with 2 down to 2729 seconds with 4 down. As more simultaneous nodes down are allowed, the number of possible network states grows by approximately factor of (N new maximum + 1)/(new maximum) per (5). D. Test 4 Geographically Correlated Failures The final set of tests that was conducted are related to the work previously done by Gardner, Beard, and Medhi [17][18]. It involves changing the feasibility criteria from a maximum hop count to a requirement that all down nodes are located within a given distance from one another. This type of analysis provides insight into the impact of a geographic event. Fig. 8 shows a graphical representation of the location of a geographic event that would disrupt a single demand between New York and Los Angeles. The shade indicates the diameter of the event required to disrupt the path. One important finding was that the simultaneous failure of the Cleveland and Detroit nodes (only about 92 m/148 km apart) does not sever a connection but does reduce the capacity of traffic leaving New York to 200 MB. This is not sufficient to support the 5 each 50 MB demands leaving New York. Since, there was no limitation on the number of simultaneous nodes down (other than geographic correlation), it was easy to see the size of geographic events needed to isolate a node. Fig. 7(a)-(c). show the number of events and computation time required for different geographic event diameters. As the diameter grows, the number of nodes that may be included in a geographic event grows which increases the number of events that would be considered in the resilience analysis to 2 M, where M is the maximum number of nodes in a geographic event diameter. Fig. 7(c). shows the number of failed network states associated with each geographic event diameter. The results were as expected. VI. SUMMARY A novel metric that uses the impact of the important events to determine network resiliency was presented and illustrated. It includes system impact into a metric that takes state probability into account. This metric can be used with nodes or links, with multilayer networks as long as a network measure can be tied to failure modes, and with multiple network measures. An approach was also presented to look for and evaluate rare but important network state. The ability of the Self Pruning Network State Generation Algorithm to enumerate relevant states was proven. Several tests were conducted to assess the computational power of the approach. These tests included varying the number of demands, varying the maximum hop count in the solution, varying the number of simultaneous failures, and varying the size of a geographically correlated network event. Both un-capacitated and capacitated networks were tested. With specific network requirements network evaluation was performed by evaluating approximately 90,000 events as opposed to an exhaustive search requiring 5.5 x events. The approach presented in this work focuses on the concept that the network state space can be pruned as it is generated in a number of ways. First, the feasibility of a given network state can provide a way to prune the network space. This can include simple feasibility checks like maximum number of simultaneous node failures or more complex feasibility checks like geographically correlated failures. The other way that a network state space can be pruned is during the calculation of Fig. 8. Impact caused by failures in specific geographic areas. Shade bar is in approximate miles. Shading indicates approximate size and location of event to disconnect Demand 1 (New York (2) to Los Angeles (1)). Lat-Long coordinates shown on map (eastern longitude shown).

8 the network measure. If a state fails a network measure, a future state that contains the same failed nodes would also fail. In addition, filters related to the network measure or the solution can be used. An example is a maximum hop count in the solution or a maximum end-to-end delay. The advantage of this approach is the ability to use various network measure and various network state feasibility checks. The disadvantage is that even with these efficiencies, there are still conditions related to topology, state feasibility, and network measure that prevent the network analysis from being tractable. This work attempts to give insight into understanding the complexity of a particular network and network measure. Network state space reduction using methods described here seems to work well for large networks with some or all of the following attributes: Sparsely connected networks (or sparsely connected groups of highly connected nodes). Network resilience measure that does not utilize a large percentage of the total number of nodes. Fulfilling the critical demand may not require the network nodes in extremely remote area of the network and therefore may not be needed in the analysis. Networks that can bound the types of failures that may occur. For example, we may not need to consider more than a certain number of simultaneous nodes down or more than a certain number of simultaneous nodes down that are not geographically correlated. Future work includes further development on the network state generation algorithm to more efficiently search certain types of topologies and use more complex network measures including multi-layer network measures. An example would be the performance of mission critical service oriented architectures. More work is planned on the network resiliency metric including additional testing on various networks and topologies. Specifically, more work is needed to learn how to calculate the metric when a complete network state probability distribution or complete network measure is not available. REFERENCES [1] D. Medhi, Network Reliability and Fault-Tolerance, in Wiley Encyclopedia of Electrical and Electronics Engineering [2] V. Li and J. Silvester. "Performance analysis of networks with unreliable components." IEEE Trans. Commun.,vol. 32, pp , [3] P.E. Heegaard and K. S. Trivedi, Network survivability modeling, Computer Networks, Vol. 53, pp , [4] C.J. Colbourn. "Reliability issues in telecommunications network planning", in Telecommunications Network Planning, P. Soriano and B. Sanso, Eds. Kluwer Academic Publishers, pp , [5] M.O. Ball, C.J. Colbourn, and J.S. Provan. Network Reliability, Handbooks in Operations Research and Management Science, pp Elsevier Science, [6] C.J. Colbourn, Network resilience. SIAM Journal on Matrix Analysis and Applications, 8(3), 404-6, [7] T. Farley, and C.J. Colbourn, "Multiterminal measures for network reliability and resilience." Proc. Of DRCN [8] J. Sterbenz, et al. "Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines." Computer Networks, vol. 54, pp , [9] P. Cholda, A. Mykkeltveit, B.E. Helvik, O.J.Wittner, and A. Jajszczyk, "A survey of resilience differentiation frameworks in communication networks," IEEE Commun. Surveys & Tutorials, vol. 9, no. 4, pp , [10] Y. Lam, and V. Li. "Reliability modeling and analysis of communication networks with dependent failures." IEEE Trans. Commun., vol. 34, pp , [11] M. Veeraraghavan and K. S. Trivedi. "An improved algorithm for symbolic reliability analysis." IEEE Trans. Reliab., vol. 40, pp , [12] M. Ball "Computational Complexity of Network Reliability Analysis: An Overview." IEEE Trans. Reliab., Vol. 35, pp , [13] T. Gomes, J. Craveirinha, and L. Martins. An efficient algorithm for sequential generation of failures in a network with multi-mode components. Reliability Engineering & System Safety, Vol. 77, pp , [14] W.P. Dotson, J.O. Gobien, "A new Analysis Technique for Probabilistic Graphs", IEEE Trans. Circuits Syst., Vol. 26, No. 10, pp , October [15] J.P. Jarvis and D. R. Shier. "An improved algorithm for approximating the performance of stochastic flow networks." INFORMS Journal on Computing, vol. 8, pp , [16] C.L. Yang and P. Kubat. Efficient computation of most probable states for communication networks with multimode components. IEEE Trans. Commun., vol. 37, pp , [17] M.T. Gardner and C. Beard, "Evaluating geographic vulnerabilities in networks," Proc IEEE Int. Workshop on Communications Quality and Reliability (CQR), [18] M. T. Gardner, C. Beard, and D. Medhi,, "Avoiding high impacts of geospatial events in mission critical and emergency networks using linear and swarm optimization," Proc IEEE Int. Multi- Disciplinary Conf. Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), New Orleans, LA, 2012, [19] S. Orlowski, R. Wessaly, M. Pioro, and A. Tomaszewski SNDlib 1.0 Survivable Network Design Library. Networks. 55, 3 (May 2010), , Wiley. [20] J.W. Eaton, Gnu Octave Manual. Network Theory Ltd. (2002).

Determining Geographic Vulnerabilities Using a Novel Impact Based Resilience Metric

Determining Geographic Vulnerabilities Using a Novel Impact Based Resilience Metric J Netw Syst Manage (2016) 24:711 745 DOI 10.1007/s10922-016-9383-y Determining Geographic Vulnerabilities Using a Novel Impact Based Resilience Metric M. Todd Gardner 1,2 Rebecca May 1 Cory Beard 1 Deep

More information

Modeling Internet Application Traffic for Network Planning and Provisioning. Takafumi Chujo Fujistu Laboratories of America, Inc.

Modeling Internet Application Traffic for Network Planning and Provisioning. Takafumi Chujo Fujistu Laboratories of America, Inc. Modeling Internet Application Traffic for Network Planning and Provisioning Takafumi Chujo Fujistu Laboratories of America, Inc. Traffic mix on converged IP networks IP TRAFFIC MIX - P2P SCENARIO IP TRAFFIC

More information

SBC Investor Update. Merrill Lynch Global Communications Investor Conference March 16, 2004

SBC Investor Update. Merrill Lynch Global Communications Investor Conference March 16, 2004 SBC Investor Update Merrill Lynch Global Communications Investor Conference March 16, 2004 Randall Stephenson Senior Executive Vice President and Chief Financial Officer Cautionary Language Concerning

More information

Free or Reduced Air from Select Gateways for 1st & 2nd guest on reservation

Free or Reduced Air from Select Gateways for 1st & 2nd guest on reservation UPDATED AS OF OCTOBER 9, 2018 Free or Reduced Air from Select Gateways for 1st & 2nd guest on reservation Booking Window: 10/3/18-10/31/18 11:59pm EST Offer Valid on Select Sailings & Categories See Terms

More information

Review of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107

Review of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107 Review of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107 On December 1 st, Councilmember Head introduced Ordinance #32,107, a 22 page ordinance

More information

Increase uptime with a faster, more reliable, connection

Increase uptime with a faster, more reliable, connection FIXED WIRELESS SELLING GUIDE Key takeaways It s survivable: you ll see improved uptime and redundancy Increase uptime with a faster, more reliable, connection It s cost-efficient: you can specify, and

More information

Best Practices in Deploying Skype for Business Voice and Video for Office 365

Best Practices in Deploying Skype for Business Voice and Video for Office 365 Best Practices in Deploying Skype for Business Voice and Video for Office 365 Laura Marx Sr. Dir., Microsoft Marketing, Polycom Sherri Pipala Director Field Sales, Polycom Jose Mateo Microsoft Solution

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Benefits of Multi-Topology Routing during Geographically Correlated Failures

Benefits of Multi-Topology Routing during Geographically Correlated Failures Benefits of Multi-Topology Routing during Geographically Correlated Failures M. Todd Gardner a, Rebecca May a, Cory Beard a, Deep Medhi a,b, a University of Missouri Kansas City, Kansas City, MO, USA b

More information

Installation Instructions

Installation Instructions Please read all instructions before installing SPECIFICATIONS Voltage... 120VAC, 60Hz Load (Single Pole) @120VAC...0-800W tungsten or ballast, 1/6HP Environment... Indoor Use Only Operating Temperature...32

More information

Q THE NIELSEN LOCAL WATCH REPORT THE EVOLVING OVER-THE-AIR HOME. Copyright 2019 The Nielsen Company (US), LLC. All Rights Reserved.

Q THE NIELSEN LOCAL WATCH REPORT THE EVOLVING OVER-THE-AIR HOME. Copyright 2019 The Nielsen Company (US), LLC. All Rights Reserved. Q2 2018 THE NIELSEN LOCAL WATCH REPORT THE EVOLVING OVER-THE-AIR HOME INTRODUCTION JUSTIN LAPORTE VP, LOCAL INSIGHTS Do you remember your first TV? If it had rabbit ears, a channel dial, access to only

More information

CenturyLink Satellite and Teleport Services

CenturyLink Satellite and Teleport Services CenturyLink Satellite and Teleport Services GREAT VIDEO DOESN T ALWAYS COME FROM THE STUDIO OR THE STADIUM. Capturing content from the real world and delivering it to your global audience takes a provider

More information

Municipal Networks. Don Berryman. Executive Vice President & President, Municipal Networks

Municipal Networks. Don Berryman. Executive Vice President & President, Municipal Networks Municipal Networks Don Berryman Executive Vice President & President, Municipal Networks 1 Executive Summary EarthLink is the leader in this fast growing market Most feasible last mile technology Product

More information

IBM ServicePac Warranty Service Upgrade (WSU)

IBM ServicePac Warranty Service Upgrade (WSU) IBM Maintenance Services ServicePac for Warranty and Maintenance Options IBM ServicePac Warranty Service Upgrade (WSU) Supported Products January 24, 2012 IBM ServicePac Warranty Service Upgrade Post-warranty

More information

Inclusion of Aleatory and Epistemic Uncertainty in Design Optimization

Inclusion of Aleatory and Epistemic Uncertainty in Design Optimization 10 th World Congress on Structural and Multidisciplinary Optimization May 19-24, 2013, Orlando, Florida, USA Inclusion of Aleatory and Epistemic Uncertainty in Design Optimization Sirisha Rangavajhala

More information

Department of Homeland Security Customs and Border Protection. Center of Excellence and Expertise

Department of Homeland Security Customs and Border Protection. Center of Excellence and Expertise Department of Homeland Security Customs and Border Protection Centers Pharmaceuticals, of Excellence Health and and Chemicals Expertise Center of Excellence and Expertise 1 2 What are Centers of Excellence

More information

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori The Computer Journal, 46(6, c British Computer Society 2003; all rights reserved Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes Tori KEQIN LI Department of Computer Science,

More information

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Weapons of Mass Destruction Directorate Federal Bureau of Investigation

Weapons of Mass Destruction Directorate Federal Bureau of Investigation Methodologies to address a WMD threat 6th Annual International Symposium Biosecurity and Biosafety: future trends and solutions Milan, Italy 4-6 November 2015 Weapons of Mass Destruction Directorate Federal

More information

Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express

Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express SOLUTION WHITE PAPER Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express www.earthlink.com November 2015 Private connections

More information

One Planet. One Network. Infinite Possibilities.

One Planet. One Network. Infinite Possibilities. One Planet. One Network. Infinite Possibilities. IPv6 in the Global Crossing IP Network May 26, 2005 Ed Bursk, Vice President Government Global Crossing Overview Global Crossing was founded seven years

More information

CRIME AND MURDER IN 2018: A Preliminary Analysis (Updated) Ames C. Grawert, Adureh Onyekwere, and Cameron Kimble

CRIME AND MURDER IN 2018: A Preliminary Analysis (Updated) Ames C. Grawert, Adureh Onyekwere, and Cameron Kimble CRIME AND MURDER IN 2018: A Preliminary Analysis (Updated) Ames C. Grawert, Adureh Onyekwere, and Cameron Kimble This analysis updates the Brennan Center s September 20, 2018, report, Crime in 2018: A

More information

Construction/Destruction Monte Carlo to Estimate the Number of Path-sets for the Reliability Measure of a Network with Diameter Constraints

Construction/Destruction Monte Carlo to Estimate the Number of Path-sets for the Reliability Measure of a Network with Diameter Constraints Int'l Conf. Scientific Computing CSC'17 57 Construction/Destruction Monte Carlo to Estimate the Number of Path-sets for the Reliability Measure of a Network with Diameter Constraints I. B. Gertsbakh 1,

More information

The Value of Content at the Edge

The Value of Content at the Edge The Value of Content at the Edge Executive Summary The way we use the Internet has changed, and the result has been exploding traffic growth that is projected to increase at a 30 to 50 percent compound

More information

IU Alumni Association Membership Statistics

IU Alumni Association Membership Statistics IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Jun-2018 Annual 11,213 8,754 Auto-Renewal 733 1,614 Life 44,597 45,355 June 30 - Fiscal Year 2018 Year To Date vs. Fiscal

More information

IU Alumni Association Membership Statistics

IU Alumni Association Membership Statistics IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Mar-2018 Annual 11,213 9,517 Auto-Renewal 733 1,466 Life 44,597 45,145 Total 56,543 56,128 70,000 65,000 60,000 55,000

More information

Upgrading Traffic Signals to Enable a Connected Vehicle Test Bed Somerville, Massachusetts

Upgrading Traffic Signals to Enable a Connected Vehicle Test Bed Somerville, Massachusetts Upgrading Traffic Signals to Enable a Connected Vehicle Test Bed Somerville, Massachusetts Presented in The 2018 ITE Northeastern District Meeting in Lake George, NY May 22 nd, 2018 ORGANIZATION OF THE

More information

Real Time Monitoring of

Real Time Monitoring of Real Time Monitoring of Cascading Events Mladen Kezunovic Nan Zhang, Hongbiao Song Texas A&M University Tele-Seminar, March 28, 2006 Project Reports (S-19) M. Kezunovic, H. Song and N. Zhang, Detection,

More information

Atron Service Level Agreement

Atron Service Level Agreement Atron Solutions LLC. Service Level Agreement (SLA) I. Overview This SLA will be governed by Atron standard Master Service Agreement (MSA). The MSA is posted under the Terms and Conditions link at www.atronsolutions.com/msa.pdf.

More information

Modeling with Uncertainty Interval Computations Using Fuzzy Sets

Modeling with Uncertainty Interval Computations Using Fuzzy Sets Modeling with Uncertainty Interval Computations Using Fuzzy Sets J. Honda, R. Tankelevich Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, CO, U.S.A. Abstract A new method

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Events Oracle Arena & McAfee Coliseum

Events Oracle Arena & McAfee Coliseum MARCH 2 Golden State vs. Portland Trail Blazers Oracle Arena 5-9 Disney on Ice-Princess Wishes Oracle Arena 12 Golden State vs. Toronto Raptors Oracle Arena 15 Golden State vs. Memphis Grizzlies McAfee

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

13 th ICCRTS: C2 for Complex Endeavors

13 th ICCRTS: C2 for Complex Endeavors GETS Survivability Analysis Topic(s): Networks and Networking Modeling and Simulation Civil-Military Endeavors Name of Authors: Denise M. Masi, Ph.D., Noblis Martin J. Fischer, Ph.D., Noblis David A. Garbin,

More information

Constraint Based Design of ATM

Constraint Based Design of ATM Constraint Based Design of ATM Networks, an Experimental Study Hongzhou Ma, Inderjeet Singh, Jonathan Turner wucs-97-15 April 97 Department of Computer Science Campus Box 1045 Washington University One

More information

Probabilistic Double-Distance Algorithm of Search after Static or Moving Target by Autonomous Mobile Agent

Probabilistic Double-Distance Algorithm of Search after Static or Moving Target by Autonomous Mobile Agent 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Probabilistic Double-Distance Algorithm of Search after Static or Moving Target by Autonomous Mobile Agent Eugene Kagan Dept.

More information

SEARCH AND DISPLAY ADVERTISING ACROSS MOBILE AND ONLINE YP SM. Local Ad Network

SEARCH AND DISPLAY ADVERTISING ACROSS MOBILE AND ONLINE YP SM. Local Ad Network The YP SM Digital Report is focused on uncovering trends across the rapidly evolving local advertising ecosystem. This Insights Report is based on internal data from over 561 million searches and over

More information

Regional 311 System Development Feasibility Study. Mike Parquette, Comprehensive Planning Manager MVPC Regional Planning Day June 20, 2013

Regional 311 System Development Feasibility Study. Mike Parquette, Comprehensive Planning Manager MVPC Regional Planning Day June 20, 2013 Regional 311 System Development Feasibility Study Mike Parquette, Comprehensive Planning Manager MVPC Regional Planning Day June 20, 2013 MVPC 311 Feasibility Assessment for Merrimack Valley Communities

More information

Adaptive Linear Programming Decoding of Polar Codes

Adaptive Linear Programming Decoding of Polar Codes Adaptive Linear Programming Decoding of Polar Codes Veeresh Taranalli and Paul H. Siegel University of California, San Diego, La Jolla, CA 92093, USA Email: {vtaranalli, psiegel}@ucsd.edu Abstract Polar

More information

Unit 9, Lesson 1: What Influences Temperature?

Unit 9, Lesson 1: What Influences Temperature? Unit 9, Lesson 1: What Influences Temperature? Let s see if we can predict the weather. 1.1: Temperature Changes What factors or variables can influence the outside temperature? Make a list of different

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

CONNECTING NETWORKS, CONNECTING PEOPLE

CONNECTING NETWORKS, CONNECTING PEOPLE SOLUTIONS PORTFOLIO CONNECTING NETWORKS, CONNECTING PEOPLE At PAETEC, we believe technology should bring people together. Whether you re connecting via copper, fiber, or wireless, it s all communications.

More information

Create Awesomeness: Use Custom Visualizations to Extend SAS Visual Analytics to Get the Results You Need

Create Awesomeness: Use Custom Visualizations to Extend SAS Visual Analytics to Get the Results You Need Paper SAS1800-2018 Create Awesomeness: Use Custom Visualizations to Extend SAS Visual Analytics to Get the Results You Need Robby Powell and Renato Luppi, SAS Institute Inc., Cary, NC ABSTRACT SAS Visual

More information

Growing the Vision for Safe Mobility: Vision Zero

Growing the Vision for Safe Mobility: Vision Zero Growing the Vision for Safe Mobility: Vision Zero Vision Zero Cities Bellevue Seattle A Vision Zero City meets the following minimum standards: - Sets clear goal of eliminating traffic fatalities and

More information

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,

More information

On Fault Tolerant Ad Hoc Network Design

On Fault Tolerant Ad Hoc Network Design On Fault Tolerant Ad Hoc Network Design Wassim El-Hajj College of Information Technology UAE University United Arab Emirates welhajj@uaeu.ac.ae Hazem Hajj Faculty of Engineering and Architecture American

More information

The Trade-off between Power Consumption and Latency in Computer Networks

The Trade-off between Power Consumption and Latency in Computer Networks The Trade-off between Power Consumption and Latency in Computer Networks M. Herlich and H. Karl {matthias.herlich,holger.karl}@uni-paderborn.de Universität Paderborn, Fachgebiet Rechnernetze, EIM-I Pohlweg

More information

Data Center Cooling An Owner s Perspective. 11 February 2016

Data Center Cooling An Owner s Perspective. 11 February 2016 Data Center Cooling An Owner s Perspective 11 February 2016 Data Center Cooling An Owner s Perspective 1 Who Is Digital Realty? Overview of world s largest data center REIT 2 Data Center Cooling Goals

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Design Methodologies and Algorithms for Survivable C-RAN

Design Methodologies and Algorithms for Survivable C-RAN 16 Regular papers ONDM 218 Design Methodologies and Algorithms for Survivable C-RAN Bahare M. Khorsandi, Federico Tonini, Carla Raffaelli DEI, University of Bologna Viale Risorgimento 2, 4136 Bologna,

More information

Routing in Overlay Multicast Networks

Routing in Overlay Multicast Networks Routing in Overlay Multicast Networks Sherlia Y. Shi Jonathan S. Turner Department of Computer Science Washington University in St. Louis {sherlia, jst}@cs.wustl.edu Abstract Multicast services can be

More information

The Reliability, Efficiency and Treatment Quality of Centralized versus Decentralized Water Infrastructure 1

The Reliability, Efficiency and Treatment Quality of Centralized versus Decentralized Water Infrastructure 1 The Reliability, Efficiency and Treatment Quality of Centralized versus Decentralized Water Infrastructure 1 Dr Qilin Li, Associate Professor, Civil & Environmental Engineering, Rice University Dr. Leonardo

More information

Efficient Tuning of SVM Hyperparameters Using Radius/Margin Bound and Iterative Algorithms

Efficient Tuning of SVM Hyperparameters Using Radius/Margin Bound and Iterative Algorithms IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 13, NO. 5, SEPTEMBER 2002 1225 Efficient Tuning of SVM Hyperparameters Using Radius/Margin Bound and Iterative Algorithms S. Sathiya Keerthi Abstract This paper

More information

WiMAX Brought to You By Intel, Sprint & Clearwire

WiMAX Brought to You By Intel, Sprint & Clearwire WiMAX Brought to You By Intel, Sprint & Clearwire Sriram Viswanathan Vice President, Intel Capital General Manager, WiMAX Program Office Growing WiMAX Momentum Toshiba sees WiMAX as an important technology

More information

Routing in Overlay Multicast Networks

Routing in Overlay Multicast Networks Routing in Overlay Multicast Networks Sherlia Y. Shi Jonathan S. Turner Department of Computer Science Washington University in St. Louis {sherlia, jst}@cs.wustl.edu Abstract Multicast services can be

More information

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS An Undergraduate Research Scholars Thesis by DENISE IRVIN Submitted to the Undergraduate Research Scholars program at Texas

More information

Analytic Performance Models for Bounded Queueing Systems

Analytic Performance Models for Bounded Queueing Systems Analytic Performance Models for Bounded Queueing Systems Praveen Krishnamurthy Roger D. Chamberlain Praveen Krishnamurthy and Roger D. Chamberlain, Analytic Performance Models for Bounded Queueing Systems,

More information

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

Dallas Police Department Proposed FY 2007/08 Budget. Budget Briefing August 27, 2007

Dallas Police Department Proposed FY 2007/08 Budget. Budget Briefing August 27, 2007 Dallas Police Department Proposed FY 2007/08 Budget Budget Briefing August 27, 2007 Presentation Topics Challenges Background/History Plans to address challenges and continue progress 2 Departmental Challenges

More information

NLR Update: Backbone Upgrade Joint Techs July 2008

NLR Update: Backbone Upgrade Joint Techs July 2008 NLR Update: Backbone Upgrade Joint Techs July 2008 Dave Reese 1 National LambdaRail Infrastructure 2006 2004 National LambdaRail, Inc. 2 NLR Backbone Upgrade Upgrade Phase 1 portion of NLR backbone Jacksonville

More information

A Tool for Supporting Regional Optical Networks

A Tool for Supporting Regional Optical Networks A Tool for Supporting Regional Optical Networks Steve Corbató Network Infrastructure Internet2 Quilt Fiber Project Session Internet2 Member Meeting Washington DC 21 April 2004 Underlying hypothesis The

More information

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Ahmad Ali Abin, Mehran Fotouhi, Shohreh Kasaei, Senior Member, IEEE Sharif University of Technology, Tehran, Iran abin@ce.sharif.edu,

More information

Using Decision Boundary to Analyze Classifiers

Using Decision Boundary to Analyze Classifiers Using Decision Boundary to Analyze Classifiers Zhiyong Yan Congfu Xu College of Computer Science, Zhejiang University, Hangzhou, China yanzhiyong@zju.edu.cn Abstract In this paper we propose to use decision

More information

Absolute QoS Differentiation in Optical Burst-Switched Networks

Absolute QoS Differentiation in Optical Burst-Switched Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1781 Absolute QoS Differentiation in Optical Burst-Switched Networks Qiong Zhang, Student Member, IEEE, Vinod M. Vokkarane,

More information

On Pairwise Connectivity of Wireless Multihop Networks

On Pairwise Connectivity of Wireless Multihop Networks On Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun, shayman}@eng.umd.edu

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

arxiv: v5 [cs.dm] 9 May 2016

arxiv: v5 [cs.dm] 9 May 2016 Tree spanners of bounded degree graphs Ioannis Papoutsakis Kastelli Pediados, Heraklion, Crete, reece, 700 06 October 21, 2018 arxiv:1503.06822v5 [cs.dm] 9 May 2016 Abstract A tree t-spanner of a graph

More information

Noise-based Feature Perturbation as a Selection Method for Microarray Data

Noise-based Feature Perturbation as a Selection Method for Microarray Data Noise-based Feature Perturbation as a Selection Method for Microarray Data Li Chen 1, Dmitry B. Goldgof 1, Lawrence O. Hall 1, and Steven A. Eschrich 2 1 Department of Computer Science and Engineering

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Bit Allocation for Spatial Scalability in H.264/SVC

Bit Allocation for Spatial Scalability in H.264/SVC Bit Allocation for Spatial Scalability in H.264/SVC Jiaying Liu 1, Yongjin Cho 2, Zongming Guo 3, C.-C. Jay Kuo 4 Institute of Computer Science and Technology, Peking University, Beijing, P.R. China 100871

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Asset Purchase & Accompanying Lease

Asset Purchase & Accompanying Lease Miami, FL Available Now Tampa, FL Available Now Orlando, FL Available Now San Antonio, TX Complete Producing Revenue Columbus, OH Complete Producing Revenue Denver, CO in Progress with Revenue Asset Purchase

More information

Scalable Selective Traffic Congestion Notification

Scalable Selective Traffic Congestion Notification Scalable Selective Traffic Congestion Notification Győző Gidófalvi Division of Geoinformatics Deptartment of Urban Planning and Environment KTH Royal Institution of Technology, Sweden gyozo@kth.se Outline

More information

Quality of Service Routing

Quality of Service Routing Quality of Service Routing KNOM Tutorial 2004, Jeju, Korea, Nov. 4-5, 2004. November 5, 2004 Kwang-Hui Lee Communication Systems Lab, Changwon National University khlee@changwon.ac.kr Contents Introduction

More information

STSM Report. December 24, Improving preparedness of networks to disaster based failures

STSM Report. December 24, Improving preparedness of networks to disaster based failures STSM Report December 24, 2016 1 STSM Title Improving preparedness of networks to disaster based failures 2 STSM Applicant Dr. Deepak Mehta, United Technologies Research Centre, Ireland. 3 Host Prof. Amaro

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes

More information

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology

More information

Identifying Layout Classes for Mathematical Symbols Using Layout Context

Identifying Layout Classes for Mathematical Symbols Using Layout Context Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi

More information

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( )

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( ) A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing (1970 1997) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233

More information

A Visualization Program for Subset Sum Instances

A Visualization Program for Subset Sum Instances A Visualization Program for Subset Sum Instances Thomas E. O Neil and Abhilasha Bhatia Computer Science Department University of North Dakota Grand Forks, ND 58202 oneil@cs.und.edu abhilasha.bhatia@my.und.edu

More information

v6 Health Metric with NOMA (guest-starring RIPE Atlas)

v6 Health Metric with NOMA (guest-starring RIPE Atlas) v6 Health Metric with NOMA (guest-starring RIPE Atlas) Network Operator Measurements Activity Leslie Daigle May 2017 http://www.techark.org/noma May 10, 2017. Summary NOMA (Some) Operators have instrumented

More information

A linear algebra processor using Monte Carlo methods

A linear algebra processor using Monte Carlo methods A linear algebra processor using Monte Carlo methods Conference or Workshop Item Accepted Version Plaks, T. P., Megson, G. M., Cadenas Medina, J. O. and Alexandrov, V. N. (2003) A linear algebra processor

More information

SIMULATION AND MONTE CARLO

SIMULATION AND MONTE CARLO JHU course no. 550.790, Modeling, Simulation, and Monte Carlo SIMULATION AND MONTE CARLO Some General Principles James C. Spall Johns Hopkins University Applied Physics Laboratory September 2004 Overview

More information

The National Organization of Black Law Enforcement Executives (NOBLE) Justice: Exploring Principles In Innovation For A More Equitable Future

The National Organization of Black Law Enforcement Executives (NOBLE) Justice: Exploring Principles In Innovation For A More Equitable Future The National Organization of Black Law Enforcement Executives (NOBLE) be Justice: Exploring Principles In Innovation For A More Equitable Future Partnership with NOBLE Table of Contents Executive Summary...Page

More information

10. Network dimensioning

10. Network dimensioning Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1 Contents Introduction Parameters: topology, routing and traffic Dimensioning

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Multipath Resilient Transport and Routing for the Future Internet

Multipath Resilient Transport and Routing for the Future Internet Multipath Resilient Transport and Routing for the Future Internet * 司徒傑莫 Джеймс Ф.Г. Штербэнз 송재윤 Yufei Cheng 成宇飞, Anh Nguyễn, Justin P. Rohrer, Egemen Çetinkaya *Department of Electrical Engineering &

More information

U.S. Department of Homeland Security Protective Security Coordination Division

U.S. Department of Homeland Security Protective Security Coordination Division U.S. Department of Homeland Security Protective Security Coordination Division Pete Owen, Protective Security Advisor Brief to CA-NV-AWWA March 31, 2010 Goal for this afternoon The National Infrastructure

More information

Advanced Attack Response and Mitigation

Advanced Attack Response and Mitigation Advanced Attack Response and Mitigation Agenda Overview of cloud DDoS detection and mitigation which features geographically diverse scrubbing and high velocity auto-mitigation capabilities. - Overview

More information

Analysis of a Reduced-Communication Diffusion LMS Algorithm

Analysis of a Reduced-Communication Diffusion LMS Algorithm Analysis of a Reduced-Communication Diffusion LMS Algorithm Reza Arablouei a (corresponding author), Stefan Werner b, Kutluyıl Doğançay a, and Yih-Fang Huang c a School of Engineering, University of South

More information