A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *

Size: px
Start display at page:

Download "A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *"

Transcription

1 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan, Ian pgoudazi@itc.ac.i Due to the polifeation of the divesity in use behavios and taffic demands, taffic engineeing mechanisms have become an inevitable task in data netwoks. Nowadays, most commonly used algoithm in end hosts is the popula TCP and its vaiants (such as MulTCP). These ae loss based schemes theefoe exhibit oscillatoy behavio which educes netwok pefomance. Moeove, since the pice fo all sessions is nomally based on the aggegate thoughput, losses that ae caused by TCP may affect othe sessions as well and aggessively educe thei thoughput and also have a dastic effect on the oveall thoughput/goodput of the netwok. In this pape a novel taffic engineeing mechanism in the fom of the selective picing is poposed in which diffeent pices ae imposed on the netwok esouces fo diffeent uses. The poposed mechanism not only educes the packet loss atio, but also inceases the goodput pefomance of the non-tcp elastic sessions such as Popotional o Minimum Potential Delay schemes. Stability popety of the algoithms ae investigated and some numeical analysis is pesented to validate the esults. Keywods: ate allocation, WRR, MulTCP, diffeentiated picing, active queue management 1. INTRODUCTION Rate contol is one of the impotant tasks of end hosts in avoiding congestion in data netwoks. The most pevalent algoithm implemented in opeating systems nowadays is vaiations of TCP. Impovement to this algoithm has long been of majo consideation by eseach goups and as a esult new impoved substitutions ae poposed, as we will discuss in the pape. But the compatibility of new algoithms with the conventional ones should be studied. It is shown that in the conventional envionments of usual Active Queue Management (AQM) used in intemediate nodes, the competition between the TCP and othe ate allocation methods would decease the oveall pefomance. Othe vaiants of TCP algoithm ae XCP [1], Fast TCP [2] and MulTCP [3]. Two diffeent methods exist fo accomplishing congestion contol in the data netwoks. One is window-based method in which the numbe of outstanding packets in the netwok is egulated by adjusting the size of a congestion window to a efeence value [4, 5]. In the ate-based method, we look at the netwok taffics as fluid flows and algoithms such as the Kelly s method ae used in ode to achieve some fainess citeia in ate allocation [6]. Thee ae diffeent fainess citeia such as max-min, popotional and minimum Received Apil 22, 2012; evised July 20 & August 18, 2012; accepted August 29, Communicated by Xiaohong Jiang. * This wok was suppoted by ITRC. 1115

2 1116 potential delay fainess [7]. Selecting a fainess citeion depends on the netwok s designe stategy. Fo example in the max-min citeion, the focus is on the uses with lowest ates wheeas in popotional citeion the objective is to maximize the sum of the logaithms of the use ates and penalize moe the uses who use long outes in the netwok. In minimum potential delay citeion, L. Massoulié et al. define a delay measue in tems of the use ates and ty to minimize that [7]. In this pape we assume that the netwok taffic can adapt itself to the netwok conditions. In othe wods, we use the tem elastic fo the taffic as it was intoduced by S. Shenke in [8] and used in the Kelly s pape [6]. Examples of such taffic type ae TCP taffic in the cuent Intenet and ABR taffic in the ATM netwoks. As it is known, lage netwoks such as the Intenet have been designed to be decentalized and depend on the well-defined behavio fom end-hosts. The inceasing complexity and size of these netwoks make centalized ate allocation impactical. Without a centalized contol, the netwok uses have a geat deal of feedom in shaing the available bandwih in the netwok. To achieve the flow contol, congestion avoidance and bandwih allocation, the eseaches have poposed diffeent ate allocation algoithms to be implemented at the end-hosts in a decentalized manne [9-12]. The most widely used flow contol/congestion avoidance mechanism in the cuent Intenet is TCP, which is a window-based mechanism. TCP, howeve, does not necessaily lead to a fai o efficient ate allocation of the available bandwih [4]. Kelly et al. have poposed an algoithm that esults in popotional fainess citeion and they used a Lyapunov function appoach fo stability analysis of thei ate allocation method [6]. Mo and Waland [4] have poposed and studied anothe fai window-based end-toend congestion contol mechanism, which is simila to TCP Vegas [13] but has a moe sophisticated window-updating ule. They have shown that the popotional fainess can be achieved by thei (, 1)-popotionally fai algoithm and max-min fainess can be achieved as a limit of (, )-popotionally fai 1 algoithm as goes to infinity. In [14], Shakkottai et al. examined how tansit and custome pices ae set in a netwok consisting of multiple Intenet Sevice Povides (ISPs). They show that some ISPs may be geogaphically co-located so that they compete fo the same set of end uses. The authos examined the existence of equilibium pice stategies in this situation and showed how positive pofit can be achieved using theat stategies. In [15], Hande et al. intoduce a famewok to quantify the pecise tade-off in the distibution of benefits among ISPs, content-povides, and end-uses. Thei poposed famewok genealizes the well-known utility maximization based ate allocation model, which has been extensively studied as an inteplay between the ISP and the end-uses, to incopoate picing of content-povides. They deived the esulting equilibium pices and data ates in diffeent ISP maket conditions. In [16] Hande et al. popose a distibuted ate allocation stategy which can be used fo inelastic (eal-time) flows. They conside non-concave utility functions, which tun utility maximization into difficult, nonconvex optimization poblems. Finally they pesent conditions unde which the standad pice-based distibuted algoithm can still convege to the globally optimal ate allocation despite nonconcavity of utility functions. 1 Heeafte, we assume that all (, )-popotionally fai flows ae descibed as non-tcp ones.

3 A STABLE TRAFFIC ENGINEERING TECHNIQUE IN NETWORKS 1117 Bui et al. [17] extend ecent esults on fai and stable esouce allocation in wieless netwoks to include multicast sessions, in paticula multi-ate multicast. Thei solution fo multi-ate multicast is based on scheduling vitual (shadow) taffic that moves in evese diection fom destinations to souces. The mentioned shadow scheduling algoithm can also be used to contol delays in wieless netwoks. Xue et al. [18] popose a new pice-based esouce allocation famewok in wieless ad hoc netwoks to achieve optimal esouce utilization and fainess among competing end-to-end flows. It is clea that fainess is a desiable featue of a ate allocation algoithm. Uses pefeences can be captued by appopiate utility functions. Due to the vaious equiements of diffeent applications, it is likely that the uses will have diffeent utility functions [8]. Fo example, suppose that a use is tansfeing a file. The pe-tansfe delay is invesely popotional to the ate it eceives. Hence, the delay might be modeled as the utility function of the use which is a function of its ate. This eveals this fact that although fainess is a desiable popety, fainess by itself may not be sufficient. A good ate allocation mechanism should not only be fai, but also should allocate the available bandwih in such a way that the oveall utility of the end-uses is maximized [19]. In the cuent wok, using a new diffeentiated picing scheme as an AQM algoithm fo intemediate nodes the oveall pefomance of non-tcp uses would be impoved. This impovement is in tems of the educed packet loss atio and incease goodput fo elastic sessions 2. By definition, goodput of a session is the effective pat of the thoughput o goss tansmitted packet ate of the session. Fo example, in the case of packet loss in TCP, some pats of the peviously tansmitted packets ae etansmitted and ae eceived by the eceive moe than once and so, ae edundant. The pesented wok is simila to [14, 15] in the fact that, it is shown that the mentioned picing stategy is stable and the netwok will each eventually to equilibium pices. The main contibution of the cuent wok and its diffeence with simila appoaches such as [14, 15] etc. is the fact that in the cuent wok, the picing is done pe-session (in contast to the aggegate picing in [14, 15] and simila woks) and the netwok opeato (ISP) can povide enhanced sevice levels fo an specific use based on an inceased pice level which is imposed on that use. The est of the pape is oganized as follows. In the Section 2, a mathematical fomulation the discete time vesions of MulTCP and (, )-fai models has been pesented. Then in section 3, the diffeentiated picing famewok would be intoduced and its stability popety would be investigated. Section 4 is devoted to the pefomance analysis of the poposed taffic engineeing technique and the pefomance of the poposed method has been investigated fo two diffeent taffic models. Finally, in the last Section, some concluding emaks have pesented and some eseach highlights fo the futue woks have descibed. 2. BACKGROUND In the following pats, two popula (, )-fai (non-tcp) and MulTCP models have been intoduced. 2 The cuent wok is an extended vesion of ou ealie pape A diffeentiated picing famewok fo impoving the pefomance of the elastic taffics in data ntwoks published in Intenational Jounal of Compute Engineeing and Technology, Vol. 1, Jan

4 (, )-Fai Model Conside a netwok with a set J of esouces o links and a set of uses and let C j denotes the finite capacity of link jj. Each use has a fixed oute R, which is a nonempty subset of J. When the allocated ate to the use is x, use eceives utility U (x ). The utility U (x ) is an inceasing, stictly concave and continuously diffeentiable function of x ove the ange x 0. Futhemoe, assume that the utilities ae additive so that the aggegate utility of ate allocation X = (x, ) is: U (x ). This is a easonable assumption since these utilities ae those of independent netwok uses. Finally, let the utility and capacity vectos to be U = (U (.), ) and C = (C j, jj) espectively. The Kelly s discete time algoithm fo eaching to the optimal solution of popotional-fai is as follows [6], x [ n 1] x k ω x μ j. (1) jr Whee {x} + max(0, x) and j [n] = p j ( x s). (2) s :jr s Paamete k contols the speed of convegence in Eq. (1). p j (y) is the amount that link j penalizes its aggegate taffic y, pice pe unit ate j [20], and is a non-negative, continuous inceasing function (see Fig. 1). Fig. 1. A sample penalty function. One of the intepetations is that using Eq. (1), the system ties to equalize with x [n]. μ j by adjusting x [n] [21]. jr In [6] it is shown that the unique, optimal and popotionally-fai equilibium point of Eqs. (1)-(2) is: ω x p ( x ),. (3) j s jr s:jrs It is necessay to mention that as Kelly et al. have discussed in [6], we may use the following fom of the link penalty function

5 A STABLE TRAFFIC ENGINEERING TECHNIQUE IN NETWORKS 1119 p j (y) = (y c j + ) + / 2, 0, jj. (4) Whee, c j is the capacity of jth link and > 0 is a small positive constant. Finally, we conside the moe geneal (, )-fai ate allocation algoithm (the Kelly s algoithm o popotional fainess is the special case with = 1 and the minimum potential delay fai algoithms is anothe special case with = 2). The discete time vesion of this algoithm would be [8] Whee x [ n1] { x[] n k ( ω ( x[]) n λ [])}. n (5) λ p j xs[ n] (6) jr sj is the aggegate pice. 2.2 MulTCP Model Anothe algoithm which we use in ou simulation is the geneal MulTCP model (which usual TCP is the special case with m = 1). The fluid flow model fo MulTCP is [7] d 2 m m x x ( t) ( t) 2 2 T T 2m. (7) Whee the is the aggegate pice, T is the ound tip time (RTT) of the flow and m is a natual numbe. The discete time vesion of Eq. (7) which will be used in pactical implementations would be 2 m m x x [ n 1] x 2 2 T T 2m. (8) In othe wods, as poposed by Cowcoft et al. in [3], MulTCP aims at popotional multiple flowshaes along a congested link by assigning a weight m to the aggegate. AIMD 3 (m; 1/(2m)) is used in MulTCP, instead of AIMD(1; 1/2) in the standad TCP, fo emulating the behavio of m concuent TCP connections using the same congestion window loop. The ationales behind AIMD(m; 1/(2m)) ae [22] Incease paamete a = m. The congestion window size of a single TCP flow is inceased by one packet pe RTT in the standad TCP. Accodingly, the congestion window size of m vitual TCP flows is inceased by m packets pe RTT in MulTCP. Decease paamete b = 1/(2m). If one packet is lost, only one of the m TCP flows halves its congestion window size W. Accodingly, the congestion window size becomes (m 1)W + W/2 = (1 1/(2m))mW in MulTCP. 3 Additive Incease Multiplicative Decease [4].

6 DIFFERENTIATED PRICING FRAMEWORK In the following subsections, we have intoduced the diffeentiated picing mechanism and in the sequel, stability analysis has been accomplished to pove the stability popeties of the distibuted algoithms. 3.1 Diffeentiated Picing In flat picing scheme, a fom of penalty function such as that used in Eq. (4) can be used but in diffeentiated picing, a fom of tangential biased picing function such as the following equation will be used [23] p j (y) = j. tan (p.y/(2c j )), jj and. (9) The incued pice is completely link and flow dependent and the amount of link pice can be contolled by paamete j > 0. The geate paamete j will esult in moe penalized use taffic and moe stavation in the dedicated netwok esouces. It must be mentioned that the choice of the tangential biased picing mechanism in Eq. (9) is completely optional. As discussed in Section 2 and Fig. 1, the penalty function P(y) must have some fundamental popeties (nonnegative fom, continuity and monotonically inceasing popety with espect to its agument y ) and these popeties can be independent fom its mathematical fomulation [6]. Any mathematical fom may be selected fo epesenting the penalty function if and only if the selected fom satisfies the mentioned popeties. We have selected the biased tangential fom in Eq. (9) because of its ease of mathematical tactability. The impotant diffeence between the poposed picing method and taditional aggegate-ate picing pesented in Eq. (4) is the fact that, the picing mechanism in Eq. (9) is selective fo each use (woks in a pe-session basis) and can be intelligently contolled by the netwok povide based on a pe-established sevice level ageement (SLA) between the netwok opeato (ISP) and the individual uses. 3.2 Stability Analysis In eality, fo pactical implementation puposes, the window-based vesions of the ate allocation algoithms in Eqs. (10) and (11) must be used. If we assume that eceives congestion window sizes ae set to unity and sende congestion window size in (, )-fai and MulTCP models ae updated accoding to elations (9) and (12) espectively [24-27]. cwnd cwnd [ n 1] { cwnd k T ( ω d [ n])} T[ n] (10) Whee CWND 2 m m CWND [ n 1] CWND [ ] d n T T 2 mt (11)

7 A STABLE TRAFFIC ENGINEERING TECHNIQUE IN NETWORKS 1121 d T d (12) is an appoximation fo the aggegate pice [n] andd is the flow s popagation delay and its ound tip time is T. Also, cwnd and CWND ae the so-called congestion-window [26] of the sendes in the (, )-fai and MulTCP models espectively. In [24] and efeences theein, it is shown that by exploiting the following Lyapunov function, the stability popety of Eq. (11) can be deived. V ( x) 2m T actan x T 2m 0 jj x s: js s p ( y) dy The stability popeties of the window-based (, )-fai model in Eq. (10) can be poved afte defining some peliminay tems. Assume that fo simplicity we epesent the congestion window of flow in Eq. (10) by w. Also assume that we have the following two definitions X w 1 : ; s : X ( w X d ). T 1 2 Theoem: The function V( w): s is a Lyapunov function fo the Eq. (10). The 2 unique value w * minimizing V(.) is the stable point of the system to which all of the tajectoies convege. j Poof: The window-based Eq. (10) can be tansfomed to its continuous time equivalent as follows: dw w kt ( ω ( T d )) T. (13) Based on the pevious definitions, the Eq. (13) can be simplified as dw kt s. (14) By diffeentiating V(.) we have dv ( w) 2 ds 1 s. (15) Based on the definition of s and some mathematical computations, it can be easily shown that we have ds X dx dw 2 ( 1) w X d X. (16) Also, fom definitions of X and s we can wite

8 1122 dx k s. (17) Finally, based on the Eqs. (14)-(17) it can be shown that dv ( w) 2 ks X ( T d ). (18) T 2 As, k, X, T, and T d all ae non-negative tems, we have dv ( w) 0. (19) Consequently, V(w) is a Lyapunov function and vecto w * = (w * ), = 1,, M (M is the numbe (, )-fai flows) is a stable point of the system to which all of the tajectoies convege. Note: It must be mentioned that in the equilibium point of the system (10) we have * * w * * * * 1 * * 1 w * * d X T d X X d X T d * T T ( ) ( ) ( ) ( ) ( ). (20) Hence we can wite fom Eq. (20): * * w X d. (20) * 1 X Whee is the so-called total backlog [4]. * 1 ( X ) 4. PERFORMANCE ANALYSIS The numeical analysis section is composed of two pats. In pat one, a macoscopic fluid-flow model [6] has been adopted fo modeling the netwok taffic and in pat two, we have used moe pactical micoscopic window-based taffic model as those in [4, 9]. 4.1 Fluid-Flow Taffic Model Assume that a simple netwok topology with one bottleneck common link exists (Fig. 2) and its esouces ae shaed by N diffeent elastic (MulTCP and non-tcp) flows. Assume that N = 5 and the bottleneck link (with capacity of 20 Kbps) is shaed by a TCP (m = 1), two MulTCP with paametes m = 2 and m = 3, a popotionally fai scheme ( = 1) and a minimum potential delay fai ( = 2) flows. In the sequel, we descibe two diffeent picing scenaios which ae the taditional flat picing and the poposed diffeentiated picing ones and compae thei pefomances. In fist picing method, we just simulate these algoithms in a simple usual envi-

9 A STABLE TRAFFIC ENGINEERING TECHNIQUE IN NETWORKS 1123 Fig. 2. Netwok topology 1. onment without disciminating between these flows i.e. we have used the flat picing as in Eq. (4) with = The allocated ates to these sessions and the oveall thoughput ae deived based on discete-time Eqs. (5) and (8) and ae depicted in the Fig. 3 (a). In this figue, the aconyms (P) and (MPD) stand fo (Popotional) and (Minimum Potential Delay) fainess citeia, espectively. Also the unit fo bit-ate is selected to be Kbps. As it can be veified in this figue, thee exist 8 loss events (we calculate a loss events if the oveall thoughput exceeds the capacity). The oscillatoy behavio is inevitable since it is intinsic to TCP. But the oveall thoughput can be impoved as we will see in the next picing method. We have summaized the statistics elated to this scenaio in the Table 1. In the second picing method, using the poposed diffeentiated picing scheme, which uses a new tangential biased picing scheme (Eq. (9)) fo all sessions, the loss ate educed to zeo and we can obseve some impovement in the mean oveall utilization of the netwok (Fig. 3 (b) and Table 2). Table 1. Simulation esults in the flat picing. Mean Oveall thoughput Mean MulTCP(m=2) thoughput Loss numbes 8 Mean MulTCP(m=3) thoughput Mean TCP thoughput Mean MPD thoughput Mean MPD thoughput As it can be veified in the Fig. 3 (b), the mean allocated ates to P and MPD flows have been inceased but the allocated ates to non-tcp flows do not change significantly with espect to the pevious flat picing case (Fig. 3 (a)) and this fact leads to the impoved oveall netwok pefomance. In this case, we have paid moe attention to P and MPD flows in pice of moe penalizing othe MulTCP and TCP flows. In othe wods, we assign highe j values which ae equal to fo MulTCP and TCP flows and lowe j values which ae selected to be fo P and MPD flows. The simulation statistics about this case ae listed in the Table 2. The simulation esults in this table show that the mean thoughput of P and MPD methods ae impoved by a facto of 3 in this case.

10 1124 Table 2. Simulation esults in the diffeentiated picing. Mean Oveall thoughput Mean MulTCP(m=2) thoughput Loss numbes 0 Mean MulTCP(m=3) thoughput Mean TCP thoughput Mean MPD thoughput Mean MPD thoughput (a) (b) Fig. 3. Rates achieved by sessions in flat (a) and diffeentiated (b) picing. 4.2 Window-Based Taffic Model In this pat, a simila appoach such as that of Waland [4] and Başa [25] has been adopted fo simulating the ates allocated to the uses with specific popagation delays. We have used the OPNET discete-event simulato [28]. Window-based Eqs. (10) and (11) have been used fo esouce assignment to the (, )-fai and MulTCP flows espectively. We have used the moe geneal netwok topology in Fig. 4 with multiple bottleneck links (bottleneck links ae shown in ed in this figue). The links popagation delays ae set to 5 ms. We have assumed that souces have data fo sending at all times (geedy souces). The links buffe sizes ae set to 30 packets and so packet loss may occu in the netwok. We have used k = fo all in Eq. (10). We assume taffic consists of point to point tansfes of individual documents of finite size aiving accoding to a Poisson pocess [29]. We have used go back n method fo e-sending the packets that ae double acknowledged. Fo implementing the taffic engineeing o diffeentiated picing in this scenaio, links scheduling disciplines ae selected to be of Weighted Round Robin (WRR) type with geate weights fo flows with moe pioity (non-tcp flows in this wok). In anothe wok, the flows ae penalized moe by assigning less shae of bandwih o less weight in the implemented WRR sevice discipline. As in TCP, slow-stat method is used fo initializing the ate allocation fo implementing the Eq. (10) [26]. As Eqs. (10) and (11) use only the RTT and popagation delay of the connection, they can be implemented in an end-to-end manne even in the cuent Intenet. The topology of Fig. 4 is composed of 41 elastic uses and 116 links. It is as-

11 A STABLE TRAFFIC ENGINEERING TECHNIQUE IN NETWORKS 1125 sumed that each use s taffic composed of two non-tcp (P and MPD) flows and one TCP flow. The utility function paametes associated with the non-tcp flows ae listed in the Table 3. Bottleneck link capacities ae selected to be 150Kbps and othe link capacities ae selected to be 10Mbps. The WRR algoithm which is implemented in each node uses the weights listed in Table 4 fo each packet type. Table 3. Non-TCP flows utility function paametes. use use use use use use Table 4. Associated weights in each node fo each packet type. MulTCP Non-TCP Type M = 1 M = 2 M = 3 P MPD Weight Fig. 4. Netwok topology 2. In Figs. 5 (a) and (b), the aggegate ates of the P and MPD (non-tcp) flows tavesing the bottleneck links 86 and 93 ae compaed with the aggegate ate of TCP flows. As it can be veified, the allocated ates to non-tcp flows behave in moe stable manne with espect to the TCP one. Also, the allocated ates to non-tcp flows have TCPfiendly chaacteistics. In Figs. 6 (a) and (b), the aggegate ate of the bottleneck links 48 and 107 ae compaed between TCP method, window-based vesion of MulTCP with paametes m = 3, m = 4 and m = 5 in Eq. (11), a popotionally (P) fai scheme ( = 1) and a minimum potential delay (MPD) fai ( = 2) flows. As can be veified in this figue, MulTCPs

12 1126 (a) (b) Fig. 5. Flow pefomances in bottleneck links 86 (a) and 93 (b). (a) (b) Fig. 6. Flow pefomances in bottleneck links 48 (a) and 107 (b). have a compaable aveage ate in compaison with the TCP. It can be veified fom the Figs. 6 (a) and (b) that inceasing the m value inceases the oscillatoy behavio in the aggegate allocated ate. As descibed in Section 2.2, this may be due to the fact that by inceasing m, the pecent of ate eduction in confontation with a loss effect educes by the facto of m. In Fig. 7 (a), the packet loss ates of the P and MPD (non-tcp) flows and TCP flows (simple TCP and MulTCP with m = 10) ae depicted vesus the numbe of elastic uses. It can be veified in this figue that non-tcp flows benefit fom lowe mean packet loss levels with espect to TCP ones. Also it can be concluded that MulTCP has a lowe aveage loss ate in compaison with the TCP. The ationale behind this lowe loss ate is the design philosophy of the MulTCP which is diected to educe the loss phenomenon [22]. In Fig. 7 (b), the goodput (efficient thoughput) of the P and MPD (non-tcp) flows and TCP flows (simple TCP and MulTCP with m = 3) ae depicted vesus the numbe of elastic uses. It can be veified in this figue that non-tcp flows have appoximately

13 A STABLE TRAFFIC ENGINEERING TECHNIQUE IN NETWORKS 1127 (a) (b) Fig. 7. Packet loss (a) and Goodput (b) pefomance compaisons. highe mean ates than thei TCP countepats but behave in a TCP-fiendly manne. Again, it can be concluded that the mean goodput pefomance of the MulTCP is supeio to that of TCP and is compaable to nontcp P and MPD flows. 5. CONCLUSIONS Using a new taffic engineeing mechanism in the fom of diffeentiated picing scheme, we showed that the oveall thoughput of the netwok could be inceased without significant decease in TCP sessions thoughput. Also it is shown that by incopoating intelligent picing mechanisms, the packet loss pefomance of the netwok can also be impoved. The eason can be the fact that we achieved this goal by deceasing the unnecessay packet dops caused by TCP using the poposed diffeentiated picing scheme, theefoe avoiding unnecessay eductions and oscillations of othe sessions. The stability popeties of the algoithms ae investigated and thei pefomances ae compaed via simulation in two diffeent scenaios consideing two diffeent taffic models. Consideing this type of picing fo non-elastic o eal-time taffic fo impoving the pefomance of such taffic types and thei associated stability analysis can be consideed fo futue eseach. REFERENCES 1. D. Katabi, M. Handley, and C. Rohs, Intenet congestion contol fo high bandwih-delay poduct netwoks, in Poceedings of ACM SIGCOMM, 2002, pp C. Jin, D. X. Wei, and S. H. Low, FAST TCP: Motivation, algoithms, pefomance, in Poceedings of INFOCOM, 2004, pp J. Cowcoft and P. Oechslin, Diffeentiated end-to-end Intenet sevices using a weighted popotional fai shaing TCP, in Poceedings of ACM SIGCOMM Compute Communication Review Achive, Vol. 28, 1998, pp

14 J. Mo and J. Waland, Fai end-to-end window-based congestion contol, IEEE/ ACM Tansactions on Netwoking, Vol. 8, 2000, pp J. J. Jaamillo and R. Sikant, Optimal scheduling fo fai esouce allocation in ad hoc netwoks with elastic and inelastic taffic, IEEE/ACM Tansactions on Netwoking, 2011, pp F. P. Kelly, A. K. Maulloo, and D. K. H. Tan, Rate contol fo communication netwoks: shadow pices, popotional fainess and stability, Jounal of the Opeational Reseach Society, Vol. 49, 1998, pp L. Massoulié and J. Robets, Bandwih shaing: objectives and algoithms, in Poceedings of IEEE INFOCOM, Vol. 3, 1999, pp S. Shenke, Fundamental design issues fo the futue Intenet, IEEE Jounal of Selected Aeas on Communications, Vol.13, 1995, pp V. Jacobson, Congestion avoidance and contol, Compute Communication Review, Vol. 18, 1988, pp S. Floyd and V. Jacobson, Connection with multiple congested gateways in packetswitched netwoks, Pat 1: One-way taffic, ACM Compute Communication Review, Vol. 21, 1991, pp S. Floyd and V. Jacobson, Random ealy detection gateways fo congestion avoidance, IEEE/ACM Tansactions on Netwoking, Vol. 1, 1993, pp R. J. Gibbens and F. P. Kelly, Resouce picing and the evolution of congestion contol, Automatica, Vol. 35, 1999, pp L. S. Bakmo and L. L. Peteson, Tcp vegas: End to end congestion avoidance on a global intenet, IEEE Jounal of Selected Aeas on Communications, Vol. 13, 1995, pp S. Shakkottai and R. Sikant, Economics of netwok picing with multiple ISPs, IEEE Tansactions on Netwoking, Vol. 14, 2006, pp P. Hande, M. Chiang, A. R. Caldebank, and S. Rangan, Netwok picing and ate allocation with content povide paticipation, in Poceedings of IEEE INFOCOM, 2009, pp P. Hande, S. Zhang, and M. Chiang, Distibuted ate allocation fo inelastic flows, IEEE/ACM Tansactions on Netwoking, Vol.15, 2007, pp L. Bui, R. Sikant, and A. L. Stolya, Optimal esouce allocation fo multicast flows in multihop wieless netwoks, in Poceedings of the 46th IEEE Confeence on Decision and Contol, 2007, pp Y. Xue, B. Li, and K. Nahste, Optimal esouce allocation in wieless ad hoc netwoks: a pice-based appoach, IEEE Tansactions on Mobile Computing, Vol. 5, 2006, pp R. J. La and V. Ananthaam, Utility-based ate contol in the intenet fo elastic taffic, IEEE Tansactions on Netwoking, Vol. 10, 2002, pp J. K. Mackie-Mason and H. R. Vaian, Picing congestible netwok esouces, IEEE JSAC, Vol. 13, 1995, pp R. Mazumde, L. G. Mason, and C. Douligeis, Fainess in netwok optimal flow contol: optimality of poduct foms, IEEE Tansactions on Communications, Vol. 39, 1991, pp F.-C. Kuo and X. Fu, Pobe-aided MulTCP: an aggegate congestion contol mechanism, ACM SIGCOMM Compute Communication Review, Vol. 38, 2008, pp. 17-

15 A STABLE TRAFFIC ENGINEERING TECHNIQUE IN NETWORKS D. Betsekas and J. Tsitsiklis, Paallel and Distibuted Computation, Englewood Cliffs, Pentice-Hall, NJ, F. P. Kelly, Mathematical modeling of the intenet, in Poceedings of the 4th Intenational Congess on Industial and Applied Mathematics, 1999, pp T. Alpcan and T. Başa, Utility-based congestion contol schemes fo intenet-style netwoks with delays, in Poceedings of IEEE INFOCOM, 2003, pp A. S. Tanenbaum, Compute Netwoks, 3d ed., Pentice Hall, NJ, S. Keshav, Engineeing Appoach to Compute Netwoking, 1st ed., Addison Wesley Pofessional, MA, OPNET discete-event simulato, L. Massouli and J. W. Robets, Bandwih shaing and admission contol fo elastic taffic, Telecommunication Systems, Vol. 15, 2000, pp Pejman Goudazi was bon in Shiaz-Ian in He eceived the B.S. degee in Electonics fom Shaif Univesity of Technology Tehan-Ian in He also eceived his M.Sc. and Ph.D. degees in Electical Engineeing both fom Isfahan Univesity of Technology, Isfahan-Ian in 1998 and 2004 espectively. D. Goudazi is an Assistant Pofesso and faculty membe in Reseach Institute fo ICT (ITRC) since His main eseach inteests ae wieless video communication, distibuted esouce allocation algoithms, soft computing, stability analysis and sevice quality assuance in data netwoks.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users Loss-Cognizant Picing in Feed-Fowad Netwoks with Geedy Uses Ashaf Al Daoud and Muat Alanyali Depatment of Electical and Compute Engineeing Boston Univesity, Boston, MA 02215 Email: {ashaf, alanyali}@bu.edu

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

TCP Libra: Exploring RTT-Fairness for TCP

TCP Libra: Exploring RTT-Fairness for TCP TCP Liba: Exploing RTT-Fainess fo TCP UCLA Compute Science Depatment Technical Repot #TR050037 Gustavo Mafia, Claudio Palazzi, Giovanni Pau, Maio Gela, M. Y. Sanadidi, Maco Roccetti, Compute Science Depatment

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Improved Utility-based Congestion Control for Delay-Constrained Communication

Improved Utility-based Congestion Control for Delay-Constrained Communication Impoved Utility-based Congestion Contol fo Delay-Constained Communication Stefano D Aonco, Laua Toni, Segio Mena, Xiaoqing Zhu, and Pascal Fossad axiv:5.2799v3 [cs.ni] 2 Jan 27 Abstact Due to the pesence

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs Compute Netwoks 54 (2010) 2327 2344 Contents lists available at ScienceDiect Compute Netwoks jounal homepage: www.elsevie.com/locate/comnet TCP Liba: Deivation, analysis, and compaison with othe RTT-fai

More information

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design Vol.2, Issue.3, May-June 2012 pp-1253-1259 ISSN: 2249-6645 Dag Optimization on Rea Box of a Simplified Ca Model by Robust Paamete Design Sajjad Beigmoadi 1, Asgha Ramezani 2 *(Automotive Engineeing Depatment,

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks

Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks 206 IEEE Intenational Symposium on Infomation Theoy Cloud-Aided Wieless Netwos with Edge Caching: Fundamental Latency Tade-Offs in Fog Radio Access Netwos Ravi Tandon Osvaldo Simeone Depatment of ECE Univesity

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays 00 th Intenational Wokshop on Cellula Nanoscale Netwoks and thei Applications (CNNA) Appoximating Euclidean Distance Tansfom with Simple Opeations in Cellula Pocesso Aas Samad Razmjooei and Piot Dudek

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

3D inspection system for manufactured machine parts

3D inspection system for manufactured machine parts 3D inspection system fo manufactued machine pats D. Gacía a*, J. M. Sebastián a*, F. M. Sánchez a*, L. M. Jiménez b*, J. M. González a* a Dept. of System Engineeing and Automatic Contol. Polytechnic Univesity

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Vehicle Chassis Control Using Adaptive Semi-Active Suspension

Vehicle Chassis Control Using Adaptive Semi-Active Suspension Poceedings of the 17th Wold Congess The Intenational Fedeation of Automatic Contol Vehicle Chassis Contol Using Adaptive Semi-Active Suspension V. Sankaanaayanan, Sinan Oncu, Dince Ocan, and Levent Güvenç

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ ISIT, Austin, Texas, U.S.A., June - 8, Divesity-Multiplexing-Delay Tadeoffs in MIMO Multihop Netwos with ARQ Yao Xie, Andea Goldsmith Depatment of Electical Engineeing, Stanfod Univesity, Stanfod, CA.

More information

Optimal Peer Selection for P2P Downloading and Streaming

Optimal Peer Selection for P2P Downloading and Streaming Univesity of Massachusetts Amhest ScholaWoks@UMass Amhest Compute Science Depatment Faculty Publication Seies Compute Science 2005 Optimal Pee Selection fo P2P Downloading and Steaming Micah Adle Univesity

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Hybrid Modeling of Communication Networks Using Modelica

Hybrid Modeling of Communication Networks Using Modelica Hybid Modeling o Communication Netoks Using Modelica Daniel Fänvist, Katin Standema, Kal Henik Johansson, and João Pedo Hespanha Abstact Modeling and simulation o communication netoks using Modelica is

More information

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach Minimizing Application-Level Delay of Multi-Path TCP in Wieless netwoks: A Receive-Centic Appoach Se-Yong Pak, Changhee Joo, Yongseok Pak, and Saewoong Bahk Depament of ECE and INMC, Seoul National Univesity,

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch 0 th Intenational Confeence on ITS Telecommunications Image Registation among UAV Image Sequence and Google Satellite Image Unde Quality Mismatch Shih-Ming Huang and Ching-Chun Huang Depatment of Electical

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information