Computer Communications

Size: px
Start display at page:

Download "Computer Communications"

Transcription

1 Computer Communcatons 3 (22) 3 48 Contents lsts avalable at ScVerse ScenceDrect Computer Communcatons journal homepage: On the queueng behavor of nter-flow asynchronous network codng Y. Yuan a,,k.wu b, W. Ja c, Y. Peng a a Natonal Lab for Parallel and Dstrbuted Processng, Natonal Unversty of Defense Technology, Changsha, Chna b Dept. of Computer Scence, Unversty of Vctora, B.C., Canada c Dept. of Computer Scence, Cty Unversty of Hong Kong, Hong Kong SAR, Chna artcle nfo abstract Artcle hstory: Receved 7 March 2 Receved n revsed form 3 March 22 Accepted 24 Aprl 22 Avalable onlne 3 May 22 Keywords: Performance evaluaton Network codng Queueng analyss Congeston control Despte the substantal research efforts on network codng, ts real-world mplementaton s manly over wreless networks or peer-to-peer networks. The deployment of network codng n the Internet core stll largely lags behnd. Among the many challenges, one dffculty s the selecton of routers to perform network codng, whch reles on the understandng of the queueng behavor of network codng. Unfortunately, the ntrcate queueng behavor of network codng, even for a sngle node case, s stll unclear. In ths paper, we buld a generc queueng model to answer many fundamental questons, ncludng for example, under what condton s the system stable? How many packets could be possbly coded when multple stochastc traffc flows pass through a codng node? What s the quanttatve relatonshp among the traffc arrval rate, the servce rate, and the codng opportuntes under a general network confguraton? Based on our analytcal results, we propose a self-adjustable delay-based codng mechansm for better congeston control. Our work provdes network researchers and engneers wth nsghts on the queueng behavor of network codng, whch are helpful n future applcatons of network codng n the Internet core. Ó 22 Elsever B.V. All rghts reserved.. Introducton The concept of network nformaton flow was ntroduced n 2 [], and snce then network codng has trggered enormous research and development actvtes. In the exstng Internet archtecture, network devces such as routers and swtches manly functon as store-and-forward relay devces. Network codng technque changes the above fundamental desgn prncple and allows the algebrac combnaton of data packets at ntermedate network nodes by usng, for example, a bt-by-bt XOR operaton. Destnaton nodes perform decodng operatons to recover the orgnal data packets. In theory, t has been proved [] that network codng can acheve the maxmum nformaton flows for multcast, whch are otherwse mpossble for tradtonal store-and-forward networks. In practce, network codng has been mplemented and tested n dfferent systems, partcularly n wreless networks where rado transmsson s broadcast n nature and a node can overhear neghbors transmssons [2]. Network codng has also found ts success n peer-to-peer networks for content dstrbuton [3]. Extra benefts of network codng nclude reducng energy consumpton for Correspondng author. Tel.: E-mal addresses: yuanyuan@nudt.edu.cn, kenyuan44@gmal.com (Y. Yuan), wku@cs.uvc.ca (K. Wu), we.ja@ctyu.edu.hk (W. Ja), pengyuxng@nudt.edu.cn (Y. Peng). wreless networks, enhancng network securty and relablty, reducng bandwdth cost for content dstrbuton over P2P networks, and much more. Wth the practcal success of network codng n wreless networks, t becomes a natural and mportant queston how network codng can be deployed n the Internet core. Ths queston cannot be smply answered because network codng requres substantal changes on current router archtecture and exstng protocols for traffc control. Among the many challenges, one dffculty reles on the subgraph selecton n large networks,.e., the selecton of routers to perform network codng. To llustrate ths, an example usng the broadly cted butterfly network n the Internet core s depcted as follows: Example. As llustrated n Fg., flow (S? D) and flow 2 (S2? D2) share the lnk from R to R2. Suppose every lnk s lossless. Due to the heavy traffcs from S and S2, router R may eventually get congested (Fg. (a)). To reduce the traffc load, R frst notfes S(S2) to route ts packets to D2(D) va redundant path (2), then XORs the buffered packet pars from each flow and transmts the coded packets to router R2 (Fg. (b)). Note that D or D2 can decode the coded packets by calculatng the XOR wth ts correspondng orgnal packets from the redundant path. However, snce the two flows arrvng at R may not be well synchronzed, R may only buffer packets from one of the two flows, such that the codng opportuntes among the two flows may not always exst /$ - see front matter Ó 22 Elsever B.V. All rghts reserved.

2 36 Y. Yuan et al. / Computer Communcatons 3 (22) 3 48 Fg.. Example : Traffc control wth network codng n the Internet core. Suppose that k and k 2 denote the mean flow arrval rates, and l denotes the mean servce rate). Thus, to ncrease the codng opportuntes, a delay s ntroduced nto the codng mechansm of R. Specfcally, ths delay-based codng mechansm can be mplemented as follows: R mantans a separate queue for each flow. When R becomes dle, t checks whether the queue for flow and the queue for flow 2 both have packets. If both have packets, R XORs the packets at the head of each queue and sends out the coded packet. If not, R wats for a preset maxmum delay to ncrease the codng opportuntes. Durng ths perod, f both queues become non-empty, R performs network codng and transmts the coded packet as soon as possble. Otherwse, R transmts the head packet n the non-empty queue wthout network codng. We call the watng delay as opportunstc delay, and the preset maxmum delay as the maxmum opportunstc delay. However, ths smple scenaro leaves us many nterestng problems about network codng n the Internet core: Is the router competent for the traffc control? How should the router operate ts network codng mechansm? To answer these questons, we need a better understandng of the ntrcate queueng behavor at codng nodes to quanttatvely dsclose the relatonshp among traffc patterns, servce pattern, codng opportuntes, and codng gan. Ths analyss wll provde mportant gudance on the protocol desgn and the route selecton over the Internet core. Unfortunately, people s understandng on the queueng behavor of network codng s stll very lmted. The challenge comes from the complex correlaton among the queueng packets. Specfcally, as for Example, When the maxmum opportunstc delay s set to be nfnty, a codng node holds ts codng operaton untl all the requred packets from each flow arrve. Ths s referred as synchronous network codng, and s equvalent to an assembly-lke queueng system, whch has been comprehensvely studed by the queueng system communty. It has been proved that wth more than two nput Posson nput flows, the state space wll explode and the problem becomes ntractable to analyze [4]. The synchronous codng also has been proved to be unstable wth unbounded It s defned as the rato of the number of transmssons requred by forwardng, to the number of transmssons used by network codng to delver the same set of packets. buffer sze, unless the arrvals are determnstc and fully synchronzed []. When a codng node allows partal requred packets coded together or perform no codng durng a bounded maxmum opportunstc delay, ths s referred as asynchronous network codng. However, the queueng behavor of asynchronous network codng s more complex than synchronous one, snce the number of packets that can be coded s random. Many efforts have been devoted to the performance analyss of asynchronous network codng [6 8], but smple assumptons (e.g. memoryless traffcs) are generally posed and none deals wth a generc queueng model. We stress that ths hgh-level classfcaton of synchronous and asynchronous network codng s generc enough and dvdes exstng network codng strateges nto dfferent domans wth respect to queueng behavor. Unlke prevous network codng research focusng on code desgn [9] and optmal schedulng strateges [], n ths paper, we constran ourselves to the queueng behavor analyss of asynchronous network codng and ts applcatons. In ths paper, a generc queueng model wth arbtrary stochastc traffc arrvals and servce capacty s bult to descrbe the network codng system of a sngle router. By analyzng the codng opportuntes, we construct a matrx to decouple the correlaton among the queueng packets. Accordng to the codng opportunty matrx, we smplfy our analyss by reducng the DoF (degree of freedom) among the preset varables. Then based on the queue decomposton technque, we obtan an approxmaton soluton for the queueng model. We further dscuss the stablty condton and the codng gan for ths system. Fnally, a self-adjustable delay-based codng mechansm s proposed based on our analytcal results. Ths method controls the congeston effectvely and acheves a nearly optmal codng gan. To the best of our knowledge, exstng queueng modelng and analyss on asynchronous network codng all assumed the memoryless network confguratons. In ths paper, we are thus motvated to answer the followng questons: What s the quanttatve relatonshp between the average packet delay, the traffc arrval rate, the servce rate, and the maxmum opportunstc delay, when the traffc arrvals and the servce tmes are both stochastc and follow general dstrbutons? Under what condton the system s stable n the sense that the router s buffer wll not eventually overflow as sure? In a stable system, what s the maxmum codng gan at the codng node? How can we use network codng for better congeston control? 2. Related work Network codng was frst ntroduced by Ahlswede et al. n 2 []. Snce then, substantal research has been devoted to studyng the performance of network codng under varous applcaton contexts. Varous network codng schemes have been developed. They dffer from each other n schedulng strateges and/or network stacks where network codng s mplemented. Accordng to the code generaton scheme, network codng could be mplemented determnstcally [] or randomly [2]; accordng to the network stacks where network codng s mplemented, t could be dvded nto applcaton-layer network codng [3], network-layer network codng [4], MAC-layer network codng [], or physcal-layer network codng [6]; accordng to the operatons on flows, network codng could be classfed as nter-flow [7] and ntra-flow network codng [8]. In ths paper, we are nterested n the queueng analyss of network codng and group our dscusson nto synchronous network codng and asynchronous network codng from the vewpont of queueng behavor.

3 Y. Yuan et al. / Computer Communcatons 3 (22) Synchronous network codng In synchronous network codng, a codng node holds the codng operaton untl all requred codng packets from dfferent flows arrve. In the early stage of network codng, most of the code desgn algorthms to acheve the maxmum network capacty are based on the mplct assumpton that the packets from dfferent nput flows can be well synchronzed. In real-world networks, however, stochastc property of the nput traffc makes the queueng behavor of network codng much more complex. In [9], Ma et al. studed a queueng model for synchronous network codng wth two dentcal Posson nput flows. They obtan the result that the output flow wll be an asymptotcally Posson flow wth the same parameter. In [2], Ma et al. extended ther prevous work, and found that wth synchronous network codng the system becomes unstable wth the queue sze ncreasng to nfnty. To handle ths, they then propose an COSE strategy wth synchronous codng stage and clearng stage, whch can be regarded as a scheme of asynchronous network codng. The queueng model of synchronous network codng can fnd ts root n assembly-lke manufacturng operatons. Early n 7s, the assembly-lke queueng model was frst studed n [4]. An mportant result s that when the buffer sze s nfntely large, the queueng system s unstable n the sense that the buffer wll eventually overflow unless the nput flows are determnstc and fully synchronzed [4]. An analytcal method for assembly-lke queue wth two Posson nput flows and fnte queue capacty was proposed n []. The author concluded that exact analyss became ntractable f the number of nput flows was large. In [2], the authors used the dfference between the accumulatve traffc amount of each class and the mnmum accumulatve traffc amount n these classes to fnd an approxmate soluton. Furthermore, the authors use a decomposton technque to obtan the approxmaton soluton for multple Posson flows. Another approxmate soluton was proposed n [22]. The approxmaton s based on the dea that a flow s turned off whenever t arrves too fast compared to other flows. In [23], the authors proved that the assembly-lke queue wth two nput flows s stochastcally equvalent to a transfer lne of tandem queues wth blockng. Albet ths approxmaton requres lttle computaton compared to those n [,22,2], t works only when there are two nput flows Asynchronous network codng In asynchronous network codng, a node may transmt uncoded packets or partal coded packets, f no codng opportuntes for all the requred packets could be found wthn a bounded tme wndow. The asynchronous network codng makes more practcal sense and was frst mplemented n COPE [2]. Its performance was manly evaluated wth measurements. Snce then, many schemes based on asynchronous network codng was proposed to acheve better performance [,24 26]. For example, n [], two practcal code constructon technques based on lnear optmzaton were proposed; n [24], Erylmaz et al. used dfferental backlogs to decde the codng opportunty for nter-flow network codng; n [2], An onlne scheme combnng the benefts of network codng and ARQ for lossy channels was proposed; n [26], Seferoglu et al. desgned a network-codng aware queue management scheme (NCAQM) at ntermedate nodes to fully explot the codng opportuntes. Although substantal efforts have been devoted to the performance analyss of asynchronous network codng [6,7,27 29], the problem was addressed wth dfferent assumptons or n dfferent contexts, e.g., n wreless networks wth random medum access [6], or n the study of energy consumpton of asynchronous network codng wth two Posson nput flows [7], or on the delvery of real-tme packets [27] from two Posson nput flows, or for r andom lnear codng over packet erasure channels [28]. In[29], the authors nvestgated the smlar problems usng stochastc network calculus. Ther results only dsclose the performance bounds n dealzed stuatons, whch may be practcally hard to acheve. Although the work n [3] bears some smlartes to our approach, t only consders the queueng behavor of synchronous network codng and the specal stuaton of asynchronous network codng that the maxmum opportunstc delay s set to zero. Up to now, we do not see any formal model and mathematcal analyss answerng the questons rased n Secton n a general settng. 3. Queueng model of asynchronous network codng In ths secton, we present a queueng model for asynchronous network codng. As shown n Fg. 2, packets from n flows arrve nto a router whch can perform network codng (codng node). Besdes the codng rules ntroduced n Example, we assume the followng confguratons: Traffc arrvals: Incomng flows are assumed to be ndependent. We assume that the packet nter-arrval tmes of flow (=,..., n) are ndependent dentcally dstrbuted (..d.) random varables wth mean arrval rate k. Denote the dstrbuton functon of packet nter-arrval tmes of flow (=,..., n) by A (t). Buffer: The codng node mantans a separate frst-n-frst-out (FIFO) queue wth a queue sze K(>) for each flow. The queue correspondng to flow (=,...,n) s labeled wth ndex. Servce: Assume that the servce tme for codng and transmttng the (coded) packets follows a general servce tme wth mean servce rate l. Denote the dstrbuton functon of the servce tme as B(t). Maxmum opportunstc delay: To ncrease codng opportuntes, the codng node may wat up to the maxmum opportunstc delay, D. When D?, the asynchronous network codng s equvalent to the synchronous network codng. In ths paper, we only focus on the asynchronous network codng,.e., 6 D <. Lnks: The lnks are assumed to be lossless and relable. Network code: We assume that the network code s properly desgned (random or determnstc lnear network codng). Extra bts are pggybacked n each coded packet for dentfyng ts orgnal components, such that the coded packets can be decoded at the ntended recever(s). Network codng can be performed on a group of k packets, where 6 k 6 n. The value of k s determned by the number of nonempty queues when the router performs network codng. A( t) A t 2( ) A t n( ) K Router Β( t) Fg. 2. Queueng model of asynchronous network codng.

4 38 Y. Yuan et al. / Computer Communcatons 3 (22) 3 48 Remark. There are many other factors that may mpact the codng opportunty of network codng, such as the unrelable transmssons [3,32], MAC layer contenton [6], the coordnaton between the senders [33], and whether the ncomng packets are nnovatve [34]. Nevertheless, takng nto consderaton of all these factors wll make the system ntractable. As shown n the paper, even wth the above smplfed confguraton, modelng the queueng behavor of network codng s already very dffcult. Remark 2. In some network codng mplementaton schemes (partcularly random network codng), codng decson may depend on the nnovatve ncomng packets. In ths case, nformaton of data packets s consdered and thus specal treatment s requred to brdge the gap between data traffc and ts nformaton [3]. Nevertheless, the abstract model n ths paper could be consdered as a specal case where ncomng packets are all consdered nnovatve, and t could be extended to deal wth other codng schemes by buldng a brdge between nformaton and packets [3]. We leave t as our future work. Remark 3. Our method could be extended to the stuaton when K s fnte, by ntroducng the steady-state blockng probablty of each queue n the followng analyss. However, to obtan the results, we need to solve a set of n equatons wth n unknown varables. When maxmum allowed delay s set on packets, sutable values for the maxmum opportunstc delay should be obtaned frst. Ths forms another nterestng queston whch needs to jontly consder the delay constrant and the maxmum opportunstc delay. We leave handlng these two stuatons as our future work. 4. Performance analyss of asynchronous network codng Exact soluton usng state transton dagram for synchronous network codng turn out to be extremely hard [29]. To say nothng of asynchronous network codng n the network wde, even for a sngle node, there s no closed-form answer for ts queueng behavor. The dffcultes come from the complex correlaton among the Table Man notatons. Symbols Meanng a The packet nter-arrval tme of flow (a random varable) A (t) The dstrbuton functon of a Var(a ) The varance of a k The mean arrval rate of flow B(t) The dstrbuton functon of the servce tme of the router l The mean servce rate of the router D The maxmum opportunstc delay Y The resdual arrval tme of the next ncomng packet of flow (a random varable) b F The dstrbuton functon of Y P j The probablty that the head packet of queue s j-level coded wthn the maxmum opportunstc delay D E j The steady state probablty that queue j s empty when queue has packets watng for servce, after a (coded) packet s sent E j The approxmaton of E j (Secton 4.2) Q n The ndex set of all queues excludng queue Q k A subset of Q n, formed by takng any k elements from Q n S (t),s() The dstrbuton functon and the pdf of the opportunstc delay n sub-system, respectvely D (t) The dstrbuton functon of the servce tme of the vrtual server n sub-system r (t) The total servce tme of sub-system (a random varable) R (t) The dstrbuton functon of r r ; Varðr Þ The mean and the varance of r, respectvely I The dle perod of sub-system (a random varable) I ; I 2 The frst and the second moments of I, respectvely packets from dfferent flows. In our queueng model, the packet s behavor depends on many aspects, ncludng the flow arrvals to the queue, the servce rate, the flow arrvals to other queues, the buffer sze and the maxmum opportunstc delay. The tradtonal queueng analyss approaches are not effectve for ths model. We therefore focus on the approxmate soluton n the followng and propose a new approxmaton method, based on the analyss of codng opportunty and queue decomposton. 4.. Analyss of codng opportuntes For ease of reference, the man notatons used n our analyss are lsted n Table. Let us frst formally defne codng opportunty n the context of queueng analyss of network codng. Defnton (Codng opportunty). Vewed from the tme nstances when a (coded) packet s sent out from the router, the head packet of a nonempty queue, f exsts, s sad to have a codng opportunty f there are other nonempty queues or f there are packet arrvals to other empty queues wthn the maxmum opportunstc delay D. Whenever a codng opportunty exsts, the head packet of a nonempty queue should be coded together wth the head packets n other nonempty queues. If a packet s coded wth other l packets, we call the packet s l-level coded. Defnton 2 (Codng opportunty matrx). The codng opportunty matrx of asynchronous network codng wth n nput flows s a n n matrx, denoted by h P ¼ P j nn 2 ¼ 6 4 P P... P n P 2 P 2... P n 2... P n P n... P n n where P j denotes the probablty that the head packet of queue s j-level coded (.e., t s coded wth exactly j packets from other flows). The matrx also can be wrtten as column vectors: P =[C,C,..., C n ], where C j ( 6 j 6 n ) equals to ½P j ; Pj 2 ;...; Pj n ŠT. We frst calculate the codng opportunty matrx, whch wll be used later to decompose the queueng model and to obtan the performance of nterests. In order to calculate P j, we need to obtan at the nstances when a (coded) packet s transmtted from the router, () the steady-state probablty that a queue s empty, and (2) the probablty that there are packet arrvals to the empty queue(s) wthn the tme perod of D. When consderng P j, we call queue the tagged queue, meanng that when the prevous servce s over (.e., a packet s sent out from the router), queue has packets to be served. From the pont of vew of the tagged queue, other n queues may ether have packets or empty at ths nstance. Let E j denote the steady state probablty that queue j s empty at ths nstance. We wll ntroduce ts calculaton n the next secton. Because the packet nter-arrval tmes follow a general..d. dstrbuton, the memoryless property of Markov arrval process may not hold. To calculate the probablty that there are packet arrvals to an empty queue wthn the tme perod of D, we need to consder the resdual arrval tme of the next ncomng packet to the empty queue. Let Y j denote the resdual arrval tme of the next ncomng packet of queue j. The probablty that there are packet arrvals to queue j wthn the perod of D; b F j, can be calculated as [36]: Z D ð A j ðyþþ bf j ¼ PrfY j 6 Dg ¼ dy: ðþ =k j 3 7 ;

5 Y. Yuan et al. / Computer Communcatons 3 (22) Wth E j and b F j at hand, we can calculate P j as follows: >< P j ¼ Xj X >< Y ð E l Þ Y X >< Y Y >= >= >= E l b F m ð b F m Þ >: >: >: >; >; >; ; lrq k k¼ Q k Q n l2q k Q j k Q n k m2q j k mrq j k where Q n denotes the set of ndex of the n queues except queue ; Q k denotes a subset of Q n by selectng any k elements from Q n ; Q n k denotes the set of ndex of the n k empty queues gven the number of nonempty queues s k, and Q j k denotes a subset of Q n k and represents those empty queues that have packet arrvals wthn the perod of D. The lengthy equaton (2) s actually a concse presentaton of all possble combnatons n the calculaton of P j. For easy understandng, we use an example to llustrate the calculaton. Example 2. Assume that a router has three ndependent nput flows. The correspondng queues are labeled by queue, 2, and 3, respectvely. We frst consder P. In ths case, k n the frst P of Eq. (2) can only be zero; Q 2 ¼f2; 3g; Q s an empty set. From Eq. (2), we thus obtan P ¼ E 2 E 3 ð b F 2 Þð b F 3 Þ: The meanng of Eq. (3) s clear: the probablty that the head packet of queue has no codng opportunty s equal to the probablty that the other two queues are empty and durng D, no packets arrve at the other two queues. Smlarly, we can obtan P and P2 as follows: P ¼ E 2 ð E 3 Þð b F 2 Þþð E 2 ÞE 3 ð b F 3 ÞþE 2 E 3 b F 2 ð b F 3 ÞþE 2 E 3 ð b F 2 Þ b F 3 P 2 ¼ E 2 E 3 b F 2 b F 3 þð E 2 ÞE 3 b F 3 þ E 2 ð E 3 Þ b F 2 þð E 2 Þð E 3 Þ: The calculaton of other values n P s smlar. Next, we dsclose some nterestng propertes of the codng opportunty matrx to help better understand the correlaton between flows and our later approxmaton method. Theorem. Codng opportunty matrx P has the followng propertes:. Completeness property: P n j¼ Pj ¼ ð 6 6 n; 6 j 6 n Þ. 2. Constrant on zero components: If z(j) s the number of zero components n vector C j, then max{z(j)} =n (j + ). Smlarly, f zðjþ s the number of nonzero components n vector C j, then mnfzðjþg ¼ j þ. 3. Equlbrum property: If z(j) = n (j + ) n vector C j, for any two non-zero components, P j and P j k, we have k P j ¼ k k P j k : Proof. Property () s obvous, because the events that a packet of flow s j-level coded (j =,,...,n ) are exclusve, and cover all possble processngs of the packet. To prove Property (2), assume that z(j)>n (j + ). We thus have zðjþ < j þ, whch means that at most j packets can be coded together. Ths s contradctory to the meanng of C j, snce a j-level coded packet means that there are j + packets coded together. So, max{z(j)} = n (j + ) and mnfzðjþg ¼ j þ. Regardng Property (3), f z(j)=n (j + ), then zðjþ ¼j þ. Snce the components n C j represent the probablty that j + packets are coded together. Ths requres the j + flows each to ð2þ ð3þ ð4þ ðþ contrbute one packet to the codng. The lmtng form of ths stuaton s that the product of the mean arrval rate of flow and P j must be equal to the product of the mean arrval rate of flow k and P j k, when Pj and Pj are both non zero. k h 4.2. The Calculaton of E j The exact calculaton of E j s very hard. To avod ths dffculty, we assume that E j s ndependent of. Ths approxmaton s based on the ntuton that from the vewpont of any tagged queue (except queue j), the probablty that queue j s empty should be roughly the same, snce flow arrvals are ndependent. Therefore, n the later dscusson, we replace E j wth E j, whch means the steady state probablty that queue j s empty. We would lke to pont out that ths approxmaton does not mply the mean arrval rate of flows s the same. Theorem 2. For any 6 6 n, E ¼ k g b F ; ð6þ where 6 g < mn k ; k 2 ;...; k n : ð7þ Proof 2. Let F stand for b F,.e., the probablty that no packet wll arrve to flow wthn D. Accordng to (2), t s easy to translate as: P n P n ¼ Y k ð E k F k Þ: ð8þ Based on Eq. (8) and the propertes of P, we have for any, k ( 6, k 6 n), ð E F Þ ¼ ð E kf k Þ : ð9þ k k k In order to decrease the number of unknown varables, we ntroduce a new parameter g nto Eq. (9), then we obtan that for any E F ¼ k g: ðþ We could gnore the case when F ¼, because for a stochastc arrval process, the probablty that no packets arrve wthn D(>), no matter how small, s not zero. We thus have E ¼ k g F ¼ k g b F : ðþ We could also gnore the case when E =, because E s the steady state probablty that queue s empty and should be non zero. 2 Snce E and F are probablty values and thus are no larger than, from () we have 6 k g <, and hence 6 g < k. Thus Equalty (7) holds naturally. h Theorem 2 mples that the degree of freedom of the n varables, E ( 6 6 n), turns out to be. To decde E, we only have to focus on the value g, whose calculaton s to be dsclosed n the next secton Approxmaton wth queue decomposton Queue decomposton has been broadly used before, e.g., n [2], to tackle the dffcultes n queueng analyss when multple 2 If E =, the utlzaton factor of queue wll equal to, whch contradcts the steady state probablty when a stochastc system s stable.

6 4 Y. Yuan et al. / Computer Communcatons 3 (22) 3 48 queues are entangled wth nterdependence. Based on the codng opportunty matrx P, we propose a new queue decomposton method to obtan the approxmate soluton to the performance of asynchronous network codng. Our method ncludes the followng three steps: Step : Decompose the orgnal queueng model (Fg. 2) nto n separate queues. Each queue (=,..., n) has ts own servce model, called sub-system (Fg. 3). Step 2: Analyze sub-system (=,...,n). Step 3: Obtan the approxmate soluton of the orgnal queueng model by ntegratng the analytcal results n Step Step Decompose the orgnal queueng model of asynchronous network codng (Fg. 2) nto n separate GI/G// queues, wth each served by a sub-system. The nput flow to queue (=,..., n) remans the same as A (t). Clearly, n order to analyze each queue separately, we need specal treatment on ts servce, whch s ntroduced n Step Step 2 To analyze the sub-system (=,..., n), we treat the opportunstc delay as a knd of servce, whch s modeled by a vrtual server. As such, the sub-system could be further decomposed by a vrtual server followed by the actual servce (.e., codng and transmsson), as shown n Fg. 3. Therefore, the total servce tme of the sub-system ncludes the servce tme of the vrtual server plus the tme of the actual servce. To obtan the servce tme dstrbuton of the vrtual server, we fnd that the row of P llustrates the dependency between flow and other flows. Specfcally, the value of P j ndcates the probablty that a packet n flow s j-level coded. Accordng to the rules of asynchronous network codng, the packet needs to wat for the maxmum opportunstc delay D before beng actually served when j < n, and t wats for a random opportunstc delay no larger than D when j = n. Therefore, the vrtual server of sub-system can be further decomposed nto 2 exclusve, parallel components (Fg. 3), wth the probablty to each component as P n, respectvely. P n and As shown n Fg. 3, the upper component of the vrtual server has the entry probablty P n and has a determnstc servce tme D. The bottom component of the vrtual server has the entry probablty P n and has a random opportunstc servce tme no larger than D. Denote ts dstrbuton functon and pdf as S (t) and s (t), respectvely. The value of S (t) s the probablty that a packet of flow s (n )-level coded wthn the tme perod of t, condtonng on that the bottom component s used. Usng Eq. (2) and Theorem 2, we have S ðtþ ¼ Qk ð k k gþ ð b b F k ðtþþ F k ð Q k k kþg n ; ð2þ where the denomnator s the probablty that packets go nto the bottom component (.e., P n ) of the vrtual server, and the numerator s the probablty that the packets of flow s (n )-level coded wthn the tme perod of t. To smplfy notatons, we slghtly abuse the notaton of ^F k by usng b F k ðtþ to denote the probablty that there are packet arrvals to flow k wthn the perod of t. It s clear that S (t) = when t P D. Let D (t) denote the dstrbuton functon of the servce tme of the vrtual server n sub-system. We have 8 >< P n S ðtþ; t < D; D ðtþ ¼ ð3þ >: P n þ P n S ðtþ ¼; t P D: Let r denote the total servce tme of sub-system. Let R (t) be the dstrbuton functon of r. Then R (t) can be calculated as the convoluton ntegral between the servce tme of the vrtual server and the actual servce tme: R ðtþ ¼Probðd þ x 6 tþ ¼ Z t D ðt yþdbðyþ ð4þ where d and x denote the servce tme of the vrtual server and the actual servce tme. From the above results, t s easy to see that E ; P j ; S ðtþ, and R (t) all are a functon of g. Let r denote the expectaton of r. Then r s also a functon of g. Snce E s the steady state probablty that queue s empty, based on the steady state relatonshp n queueng theory [36] and wth Eq. (6) n Theorem 2, we can obtan another equaton on g: E ¼ ð k gþ b F ¼ q ¼ k r ; ðþ where q s the utlzaton factor of subsystem. Solvng (), we obtan the value of g Step 3 We can then obtan the approxmate soluton to the orgnal queueng model, by ntegratng the analytcal results n Step 2. We use the calculaton of the average delay as an example: (a) Choose any sub-system, say, sub-system. Use (6) and (8) to express E and P j ð 6 j 6 n Þ as a functon of g, respectvely. (b) Express R (t) wth (4). Calculate r, whch s a functon of g. (c) Solve () to obtan the value of g, whch wll be used n the rest of calculatons. (d) For each sub-system, say, sub-system, calculate the values of E and R (t) wth (6) and (4), respectvely. Calculate r, and Var(r ). (e) For each =,...,n, calculate the varance of the nter-arrval tmes of flow, denoted by Var(a ). Based on [36], the dstrbuton of the dle-perod, I, s the same as the resdual tme A( t) - P n- D Β( t) P n- S t ( ) Fg. 3. The queueng model to approxmate the processng of flow wthn a sub-system.

7 Y. Yuan et al. / Computer Communcatons 3 (22) dstrbuton of the nput flow. The frst two moments of I, denoted by I and I 2, respectvely, can be calculated from bf ðtþ. (f) The mean queueng tme of flow before gong nto the vrtual server, W, can be calculated [36] as: W ¼ k2 ðvarða ÞþVarðr ÞÞ þ E 2 2 k E I2 2I The average delay of flow, T, s thus: T ¼ W þ r :. Further dscusson ð6þ ð7þ In ths secton, we frst dscuss the condton that the queueng system s stable (.e., no queue wll eventually overflow). Then we analyze how to calculate the codng gan on certan network confguratons... Stablty Snce our approxmaton method s based on the assumpton that the queue sze s nfnte, accordng to the well-known Stablty Theorem for GI/G// [36], whether the steady state probabltes of nterests (e.g., E ) exst s decded by the stablty of the queueng system. So, before applyng our approxmaton method, we need to know under what condtons our queueng system s stable. Theorem 3. The orgnal queueng system (Fg. 2) s stable, f and only f n each sub-system, the maxmum opportunstc delay D, the mean arrval rate k and the mean servce rate l satsfy: D þ l Pn Z D S ðtþdt < k : ð8þ Proof 3. Clearly, the orgnal queueng system s stable f and only f each sub-system s stable. In sub-system, the utlzaton factor q should be smaller than. Let r denote the expectaton of r. we frst have: Z r ¼ P n D þ P n t s ðtþdt þ l Z D ¼ D D P n þ P n ½t S ðtþš D S ðtþdt þ l ¼ D D P n ¼ D þ l Pn þ D P n Z D S ðtþdt: P n Z D S ðtþdt þ l ð9þ The theorem s proved snce the utlzaton factor must be less than,.e., q ¼ k r <. h Theorem 3 mples that by solvng Inequalty (8), we can obtan a upper bound on the maxmum opportunstc delay when other network confguratons are fxed. If the mean arrval rates of the n flows are not dentcal, we ntroduce a looser upper bound for the maxmum opportunstc delay to quckly check the stablty of the orgnal queueng system. Ths could avod ntensve computaton n solvng Inequalty (8). Corollary. If the orgnal queueng system s stable, the mean arrval rate k j, the mean servce rate l, and the maxmum opportunstc delay D should satsfy: k D < max l Q j mn ; k j k max ð2þ where k max and k mn denote the maxmum mean arrval rate and the mnmum mean arrval rate among the n flows, respectvely. Proof 4. Snce S (t) s a dstrbuton functon, we have R D S ðtþdt < D. Thus Inequalty (8) can be transformed as: > D þ Pn D ð2þ k l From Theorem 2, snce E cannot be zero and D s a bounded value n asynchronous network codng, we could gnore the case that ¼. Then we have P n k D < l : ð22þ P n Based on Theorem 2, we can obtan the upper bound of P n P n ¼ Y ðk j gþ < Y j j k j mn 66n k ¼ Y j k j k max, that s: : ð23þ If the orgnal system s stable, Inequalty (22) should hold for any sub-system. By consderng the sub-system wth the maxmum mean arrval rate, we can obtan a looser bound on D, whch s equal kmax to l Q. h k j j mnkmax Corollary gves a necessary condton for system stablty. It mples that f the dfferences between the mean arrval rates of the nput flows are small and the maxmum expected nter-arrval tme s much larger than the mean servce tme l, the maxmum opportunstc delay could be set to a large value. Otherwse, kmax t should be set small..2. Codng gan Codng gan s defned as the rato of the number of transmssons requred by forwardng, to the number of transmssons used by network codng to delver the same set of packets. For smplcty, suppose that packets have the same sze and delverng one (coded or uncoded) packet consumes the same bandwdth. The codng gan can be easly computed wth the followng theorem: Theorem 4. Assume that the orgnal queueng system s stable and the codng opportunty matrx s P, the codng gan, G c, can be expressed as: G c ¼ P n P n k¼ ¼ P n ¼ k n kþ : ð24þ k P n k Proof. We need to compute both the expected number of total packets delvered per tme unt and the expected number of coded packets delvered per tme unt. Snce the system s stable, the expected number of total packets delvered per tme unt s equal to the expected number of packets arrvng nto the system per tme unt, whch s P n ¼ k. Wth network codng, based on codng opportunty matrx P, the expected number of coded packets wth k-level codng opportunty per tme unt s: X k P k k þ : ð2þ where the factor means that the total number of delvered k-level coded packets has been counted k + tmes. By summng up kþ all

8 42 Y. Yuan et al. / Computer Communcatons 3 (22) 3 48 levels, we obtan the expected number of coded packets delvered per tme unt as: X n k P n þ X n n n ¼ ¼ ¼ Xn X n n k þ k¼ ¼ k P n 2 þþ Xn k P ¼ k P n k : ð26þ Accordng to the above analyss and the meanng of codng gan, the codng gan can be calculated wth Eq. (24). h 6. Model valdaton and performance evaluaton We have used a large amount of dverse network confguratons to compare the performance (e.g. codng gan, average packet delay, and codng opportunty) calculated wth our analytcal model to that obtaned wth smulaton. To save space, however, we only use three representatve cases to llustrate the results,.e., a smple case wth memoryless traffc and servce, a complex case wth saturate non-memoryless traffc, and a more complex case wth heavy-taled traffc and adjustable servce rate. Both the numercal calculatons and the smulatons were mplemented n Matlab. Snce the network codng n the consderaton of ths paper only touches the network layer, we bult an event-drven smulator to smulate the network layer operatons and gnored the detals of the physcal layer and the MAC layer. Smulaton results are obtaned by takng average over runs, each of whch ends at, tme unts. 6.. A smple case: memoryless traffc and servce capacty We frst consder our approxmaton method n a smple case: the servce tme of the router follows an exponental dstrbuton wth the mean of (tme unts), and that two nput flows follow Posson arrvals wth the mean nter-arrval tmes of and 2 (tme unts), respectvely. Wth Theorem 3 and Corollary, the threshold value of D s equal to 3.8 (a tghter bound) and 2 (a looser bound), respectvely. As shown n Fg. 4, when the system s stable, our analytcal results are very close to those from the smulatons. In Fg. 4, wth the ncrease of D, the codng gan, the average packet delay and the codng opportunty ncrease steadly. Under the constrant of a stable system, we may ncrease the maxmum opportunstc delay to get a larger codng opportunty. Ths Codng gan Smulaton Calculaton Average packet delay Flow (smulaton) Flow (calculaton) Flow 2 (smulaton) Flow 2 (calculaton) Maxmum opportunstc delay (a) Codng gan Maxmum opportunstc delay (b) Average packet delay.8 2 level codng opportunty Flow (smulaton) Flow (calculaton) Flow2 (smulaton) Flow2 (calculaton) Maxmum opportunstc delay (c) The -level codng opportunty Fg. 4. Memoryless traffc and servce capacty.

9 Y. Yuan et al. / Computer Communcatons 3 (22) operaton brngs a larger codng gan but also ncreases the average packet delay of the faster flow, as we can see from Fg. 4(b). See also, n Fg. 4(c), when D approaches ts threshold value, the -level codng opportunty of flow 2 s close to. At ths stuaton, f we ncrease D further, the system becomes unstable: the packets from flow wll be accumulated n the buffer, eventually resultng n buffer overflow no matter how large the buffer sze s. Ths has been verfed n our smulaton A complex case: saturated traffc wth balanced flow arrvals Case assumes Posson traffc and exponental servce. Our queueng model covers much beyond ths smple case, and our analytcal results hold for general dstrbutons. To valdate, we use a complex system confguraton. Assume that the system has three ndependent nput flows and ther packet nter-arrval tmes all follow the Erlang-2 dstrbuton wth the same mean of (tme unts). The servce tme of the router follows Gamma dstrbuton wth the shape parameter 2 and the scale parameter /. The mean servce tme s derved from the Gamma-(2,/), whch s equal to (tme unts). Note that both Erlang and Gamma dstrbutons have been broadly used n network traffc modelng [37]. Ths model has two features. Frst, the traffc load s nearly saturated, snce the mean rate of each flow s very close to the servce rate. Second, the flow arrvals are balanced,.e., the mean arrval rates of flows are the same. We omt results of flow 2 and flow 3 n the fgure, because the result s very smlar to that of flow. As shown n Fg. (c), even f D s set to be, the sum of -level and 2-level codng opportuntes exceeds.9. Wth the ncrease of D, the 2-level codng opportunty of flow ncreases steadly. Wth Theorem 3, the threshold value of D n ths case s about 4. From the fgures, we can see that the analytcal results match the smulaton results ncely when the maxmum opportunstc delay D s smaller than ts threshold. However, as n Fg. (b), after D approaches and exceeds ts threshold, the system becomes unstable and the average packet delays fluctuate severely. Our analytcal average delays become meanngless A more complex case: heavy-taled traffc wth adjustable servce rate To further valdate our analytcal model for practcal and more complex cases, we consder a system wth heavy-taled traffc arrvals of heterogeneous mean rates. It has been shown that the Codng gan Smulaton Calculaton Maxmum opportunstc delay (a) Average packet delay 2 2 Smulaton Calculaton Maxmum opportunstc delay (b) Codng opportunty level (smulaton) level (calculaton) level (smulaton) level (calculaton) 2 level (smulaton) 2 level (calculaton) Maxmum opportunstc delay (c) Fg.. Saturated traffc wth balanced flow arrvals.

10 44 Y. Yuan et al. / Computer Communcatons 3 (22) 3 48 Average packet delay Smulaton Calculaton Maxmum opportunstc delay Mean servce tme 3 2 level codng opportunty Smulaton Calculaton Maxmum opportunstc delay Mean servce tme 3 (a) Average packet delay (b) The 2-level codng opportunty of flow 2 level codng opportunty Smulaton Calculaton Maxmum opportunstc delay Mean servce tme 3 2 level codng opportunty Smulaton Calculaton Maxmum opportunstc delay Mean servce tme 3 (c) The 2-level codng opportunty of flow 2 (d) The 2-level codng opportunty of flow 3 Fg. 6. Heavy-taled traffc wth adjustable servce rate. network flows n Internet core may exhbt the self-smlar nature, and ther packet nter-arrval tmes could be approxmated by a log-normal dstrbuton [38], denoted by Log-N-(m,r 2 ), where m and r are the mean and the standard devaton of the nter-arrval tme natural logarthm. Assume that there are three ndependent nput flows followng log-normal dstrbuton wth mean packet nter-arrval tmes of 2, 3, and 2, respectvely. For smplcty, we set m to, through calculaton, the log-normal expresson of these three dstrbutons can be descrbed as Log-N-(, ), Log-N-(, ), and Log-N-(, ), respectvely. Assume that the servce tme of the router follows an exponental dstrbuton wth the parameter l. We change l and the maxmum opportunstc delay D to study ther mpact on the performance. As shown n Fg., the analytcal results match the smulaton results very well when the mean servce tme and D are both small. However, the gap between the two becomes a bt larger when the mean servce tme and D ncrease. Ths s because a faster server (.e., a smaller mean servce tme) and a smaller maxmum opportunstc delay both mply less codng opportuntes. Wth less codng opportuntes, the multple flows are less dependent on each other and our queueng decomposton method works better. As we can see n Fg. 6(b), (c), and (d), when l and D are set to and, respectvely, the codng opportuntes for 2-level codng are all very close to zero and the average packet delay s also at ts lowest pont, as n Fg. 6(a). From Fg. 6(a), we can also see that the average packet delay s more senstve to the servce tme than to the maxmum opportunstc delay. Ths s because the servce tme has a drect mpact on the packet delay, whle the maxmum opportunstc delay mght not. Note that the maxmum opportunstc delay s only an upper bound on the watng tme for better codng opportuntes. Packets do not have to wat to ths bound before beng processed. 7. Self-adjustable delay-based codng mechansm In ths secton, we llustrate how to use our analytcal results to desgn an adaptve network codng mechansm for effcent congeston control. Most tradtonal IP layer congeston control mechansms use Actve Queue Management (AQM) polces [39], such as BLUE [4], to keep queue length small. However, these polces share a common drawback that there s a tme lag between the congeston notfcatons ssued by the router to the end hosts rate control actons beng n effect. Durng ths lag, the congeston may become even worse, and more packets are dropped.

11 Y. Yuan et al. / Computer Communcatons 3 (22) Network codng technque brngs a new soluton for IP congeston control [24]. As shown n Example, once the congeston s detected, the router actvates network codng mechansm, and nforms ts end hosts to transmt orgnal packets through redundant paths. Wth network codng, more than one buffered packets can be removed from the congested router smultaneously, whch may sgnfcantly reduce the packet losses. However, how to maxmze the codng opportuntes and the codng gans whle controllng the congeston s not trval. Snce n real-world deployment, the traffc loads are tme-varyng, a fxed value of the maxmum opportunstc delay s very hard to determne and may not work well. To address ths problem, we desgn a Self-Adjustable Delaybased Codng Mechansm, called SADCM. By usng our analytcal results and the perodc network measurements, SADCM can quckly fnd out the near optmal values for the maxmum opportunstc delay, whch help to mantan hgh-level codng gans. To guarantee congeston control effectvely, SADCM can also adjust the maxmum opportunstc delay dynamcally and senstvely as the nput traffc loads are changng. The detals of SADCM are descrbed as follows: Measurements collecton: Suppose that the congeston control operates perodcally wth equal length tme ntervals, each of whch are set to T tme unts. Durng each nterval, the SADCM router measures arrval rates for the nput flows and ts servce rate by usng Exponental Weghted Movng Average (EWMA) approach [39]. For nstance, flow s EWMA arrval rate at the sth nterval, k ðsþ, can be calculated as: k ðsþ ¼ak þð aþk ðs Þ; ð27þ where a s the weghtng factor, and k (s) s the measurement of the arrval rate at the sth nterval. A hgher a dscounts older observatons faster. Congeston detecton: To evaluate congeston, the router needs to estmate the queue length threshold for each flow at the end of each nterval. Let d (s) denotes the threshold of the flow at the sth nterval, Suppose that there are n nput flows, whch can be estmated as: d ðsþ ¼Kð P rsv Þ T max k ðsþ lðsþk ðsþ P n ¼ k ðsþ ;!!; ð28þ where K s the maxmum queue sze and P rsv s the reserved porton of the queue space for traffc bursty. If the aggregated EWMA arrval rate of the nput flows s larger than the EWMA servce rate, that s, P n ¼ k ðsþ > lðsþ, and f there s one queue, say k, ts length L k exceeds d k (s), the router actvates SADCM for congeston control. Self-adjustable mechansm: After beng actvated, SADCM frst marks output packets as the congeston notfcatons. Then, by usng Corollary, t calculates a regon [D mn,d max ] to bound the optmal value of D at the recent tme ntervals. As shown n Algorthm, a bnary search s used to quckly refne the regon sze to an error nterval, denoted by. As we can see from the algorthm, SADCM perodcally counts the codng gan, denoted by G c ðgþ, whch s used to compute the servce rate under network codng. If the aggregate EWMA arrval rate s smaller than the servce rate under network codng, SADCM regards that the congeston s beng allevated. If the nput traffc loads are changed or the router s fed by new nput flows, SADCM wll reset the bnary search process. The pseudo-code of the self-adjustable mechansm s shown n Algorthm. Congeston release: At the begnnng of another tme nterval, say t, f P n ¼ k ðtþ < lðtþ, and for any, L < h (t), the router swtches SADCM back to the store-and-forward routng, whch reduces the complextes brought by the codng operatons. Algorthm. Self-adjustable mechansm Intalze D max ¼ kmaxðgþ lðgþ = Q j mn Intalze D mn ¼ mn ; k ðgþ lðgþ f D max D mn 6 then f P n ¼ k ðgþ < lðgþg c ðgþ then D = mn (D + M D,D max ); else D = D mn ; else f P n ¼ k ðgþ < lðgþg c ðgþ then D mn = D; else D max = D; D ¼ Dmax D mn 2 ; k j ðgþ kmaxðgþ ; To evaluate the performance of SADCM, we modfy Case n Secton 6. as follows: assume that ntally the router has only one nput flow wth the mean nter-arrval tme of (tme unts). After, tme unts, a flow wth the mean nter-arrval tme of 2 (tme unts) s fed nto the router. At the smulaton tme of 4, tme unts, the second nput flow wth mean nter-arrval tmes of 2 fnshes ts transmsson. The specfc confguraton of ths case study s descrbed n Table 2. As shown n Fg. 7, at the tme perod between, and, tme unts, the router fnds that the aggregated EWMA arrval rate becomes larger than the EWMA servce rate, and both the queue lengths and the packet delays of the two nput flows ncrease rapdly. At the begnnng of next perod (.e., between and, tme unts), the queue length of flow 2 exceeds ts threshold, the router thus actvates SADCM for congeston control. As we can see from Fg. 7(a), the router can quckly fnd a tght regon to bound the maxmum opportunstc delay to approach the maxmum codng gan. As shown n Fg. 7(c) and (b), wth network codng, flow 2 mantans relatvely stable queue length and stable packet delay, snce newly-joned packets of flow 2 can be mmedately coded wth the queueng packets of flow. However, the opportunstc delay enlarges both the queue length and the packet delay of flow. Fg. 7(d) llustrates that SADCM mantans a hgh codng gan. We also mplement the BLUE [4] for comparson. The BLUE router mantans a probablty p m, whch decdes the chance of droppng or markng the packets when they arrve. If the packets are dropped due to overflow, the router ncreases p m by h ; n contrast, f the downstream lnks are dle, the router decreases p m by h 2. Usually h s much larger than h 2. BLUE also uses a parameter Table 2 Case confguraton. Parameters Settngs Mean arrval rate of flow (k ) / Mean arrval rate of flow 2 (k 2 ) /2 Maxmum buffer sze (K) 2 Mean servce rate (l) / Length of tme perod (T) Addtve ncrement of D (D D ).2 Bounded regon sze of D () EWMA weghtng factor (a).8 Reserved porton of the queue space (P rsv ) /4

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Buffer-aided link selection with network coding in multihop networks

Buffer-aided link selection with network coding in multihop networks Loughborough Unversty Insttutonal Repostory Buffer-aded lnk selecton wth network codng n multhop networks Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Ctaton:

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

A Sub-Critical Deficit Round-Robin Scheduler

A Sub-Critical Deficit Round-Robin Scheduler A Sub-Crtcal Defct ound-obn Scheduler Anton Kos, Sašo Tomažč Unversty of Ljubljana, Faculty of Electrcal Engneerng, Ljubljana, Slovena E-mal: anton.kos@fe.un-lj.s Abstract - A scheduler s an essental element

More information

Enhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms

Enhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms Enhancng Class-Based Servce Archtectures wth Adaptve Rate Allocaton and Droppng Mechansms Ncolas Chrstn, Member, IEEE, Jörg Lebeherr, Senor Member, IEEE, and Tarek Abdelzaher, Member, IEEE Abstract Class-based

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Neural Network Control for TCP Network Congestion

Neural Network Control for TCP Network Congestion 5 Amercan Control Conference June 8-, 5. Portland, OR, USA FrA3. Neural Network Control for TCP Network Congeston Hyun C. Cho, M. Sam Fadal, Hyunjeong Lee Electrcal Engneerng/6, Unversty of Nevada, Reno,

More information

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks www.hurray.sep.pp.pt Techncal Report -GAME: An Implct GTS Allocaton Mechansm n IEEE 802.15.4 for Tme- Senstve Wreless Sensor etworks Ans Koubaa Máro Alves Eduardo Tovar TR-060706 Verson: 1.0 Date: Jul

More information

Analytic Evaluation of Quality of Service for On-Demand Data Delivery

Analytic Evaluation of Quality of Service for On-Demand Data Delivery Analytc Evaluaton of Qualty of Servce for On-Demand Data Delvery Hongfe Guo Haonan Tan ( guo@cs.wsc.edu) (haonan@cs.wsc.edu) Abstract Qualty of servce (QoS) measured as balkng probablty and average watng

More information

Analysis of a Polling System Modeling QoS Differentiation in WLANs

Analysis of a Polling System Modeling QoS Differentiation in WLANs Analyss of a Pollng System Modelng QoS Dfferentaton n WLANs T.J.M. Coenen Unversty of Twente Department of Appled Mathematcs Enschede, The Netherlands t.j.m.coenen@utwente.nl J.L. van den Berg TNO Informaton

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

On the Fairness-Efficiency Tradeoff for Packet Processing with Multiple Resources

On the Fairness-Efficiency Tradeoff for Packet Processing with Multiple Resources On the Farness-Effcency Tradeoff for Packet Processng wth Multple Resources We Wang, Chen Feng, Baochun L, and Ben Lang Department of Electrcal and Computer Engneerng, Unversty of Toronto {wewang, cfeng,

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

TECHNICAL REPORT AN OPTIMAL DISTRIBUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION. Jordi Ros and Wei K Tsai

TECHNICAL REPORT AN OPTIMAL DISTRIBUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION. Jordi Ros and Wei K Tsai TECHNICAL REPORT AN OPTIMAL DISTRIUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION Jord Ros and We K Tsa Department of Electrcal and Computer Engneerng Unversty of Calforna, Irvne 1 AN OPTIMAL

More information

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms On Achevng Farness n the Jont Allocaton of Buffer and Bandwdth Resources: Prncples and Algorthms Yunka Zhou and Harsh Sethu (correspondng author) Abstract Farness n network traffc management can mprove

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Space-Optimal, Wait-Free Real-Time Synchronization

Space-Optimal, Wait-Free Real-Time Synchronization 1 Space-Optmal, Wat-Free Real-Tme Synchronzaton Hyeonjoong Cho, Bnoy Ravndran ECE Dept., Vrgna Tech Blacksburg, VA 24061, USA {hjcho,bnoy}@vt.edu E. Douglas Jensen The MITRE Corporaton Bedford, MA 01730,

More information