A Recovery Algorithm for Reliable Multicasting in Reliable Networks

Size: px
Start display at page:

Download "A Recovery Algorithm for Reliable Multicasting in Reliable Networks"

Transcription

1 A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL {dzhang, Ragopal Kannan S. Sitharama Iyengar Dept. of Compter Science Loisiana State University Baton Roge, LA {rkannan, Abstract Any reliable mlticast protocol reqires some recovery mechanism. A generic description of a recovery mechanism consists of a prioritized list of recovery servers/receivers (clients), hierarchically and/or geographically and/or randomly organized. Recovery reqests are sent to the recovery clients on the list one-byone ntil the recovery effort is sccessfl. There are many recovery strategies available in literatre fitting the generic description. In this paper, we propose a polynomial time algorithm for choosing the recovery strategy with low recovery latency withot sacrificing mch bandwidth. We compared or method with two existing recovery methods, SRM (Scalable Reliable Mlticast) and RMA (Reliable Mlticast Architectre), by simlation and fond that or method performs better. Althogh or theoretical analyses are based on a reliable network, or simlation reslts show that or strategy performs as well with the per link loss probability in a network p to 20% or more.. Introdction and literatre srvey Best-effort IP mlticast transmission withot any garantee of reliability has led to a wide and deep discssion of how to provide efficient and scalable error recovery schemes for reliable mlticast. Nmeros sch schemes have been sggested by researchers. Althogh their naming conventions and techniqe details are different, these schemes can be classified into three main categories, i.e., sorce-based, server-based and peerbased recovery schemes, with respect to the responsibility of retransmission and the need for frther groping (for other taxonomies, please refer to [] and [2]). In sorce-based recovery schemes, the sorce exclsively retransmits all the lost packets to the reqesting receivers. This mechanism garantees that one recovery attempt is enogh for each reqest, and ths redces the overhead incrred by failed recovery attempts. However, it needs some techniqe to handle ACK/NACK implosion problem and exposre [3] problem. Or previos research [4] is an endeavor to resolve these problems. NP [5] and [6, 7] are also sorce-based recovery protocols. This paper does not focs on this category. Server-based recovery schemes sally partition grop members into sbgrops (or local grops) hierarchically and/or geographically and allocate one server for each sbgrop to detect recovery reqests and recover the lost packets. A common problem existing in this mechanism is how the server recovers the lost packet in the case that the server itself does not receive it. The sal soltion for this problem is to send reqest to a prioritized list of servers/proxies/sorce one-by-one till sccess. A nmber of server-based recovery protocols [9, 0,, 2, 3, 4, 5, 6] either simply send reqests to some pstream servers/sorce or constrct a tree-based hierarchy to organize these servers. The prioritized list for the treebased hierarchy contains those nodes along the path from the reqesting server to the sorce in sch order. Treebased strctre can not garantee the prioritized list have low recovery latency, while or strategy gives a polynomial time algorithm to compte the prioritized list of servers/proxies with low recovery latency. Note that or strategy does not belong to this category, bt it can be sed as part of any scheme in this class. In peer-based recovery schemes, it is p to the receivers to detect packet loss and send the reqest to other receivers [7, 8, 9] or third-party [20]. There is no sbgroping operation in this scheme. This mechanism also needs some recovery strategy, which shold satisfy two conditions, ) low latency; 2) low correlation of packet loss. Nearby receivers/proxies can be efficient, bt they are tightly correlated in terms of packet loss since they share many common links in the mlticast tree. Receivers/proxies closer to the sorce have a better chance of receiving the lost packet, bt the farther, the longer the latency is. SRM (Scalable Reliable Mlticast) [7] is an early peer-to-peer recovery scheme. In SRM, if a receiver R lost a packet P, R will set a reqest-sppression timer, once this timer expires and R has not received any reqest for packet P, R will mlticast its reqest. If receiver/sender S receives R s reqest and S has packet P, then S will set a repair-sppression timer, once this timer expires and S has not received any repair for packet P, then S will mlticast that repair. SRM is qite scalable and the reqestsppression and repair-sppression timers effectively

2 Sorce Backbone network of mlticast-capable roters Shared Roters in the grop Ghost Recipients Figre. A mlticast network tree redce the nmber of dplicate NACKs and repairs to be mlticasted, however, these timers also increase the recovery latency. Frthermore, mlticasting NACKs/repairs adds some nnecessary load on roters and significantly increases the nmber of bandwidth being sed. In RMA (Reliable Mlticast Architectre) [9], each receiver that lost some packet attempts to achieve the shortest delay from the nearest pstream (from this receiver toward the sorce) receiver that has received the packet. Once the reqest approaches an pstream receiver that has the packet, this receiver will mlticast the repair to the sbtree that contains all the receivers that have been reqested. This scheme is efficient in that when the reqest reaches a repairer, it garantees that all receivers that have been reqested also lost that packet. This scheme is not efficient in that one-by-one searching is st besteffort, not strategic. These two schemes did not deeply analyze the peerbased recovery problem, ths cold not provide a recovery strategy with low recovery latency and bandwidth sage, which is primary contribtion of this paper. Or simlation compared the performance of or recovery strategy with that of SRM and RMA. PGM [8] and STORM [20] are two other peer-based recovery schemes, bt they apply repair server placement mechanism, which is ot of the scope of this paper s discssion, therefore, or simlation did not take these two schemes into accont. The rest of this paper is organized as follows. In section 2, we describe the network topology and or recovery strategy. In section 3, we give or algorithmic framework for peer-based recovery, along with the obective fnction for compting the recovery latency. In section 4, we present a polynomial time algorithm to compte the recovery strategy with low delay and exploit a directed acyclic strategy graph to show how we get the shortest delay in the digraph from or algorithm. Section 5 depicts or simlation reslts. Or conclsion for this paper is given in section 6. Figre 2. Ghost nodes represent shared links 2. Problem description Refer to Table in [26] for the meaning of some of the symbols we are sing in this paper. We are interested in the reliable mlticast problem over a reliable network, for example, distribting a large file to a nmber of clients, etc. Sch applications need fll reliability. As discssed in introdction, the peer based and server-based schemes distribte the recovery load in different regions of the network and hence introdce little extra delay over the delay created by the ambient (or backgrond) traffic. 2.. Topology of the Network Withot loss of generality, we assme that the sorce and clients are individal compters connected to a backbone of roters. Algorithmically, this assmption pts the clients at the leaves and the sorce at the root of the mlticast tree. Strictly speaking, we really need to pt the sorce at the root of the mlticast tree otside roter backbone. The clients/proxies/servers may as well be internal nodes. Figre describes the network topology pictorially and demonstrates a convention followed over the rest of this paper. A straight line between two nodes means a direct link, while a wavy line implies a mlti-hop path withot any branching in the middle. This topology simplifies the description of or algorithm and may be relaxed with little extra effort. And or theoretical research is based on a reliable network, like ATM or optical network, i.e., the per-link loss probability p is so low that we can assme p 2 0. This is a reasonable assmption in a reliable network [24] and we make this assmption becase most of or theoretical analyses are based on low loss probability, however, in section 5, or simlation reslts show that or recovery strategy conclded from the theoretical research can still have qite low recovery latency and bandwidth sage even if the per-link loss probability is p to 20% or more. Therefore, we can claim that this assmption is reqired for or theoretical work, bt not necessary for the application of or strategy. 2

3 2.2. RP (Recovery strategy with Prioritized list) We model the network sing a graph G=(V, E) where V is the set of nodes (roters/clients/sorce) and E is the set of links. The word client is sed to mean recovery servers or grop members of the mlticast grop (except the sorce). We present the work sing only point-to-point links. However, a shared link may be expressed as mltiple point-to-point link sing ghost nodes (Figre 2). If the packet is lost over the shared link, depending on the natre of loss (partial or total), we may assign the loss to appropriate link(s) in the converted topology with ghost nodes. In fact, a shared link acts as a mlticast capable roter making copies of the packet sing broadcast capacity. Hence the ghost node may be viewed as the shared link itself. Frther, we assme that the mlticast is performed over a sbtree T of G where the vertex set of T = C T RT where C T is the set of clients and sorce (the leaves and root) and R T is the internal nodes (roters). We do not make any assmption abot the properties of T. T can be the mlticast tree generated by CBT or PIM or any other mlticast roting protocol [25] and its topology is therefore known. The roters do not save any data packet after forwarding. Hence, if a packet is lost, it needs to be recovered either from sorce or from another client (peer) which has received the packet. We define or recovery strategy as follows, For every node CT {} S, we have a prioritized list of peers (other clients) L = { v } and L CT {, S}. If detects a loss, it reqests v for the packet. If v does not send the packet (detected by timeot), reqests the packet from v 2 and so on. If the packet may not be recovered from v,,v, then will k recover it from S by defalt. We recognize the possibility that in some rare cases S may receive large nmber of recovery reqests. The recovery load on S may be redced by groping clients in a net neighborhood together. Whenever S receives a recovery reqest, it will mlticast the packet to all members of the sbgrop (sing the original mlticast tree) from where the recovery reqest came. Reference [4] discsses one sch sorce-based sbgroping strategy in detail. The size of the recovery strategy, k = may be different for different clients. L Since different recovery strategies have different delays, the performance of recovery algorithm depends on the choice of the recovery strategy. For the convenience of reference, we call or low-latency recovery strategy RP, meaning Recovery strategy based on Prioritized list. The rest of this paper is dedicated to developing an exact algorithm for compting RP. 3. Algorithmic framework for peer-based recovery 3.. Expected vale of rond trip time The primary appeal of peer-based recovery strategies lies in their potential to lower the recovery delay. Hence, we want to select the recovery strategy that will reslt in low recovery delay for each client. Let a recovery strategy for client be L = { v }. As described earlier, the recovery reqest will be sent to, only if the earlier recovery reqests (sent to v, ) fail. For notational convenience, let V i be the event that the recovery reqest to is sccessfl. The complimentary event V i is the reqest fails. Similarly, let U be the event that has received the packet and U be the event that has not received the packet. Let d ( ) be the time reqired to decide whether a recovery reqest to has been sccessfl. If the recovery reqest is sccessfl, then within d ( ) time (after sending recovery reqest), receives the packet. If the packet is not received by within d ( ) time, then assmes that the recovery effort has failed and sends a new recovery reqest to + or S. d may be estimated sing many different methods. For ( ) example, d ( ) may be estimated sing timeot. However, timeot is sally a gross overestimation of d ( ). Alternately,, if the roting algorithm sed in OSPF (Open Shortest Path First) and the network ses link-delay as link cost, then the roting Table will give an estimate of oneway delay between and [8], ths ( ) d may be estimated sing rond trip time (over twice the one-way delay) between and. However, this method nderestimates d ( ). We sggest the following method for estimation of d ( ). Let the timeot be t 0. This mch delay will incr if the recovery effort fails. Let the rond trip time between and be d i. d i is estimated from roting table and incldes all the qeing delays in intermediate roters. If the packet recovery effort from is sccessfl, the approximate delay is d i. Frther we assme that the packet recovery effort fails only if has not received the original packet. The probability that the reqest or the repair is lost is ignored. This is reasonable for a reliable network. Combining these two delays, we estimate d ( ) as d( v ) d P( V U V V ) t P( V U V V ) () is the conditional probability that has received the packet given have not received the packet. ) i = i i i + 0 i i P( Vi U V V i ), v,, P( V i U V V i is the 3

4 R, R 2 Figre 3. Naming convention of the network x 0 R i- v v 2 Figre 4. A network scheme Assisting Proof conditional probability that has not received the packet given that, v have not received the packet. We did not cont the protocol stack exection cost in () explicitly. We assme that those costs are incorporated in d i and t Conditional probabilities R i In Lemma, we derive an expression for these conditional probabilities for a reliable network. And we compte the corresponding conditional probabilities assming p 2 0, which is necessary only for theoretical analyses as described and explained in sbsection 2.2. Here we introdce a naming convention for roters (refer to Figre 3). We call the first common roter of and v on the mlticast tree as R. Clearly we entertain the possibility that one roter may receive more than one name. Let DS be the length of the path (hop cont) from S to R on the mlticast tree. Withot loss of generality, let R i be nearer to S than R i-, i.e., DSi DS for all i (refer to Figre 4). i Lemma If the network is reliable, then DSi P( V i U V Vi ) =. DSi Proof Refer to proof for Lemma in [26]. - DS DS i- DS i R x v R i- R i x i- - S S x i The next lemma along with lemma allows s to compte all failre probabilities. Lemma 2 For a reliable network, P( V U V V V + Vi ) = if i. Proof Similar to the proof of lemma. Observation DSi P( Vi U V Vi ) = and DSi P( V U V V V + Vi ) = 0. Observation allows to compte expected delays in (). Lemma 3 For a reliable network, DSk P ( V V2 Vk U ) = DS Proof Similar to the proof of lemma. Observation 2 P( V V2 Vk U ) = P( Vk U ) for a reliable network. Lemma 3 and Observation 2 will be sefl to compte or obective fnction and to derive a polynomial time algorithm for optimizing the obective fnction. Example Compting conditional probability & delay () Refer to Example in [26] Obective fnction Given the lemmas and observations, we are ready to compte or obective fnction. As described earlier, or obective fnction is the expected delay for a recovery strategy. Let s assme that a recovery strategy for client is L = { v,, }. We assme earlier that a recovery reqest to may fail primarily if also has not received the packet, then the expected delay for the recovery reqest may be compted from the following formla, Delay( L ) = d( v) V U ){ d( v2) V2 U V )[ d( v3) + ] } = d( v) V U ) d( v2) V U ) P( V2 U V ) d( v3) + V U ) P( V2 U V ) P( Vk U V Vk ) d( S) This formla is obtained from the obective fnction that a recovery reqest to v will be sent only after all recovery reqests to v, v fail. Note that, from the definition of conditional probability, P( V U ) P( V U V ) P( V U V V ) 2 = P( V V U ) Therefore, the expected delay can be simplified as Delay( L ) = d( v) V U) d( v2) V2 V U ) d( v3) + (2) V Vk U) d( S) Eqation (2) gives s the expected delay for a recovery strategy. In next section, we give an algorithm that comptes the recovery strategy with low delay. Example 2 Comptation of the Obective Fnction Refer to Example 2 in [26]. 4

5 4. Compting low-latency recovery strategy We call two clients competitive clients with respect to if their nearest ancestor on the path from S to (in the mlticast tree) is the same. It is easy to see that two or more competitive clients may not belong to the lowlatency recovery strategy for. Lemma 4 Let, v be competitive clients. Let L = { v,, v } be a recovery strategy. Let L ' be another recovery strategy identical to L except that v is dropped, (i.e., L ' = { v,, v, v +, }), then L ' is at least as good as L. Proof Refer to the proof for Lemma 4 in [26]. Example 3 Competitive Clients Refer to Example 3 in [26] Clearly, the competitive relation is an eqivalence relation that partitions the clients into eqivalence classes. For each roter on the S to path in the mlticast tree, there may be one sch eqivalence class depending on whether that roter copies the packet or not. The recovery strategy with low delay may contain at most one client from each eqivalence class. In particlar, the member of an eqivalence class with shortest delay (as per ()) is the only possible entry from that class in the low-latency recovery strategy. To begin with, we identify the candidates from each class (tie broken at random) and call them candidate clients. The recovery strategy is a sbset of the set of candidate clients. Here we remember a notation introdced in sbsection 3.2. For the candidate client v, R is the first common roter of and v. The distance between S and R (in terms of hop cont) on the mlticast tree is DS. If a recovery reqest to v fails, then in all likelihood, v did not receive the packet. Both and v did not receive the packet implies (with a very high probability) that the packet was lost on the path from S to R. This in trn implies (with high probability) that the client downstream from R has not received the packet and any frther recovery reqest to them will fail almost certainly. This observation means that if, v appears in the optimal recovery strategy in the order and then v, then DS i > DS. The next lemma proves this reslt formally. Lemma 5 Let L = { v,, v } be a recovery strategy where DS i < DS. Let L ' be another recovery strategy obtained from L by dropping v, then L ' is at least as good as L. Proof Refer to the proof for Lemma 5 in [26]. At this point of time, we know that the clients in the low-latency recovery strategy are all candidate clients and sorted in descending order of DS s. Sch recovery strategies are called meaningfl strategies. Example 4 Descending-Ordered Strategy is Meaningfl Refer to Example 4 in [26] Now we rewrite or obective fnction as follows, if L = { v,, } is a meaningfl recovery strategy, then Delay( L ) d v [ DS d( v ) DSk d( vk ) DSkd( S) ] (3) = ( ) DS d(s) is the shortest delay from to S (not necessarily sing the path on the mlticast tree). DS is the hop cont from S to on the mlticast tree. Let { v,,v N } be the set of all candidate clients sorted in descending order of DS s. To choose the low-latency recovery strategy, we se a weighted directed acyclic graph called the strategy graph. Definition The strategy graph over the set of candidate nodes { v,,v N } is an edge-weighted directed acyclic graph with node set V = {, S, v,, v N }. There are directed edges from all nodes to S and from to all other nodes. In addition, there are directed edges vi v for all i<. Formally, the edge set is E = {( S )} {( vi ) i = N} {( vi S ) i = N} {( vi v ) i N} The edge weights are as follows, w ( S ) = d( S ) w( vi ) = d( vi ), i = N DSi w( vi v ) = d( v ), i N DS DSi w( vi S ) = d( S ), i = N DS Note that, any path from to S in the strategy graph is a recovery strategy for. The length of the path is the expected delay of that particlar strategy. More detail is given in the following example. Frther, the strategy graph may be modified to represent restricted strategies also. For example, if we do not want any client to go to sorce directly, we remove the ( S) edge from the strategy graph. Sch a strategy will alleviate congestion at sorce if there are many clients close to sorce. Many similar sefl restrictions of this graph are conceivable. Example 5 Strategy Graph Refer to Example 5 in [26] From the above example and discssion it is clear that the low-delay strategy is obtained by compting a shortest path from to S in the strategy graph. From definition, the strategy graph has O(N) vertices and each vertex has O(N) otgoing edges. Therefore the nmber of edges in the strategy graph is O(N 2 ). The shortest path algorithm (Dikstra s) rns in O( elog N ) time, where e is the nmber of edges in the graph. However, or strategy graph is a directed acyclic graph and hence the following algorithm will compte the shortest path in O(N 2 ) time, less than 2 O N log N. ( ) 5

6 Algorithm Searching_Minimal_Delay. For each node, have a distance field and a parent field. 2. Set the distance field of to 0 and parent field to nil. Set the distance field of other nodes to infinity and parent field to nil. 3. Process the vertices (step 4) in the following order,, v v, N S 4. If crrent vertex being processed is S, go to step 5. If the crrent vertex is x, do the following, If distan ce( x) dis tan ce( S ) then skip this node and go back to step 4 else for directed edge x y if dis tan ce( x) + w( x y) < dis tan ce( y) then dis tan ce( y) w( x y) + dis tan ce( x) ; parent( y) x 5. distance(s) is the shortest delay and the path Sparent(S)parent(parent(S)) gives the recovery strategy with the shortest delay in the digraph. Example 6 Searching the Exact Peer-based Recovery Strategy Refer to Example 6 in [26] Algorithm processes each edge exactly once, Hence the complexity of algorithm is O(N 2 ). Correctness of algorithm is trivial when compared with Dikstra s shortest path algorithm. N is the nmber of eqivalence classes obtained from the competitive node relation. 5. Simlation reslts and analysis The primary obectives of or simlation are to explore how short the recovery latency can be achieved from or recovery strategy RP and to verify that even if RP can make as low recovery latency as possible, no extra bandwidth needs to be sacrificed. Besides efficiency, or simlation also tests the scalability of or algorithm. And as mentioned before, althogh the whole theoretical research in this paper is based on a reliable networking environment, or simlation also examines the performance of or recovery strategy, conclded from or theoretical analyses, in an nreliable network environment with the per link loss probability p to 20% or more. We compared the performance of RP with that of SRM and RMA, as described in section. 5.. Simlation parameters and settings We se a discrete event packet level simlator. Network topology for se in the simlator is randomly generated and as described in section 2. The sorce or Average delay per packet recovered (milliseconds) SRM 450 RMA 400 RP Nmber of clients Figre 5. Average recovery latency per packet recovered (p=5%) Average bandwidth sage per packet recovered (hops) SRM RMA RP Nmber of clients Figre 6. Average bandwidth sage per packet recovered (p=5%) links are randomly generated to connect m backbone roters. The mlticast tree is st a spanning sbtree generated in the network topology. Mlticast packets are roted along the paths in mlticast tree while nicast packets are roted along paths that minimize expected vale of rond trip time in the network model, which match the descriptions of all the three strategies being compared in or simlation. Frther, the typical delay for each link i is d(i) and a niformly distribted nmber between d(i) and 2d(i) is generated as the expected delay being sed in or simlation. Let n be the total nmber of nodes in or network model and k be the total nmber of clients where n is an inpt to the program and k is decided by the randomly generated spanning sbtree. Frthermore, nlike a real network, the link delay and loss properties are independent of the nmber of packets traversing the link. The reslt is that simlations will favor protocols that generate more data. Since SRM that ses global mlticast and RMA that employs partial mlticast generate more data than RP, the simlator is likely to be optimistic abot 6

7 RMA s performance and more optimistic abot SRM s performance Simlation reslts and analyses In order to evalate the efficiency and scalability of RP, we ran simlations on topologies with 50, 00, 200, 300, 400, 500, 600 nodes in the network model which generates 4, 35, 77,, 57, 208, 246 clients respectively, as shown in Figre 5 and Figre 6. The per link loss probability in these simlations is 5%. According to Figre 5, average recovery latency of RP is 77.78% shorter than that of SRM and 7.3% shorter than that of RMA. From Figre 5, we can also see that the vales of recovery latency for RP and SRM are within a small range and not increased sharply, while the vales of recovery latency for RMA are not as steady as those of RP and SRM, which indicates RP and SRM are more scalable than RMA. According to Figre 6, RP does not sacrifice bandwidth compared to SRM and RMA. Actally, average bandwidth sage for RP is 38.53% smaller than that of SRM and 23.2% smaller than that of RMA. Figre 7 and Figre 8 show that when the nmber of nodes in the network model is 500, generating 208 clients, for per link loss probability is 2%, 4%, 6%, 8%, 0%, 2%, 4%, 6%, 8% and 20%, what the vales of average delay and bandwidth sage are. The prpose of these simlations is to examine the three schemes performance in the networks with varios reliabilities. The reslts show that the average vales of recovery latency for the three recovery schemes are almost constant when the per link loss probability changes from 2% to 20%, which means the three schemes can perform as well in nreliable network as in reliable network. Average bandwidth sage of SRM is decreased while that of RMA and RP is increased. This is becase with the per link loss probability increased, more clients lose the same packet, while SRM employs mlticast to the whole tree as retransmission method, i.e., the total bandwidth sage for SRM for recovering each packet is fixed, ths the average bandwidth sage drops with nmber of clients being recovered increased. While for RMA and RP, the cost of retransmission for a lost packet is not a fixed vale, it increases with the nmber of reqesters added. An anomaly happens when p is changed from 8% to 20%. This is becase the randomly generated mlticast tree strctre is more appropriate to RMA and RP than to SRM compared to mlticast trees previosly generated. And from Figre 7, average recovery latency of RP is 78.53% shorter than that of SRM and 56% shorter than that of RMA. From Figre 8, average bandwidth sage for RP is 5.83% smaller than that of SRM and 9.52% smaller than that of RMA. Average delay per packet recovered (milliseconds) SRM 450 RMA 400 RP Per link loss probability (%) Figre 7. Average delay per packet recovered (n=500 and k=208) Average bandwidth sage per packet recovered (hops) SRM RMA Per link loss probability (%) Figre 8. Average bandwidth sage per packet recovered (n=500 and k=208) 6. Conclsion In this paper we present a polynomial time algorithm for compting low-latency recovery strategy for reliable mlticast in a reliable network. The recovery strategies proposed in literatre either choose a locally random recovery strategy or prefers clients in the net neighborhood for recovery prpose. Random recovery strategies may increase the cost of recovery by choosing far-away clients or highly correlated clients. As the loss in a mlticast tree is correlated (if a link fails, all down stream clients lose the packet), choosing a nearby client for recovery prpose will increase the probability of failed recovery attempts. Or algorithm helps to choose the best recovery strategy, which may not be random or geography based. Or simlation shows that or RP scheme can achieve mch shorter recovery latency and cost low bandwidth, and it also performs well in nreliable network. RP 7

8 References [] Marin S. Lacher, Jörg Nonnenmacher, and Ernst W. Biersack, Performance comparison of centralized verss distribted error recovery for reliable mlticast, IEEE/ACM Transactions on Networking, vol. 8, no. 2, pp , April [2] Sneha K. Kasera, Jim Krose, and Don Towsley, A comparison of server-based and receiver-based local recovery approaches for scalable reliable mlticast, in Proceedings of IEEE INFOCOM 98, San Francisco, CA, USA, March 998. [3] Christos Papadopolos, Gr Parlkar, and George Varghese, An error control scheme for large-scale mlticast applications, in Proceedings of IEEE INFOCOM 98, pp [4] Danyang Zhang, Sibabrata Ray and Ragopal Kannan, Static Sbgrop-based Sorce Recovery for Reliable Mlticast in Reliable Networks, in Proceedings of IEEE Globecom 2002, Nov. 2002, Taiwan. [5] J. Nonnenmacher, E. W. Biersack, and Don Towsley, Parity-Based Loss Recovery for Reliable Mlticast Transmission, IEEE/ACM Transactions on Networking, vol. 6, no. 4, pp , Ag [6] Sneha K. Kasera, Gisli Halmtysson, Don Towsley and Jim Krose, Scalable reliable mlticast sing mltiple mlticast channels, IEEE/ACM Transactions on Networking, vol. 8, no. 3, Jne [7] Sneha K. Kasera, J. Krose, and D. Towsley, Scalable reliable mlticast sing mltiple mlticast grops, Proceedings of ACM Sigmetrics Conference, Jne 997. [8] James F. Krose and Keith W. Ross, Compter Network: A Top-Down Approach Featring the Internet, 2 nd ed., Addison Wesley, 2002, pp. 350 [9] John C. Lin and Sanoy Pal, RMTP: A reliable mlticast transport protocol, IEEE INFOCOM '96, March 996, pp [0] Roger Kermode, Scoped Hybrid Atomatic Repeat reqest with Forward Error Correction (SHARQFEC), in Proceedings of ACM SIGCOMM 98, Vancover, BC, Canada, October 998. [] Kang-Won Lee, Sngwon Ha, and Vadvr Bharghavan, IRMA: A reliable mlticast architectre for the Internet, IEEE INFOCOM, 999, pp [2] Matthew T. Lcas, Bert J. Dempsey, and Alfred C. Weaver, MESH: Distribted error recovery for mltimedia streams in wide-area mlticast networks, in International Conference on Commnication, ICC 97, Montreal, Canada, Jne 997, pp [3] M. Lcas, B. Dempsey, and A. Weaver, MESH-R: Large-scale, reliable mlticast transport, IEEE International Conference on Commnication (ICC '99), Vancover, BC, Jne 999, pp [4] M. Hofmann, Enabling grop commnication in global networks, Proceedings of Global Networking 97, Calgary, Alberta, Canada, November 996. [5] Inong Rhee, Nallathambi Balagr, and George N. Roskas, MTCP: Scalable TCP-like congestion control for reliable mlticast, IEEE INFOCOM, 999, pp [6] R. Yavatkar, J. Griffioen and M. Sdan, A reliable dissemination protocol for interactive collaborative applications, Proceeding of ACM Mltimedia, November 995. [7] S. Floyd, V. Jacobson, C. Li, S. McCanne, and L. Zhang, A reliable mlticast framework for light-weight sessions and application level framing, IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp , Dec [8] Speakerman, Tony, Farinacci, Dino, Lin, Steven, Tweedly and Alex, PGM Reliable Transport Protocol Specification, Internet Draft, [9] B.N. Levine and J.J. Garcia-Lna-Aceves, Improving internet mlticast with roting labels, IEEE International Conference on Network Protocols (ICNP- 97), October 28-3, 997. p [20] Knwadee Sripanidklchai, Andy Myers, and Hi Zhang, A third-party vale-added network service approach to reliable mlticast, SIGMETRICS '99. [2] D. Towsley, J. Krose, and S. Pingali, A comparison of sender-initiated and receiver-initiated reliable mlticast protocols, IEEE Jornal on Selected Areas in Commnications, vol. 5, no. 3, pp , 997. [22] Lin Y, Ma W, Long Keping, and Cheng Shidan, Analyzing the delay performance of server-based and receiver-based local recovery approaches for reliable mlticast, Info-tech and Info-net, 200. Proceedings. ICII Beiing. 200 International Conferences on, vol. 2, 200, pp [23] Athina P. Markopolo and Foad A. Tobagi, Hierarchical reliable mlticast: performance analysis and placement of proxies, Proceedings of NGC 2000 on Networked grop commnication, November [24] T. Chanoy, J. Fingerbt, M. Flcke, and J. S. Trner, Design of a gigabit ATM switch, Proc. Infocom 997, Kobe, Japan, pp.2-. [25] Sanoy Pal, Mlticasting on the Internet and Its Applications, Klwer Academic Pblishers: Massachsetts, 998. [26] Danyang Zhang, Sibabrata Ray, Ragopal Kannan and S. Sitharama Iyengar, An Optimal Recovery for Reliable Mlticasting with Sparse Clients, Technical Report, Department of Compter Science, University of Alabama, TR

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Collision Avoidance and Resolution Multiple Access: First-Success Protocols Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

Generic Multicast Transport Services: Router Support for Multicast Applications

Generic Multicast Transport Services: Router Support for Multicast Applications Generic Multicast Transport Services: Router Support for Multicast Applications Brad Cain 1 and Don Towsley 2 1 Network Research, Nortel Networks Billerica, MA 01821, USA bcain@nortelnetworks.com 2 Department

More information

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 26: Dynamic Memory (2) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

THE Unit Commitment problem (UCP) is the problem of

THE Unit Commitment problem (UCP) is the problem of IEEE TRANS IN POWER SYSTEMS 1 A new MILP-based approach for Unit Commitment in power prodction planning. Ana Viana and João Pedro Pedroso Abstract This paper presents a novel, iterative optimisation algorithm

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Switched state-feedback controllers with multi-estimators for MIMO systems

Switched state-feedback controllers with multi-estimators for MIMO systems Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Chao Li Thomas Su Cheng Lu

Chao Li Thomas Su Cheng Lu CMPT885 High-Performance Network Final Project Presentation Transport Protocols on IP Multicasting Chao Li Thomas Su Cheng Lu {clij, tmsu, clu}@cs.sfu.ca School of Computing Science, Simon Fraser University

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Appearance Based Tracking with Background Subtraction

Appearance Based Tracking with Background Subtraction The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

A Tree-Based Reliable Multicast Scheme Exploiting the Temporal Locality of Transmission Errors

A Tree-Based Reliable Multicast Scheme Exploiting the Temporal Locality of Transmission Errors A Tree-Based Reliable Multicast Scheme Exploiting the Temporal Locality of Transmission Errors Jinsuk Baek 1 Jehan-François Pâris 1 Department of Computer Science University of Houston Houston, TX 77204-3010

More information

Fast Ray Tetrahedron Intersection using Plücker Coordinates

Fast Ray Tetrahedron Intersection using Plücker Coordinates Fast Ray Tetrahedron Intersection sing Plücker Coordinates Nikos Platis and Theoharis Theoharis Department of Informatics & Telecommnications University of Athens Panepistemiopolis, GR 157 84 Ilissia,

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Lecture 14: Congestion Control

Lecture 14: Congestion Control Lectre 14: Congestion Control CSE 222A: Compter Commnication Networks George Porter Thanks: Amin Vahdat, Dina Katabi Lectre 14 Overview TCP congestion control review XCP Overview CSE 222A Lectre 14: Congestion

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

Minimum Spanning Trees Outline: MST

Minimum Spanning Trees Outline: MST Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

CS 251, Winter 2019, Assignment % of course mark

CS 251, Winter 2019, Assignment % of course mark CS 25, Winter 29, Assignment.. 3% of corse mark De Wednesday, arch 3th, 5:3P Lates accepted ntil Thrsday arch th, pm with a 5% penalty. (7 points) In the diagram below, the mlticycle compter from the corse

More information

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages.

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages. J. Inform. Process. Cybernet. EIK?? (199?), (formerly: Elektron. Inform.verarb. Kybernet.) Optimization and Translation of Tablea-Proofs into Resoltion By Andreas Wolf, Berlin Abstract: Dierent kinds of

More information

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh

More information

Abstract 1 Introduction

Abstract 1 Introduction Combining Relevance Information in a Synchronos Collaborative Information Retrieval Environment Colm Foley, Alan F. Smeaton and Gareth J. F. Jones Centre for Digital Video Processing and Adaptive Information

More information