Embedding Algorithm for Virtualizing Content-Centric Networks in a Shared Substrate

Size: px
Start display at page:

Download "Embedding Algorithm for Virtualizing Content-Centric Networks in a Shared Substrate"

Transcription

1 Embedding Algorithm for Virtulizing Content-Centric Networks in Shred Substrte Shengqun Lio, Xioyn Hong, Chunming Wu, Ming Jing College of Computer Science nd Technology, Zhejing University, P.. Chin Deprtment of Computer Science, University of Albm, Tuscloos, AL Institute of Softwre nd Intelligent Technology, Hngzhou Dinzi University, P.. Chin Abstrct Network virtuliztion enbles diversified network rchitectures to coexist in substrte network. Content-centric network (CCN), s one of the mjor proposls for the future network, cn be deployed in the virtulized environment. However, the recent work tht hs ttempted in this direction hs not ddressed issues concerning the unique resource usge of CCN in resource lloctions during the embedding procedure when instntiting virtul CCN (VCCN). The unique problem is the cche component, i.e., the content store, in CCN. This pper will develop VCCN Mpping Algorithm (VCCNMA) tht optimizes the performnces of VCCN considering the content store request in ddition to CPU nd bndwidth. Since the resource lloction problem is NP-hrd, this pper thus proposes heuristic lgorithm. Severl sets of simultion experiments re performed to evlute the cceptnce rtio, the network cost, the storge utiliztion rtio nd lod blnce. esults show tht the lgorithm cn chieve better performnces. Moreover, the pper lso studies the trdeoffs between the network cost nd the lod blnce. Keywords - virtul network mpping; content-centric networking; network virtuliztion; distributed storge lloction; storge lod blnce I. INTODUCTION Content-Centric Networking (CCN) [1] is one of the min clen-slte rchitecture for the future Internet [2]. Under this communiction rchitecture, consumers brodcst interest pckets nd those who hve the content chunks serve the dt pckets. During the trnsmission, routers cn comprehend the content nme nd cche the content chunk in their content stores. Therefore, it is possible for ny routers to stisfy n interest pcket, if the content nme mtches cched chunk, without further forwrding the interest pcket to the dt source. The CCN rchitecture hs mny benefits, for exmple, improving performnces [3] nd lowering network costs [4]. On the other hnd, network virtuliztion llows different network services nd experiments to coexist in shred substrte network [5, 6 nd 7]. It is regrded s technology tht is ble to become long-term solution for reconciling the co-existence issue for Tody s Internet nd multiple future network innovtions [8]. As such, we believe tht CCN, populr future network proposl, cn be embedded s sliced instnce in the virtulized environment. In ddition, we lso believe tht embedding CCN is beneficil both for its rel production uses nd experimentl vlidtions. It cn be expected tht the lrge-scle network testbeds (e.g. Prof. Chunming Wu is the corresponding uthor. GENI [6] nd PlnetLb [9]) cn be fully utilized to vlidte performnces of innovtions in CCN. This pper is to ddress the resource lloction problem in the VCCN embedding procedure tht instntites VCCN onto the substrte network. The mjor problem is how to llocte resources of the substrte network to support the request of slicing VCCN request. Usully, CPU nd bndwidth re considered in generl virtul network embedding modules [1, 11 nd 12]. However, CCN hs its unique cche component, i.e., the content store [1]. No existing work hs considered the storge demnds in the embedding issue. Yet, s shown in this pper, such considertion cn led to efficient lgorithms tht improve the performnce of sliced CCN. In this pper, we will develop n efficient VCCN Mpping Algorithm (VCCNMA) to optimize the performnce of CCN when running in the network virtuliztion environment by considering its unique content store lloction needs. The key ide we propose in VCCNMA is to distribute the requested storges long the routing pths in the substrte network, whilst ssigning CPU nd bndwidth resources in greedy wy. However, the storge lloction optimiztion problem is proven to be Integer Liner Progrm (ILP) which is typicl NP-hrd problem [11]. As such, we relx the ILP to convex progrmming, nd introduce heuristic solution (SAA) for the distributed storge lloction issue. Severl simultion experiments re then performed to evlute VCCNMA in term of the cceptnce rtio, the network cost, the storge utiliztion rtio nd lod blnce. The results show our lgorithm cn chieve better performnces. In ddition, the embedding lgorithm needs to consider the trdeoff between the ccess cost nd the blnce of the storge lod. The ccess cost cn be lowered if more storge resources re ssigned closer to the destintion node. However, this strtegy cn threten the storge lod blnce needed by the Internet Service Providers (ISPs). To tckle the conflict, we introduce weight fctor in the proposed heuristic lgorithm. The desired trde-off between the lod blnce nd the ccess profit cn be chieved by djusting the weight. Simultions re performed to show how the weight influences the trdeoff. The rest of the pper is orgnized s follows: In Section II, we present the embedding model nd problem formultion. Section III describes VCCNMA in detil. Section IV gives simultion results vlidting our proposed lgorithm. Finlly, conclusion is presented in Section V.

2 II. CONSIDEATION OF STOAGE ALLOCATIONS A. Models for Virtul nd Substrte Networks Current reserches on embedding virtul network to substrte focus on improving the cceptnce rtio nd reducing the network cost, where constrints re usully the CPU cpcity nd bndwidth in virtul nodes nd links. Hence, corresponding solutions re mostly heuristic so s to reduce the computtionl complexity [1, 11 nd 12]. There re other works trying to implement CCNs in the virtulized environment [13, 14]. However, issues concerning the unique resource usge of CCNs during the embedding procedure, specificlly, the storge resource for content store, remin open. Here we present virtul network to physicl network (V2P) model tht cptures the VCCNs mpping. The model includes dding the storge ttribute for virtul/physicl nodes nd the direct routing constrint for virtul links in comprison to the generl model in ef. [1, 11 nd 12]. The proposed core strtegy is to distribute the requested storge to severl physicl nodes long the substrte pth which crries virtul link. Thus, we use directed grph to denote the virtul network, nd n undirected grph for the physicl network. Under this model, the trditionl undirected virtul link cn be viewed s two overlid directed ones. Further, we tret the forwrding behvior of interest pckets to be bi-directionl in the substrte network to ese the modeling of locting chunks in CCN. This tretment is resonble becuse the interest pckets re smll nd consume little bndwidth. Such model hs reduced complexities in the resource lloction, but it keeps CCN protocol behvior intct. B. Benefit nlysis of distributed storge lloction 3 1 A The CPU nd Storge request Fil b The vilble CPU nd Storge resources A B C D () Trditionl Virtul Network Embedding Succeed b f1 f2 B C D f1 f2 f3 f4 (b) Virtul Network Embedding with Distributed Storge Alloction Fig. 1: Mpping CCN using two virtul network models The cceptnce rtio is the min metric to guge the successfulness of mpping lgorithm. It cn be enhnced when the storge cpcities of ll nodes long the substrte pth re cultivted for distributed storge lloctions. In our model, the loctions nd the cpcities of the storge nodes f3 f4 re both considered. Fig.1 depicts the CCN mpping under the trditionl nd proposed virtul network embedding model, respectively. The virtul network (VN) hs only two nodes nd one link (b ), nd the physicl network (PN) hs four nodes on line (D C B A). The number in the squre box indictes the requested or vilble CPU resources on the virtul/physicl nodes, nd the number in round box indictes the requested or vilble storge resources. In this cse, we ssume the requested bndwidth of (b ) cn be stisfied by the substrte network. A trditionl forwrding mpping cretes tunnel for the virtul link onto the substrte pth. As shown in Fig.1., the virtul link (b ) is mpped onto the substrte pth (D C B A), where the bndwidth resources re reserved for dt pckets nd the virtul node nd b re embedded onto the substrte A nd D, respectively. If the requested storge of the virtul node b is 3, the embedding of b to D would fil becuse the substrte node D does not hve enough storge resources to host b s need in the trditionl wy. In contrst, the requested storge of 3 cn be stisfied in distributed storge lloctions. As shown in Fig.1.b, the requested storge 3 is distributed to nodes {B, C, D}, nd the virtul network embedding cn succeeds. Hence, the distributed storge lloction hs enhnced the VCCNs embedding cceptnce rtio. Another dvntge of distributed storge lloctions is tht the routing efficiency would not be reduced in CCNs, rther, be often incresed. Tke b s requested storges being 2 nd its cched chunks being {f 1, f 2, f 3, f 4 } s n exmple. In the trditionl mpping, ll the requested storge of b would be mpped onto D, nd node A cn get f 1 from D in three hops (Fig.1.). By the distributed storge lloction, f 1 cn be stored in B. outing from D to B is in two hops, nd A gets f 1 from B in one hop. As result, the totl ccess cost is three hops which is the sme s tht in trditionl mpping, when the ccess frequency F is 1. More benefits cn be chieved when F is bigger (F 1). According to the current usge of CCN, it is resonlbe to ssume tht F is much bigger thn 1 becuse populr content chunks re cched in routers [13]. Thus, in Fig.1., if A requests content f 1 fromdf times, the totl network cost is 3F. However, in distributed storge lloction (Fig.1.b), the first visit hs cost of 3. For the rest F-1 requests, only 1*(F- 1) hops re needed becuse f 1 hs been cched in B fter the first request. Thus, the totl cost reduces to F+2. The cost reduction is 2(F-1). In generl, with distributed storge lloctions, the cost reduction is i length ic i(f 1) in verge, where length is the totl hops of the substrte pth nd c i is the size of cche which is llocted to the ith node wy from the source node on the substrte pth. C. Whose requested storge cn be divided? Here we nlyze how to distribute the requested storges of virtul nodes. Although distributing requested storges of source nodes hs potentil to chieve higher ccess profits. Not ll the virtul source nodes requested storges could be prtitioned. Further work of trnsformtion of the input virtul network grph is needed. Using the term of grph theories, virtul source nodes could be clssified ccording to their outdegrees. For instnce, the set {} nd {b,c,d} in Fig.3. contin

3 9 4 e d 7 5 9, G V c e G V 1 3 b () Originl Virtul Network equest Trnsfer requested storge 4 6 d b 1 5 (b) Modified Virtul Network equest Fig. 2: Preprocessing virtul network inputs nodes of out-degree of two nd one, respectively. Firness considertion speks ginst find dividing nd distributing the requested storge of virtul nodes with two or more outdegrees. As the exmple in Fig.2. shows, if we ssign the requested storge of on the substrte pth of the virtul link( b), the virtul node c will suffer unfir tretment, becuse more hops to ccess the cched contents in b would be needed. Hence, we suggest to distribute the requested storge of the source nodes whose out-degree is 1 in the virtul network. With the bove nlysis, ech input virtul network cn be trnsformed to new grph. The requested storge of the source nodes which meet the fore-mentioned requirements cn be trnsferred to its djcent virtul link nd so the virtul link hs the storge ttribute. Hence, the originl input (Fig.2.) cn be trnsformed to Fig.2.b. D. Problem Formultion It is noted tht the storge distribution long the substrte pth does not hve to be uniform. There re cses tht one wnting more cost reductions tends to ssign more storge to substrte nodes tht re closer to the destintion. For exmple, if we trnsfer C s llocted storges (1 units) to B in Fig.1.b, 1*(F-1) more benefits could be chieved under the verge F ccesses for ech unit. Doing this would, however, jeoprdize the storge lod blnce in the substrte network, becuse blnced storge lod distribution is needed to increse the cceptnce rtio [1]. There is obviously trde-off between the contrdictory requirements nd we found tht VCCN mpping with Blncing the Access Profit nd the storge Lod Blnce (VCCN-BAPLB) is equivlent to the trditionl virtul network embedding problem, where the storge lod nd the ccess benefit from distributed storge lloctions under ny mpping cn be viewed s when the requested storge of ll virtul nodes is. It hs been proven tht the virtul network embedding problem cn be reduced to NP-hrd problem [15]. Therefore, VCCN-BAPLB is lso NP. III. ALGOITHM DESIGN In this section, we formulte our object which seeks for trde-off between the ccess benefit nd the storge lod blnce during the storge lloction. After the issue is proven to be NP, heuristic lgorithm (SAA) is proposed for the solution. VCCNMA strts with greedy node embedding, nd then uses the K-shortest lgorithm to find substrte pths for virtul links, followed by distributing requested storge of virtul links to nodes long the substrte pth with SAA. c 7 6 A. Trde-off between the ccess benefit nd the lod blnce We denote the substrte network by n undirected grph G S =(N S, E S, A S N, AS E ), where N S nd E S re the set of substrte nodes nd links, respectively. Substrte nodes nd links re ssocited with their ttributes A S N nd AS E, which ccounts for CPU, storge nd bndwidth. On the other hnd, the virtul network is described by directed grph G V =(N V, E V, CN V, CV E ), where N V nd E V refer to the set of virtul nodes nd links, respectively, nd CN V nd CV E re constrints for virtul nodes nd links in terms of CPU, storge nd bndwidth. The nodes in N V which stisfy the requirements for distributed storge lloctions re put into the set Φ. Thus, the VCCN embedding cn be defined s the following mpping: M: G V (N, P, N, L ), where N N S, P is loop-free pth in the substrte network. N nd L re the resources of substrte nodes nd links llocted to the virtul network G V. The mpping is fesible when the following conditions re stisfied: bw res (p ) bw(e v ), for e v p (1) cpu res (n ) cpu(n v ), for n v n (2) storge res (n ) storge(n v ), for n v n, iff n / Φ (3.1) storge res (n ) storge(n v ), for n v n, iff n Φ (3.2) n p n nd p re elements in N nd P, respectively. n v nd e v re virtul nodes nd links in G V. It mens the requested bndwidth should be fulfilled in the substrte pth. Tht lso requires the requested CPU nd storge resources of virtul nodes must be stisfied by the residul resources of its host nodes, if the virtul nodes requested storges cnnot be divisible. Otherwise, we distributed the requested storges of divisible nodes to the physicl nodes long the substrte pth. If the requested storges of v 1 is divisible nd the virtul link v 1 v 2 is mpped onto the substrte pth p =(n s, n s 2,..., n s t ), we should distribute the requested storges of v 1 to its physicl pth {n s, n s 2,..., n s t } for mximizing ccess profits nd minimizing lod differences in the storge mpping. n Define 1: We use L= mx{ v n s storge(nv ) storge(n v ) }, n s {n s, n s 1,..., n s t } to denote the storge s lod blnce on the substrte pth. n v n s storge(nv ) is the sum of requested storges of virtul nodes mpped onto n s. We cn see tht L is the lrgest storge utiliztion rtio mong nodes on the substrte pth. Define 2: If the size of content chunk is 1, the requested storge C totl of the virtul node v 1 is distributed to nodes {n s, n s 1, n s 2,..., n s t } s the vector {c s, c s 1, c s 2,..., c s t}, where t is the length of the substrte pth nd c i is the cche size llocted to the ith node wy from the source node in the pth. As is nlyzed in Section II, we cn define the ccess profits of distributed storge lloctions s: B = i t i c i (F 1) (4) The more storges re llocted for substrte nodes closer to the destintion node, the more benefits could be chieved. However, it would brek the lod blnce constrint. Hence, we introduce integer liner progrm to describe this problem. objective: minimize α K L - B (5) s.t.

4 c i storge res (n s i ), i t (6) c i = C totl (7) i t c i N, i t (8) The objective (Eq.5) is to gurntee the storge s lod blnce (Define 1) of substrte nodes, whilst mximizing the ccess benefits (Define 2) in distributed storge lloctions. Constrint (6) sys tht the substrte nodes must hve enough cpbility to ccept those llocted storges; while constrint (7) gurntees tht the sum of distributed storge resources is equl to the totl requested storge of the virtul source node. In Eq.8, the llocted storges for ll nodes long the pth should be multiple of the content chunk size, ssuming the size of content chunk is 1. The distributed storge lloction is integer liner progrm which is well-known NP-hrd problem [11]. However, the constrint (8) could be relxed s the following constrint: c i (9) After the relxtion, we nme the new liner progrm s Storge LP ELAX. It is bsed on convex optimiztion s formulted in the following: We suppose tht the current storge lod vector of ll nodes long the substrte pth is S=(s,s 1,s 2,...,s t ) nd the solution vector is C=(c,c 1,c 2,...,c t ). If the storge cpcity vector for these nodes is =(r,r 1,r 2,...,r t ), our objective (Eq.5) could be rewritten s follows: F(C)=α K mx{ si+ci r i }-P C T (F-1), i {, 1, 2,..., t} where P=(,1,2,...,t) is coefficient vector to clculte ccess benefits. Then we prove tht our objective is convex. To simplify our description, we replce mx{ si+ci r i }(i {,1,2,..., t}) with mx { S+C }. Also, we ssume the solution spce of Storge LP ELAX is Θ. X nd Y re the two solution vectors in Θ. Ifθ (, 1) nd (1-θ) X+θ Y Θ: F((1-θ) X+θ Y) = α K mx{ S+(1 θ) X+θ Y } +P ((1-θ) X T +θ Y T ) (F-1) α K mx{ 2S+(1 θ) X+θ Y } +P ((1-θ) X T ) (F-1) +P (θ Y T ) (F-1) α K mx{ S+(1 θ) X } +P ((1-θ) X T ) (F-1) + α K mx{ S+θ Y } +P (θ YT ) (F-1) F((1-θ) X) + F(θ Y) Therefore, the objective function F(C) is convex, nd this convex optimiztion (liner progrm) cn be solved in polynomil time with the interior-point polynomil lgorithm or ellipsoid lgorithm [16]. B. VCCN Mpping Algorithm When the requested storge of ll virtul nodes is set s, the VCCN mpping issue is equl to the trditionl virtul network embedding which is NP. Hence, we cn conclude the VCCN mpping is NP problem, nd heuristic lgorithm (VCCNMA) is then proposed for the problem. Initilly, we preprocess the input virtul network with discussions in Sec.II.C. After tht, we give the following formul: rnk(n s ) = storge(n s ) cpu(n s ) bw(l) (1) l Neighbor(n s ) to compute the weight for virtul/substrte nodes. Then, virtul nodes re mpped onto substrte nodes one to one ccording to their rnks in vlues clculted with formul (1), followed with the link mpping. In the link mpping phse, K-shortestpth lgorithm is utilized to find substrte pths for those virtul links. Finlly, we cll SAA lgorithm to distribute the requested storges of virtul links to ll nodes long the pth. If the link/node mpping nd SAA succeed, we ccept this virtul network. In SAA (Algorithm 1), for ech virtul link in the modified virtul network G V, we choose the shortest pth which met the requested storges from its cndidte pth set to support the virtul link for the reson tht it consumes lest bndwidth resources. Then, we solve the relxed liner progrm (Storge LP ELAX) so s to distribute requested storges to ll nodes long the substrte pth. Since the solution vector is rel, we then pply the brnch-nd-cut lgorithm to get the finl integer ssignment. TABLE I: P-code of SAA Algorithm 1: Storge Alloction Algorithm (SAA) Input: the virtul network G V, nd the pth set P S = 1 i E V P s i.(p s i is the K-pth set including k cndidte substrte pths for the virtul link e v i in GV ) Begin: 1. For ech e v i G v 2. Sort elements in P s i ccording to their lengths. 3. BOOL Flg =. 4. For ech p s i P s i // ps i =(ns, ns 1, ns 2,..., ns t ) 5. if storge res(n s i ) storge(ev i ) i t 6. Flg = 1, p = p s i //Sve the pth 7. Brek 8. end if 9. End for 1. if Flg =, then reject the request. 11. Solve Storge LP ELAX(storge(e v i ), p) 12. Apply the brnch-nd-bound serch for the finl integer ssignment. 13. End for End C. Complexity Anlysis In VCCNMA, the time complexity of the node mpping is O(N 2 ) for the greedy lgorithm. The time complexity of the link mpping is O(logN N 3 ) owe to the k-shortest-pth lgorithm s (O(logN N+k N)) (k logn) nd the mximl number of links O(N 2 ). Also, the Storge LP ELAX could be solved in polynomil time by the ellipsoid lgorithm or Krmrkrs interior point lgorithm [16]. Although the complexity of the brnch-nd-cut lgorithm is exponentil, we cn limit the itertion number for pproximte solution in polynomil time. IV. PEFOMANCE EVALUATION The purpose of our evlution is to vlidte tht our heuristic lgorithm cn chieve better performnces in the cceptnce rtio, the ccess cost, the storge utiliztion rtio nd lod blnce. The comprisons re mde to bseline lgorithm nd rndom lgorithm s no direct relted work exists. Further, the simultions lso show tht the trdeoff between the lod blnce nd the ccess profit cn be controlled by weight fctor. A. Simultion settings In this pper, the simultion environment is the sme s tht in ef.[12]. We use the brite tool [17] to generte substrte

5 network with 1 nodes. Ech pir of nodes in the network is connected with link with probbility.5. The vilble CPU nd storge resources for physicl node follow n uniform distribution between 5 nd 1. Also, the bndwidth resource for link is uniformly distributed in the rnge from 5 to 1. In contrst, the number of VN nodes follows unique distribution between 2 nd 1. Also, ech pir of virtul nodes is rndomly connected with probbility.5. The CPU, Storge nd bndwidth for virtul node/link re ll uniquely distributed from 1 to 2. The virtul network requests (VNs) rrive following Poisson process with n verge rte of 4 VNs per 1 time units. Ech VN s lifetime is 5 units. We run for bout 5 time units, which corresponds to 2 VNs on verge in one instnce of simultion. We compre our lgorithm with bseline lgorithm (BL- VNE) [12] nd rndom lgorithm (VNE) [18]. BL-VNE nd VNE both do not distribute the requested storges long the substrte pth. The difference between them is tht BL-VNE choses the host nodes ccording to their rnks in resources in the node mpping phse, while VNE rndomly select the mpping nodes. B. Metrics 1) Acceptnce rtio: We define our cceptnce rtio s formul (11), which is the division of the number of ccepted virtul networks nd the totl VNs. T i= cceptnce rtio = M(GV i ) (11) T i= GV i 2) Averge network cost: The totl network cost is the sum of expenses to ccess those requested storges vi the virtul link e v with n verge frequency F ev. We cn get the Averge Network Cost (ANC) by dividing the totl cost with the number of virtul links. ANC 1 = ANC Fe v = v i length e v c e e v E v i length e v E v e v E V i length E v (F ev 1)(length i)c ev i iff: F e v =1 (12) + AVC 1 iff: F e v > 1 (13) c ev i is the requested storge of the virtul link e v llocted for the ith node wy from the source node on the pth. length is the totl hops of the substrte pth of e v, nd F ev is the verge ccess frequency for e v s requested storges. 3) Averge storge utiliztion rtio nd stndrd devition of the storge resources in the substrte network: The verge storge utiliztion rtio is quotient of the sum of current substrte nodes s storge utiliztion rtio divided by the number of nodes. It is presented in formul (14): storge(n v ) U storge = n s N S n v N V n v n s storge(n s ) N S (14) As for the stndrd devition of the storge resources, we defined s formul (15): U σ = storge(n v ) n ( v N V n v n s storge(n s U ) storge) 2 n s N S N S (15) C. Simultion results nd nlysis Initilly, α is ssigned s 1, while K is set s 1 to blnce the mgnitude of the two vlues. After tht, we solve the integer liner progrm with ILOG CPLEX [19] nd get the sttisticl results in the cceptnce rtio, the network cost, the verge storge utiliztion nd lod blnce (stndrd devition). Then, we observe the reltion between the ccess frequency nd the ccess benefits. Finlly, we discuss how α influences the storge lod blnce nd the network cost. Fig.3 shows VCCNMA outperforms BL-VNE (1%) nd VNE (2%) in term of the cceptnce rtio. Without the distributed storge lloction, virtul nodes in BL-VNE nd VNE should find physicl nodes tht concurrently meet CPU nd storge requests s their hosts. In contrst, virtul nodes only need to find those with enough CPU s their hosts in VCCNMA. Hence, the node mpping of VCCNMA is esier to succeed thn tht of BL-VNE nd VNE, which leds to higher cceptnce rtio. Correspondingly, this mens more virtul network requests could be successfully mpped onto the substrte network with VCCNMA. Therefore, ech substrte node would hve higher storge lod in verge, s hs been confirmed in Fig.4. Fig.5 describes comprisons of three lgorithms on the stndrd devition of the storge utiliztion. Fig.5 shows tht VCCNMA cn keep higher performnce in the storge lod blnce in substrte nodes. Tht is becuse VCCNMA breks big storge requests into multiple cches. Thus, the differences in the storge utiliztion mong substrte nodes re smller thn those of the other two schemes. Hence, the storge lod is much more blnced in substrte nodes. As is shown in Fig.6, the higher the verge ccess frequency is, the more benefits the distributed storge lloction cn gin. More specificlly, the network cost is lmost the sme when the verge ccess frequency (F) is1.however, we cn obtin more benefits when F chnges from 2 to 6. If the requested storges re llocted closer to the clients, clients cn ccess these content chunks vi fewer hops. Obviously, the ccess benefits is proportionl to the ccess frequency. Fig.7 nd Fig.8 show tht α cn djust the trdeoff between the storge lod blnce nd the network cost. When α becomes lrger, optimizing the storge lod blnce becomes more importnt in our objective function. Hence, the stndrd devition of the storge utiliztion would be smller nd smller. As shown in Fig.7, when α chnges from.1 to 5, the storge lod is more nd more blnced in the substrte nodes becuse its stndrd devition is becoming smller. In contrst, the benefit would decrese nd the verge network cost would increse, which hs been confirmed in Fig.8 where the network cost incresingly becomes lrger when α becomes bigger. V. CONCLUSION In this pper, we introduced the problem concerning the storge need when embedding CCNs onto the substrte network, nd proved tht the problem is NP. As such, we

6 Acceptnce tio = 1, K = 1 BL VNE VNE VCCNMA Fig. 3. Comprison on Acceptnce tio Averge Utiliztion of Storge BL VNE.5 = 1, K = 1 VNE VCCNMA Fig. 4. Comprison on Averge Storge Utiliztion Stndrd Devition of Storge Utiliztion BL VNE = 1, K = 1 VNE VCCNMA Fig. 5. Comprison on Stndrd Devition of Storge esources Averge Cost for Accessing the Storge = 1, K = 1 Benefits of Distributed Storge (F = 6) Benefits of Distributed Storge (F = 2) BL VNE (F=1) BL VNE (F=2) BL VNE (F=6) VCCNMA (F=1) VCCNMA (F=2) VCCNMA (F=6) Stndrd Devition of Storge Utiliztion VCCNMA (=.1) VCCNMA (=1) VCCNMA (=2) VCCNMA (=5) K = 1 Averge Cost for Accessing the Storge K = 1, F = 6 VCCNMA (=.1) VCCNMA (=1) VCCNMA (=2) VCCNMA (=5) Fig. 6. Comprison on the verge network cost with different F Fig. 7. Comprison on storge lod blnce with different α Fig. 8. Comprison on the verge network cost with different α developed heuristic lgorithm (VCCNMA) to solve for efficient embedding tht yields better VCCN performnces. Severl simultion experiments hve vlidted tht VCCNMA cn chieve higher performnces in the cceptnce rtio, the verge storge utiliztion, the storge lod blnce nd network cost. The results lso show tht we cn control the trdeoff between the lod blnce nd the ccess benefits with weight fctor. ACKNOWLEDGMENT This work is supported by the Ntionl Bsic eserch Progrm of Chin (212CB31593), the Progrm for Zhejing Leding Tem of Science nd Technology Innovtion ( , 213TD2), the Ntionl Science nd Technology Support Progrm (214BAH24F1), 863 Progrm of Chin (215AA1613), nd the Ntionl Nturl Science Foundtion of Chin ( ). EFEENCES [1] Vn Jcobson, Din K. Smetters, et l. Networking Nmed Content, Proc. of ACM CoNext9, pp. 1-12, 29. [2] Pedro Henrique, V. Guimres, et l. Experimenting Content-Centric Networks in the Future Internet Testbed Environment, pp [3] Psrs I, Clegg G, et l. Modeling nd evlution of CCN-cching trees, in Networking 211, Springer Berlin Heidelberg, pp , 211. [4] Tyson G, Kune S, et l. A trce-driven nlysis of cching in contentcentric networks, Proc. of IEEE ICCCN 212, pp. 17, 212. [5] Anderson T, Peterson L, et l. Overcoming the Internet impsse through virtuliztion, Computer, 25(4): [6] GENI: [7] Bvier A, Femster N, Hung M, et l. In VINI verits: relistic nd controlled network experimenttion, Proc. of ACM SIGCOMM Computer Communiction eview, 36(4): 3-14, 26. [8] Nick Femster, Lixin Go, et l. How to Lese the Internet in Your Spre Time, in ACM SIGCOMM Computer Communiction eview, 37(1): 61-64, 27 [9] PlnetLb: [1] Zhu Y., Ammr M. H., Algorithms for Assigning Substrte Network esources to Virtul Network Components, Proc. of IEEE INFOCOM 26, pp. 1-12, 26. [11] Chowdhury N. M. M. K., hmn M.., et l. Vritul Network embedding with coordinted node nd link mpping, Proc. of INFOCOM 29, pp , 29. [12] Minln Yu, Yung Yi, et l., ethinking virtul network embedding: substrte support for pth splitting nd migrtion, in ACM SIGCOMM Computer Communiction eview, 38(2): 17-29, 28. [13] Msto Ohtni, Keiichiro Tsukmoto, et l. VCCN: Virtul Content- Centric Networking for elizing Group-Bsed Communiction. InProc. of ICC 213. [14] S. Slsno, et l. Informtion centric networking over SDN nd Open- Flow: Architecture spects nd experiments on the OFELIA testbed. Vol. 57, No. 16, pp , Nov [15] D. G. Andersen. Theoreticl pproches to node ssignment, Unpublished Mnuscript, 22. [16] A. Schrijver, Theory of liner nd integer progrmming, John Wiley & Scons, [17] BITE : Topology Genertor, [Online] Avilble: [18] S. Zhng, et l. Virtul Network Embedding with Substrte Support for Prlleliztion, in Proc. of Globecom 212, pp , 212. [19] ILOG IBM., Cplex optimiztion studio, [online:]

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

Virtual Network Embedding For Evolving Networks

Virtual Network Embedding For Evolving Networks This full text pper ws peer reviewed t the direction of IEEE Communictions Society subject mtter experts for publiction in the IEEE Globecom proceedings. Virtul Network Embedding For Evolving Networks

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Network service chaining with optimized network function embedding supporting service decompositions

Network service chaining with optimized network function embedding supporting service decompositions Network service chining with optimized network function embedding supporting service decompositions Shel Shhf Wouter Tvernier Mtthis Rost Stefn Schmid 3 Didier Colle Mrio Pickvet Piet Demeester Ghent University

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting:

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting: Redings 15-744: Computer Networking L-14 Future Internet Architecture Required: Servl pper Extr reding on Mobility First Relevnt erlier meeting: CCN -> Nmed Dt Network 2 Outline The Next Internet: More

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

A Progressive Register Allocator for Irregular Architectures

A Progressive Register Allocator for Irregular Architectures A Progressive Register Alloctor for Irulr Architectures Dvid Koes nd Seth Copen Goldstein Computer Science Deprtment Crnegie Mellon University {dkoes,seth}@cs.cmu.edu Abstrct Register lloction is one of

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Caches I. CSE 351 Spring Instructor: Ruth Anderson

Caches I. CSE 351 Spring Instructor: Ruth Anderson L16: Cches I Cches I CSE 351 Spring 2017 Instructor: Ruth Anderson Teching Assistnts: Dyln Johnson Kevin Bi Linxing Preston Jing Cody Ohlsen Yufng Sun Joshu Curtis L16: Cches I Administrivi Homework 3,

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Caches I. CSE 351 Autumn Instructor: Justin Hsia

Caches I. CSE 351 Autumn Instructor: Justin Hsia L01: Intro, L01: L16: Combintionl Introduction Cches I Logic CSE369, CSE351, Autumn 2016 Cches I CSE 351 Autumn 2016 Instructor: Justin Hsi Teching Assistnts: Chris M Hunter Zhn John Kltenbch Kevin Bi

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

USING HOUGH TRANSFORM IN LINE EXTRACTION

USING HOUGH TRANSFORM IN LINE EXTRACTION Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

Replicating Web Applications On-Demand

Replicating Web Applications On-Demand Replicting Web Applictions On-Demnd Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit, Amsterdm {swmi,gpierre,steen}@cs.vu.nl Abstrct Mny Web-bsed commercil

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Exam #1 for Computer Simulation Spring 2005

Exam #1 for Computer Simulation Spring 2005 Exm # for Computer Simultion Spring 005 >>> SOLUTION

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization ECEN 468 Advnced Logic Design Lecture 36: RTL Optimiztion ECEN 468 Lecture 36 RTL Design Optimiztions nd Trdeoffs 6.5 While creting dtpth during RTL design, there re severl optimiztions nd trdeoffs, involving

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

Topology-aware routing in structured peer-to-peer overlay networks

Topology-aware routing in structured peer-to-peer overlay networks Topologywre routing in structured peertopeer overly networks Miguel Cstro Peter Druschel Y. Chrlie Hu Antony Rowstron Microsoft Reserch, 7 J J Thomson Close, Cmbridge, C3 F, UK. Rice University, Min Street,

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

Accelerating 3D convolution using streaming architectures on FPGAs

Accelerating 3D convolution using streaming architectures on FPGAs Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost

More information

Address Register Assignment for Reducing Code Size

Address Register Assignment for Reducing Code Size Address Register Assignment for Reducing Code Size M. Kndemir 1, M.J. Irwin 1, G. Chen 1, nd J. Rmnujm 2 1 CSE Deprtment Pennsylvni Stte University University Prk, PA 16802 {kndemir,mji,guilchen}@cse.psu.edu

More information

Scalable Distributed Data Structures: A Survey Λ

Scalable Distributed Data Structures: A Survey Λ Sclble Distributed Dt Structures: A Survey Λ ADRIANO DI PASQUALE University of L Aquil, Itly ENRICO NARDELLI University of L Aquil nd Istituto di Anlisi dei Sistemi ed Informtic, Itly Abstrct This pper

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

cell 1 cell 2 cell 3 cell 4 a a

cell 1 cell 2 cell 3 cell 4 a a Frequency Assignment for Cellulr Mobile Systems Using Constrint Stisfction Techniques Mkoto Yokooy nd Ktsutoshi Hirymz y NTT Communiction Science Lbortories -4 Hikridi, Seik-cho, Sorku-gun, Kyoto 69-037

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

Math 142, Exam 1 Information.

Math 142, Exam 1 Information. Mth 14, Exm 1 Informtion. 9/14/10, LC 41, 9:30-10:45. Exm 1 will be bsed on: Sections 7.1-7.5. The corresponding ssigned homework problems (see http://www.mth.sc.edu/ boyln/sccourses/14f10/14.html) At

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Looking up objects in Pastry

Looking up objects in Pastry Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech

More information

Expected Worst-case Performance of Hash Files

Expected Worst-case Performance of Hash Files Expected Worst-cse Performnce of Hsh Files Per-Ake Lrson Deprtment of Informtion Processing, Abo Akdemi, Fnriksgtn, SF-00 ABO 0, Finlnd The following problem is studied: consider hshfilend the longest

More information

Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking

Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking 1 Self-Orgnizing Hierrchicl Routing for Sclble Ad Hoc Networking Shu Du Ahmed Khn Sntshil PlChudhuri Ansley Post Amit Kumr Sh Peter Druschel Dvid B. Johnson Rudolf Riedi Rice University Abstrct As devices

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks Performnce Evlution of Dynmic Reconfigurtion in High-Speed Locl Are Networks Rfel Csdo, Aurelio Bermúdez, Frncisco J. Quiles, JoséL.Sánchez Depto. de Informátic Universidd de Cstill-L Mnch 271- Albcete,

More information

Data-Flow Prescheduling for Large Instruction Windows in Out-of-Order Processors

Data-Flow Prescheduling for Large Instruction Windows in Out-of-Order Processors Dt-Flow Prescheduling for Lrge Instruction Windows in Out-of-Order Processors Pierre Michud, André Seznec IRISA/INRIA Cmpus de Beulieu, 35 Rennes Cedex, Frnce {pmichud, seznec}@iris.fr Abstrct The performnce

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks 1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

On Achieving Optimal Throughput with Network Coding

On Achieving Optimal Throughput with Network Coding In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end

More information

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved.

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved. Dt Flow on Queue Mchine Bruno R. Preiss 2 Outline Genesis of dt-flow rchitectures Sttic vs. dynmic dt-flow rchitectures Pseudo-sttic dt-flow execution model Some dt-flow mchines Simple queue mchine Prioritized

More information

Topology-aware routing in structured peer-to-peer overlay networks

Topology-aware routing in structured peer-to-peer overlay networks Topology-wre routing in structured peer-to-peer overly networks Miguel Cstro ½ Peter Druschel ¾ Y. Chrlie Hu Antony Rowstron ½ ½ Microsoft Reserch, 7 J J Thomson Close, Cmbridge, CB3 FB, UK. ¾ Rice University,

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

Article Data Dissemination in Mobile Social Networks With the Acknowledgment Feedback

Article Data Dissemination in Mobile Social Networks With the Acknowledgment Feedback Article Dt Dissemintion in Mobile Socil Networks With the Acknowledgment Feedbck Ning Wng 1 nd Jie Wu 1 Received: dte ; Accepted: dte ; Published: dte Acdemic Editor: nme 1 Deprtment of Computer nd Informtion

More information

CHANGING STRATA AND SELECTION PROBABILITIES* Leslie Kish, The University of Michigan. Summary

CHANGING STRATA AND SELECTION PROBABILITIES* Leslie Kish, The University of Michigan. Summary 124 CHANGING STRATA AND SELECTION PROBABILITIES* Leslie Kish, The University of Michign Summry Survey smples re often bsed on primry units selected from initil strt with probbilities proportionl to initil

More information

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015 Finite Automt Lecture 4 Sections 3.6-3.7 Ro T. Koether Hmpden-Sydney College Wed, Jn 21, 2015 Ro T. Koether (Hmpden-Sydney College) Finite Automt Wed, Jn 21, 2015 1 / 23 1 Nondeterministic Finite Automt

More information