Avoiding congestion through dynamic load control

Size: px
Start display at page:

Download "Avoiding congestion through dynamic load control"

Transcription

1 Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach to qualty of servce n the Internet can no longer satsfy a dverse varety of customer servce requrements, and that s why there s a need for alternatve strateges. In order to solve ths problem a number of servce dfferentaton models have been proposed. Unfortunately, these schemes often fal to provde proper servce dfferentaton durng perods of congeston. To deal wth the ssue of congeston, we ntroduce a load control mechansm that elmnates congeston based on the feedback from the network core by dynamcally adjustng traffc load at the network boundary. We ntroduce four methods for calculatng load dstrbuton among the ngress routers and among dfferent flows n each ngress router, and we evaluate these proposed methods through smulaton. Keywords: Qualty of servce, dynamc admsson control, load dstrbuton, network feedback. INTRODUCTION As a dverse varety of applcatons wth dfferent customer servce requrements are begnnng to access the Internet, the current best effort approach to qualty of servce n the Internet s no longer suffcent. As people become wllng to pay more for servces that satsfy ther applcaton requrements, the one-servce-for-all approach of today s Internet wll become obsolete, creatng a need for alternatve strateges. In order to solve ths problem, a number of servce dfferentaton models have been proposed. Dfferentated Servce archtecture [] ntroduced by IETF s DffServ workng group, core-stateless far queung [3] proposed by Stoca et al, and proportonal servce dfferentaton framework [4-6] proposed by Dovrols et al are currently among the most popular approaches. Unfortunately, these schemes often fal to provde proper servce dfferentaton durng perods of congeston. For example, IETF s DffServ model fals to provde far resource allocaton and far servce degradaton durng the perods of congeston [7,0-] because of statc resource allocaton. On the other hand, the proportonal servce dfferentaton model does not volate relatve guarantees under any network condton. However n ths model, the lack of mechansms for lmtng the amount of data njected nto the network can reduce the absolute level of QoS below user expectatons [4-6]. We beleve that one way to deal wth ths problem s to ntroduce a dynamc load control mechansm at the boundary routers. The dea behnd dynamc load dstrbuton s dfferent from the dea of admsson control. Although both mechansms adjust themselves based on network feedback, they determne ther adjustments dfferently. Whle admsson control decdes whether or not to admt users nto the network, the dynamc load control mechansm admts all the users and only when congeston arses does t adjust user sendng rates. Fgure llustrates the dea behnd the dynamc load control. As the fgure shows, the traffc enters the network doman at the boundary router B, traverses the network n some fashon, and then exts ths network doman at the boundary router B. If congeston arses, the core routers provde feedback to the ngress routers. Based on ths feedback, the ngress routers adjust the amount of traffc admtted nto the doman. The dea of adjustng admsson control based on network feedback s not. Chow et al also used such an dea n ther work []. They proposed to perodcally probe the network and, based on the obtaned results, adjust admsson control at the ngress nodes. However, they only ntroduced a general framework for the feedback-based dynamc admsson control and dd not pursue further nvestgaton of ths dea. The framework for Explct Congeston Notfcaton [9] also reles on a smlar feedback mechansm. In ths approach, when the core routers experence congeston, they set Congeston Experenced (CE) bts n the IP headers of packets flowng through them n order to Throughout ths paper we wll also refer to the boundary nodes at whch traffc enters a doman as ngress routers and we wll call the boundary nodes where traffc leaves a doman as egress routers.

2 notfy the sources to reduce ther rates. The Explct Congeston Notfcaton model assumes that the sources wll reduce ther rates upon recepton of the CE marked packets, whch may not always be true. Incomng traffc Dynamc Load Control Boundary Router B Feedback Core router C Feedback Core router C3 Core router C Boundary Router B Outgong Traffc Fgure. Scenaro for Dynamc Load Control In ths paper, we extend these deas and provde a protocol for dynamc load dstrbuton based on network feedback. The rest of the paper s organzed as follows. Secton ntroduces the general dea of our model, ncludng a detaled explanaton of the message exchange mechansm used n ths model. Secton 3 descrbes possble technques by whch each ngress node can reduce ts sendng rate to elmnate congeston at the congested nterface. Secton 4 provdes an ntal expermental evaluaton of our scheme. We nclude concludng remarks and present drectons for future work n Secton 5.. DYNAMIC LOAD DISTRIBUTION FEEDBACK CONTROL SCHEME.. General Idea The man dea of the feedback-based dynamc load control scheme s to dynamcally adjust the traffc sendng rates at the network boundares. When the network s congeston-free, the boundary nodes allow users to nject as much data as they desre. However, when the network experences congeston, the boundary nodes start lmtng the amount of traffc that can be admtted nto the network. Durng these perods of congeston, the core routers provde ndcatons to the boundary nodes to slow down. We use an explct message passng mechansm for provdng congeston notfcatons to the boundary nodes. In our model, these congeston notfcaton messages contan nformaton about whch core router nterface s congested and ts congeston level. Ths nformaton allows each boundary node to determne by how much t should reduce the overall traffc rate to elmnate congeston. Once the overall reduced rate s calculated, the boundary router can calculate correspondng sendng rates for all user flows that contrbute to the congeston. F F B C B C C3 From F and F F3 B4 B3 Fgure. Congeston-free network From F3 Consder the stuaton shown n Fgure. Ths fgure shows a congeston-free network, where the boundary node B accepts traffc flows F, F, and F3 and forwards them towards ther correspondng destnatons. In partcular, flows F and F pass through core routers C and C and then ext ths doman at the egress node B. Flow F3 passes through the routers C and C3 and then exts the network doman through the boundary node B3. Fgure depcts a stuaton where all the nterfaces of the core routers are congeston-free and no load control at the boundary nodes s

3 requred. Fgure 3 shows what happens when one of the core lnk nterfaces becomes congested. Suppose that flow F4 becomes actve and enters the doman at boundary node B4. Flow F4 follows the path C3, C, B and creates congeston on the lnk between C and B. C dentfes ths stuaton and generates congeston notfcatons to all the boundary nodes that send ther traffc through the congested lnk. Congeston notfcatons travel through the routers C and C3 to reach boundary nodes B and B4 respectvely. F F F3 B F4 cn B4 C cn cn C3 cn C Fgure 3. Node actons durng the congeston When B and B4 receve ther congeston notfcatons, they calculate by how much they should reduce ther traffc rate to elmnate congeston. Then B and B4 dentfy the flows that contrbute to the congeston between C and B (F, F and F4). After that, B and B4 dstrbute the calculated rate reducton among these flows, by controllng each flow s load accordngly. Fgure 4 llustrates how the network stuaton changes after the actvaton of load control for the selected flows. B3 B From F, F, and F4 From F3 Lnk Interface Congested Not Congested F F F3 B B4 C C3 C B3 B From F, F, and F4 Load Control -- Inactve -- Actve F4 From F3 Fgure 4. Congeston-free network after the adjustng load control. Overvew of the message exchange mechansm In our model, we assume that for each source host that sends traffc through a gven ngress node, the ngress node knows the lst of destnaton hosts for whch the traffc s ntended. We record ths nformaton n the Servce Level Agreement (SLA) establshed between each source and the network doman. The SLA wll also nclude nformaton about the mnmum provsoned rate for each source-destnaton host par. Durng congeston, the boundary node wll not reduce a flow s sendng rate below ths mnmum provsoned rate specfed n the SLA. In our scheme we assume that the network s well provsoned, and that congeston does not occur when all the users send traffc at ther mnmum provsoned rates. Throughout the paper, whenever we refer to a flow, we wll mean packets flowng between a sourcedestnaton host par specfed n the SLA, as contrasted wth the tradtonal defnton of a flow, as stream of packets flowng between a par of applcatons. Table shows an example of Servce Level Agreements establshed between users (source hosts) and a network doman. When congeston occurs, the boundary node receves a congeston notfcaton that specfes the address of the nterface where congeston occurred and the level of congeston on that nterface. Not all the flows that enter the doman at a partcular ngress node travel through the congested nterface; therefore, t s mpossble to determne whch flows

4 should slow down based only on the nformaton provded n the congeston notfcaton message. To remedy ths stuaton, we mantan two data structures n addton to the SLA n each boundary node, called path table and router table. These tables allow the boundary node to dentfy the flows that should be slowed down when congeston occurs. These data structures are generated and mantaned based on nformaton collected by probe messages, whch the ngress nodes perodcally transmt on each currently actve path, n order to dscover the path changes. Probe messages are also generated when a flow becomes actve for determnng the flow s path wthn ths doman. The probes collect the lst of routers they traversed wthn the doman and the ngress nodes use ths nformaton to mantan the path and router tables. The path table contans a complete route wthn the doman that the flows follow to ther destnaton. The router table keeps the router nterface addresses and the lst of flows that pass through those nterfaces. Thus, whenever a flow becomes actve or the path tmer expres, the ngress boundary node generates a probe message that follows the route toward a partcular destnaton. The probe termnates ts progress at the egress node, whch s the last router wthn the doman on the path to the destnaton. The egress node forwards the probe back to the ngress node that generated t. We refer to the message forwarded by the egress node as a probe reply message. Flow ID Source Egress Mn. Provsoned Rate B 00 Kbps B3 50 Kbps B 90 Kbps B3 300 Kbps Table. Example of Servce Level Agreement Ingress B F, F C C Egress B F3 From F and F C3 Egress B3 Fgure 5. Network Topology From F Destnaton Path Lst of Flows Tmer Mn. Provsoned Rate B B, C, C, B F, F Kbps B3 B, C, C3, B3 F Kbps Table. Path Table for the boundary node B. Router Interface B-C C-C C-C3 C-B C3-B3 Lst of Flows F,F,F3 F, F3 F F, F3 F Table 3 Router Table for the boundary node B. Tables and 3 show an example of the path and router tables respectvely at node B for actve flows wthn the network of Fgure 5. We ndex the path table usng the full path between the current ngress node and the egress router where the flow exts the doman. In addton, each entry n the path table contans a tmer and a lst of actve flows that follow that path. The tmer specfed n the path table s used to determne when the next probe for that path should

5 be generated. A router table kept n each ngress node s ndexed by the router nterface address and contans the lst of the flows that pass through that nterface. Both of these tables are bult based on the data collected by the probe messages. When a probe reply message arrves at the ngress node, t contans a lst of the nterface addresses and ther current arrval rates. Interface arrval rates are used to update load control for the flows that pass through those nterfaces. The nterface addresses are used to update the path and router tables. If the probe reply message was generated due to tmer expraton and contans a route, then the old route entry n the path table should be replaced wth the route nformaton. Moreover, the router table should be updated. Frst, we dentfy the lst of flows that follow a path, let us call t flows-to-update lst. Then, we remove the lst of flows-to-update from each router nterface entry of the router table that was part of the old route. Smlarly, we add the lst of flows-to-update to each router nterface entry of the router table that s part of the route. In the case when the probe message was generated due to actvaton of a flow, we update the path table as follows. If returned path already exsted we smply add a flow to the lst of current flows for that entry, otherwse we create a entry n the path table. Smlarly, we update the router table by ether modfyng the lst of flows for all exstng nterfaces, or by addng entres nto the router table f unknown nterfaces were encountered. Now, let us consder an example of path and router tables updates. Consder that, n addton to the actve flows shown n Fgure 6, flow F4 becomes actve and starts sendng traffc. When the frst packet of the flow F4 arrves at the boundary node B, a probe s generated and forwarded towards ts destnaton. When the egress node B3 receves the probe generated by the ngress node B, t copes collected data nto the probe reply message and sends t to B. Upon arrval of the probe reply message at the boundary node B, the correspondng entres n the path and router tables are updated. Fgure 6 llustrates how the probe message exchange works and Tables 4 and 5 show how path and router tables are updated. Ingress B F, F Probe C C F3, F4 Probe Probe Reply Probe Probe Reply C Probe Reply Egress B From F and F3 Egress From F, F4 B3 Fgure 6. Network Topology Destnaton Path Lst of Flows Tmer Mn. Provsoned Rate B B, C, C, B F, F Kbps B3 B, C, C3, B3 F, F Kbps Table 4. Updated path table for the boundary node B. In general, the message exchange mechansm of the feedback-based dynamc load control scheme conssts of two parts. The frst part called probe message exchange keeps track of the routng changes and allows boundary routers to dentfy the flows to whch load control should be appled. The second part called congeston notfcaton exchange, provdes ndcaton to the boundary nodes about when and how to adjust the load control. The probe message passng accomplshes two goals. Frst of all t allows core routers to dentfy whch ngress routers should be notfed durng the congeston, and t allows ngress routers to dentfy the flows that should reduce ther rates. Snce boundary nodes generate probe messages each tme a flow becomes actve, these messages allow a core router to keep track of the boundary nodes that are sendng traffc through t. When the core router receves a probe message, t records the address of the boundary node that generated ths message and the address of the outgong nterface on whch the probe message departed. So for each outgong nterface the core router keeps a lst of ngress

6 routers that send traffc through ths nterface. Durng congeston, the core routers consult ths table and send congeston notfcatons to all the boundary nodes that sent the traffc through the congested nterface. Router Interface B-C C-C C-C3 C-B C3-B3 Lst of Flows F,F,F3,F4 F, F3 F, F4 F, F3 F, F4 Table 5. Updated router table for the boundary node B. The core nodes generate congeston notfcaton when an outgong nterface becomes congested. Core nodes estmate ncomng traffc rate for each outgong nterface. If the estmated rate on a partcular outgong nterface reaches a certan threshold then t sgnfes congeston and notfcaton messages are sent to correspondng boundary nodes. A congeston notfcaton message carres nterface address, estmated arrval rate on that nterface, and the capacty of that nterface. Based on ths nformaton along wth the local flow nformaton, the boundary nodes can calculate the sendng rate for each of the flows that send ts traffc on the congested nterface. 3. RATE REDUCTION TECHNIQUES 3. Calculaton of the congeston reduced aggregated rate The problem of adjustng traffc load at the boundary nodes may be dvded nto two parts. The frst part deals wth the problem of calculatng the total load that a partcular ngress router can generate wthout causng congeston n the network core. The second part of the problem deals wth the queston of how the total load should be dvded among the ndvdual flows. In ths secton we wll ntroduce three smple mechansms for solvng the frst problem. Each ngress router must compute the aggregate rate at whch t transmts traffc through the congested lnk. Ths rate, whch we call Congeston Reduced Aggregated Rate (CRAR), should satsfy two requrements:. The sum of all CRARs from all the ngress nodes should not exceed the congested lnk s capacty.. The congested lnk s utlzaton should reman hgh after all the ngress nodes reduce ther sendng rates. It s very dffcult for the ngress nodes to compute the CRARs that satsfy the above requrements wthout addtonal nformaton about the rate dstrbuton among the varous ngress nodes that send traffc on the congested nterface. Unfortunately, ths nformaton s not avalable to the ngress nodes, whch only have the estmated value of ther own sendng rate and the nformaton about the arrval rate and capacty of the congested nterface. A possble soluton to ths problem s to have the core router montor the rates of traffc reachng t from each ngress node and then provde ths nformaton to the boundary nodes when congeston arses. In order for the core router to estmate the arrval rate of the boundary node, t should know whch flows enter the doman through that ngress node. One way to acheve ths s for the core router to pre-compute and keep nformaton about all the flows that enter ths doman and ther correspondng ngress nodes. Another approach would be to requre all the packets to be marked n such a way that the core router could unquely dentfy the ngress node through whch the packet entered ths doman. Both of these approaches seem to be too heavyweght and would ntroduce too much addtonal complexty nto the core router processng. Because of ths addtonal complexty assocated wth dstrbuton of the boundary node traffc sendng rates among the ngress routers, we decded to estmate the value of the Congeston Reduced Aggregated Rate. We wll frst examne a set of nave methods for calculatng the CRAR at each boundary node. In the frst method, we reduce the rate at each ngress node proportonally to ts sendng rate. We wll use the followng notaton n our subsequent dscusson: R total traffc rate on the congested nterface from all ngress nodes. C capacty of the congested nterface. E excess traffc receved at the congested nterface. R CRAR that arrves at nterface.

7 R j total traffc rate from the ngress node j to the nterface. S j total provsoned traffc rate from the ngress node j to the nterface. E j excess traffc sent from the ngress node j to the congested nterface. R j CRAR from ngress node j to nterface. In the frst method, called nave method, we calculate the CRAR R j, as follows, reducng sendng rates only of those ngress nodes that send traffc above ther mnmum provsoned rate. E R j = R j, only f R j > S j (3..) R Usng ths method, the boundary nodes wll reduce ther aggregated sendng rates to R. However such rate reducton may not completely elmnate congeston. Consder the stuaton where some ngress nodes send traffc below ther mnmum provsoned rate and therefore do not slow down durng the congeston. For ths case, we can show that reducng the sendng rate n accordance wth nave method wll not elmnate the congeston. We defne congeston as the stuaton when the estmated arrval rate at the lnk s above the lnk s capacty, R > C. The excess traffc s gven by: E = R C (3..) The total rate U from all nodes sendng traffc below ther provsoned rates s: U = (3..3) R j j R j S j Whereas the total rate O from all nodes that exceed ther provsoned rates s: O = (3..4) Obvously, R j j R j > S j R = R = O + U (3..5) j When load control s appled accordng to nave method, the rate from the prevously over-provsoned nodes s adjusted to: O = R j, where R j < R j (3..6) j R j > S j Thus, the CRAR s: R = R = U + O (3..7) j j By re-wrtng (3..7) and by usng defntons (3..) (3..6) we wll obtan that: E O R = O + U = R E > C R (3..8) R Inequalty (3..8) holds snce E s the exact amount by whch we should reduce rate R n order to elmnate congeston. O However, snce the rato s smaller than because of the assumpton that there are some ngress nodes that send R traffc below ther mnmum provsoned rate, we have reduced the rate R by an amount smaller than E. Therefore, n ths case, we wll not elmnate congeston at the core router. However, f all the ngress nodes send above ther mnmum provsoned rates, such rate reducton wll elmnate congeston. Another problem of ths approach s that t j

8 computes rate reducton based only on the ngress node s sendng rate and congeston level n the core router. Because of that, ths rate reducton method mght cause certan ngress nodes to reduce ther sendng rates below ther correspondng mnmum provsoned rate S j. To elmnate the last problem, we propose two other rate-reducton technques, whch we wll call nave methods and 3. Smlarly to the nave method, we wll reduce sendng rate only at those ngress nodes that send traffc above ther mnmum provsoned rate. Both of these approaches guarantee that the ngress nodes wll not reduce ther sendng rates below ther mnmum provsoned rates. In nave method, the ngress nodes reduce ther sendng rate only by a fracton of the excess rate, and therefore can reduce ther sendng rate by excess rate at the most. E R j = R j E j, only f R j > S j (3..9) R On the other hand, n nave method 3, we explctly prohbt reducng sendng rates below correspondng mnmum provsoned rates. R j = E max R j, S j, only f R j > S j (3..0) R Unfortunately, none of the nave methods can reduce sendng rates to a level that wll elmnate congeston after only a sngle congeston notfcaton. Usng these rate reducton approaches would requre multple congeston notfcaton messages before congeston n the core router s nterface s eradcated. 3. Two-teraton method for computng CRAR We expect that none of the nave technques for computaton of the CRAR at the ngress nodes can guarantee fast convergence to the sendng rate that would elmnate congeston. That s why we propose an alternatve method that s able to reach a sendng rate that wll elmnate congeston after the second congeston notfcaton. In ths scheme, when the frst congeston notfcaton arrves at the ngress nodes, the sendng rate s lowered to a level whch reduces but does not elmnate the congeston. Because of that, the congested nterface of the core router generates another congeston notfcaton. In our scheme, after recevng the second congeston notfcaton, the ngress nodes are able to calculate the exact value of the CRAR, such that congeston n the core router s nterface wll be completely elmnated. In ths secton we wll use the same notatons as n Secton 3., except that we wll dstngush between the rates before the frst and the second computaton of the CRAR. For example, we wll call the amount of excess traffc that nterface receves before the frst and the second rate reductons as E and E respectvely. Also we wll use symbol d to denote the rate reducton rato used to compute the rate after recevng the frst congeston notfcaton. Thus, when the frst congeston notfcaton s generated, the congested nterface has an amount of excess traffc that s equal to E. After the rate s reduced usng reducton rato d, the congested nterface wll have an amount of excess traffc that s equal to E. When an ngress node receves a congeston notfcaton, t computes the frst rate reducton rato as follows: E d = (3..) R Those ngress nodes that send traffc below ther provsoned rates have excess traffc rate equal to zero. Then each ngress router that receves a congeston notfcaton wll compute the CRAR as follows: R j = R j E jd (3..) The excess traffc after ths rate reducton s: E j = E j ( d ) (3..3) We can easly show that ths reducton wll not elmnate congeston and therefore a second congeston notfcaton wll be generated. The frst rate reducton caused the followng decrease n the arrval rate at the congested nterface:

9 d j E j = E E Based on the knowledge that, for ngress node, the reducton by the congested nterface n the amount of E E overall rate reducton at the congested nterface n the amount of (3..4) d caused an overall rate reducton at E j, we can calculate the reducton rato d, such that t wll cause an E. Based on ths observaton and equaton (3..3), d. In order to be able to construct ths equalty, we assume that we can construct the followng equalty and solve t for the number of the ngress nodes that adjust ther rates remans the same for the perod of the rate reducton. E ( ) j d E j d = d (3..5) E E E d E d = (3..6) d E E Selectng the value of d accordng to equaton (3..6) ensures that the prevously congested nterface wll become congeston-free. To verfy the correctness of equaton (3..6), we wll show that the overall rate reducton after the second congeston notfcaton equals the amount of excess traffc at the congested nterface. d E j = E (3..7) j By applyng equaton (3..3) to the left sde of equaton (3..7) and then by usng equatons (3..4) and (3..6) we obtan: E E d E j = d ( d ) E j = d ( d ) d j j E E ( d ) E d E d E j = = j d E E d Therefore, equaton (3..7) holds, and selecton of the reducton rato for the second teraton accordng to equaton (3..6) wll elmnate congeston on the nterface that generated the congeston notfcaton. 3.3 Reducton of the flow rates durng the congeston When the boundary node receves a congeston notfcaton, t calculates the CRAR, usng one of the methods presented n Sectons 3. and 3.. After that, the boundary node calculates the traffc rate, r, for each flow that contrbutes nto the aggregate that passes through the congested lnk. In ths secton, we wll use a slghtly dfferent notaton n order to make the formulas more readable. R Congeston Reduced Aggregated Rate. R estmated traffc rate generated by the flows passng through the congested nterface. S sum of the mnmum provsoned traffc rates for all the flows that travel to ther destnaton through the congested nterface. k r estmated traffc rate of flow k that passes through the congested nterface. k s mnmum provsoned traffc rate of flow k that passes through the congested nterface. k r traffc rate of flow k that passes through the congested nterface. The dea of ths approach s very smple: we calculate a far share for each flow and we reduce the flow s sendng rate only f t sends traffc above ts far share. We calculate the far share of the flow as follows: k n

10 R S f = s + (3.3.) S where, ( R S ) s the amount of excess bandwdth avalable for all the flows. Then, we calculate a sendng rate for each flow that sends above ts far share as follows: under over R R S r = + s (3.3.) over S where, under R = r, s the total sendng rate of those flows that send below ther far share. r f over S = s r > f under over ( R R S ), s the total provsoned rate of those flows that send above ther far share. s the excess bandwdth left for sharng among the flows that send above ther far share. We assert that reducng flow rates accordng to equaton (3.3.) wll reduce the aggregated rate to the calculated value of R. To prove ths asserton, we need to show that: r = R (3.3.3) u o By applyng the defnton of R, S, and (3.3.) to (3.3.3) we get: under over under R R S under r = R + s + = R + over S s + over R R S S under over under over over r = R + S + S = over R R R S 4. EVALUATION OF THE LOAD DISTRIBUTION FEEDBACK CONTROL SCHEME 4. Smulaton set-up To evaluate the proposed load control scheme, we bult a smulaton model usng the OPNET [7] network smulator. We mplemented the message exchange mechansms descrbed n Secton, and compared the performance of the dfferent rate reducton schemes for the network topology shown n Fgure 7. under S over s User B C User Bottleneck B3 Server User 3 User 4 B C C3 Fgure 7. Smulaton topology.

11 We connected all the nodes n ths topology wth T lnks wth a capacty of.544 Mbps. Only the bottleneck lnk between nodes C3 and B3 was provsoned wth a dfferent amount of bandwdth, varyng ts capacty to smulate dfferent congeston stuatons. We smulated one-drectonal traffc from the user nodes (sources) to the server node (destnaton). All the sources generated FTP traffc wth an average nter-request tme of 0. second and data sze of 800 bytes. Includng all the headers, ths added up to a total sendng rate of 66,40 bts/second for each user. Also the boundary nodes B and B establshed SLAs wth ther correspondng users as shown n Table 6. We used the Tme Sldng Wndow Meterng (TSW) mechansm [3] for estmatng the arrval rate n the core and boundary nodes. The boundary routers estmated a value of the arrval rate for calculaton of reduced rates, whle the core router used the estmated rates for determnng f there was congeston. We confgured the TSW meter wth a wndow sze of 5 seconds. Durng the congeston, we passed user traffc through a smple token bucket that reduces the sendng rate of the user as needed. We ran our smulatons for 300 seconds and actvated users accordng to the followng schedule: User and user 3 start sendng traffc at tme nstant chosen randomly durng the frst 40 seconds of smulaton. User 4 starts sendng traffc at tme 00 seconds. User starts sendng traffc at tme 300 seconds. User Server User Server User 3 Server User 4 Server Mnmum Provsoned Rate 0 Kbps 0 Kbps 30 Kbps 40 Kbps Boundary node B B B B Table 6. Servce Level Agreement 4. Evaluaton of the -step rate reducton method for computng CRAR. Durng our expermental evaluaton, we observed that the -step rate reducton method was not able to properly estmate the CRAR. After close examnaton of the results, we notced that the value of the aggregated arrval rate at the congested nterface as reported to the ngress nodes was not very accurate. The -step rate reducton method s based on the assumpton that we can clearly observe the results of the frst rate reducton. Any naccuracy of the current arrval rate values causes the estmate of the CRAR to fal durng the second teraton. For ths reason, we evaluate the performance of the -step rate reducton method separately from the other methods. We further observed that the value of the arrval rate at the congested lnk reported durng the frst teraton was usually smaller than the value reported durng the second teraton. Closer examnaton of that phenomenon revealed that the Tme Sldng Wndow rate estmator was not reportng the current rate accurately enough and requred addtonal tme to converge to the actual value of the arrval rate. Therefore, the ngress node was observng that the rate reducton after the frst congeston notfcaton caused an ncrease nstead of decrease n the arrval rate at the core lnk. Because of that we slghtly modfed our mplementaton of the -step rate reducton mechansm. Instead of generatng congeston notfcaton mmedately after the congeston was observed, we delay ths notfcaton. Introducton of the delay sgnfcantly mproved the performance of the -step rate reducton mechansm. Ths method was now able to elmnate congeston n exactly two steps. A second problem wth ths method was that t reduced total sendng rates of the ngress nodes below ther mnmum provsoned rates. Agan, the reason for ths behavor was the naccuracy of the reported values by the TSW rate estmator. In one case, we notced that although all the ngress nodes reduced ther total load by 4 Kbps, the TSW rate estmator reported a rate reducton of only 8 Kbps. Such naccuracy forced the ngress nodes to reduce ther loads by an amount larger than was needed to elmnate the congeston. We then explctly added a condton that does not allow the reducton of the total load at the ngress node to be below the mnmum provsoned rate. Ths solved the problem partally but stll resulted n larger than necessary rate reducton, causng the congested lnk to become underutlzed. In our smulaton, the -step method wth these modfcatons was properly reducng the ngress node sendng rates only when the nterval between the congeston notfcatons was about 7 seconds.

12 4.3 Evaluaton of the nave rate reducton methods for computng CRAR. In our evaluaton, we used the number of congeston notfcatons needed to completely elmnate congeston n the core router as a measure of how well the method performs. For each method, we ran the experment 0 tmes, counted the number of notfcatons requred to completely elmnate congeston, and averaged these counts over the 0 runs. In ths set of smulatons, we provsoned the bottleneck lnk wth 05 Kbps of bandwdth, whch s only 5 Kbps above the arrval rate at the lnk n the case when all of the users send ther traffc at the mnmum provsoned rate. We also set the mnmum tme nterval between two consecutve congeston notfcatons to be second. Ths nterval was ntroduced n order to avod sendng too many congeston notfcatons. Fgure 8. Nave method : ngress node sendng rate varaton Fgure 9. Nave method 3: ngress node sendng rate varaton Due to the user actvaton schedule, our smulaton had three dstnct perods of congeston. The frst perod of congeston occurred at tme 30 seconds, when both users and 3 became actve. Snce all users send ther traffc at the rate of 66.4 Kbps, the core router C, had ( * ) = 7.48 Kbps of excess traffc arrvng on ts nterface. The second perod of congeston stated at tme 05 seconds, when the user 4 started sendng traffc. At ths pont, core router C had about 66.4 Kbps of traffc arrvng above the capacty of the nterface. The thrd congeston perod started at tme 0 seconds when user began sendng traffc. The core router C agan was observng 66.4 Kbps of excess traffc arrvng on ts lnk. Table 7 dsplays the number of congeston notfcatons requred to elmnate congeston n the core for each perod of congeston. As expected, nave method performs very poorly. Ths method requres about two and a half tmes as many congeston notfcatons as nave methods and 3. The man reason for that s the fact that nave method always reduces sendng rate only by a fracton of the excess rate. As experments showed, ths reducton technque s unable to converge to the value of the sendng rate that would elmnate congeston completely. As a result, wth nave method the ngress nodes receve congeston notfcatons almost throughout the whole smulaton. Nave methods and 3, on the other hand, converge to the correct sendng rate farly quckly, and as expected they requre almost the same number of congeston notfcatons to converge.

13 Rate Reducton Congeston Perod Method -st -nd 3-rd Nave Nave Nave Table 7. Comparson of the methods for rate reducton Also, as we expected, nave method faled to avod reducng aggregated rates below the mnmum provsoned rates. However, both nave methods and 3 were able to elmnate ths problem. Fgures 8 and 9 llustrate ths by showng how the sendng rates of the ngress nodes change durng the congeston. As Fgure 8 shows, nave method reduces traffc load at ngress node to 59 Kbps, whle ths node s provsoned for 70 Kbps on the path to the server. Nave method 3 on the other hand, does not reduce traffc loads below ther mnmum provsoned rates. As shown n Fgure 9, both, ngress node and ngress node send traffc at rates slghtly above ther provsoned rates. 4.4 Evaluaton of the per-flow rate dstrbuton. As we expected, usng the method proposed n Secton 3.3 allows the ngress nodes to farly dstrbute excess bandwdth among ther users. To llustrate how the ngress nodes dstrbute excess bandwdth among the users, we conducted a dfferent set of smulatons. In ths smulaton set, we allocated 40 Kbps of bandwdth at the bottleneck lnk, and we used nave method 3 for CRAR computaton. In ths scenaro, we had only two congeston perods because the bottleneck lnk had more bandwdth allocated to t. As the results n Tables 8 and 9 show, the excess bandwdth s always dstrbuted farly among the users of the ngress nodes n proporton to ther mnmum provsoned rates. It should be noted that the far share dstrbuton among flows s only across flows n a gven ngress node and s not vald for flows n dfferent ngress nodes. Fgures 0 and llustrate these results n a graphcal form. Fgure 0: Nave method 3: Per-flow rate dstrbuton. Fgure : Nave Method 3: Ingress node sendng rates varaton.

14 Mnmum Frst Congeston Perod Second Congeston Perod Provsoned Rates Sendng rate Excess BW Sendng Rate Excess BW Ingress Node 30 Kbps 47.3 Kbps 7.3 Kbps 68.5 Kbps 38.5 Kbps Ingress Node 70 Kbps 9.6 Kbps.6 Kbps 7.4 Kbps.4 Kbps Table 8. Rate dstrbuton among ngress nodes. Provsoned Frst Congeston Perod Second Congeston Perod Rate Sendng rate Far share Sendng rate Far share Ingress User 0 Kbps 47.3 Kbps 37.3 Kbps.8 Kbps.83 Kbps Node User 0 Kbps Kbps 5.67 Kbps Ingress User 3 30 Kbps 39.7 Kbps 9.68 Kbps 30.6 Kbps 0.6 Kbps Node User 4 40 Kbps 5.9 Kbps.9 Kbps 40.8 Kbps 0.8 Kbps Table 9. Rate dstrbuton among the users. 5. CONCLUSIONS AND FUTURE WORK In ths paper we ntroduced an archtecture for load dstrbuton n the ngress nodes of a network doman durng perods of congeston. We also presented and evaluated four methods for dstrbuted computaton of the sendng rates at ngress nodes. We found that the complex method for precsely estmatng sendng rates does not work well because of the naccuracy n the reported arrval rate at the congested nterface. However, smple methods for reducng rate can elmnate congeston wthn a reasonable tme and would not reduce traffc rates at ngress nodes below ther correspondng mnmum provsoned rates. Furthermore, we proposed a mechansm for far rate dstrbuton among the ndvdual flows of the ngress node, and we showed usng the OPNET [7] network smulator that ths mechansm acheves far load dstrbuton among the flows. However, to better understand possble advantages of the proposed dynamc load control protocol, we need to nvestgate further the performance of the rate reducton mechansms under a varety of network condtons. 6. ACKNOWLEDGEMENTS We would lke to thank Dr. Constantnos Dovrols for the long hours of dscusson and for helpng to realze ths dea. 7. REFERENCES. S. Blake, D. Black, M. Carlson, E. Daves, Z. Wang, W. Wess. "An Archtecture for Dfferentated Servces", December 998. IETF RFC 475. H. Chow, A. Leon-Garca, "A Feedback Control Extenson to Dfferentated Servces", March 999. Internet Draft: draft-chow-dffserv-fbctrl.txt 3. D. Clark, W. Fang, "Explct Allocaton of Best Effort Packet Delvery Servce," IEEE/ACM Transactons on Networkng, vol. 6, no. 4, pp , August C. Dovrols, P. Ramanathan, "A Case for Relatve Dfferentated Servces and Proportonal Dfferentaton Model," IEEE Network, Vol. 3, No. 5, pp. 6-34, Sep./Oct C. Dovrols, D. Stllads, "Relatve Dfferentated Servces n the Internet: Issues and Mechansms," In ACM SIGMETRICS, May C. Dovrols, D. Stllads, P. Ramanathan, "Proportonal Dfferentated Servces: Delay Dfferentaton and Packet Schedulng," Proc. ACM SIGCOMM 99 Conference, Cambrdge, MA, Sep. 999, pp Wu-chang Feng, Dlp D. Kandlur, Dabanjan Saha, and Kang G. Shn "Understandng and Improvng TCP Perfromance over Networks wth Mnmum Rate Guarantees," IEEE/ACM Transactons on Networkng, Vol. 7, No., pp , Aprl 999.

15 8. OPNET Modeler. OPNET Technologes Inc K. K. Ramakrshnan, Sally Floyd, D. Black, "The Addton of Explct Congeston Notfcaton (ECN) to IP", March 00. Internet Draft: draft-etf-tsvwg-ecn-03.txt 0. Rezende, J. F., "Assured Servce Evaluaton", In Proceedngs Globecom 99, March B. Nandy, N. Seddgh, P. Peda, J. Ethrdge, "Intellgent Traffc Condtoners for Assured Forwardng Based Dfferentated Servces Networks, In Proceedngs of IFIP Hgh Performance Networkng (HPN 000), June Peter Peda, Nabl Seddgh, Bswajt Nandy, "The Dynamcs of TCP and UDP Interacton n IP-QOS Dfferentated Servces Networks," In Proceedngs of the 3rd Canadan Conference on Broadband Research, November Ion Stoca, Scott Shenker, Hu Zhang, "Core-Stateless Far Queung: Achevng Approxmately Far Bandwdth allocatons n Hgh Speed Networks," Proc. ACM SIGCOMM 98 Conference, Vancouver, B.C., Sept. 998, pp A.F. Lobo and A.S. Seth, ''A cooperatve congeston management scheme for swtched hgh-speed networks,'' Proc. ICNP-96, Internatonal Conference on Network Protocols, Columbus, Oho (Oct.-Nov. 996), pp

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Reducing Load Distribution Overhead With Message Aggregation

Reducing Load Distribution Overhead With Message Aggregation roc. ICCC-2003, 22 nd IEEE Internatonal erormance Computng and Communcatons Conerence, hoenx, AZ (Aprl 2003), pp. 227-234. Reducng Load Dstrbuton Overhead Wth Message Aggregaton Vasl Hnatyshn and Adarshpal

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Fair and Scalable Load Distribution in the Internet

Fair and Scalable Load Distribution in the Internet Proc. 3rd Internatonal Conerence on Internet Computng, Las Vegas, NV (June 2002), pp. 201-208. Far and Scalable Load Dstrbuton n the Internet Vasl Hnatyshn and Adarshpal S. Seth Department o Computer and

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

State of the Art in Differentiated

State of the Art in Differentiated Outlne Dfferentated Servces on the Internet Explct Allocaton of Best Effort Packet Delvery Servce, D. Clark and W. Fang A Two bt Dfferentated Servces Archtecture for the Internet, K. Nchols, V. Jacobson,

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks 1

Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks 1 Intellgent Traffc Condtoners for Assured Forwardng Based Dfferentated Servces Networks B. Nandy, N. Seddgh, P. Peda, J. Ethrdge Nortel Networks, Ottawa, Canada Emal:{bnandy, nseddgh, ppeda, jethrdg}@nortelnetworks.com

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

High Performance DiffServ Mechanism for Routers and Switches: Packet Arrival Rate Based Queue Management for Class Based Scheduling

High Performance DiffServ Mechanism for Routers and Switches: Packet Arrival Rate Based Queue Management for Class Based Scheduling Hgh Performance DffServ Mechansm for Routers and Swtches: Packet Arrval Rate Based Queue Management for Class Based Schedulng Bartek Wydrowsk and Moshe Zukerman ARC Specal Research Centre for Ultra-Broadband

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms On Achevng Farness n the Jont Allocaton of Buffer and Bandwdth Resources: Prncples and Algorthms Yunka Zhou and Harsh Sethu (correspondng author) Abstract Farness n network traffc management can mprove

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Mobile Intelligent Agent Technology for QoS Provisioning and Network Management

Mobile Intelligent Agent Technology for QoS Provisioning and Network Management Proceedngs of the 10th WSEAS Internatonal Conference on COMMUNICATIONS, Voulagmen, Athens, Greece, July 10-12, 2006 (pp340-345) Moble Intellgent Agent Technology for QoS Provsonng and Network Management

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Enhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms

Enhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms Enhancng Class-Based Servce Archtectures wth Adaptve Rate Allocaton and Droppng Mechansms Ncolas Chrstn, Member, IEEE, Jörg Lebeherr, Senor Member, IEEE, and Tarek Abdelzaher, Member, IEEE Abstract Class-based

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks www.hurray.sep.pp.pt Techncal Report -GAME: An Implct GTS Allocaton Mechansm n IEEE 802.15.4 for Tme- Senstve Wreless Sensor etworks Ans Koubaa Máro Alves Eduardo Tovar TR-060706 Verson: 1.0 Date: Jul

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

A Quantitative Assured Forwarding Service

A Quantitative Assured Forwarding Service TO APPEAR IN PROCEEDINGS OF IEEE INFOCOM 00, c IEEE A Quanttatve Assured Forwardng Servce Ncolas Chrstn, Jörg Lebeherr, and Tarek F. Abdelzaher Department of Computer Scence Unversty of Vrgna P.O. Box

More information

Bandwidth Allocation for Service Level Agreement Aware Ethernet Passive Optical Networks

Bandwidth Allocation for Service Level Agreement Aware Ethernet Passive Optical Networks Bandwdth Allocaton for Servce Level Agreement Aware Ethernet Passve Optcal Networks Dawd Nowak Performance Engneerng Laboratory School of Electronc Engneerng Dubln Cty Unversty Emal: nowakd@eengdcue Phlp

More information

ARTICLE IN PRESS. Computer Networks xxx (2008) xxx xxx. Contents lists available at ScienceDirect. Computer Networks

ARTICLE IN PRESS. Computer Networks xxx (2008) xxx xxx. Contents lists available at ScienceDirect. Computer Networks Computer Networks xxx (28) xxx xxx Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet On applyng far queung dscplne to schedule requests at access gateway

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

Computer Communications

Computer Communications Computer Communcatons 3 (22) 3 48 Contents lsts avalable at ScVerse ScenceDrect Computer Communcatons journal homepage: www.elsever.com/locate/comcom On the queueng behavor of nter-flow asynchronous network

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN*

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN* ARC: An End-to-End Rate Adaptaton Scheme for Multmeda Streamng over Wreless LAN We Wang Soung C Lew Jack Y Lee Department of Informaton Engneerng he Chnese Unversty of Hong Kong Shatn N Hong Kong {wwang2

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Balancing Energy Saving and QoS in the Mobile Internet: An Application-Independent Approach

Balancing Energy Saving and QoS in the Mobile Internet: An Application-Independent Approach Balancng Energy Savng and QoS n the Moble Internet: An Applcaton-Independent Approach Unv. of Psa, Dept. of Informaton Engneerng Va Dotsalv 2-5622 Psa, Italy {g.anastas, a.passarella}@et.unp.t, G. Anastas,

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

FAST TCP: Motivation, Architecture, Algorithms, Performance

FAST TCP: Motivation, Architecture, Algorithms, Performance FAST TCP: Motvaton, Archtecture, Algorthms, Performance Cheng Jn Davd X. We Steven H. Low Engneerng & Appled Scence, Caltech http://netlab.caltech.edu Abstract We descrbe FAST TCP, a new TCP congeston

More information

arxiv: v3 [cs.ds] 7 Feb 2017

arxiv: v3 [cs.ds] 7 Feb 2017 : A Two-stage Sketch for Data Streams Tong Yang 1, Lngtong Lu 2, Ybo Yan 1, Muhammad Shahzad 3, Yulong Shen 2 Xaomng L 1, Bn Cu 1, Gaogang Xe 4 1 Pekng Unversty, Chna. 2 Xdan Unversty, Chna. 3 North Carolna

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

JTCP: Congestion Distinction by the Jitter-based Scheme over Wireless Networks

JTCP: Congestion Distinction by the Jitter-based Scheme over Wireless Networks JTCP: Congeston stncton by the Jtter-based Scheme over Wreless Networks Erc Hsao-Kuang Wu, Mng-I Hseh, Me-Zhen Chen and Shao-Y Hung ept. of Computer Scence and Informaton Engneerng, Natonal Central Unversty,

More information

New Exploration of Packet-Pair Probing for Available Bandwidth Estimation and Traffic Characterization

New Exploration of Packet-Pair Probing for Available Bandwidth Estimation and Traffic Characterization New Exploraton of Packet-Par Probng for Avalable Bandwdth Estmaton and Traffc Characterzaton Yu Cheng, Vkram Ravndran, Alberto Leon-Garca, Hsao-Hwa Chen Department of Electrcal and Computer Engneerng,

More information

A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees

A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees A Network Bandwdth Computaton Technque for IP Storage wth QoS Guarantees Young Jn Nam 1, Junkl Ryu 1, Chank Park 1, and Jong Suk Ahn 2 1 Department of Computer Scence and Engneerng Pohang Unversty of Scence

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

Why Congestion Control. Congestion Control and Active Queue Management. TCP Congestion Control Behavior. Generic TCP CC Behavior: Additive Increase

Why Congestion Control. Congestion Control and Active Queue Management. TCP Congestion Control Behavior. Generic TCP CC Behavior: Additive Increase Congeston Control and Actve Queue Management Congeston Control, Effcency and Farness Analyss of TCP Congeston Control A smple TCP throughput formula RED and Actve Queue Management How RED works Flud model

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm Seventh Internatonal Conference on Informaton Technology Dervaton of Three Queue Nodes Dscrete-Tme Analytcal Model Based on DRED Algorthm Jafar Ababneh, Hussen Abdel-Jaber, 3 Fad Thabtah, 3 Wael Had, EmranBadarneh

More information

Harfoush, Bestavros, and Byers, Robust Identfcaton of Shared Losses Usng End-to-End Uncast Probes 2 Introducton One of the defnng prncples of the netw

Harfoush, Bestavros, and Byers, Robust Identfcaton of Shared Losses Usng End-to-End Uncast Probes 2 Introducton One of the defnng prncples of the netw Robust Identfcaton of Shared Losses Usng End-to-End Uncast Probes Λ Khaled Harfoush Azer Bestavros John Byers harfoush@cs.bu.edu best@cs.bu.edu byers@cs.bu.edu Computer Scence Department Boston Unversty

More information