GTPP: General Truncated Pyramid Peer-to-Peer Architecture. over Structured DHT Networks

Size: px
Start display at page:

Download "GTPP: General Truncated Pyramid Peer-to-Peer Architecture. over Structured DHT Networks"

Transcription

1 GTPP: Geeral Trucated Pyramid Peer-to-Peer Architecture over Structured DHT Networs Zhoghog Ou, Eri Harjula, Timo Kosela ad Mia Yliattila Abstract Hierarchical Distributed Hash Table (DHT) architectures have bee amog the most iterestig research topics sice the birth of flat DHT architecture. However, most of the previous wor has merely focused o the two-tier hierarchy. I this paper, we study ad aalyze Geeral Trucated Pyramid Peer-to-Peer (GTPP) architecture, the geeralized versio of Partially Vertical Hierarchical Architecture (PV-HA). The idea is to study whether added tiers of hierarchy ca provide added value i performace ad fuctioality. Through mathematical aalysis, we demostrate performace results i compariso to flat architecture, which helps uderstadig the typical characteristics of hierarchical architectures. Firstly, GTPP has slightly higher expected looup hop cout, although it ca be decreased with optimizig the sub-overlay setup. However, GTPP sigificatly decreases the expected looup routig latecy. Secodly, GTPP has clearer ad more reasoable traffic distributio amog all the peers from differet tiers of sub-overlays, ad ca wor with slightly lower maiteace traffic. Thirdly, our studies idicate that -3 tiers are most suitable i most cases for GTPP, cosiderig all the parameters. Keywords geeral trucated pyramid peer-to-peer architecture, hierarchical architecture, partially vertical, fully vertical, horizotal, DHT. I. INTRODUCTION Peer-to-Peer (PP) techologies have attracted extesive attetio of the academia, idustry, ad the media i the past few years due to their decetralized, failure tolerat ad scalable characteristics. A few importat proposals have bee put forward to implemet the distributed looup services utilizig Distributed Hash Table (DHT), icludig Chord [], CAN [], Kademlia [3], Pastry [4], Tapestry [5], just to ame a few. The ey poit of DHT-based PP overlay looup algorithms is that they firstly defie a certai metric for the distace of the peer-peer ad peer-ey, ad the store the ey-value pair i the closest peer accordig to the distace metric defied. Whe looig up the value of the ey, they utilize differet mechaisms to approach the target peer which stores the ey-value pair step by step, ad fially, get the value of the ey i a logarithmic umber of hops. Origially, the aforemetioed DHT looup algorithms are based o flat architecture, which meas the peers of the overlay have the same fuctioalities ad load i routig ad maiteace, etc. O the other had, the hierarchical architecture almost always accompaies the large-scale, complex systems. O the Iteret, routers are grouped ito various autoomous systems (AS). Differet routig protocols are used for the itra-as routig ad iter-as routig; while the former utilizes Routig Iformatio Protocol (RIP) or Ope Shortest Path First (OSPF) protocol, etc., the latter uses Border Gateway Protocol (BGP), etc. Whe describig the desig of a global ame system, Butler Lampso [6] stated the hierarchy as a fudametal method for accommodatig growth ad isolatig faults. I the cotext of DHT desig, hierarchy has This wor was supported i part by Tees, Noia, Ericsso ad Nethaw i the project Decicom. Zhoghog Ou was with Beijig Uiversity of Posts ad Telecommuicatios. He is ow with Departmet of Electrical ad Iformatio Egieerig, Uiversity of Oulu, Filad, ad School of Electroic Egieerig, Beijig Uiversity of Posts ad Telecommuicatios, Beijig, Chia. ( tommy@ee.oulu.fi). Eri Harjula, Timo Kosela ad Mia Yliattila are with Departmet of Electrical ad Iformatio Egieerig, Uiversity of Oulu, FIN-94, Filad. ( firstame.lastame@ee.oulu.fi ).

2 also some otable advatages proved by the previous wor: fault isolatio ad security, effective cachig ad badwidth utilizatio [7], deductio i looup hops ad latecy [8], adaptatio to the uderlyig physical etwor [7] [9], providig admiistratio cotrol ad autoomy [8] [], more adaptable to mobile eviromets []. I our previous studies [] [3], we also foud the same advatage of hierarchical DHT, e.g. decreased looup hop cout. I this paper, we cotiue our exploratio i the hierarchical DHT desig, or more precisely, the multiple-tier hierarchical DHT which is ot limited to two-tier, as was usually doe i the previous wor. We first put forward a geeralized multiple-tier hierarchical DHT, called Geeral Trucated Pyramid Peer-to-Peer (GTPP) architecture. Geeral here meas the architecture is built o the basic fuctioalities of the hierarchical DHT, all of the tiers utilize the same basic DHT looup algorithm (Chord as our istatiatio), o optimizatio is adopted i the architecture, e.g. aycast [], multicast [4], mesh-coectio or sigle-coectio [5] [6] i the lower tier. Thus, we ca treat GTPP as a geeralized versio of multiple-tier hierarchical DHT architecture. With these assumptios, we the aalyze the expected looup hop cout, expected looup routig latecy, traffic distributio of each sigle peer from a differet tier of sub-overlay ad the total traffic of GTPP compared to flat architecture. Fially, we give the experimetal results based o the two-tier hierarchical commuity maagemet system. The mai coclusios i this paper are as follows: GTPP, as the geeralized versio of multiple-tier hierarchical DHT architecture, has slightly higher amout of looup hop cout tha flat architecture. However, the looup latecy of GTPP is sigificatly decreased compared to flat architecture. GTPP has clearer ad more reasoable traffic distributio amog the peers from differet tiers of sub-overlays, i.e. the higher tier a peer locates, the more traffic it shares. The maiteace traffic of GTPP is slightly less tha flat architecture, although the total traffic of GTPP is slightly more tha flat architecture i a highly active overlay etwor where there are a great deal of looup operatios. The total traffic of GTPP is icreased as the umber of tiers icreases. As a whole, GTPP shows its advatages compared to flat architecture, our studies idicate that -3 tiers are most suitable i most cases for GTPP, cosiderig all the parameters. The remaider of this paper is orgaized as follows: Sectio II gives the related wor ad describes the taxoomy of hierarchical architecture. Sectio III itroduces the GTPP architecture. Sectio IV aalyzes the performace of GTPP. Sectio V presets the evaluatio results. I Sectio VI, we elaborate the experimetal results. Sectio VII gives some discussio about the cotet cachig ad iterative routig mechaism. Sectio VIII describes the future wor ad i Sectio IX we coclude the article. II. RELATED WORK AND TAXONOMY Hierarchical PP architecture is resulted from the high popularity of file-sharig applicatios based o ustructured PP etwors, e.g. KaZaA [7], Gutella [8]. Large populatio of KaZaA ad Gutella applicatio results i large scale PP etwors aroud the world, which i tur causes the ever icreasig search traffic across differet admiistrative domais. Meawhile, the search recall ratio, i.e. the ratio of the umber of search results ad the total umber of available copies of the searched object, is

3 3 sigificatly decreased as the etwor scale becomes larger [6]. Therefore, KaZaA ad Gutella itroduce the hierarchy i their architectures. KaZaA [7] desigates the more powerful ad available peers as super-odes. The ew odes joiig the KaZaA etwor set up coectios to the closest super-odes though the shortest Roud Trip Time (RTT) metric. The super-odes costruct a top-level overlay etwor by proprietary desig. I the later versio of Gutella [8], the similar mechaism is used which it ames as super-peers. No-super-peer loos up the service provided by the overlay through the gateway super-peers. The top level overlay utilizes the same ustructured algorithm as ormal Gutella. Aother similar architecture is CAP [9], a two-tier ustructured PP etwor focusig o scalability ad stability. Hierarchical PP Systems Structured (DHT-based) Ustructured Vertical Horizotal KaZaA [7] Gutella [8] CAP [9] Partially Fully Cao [7] Cycloe [] mdht [4] Two-tier Brocade [], PPSIP [3], Garces-Erice et al.[8], Mislove et al. [], Zoels et al. [5] [6]. Multipletier Le et al. [], GTPP [] [3] HIERAS [9] Fig.. Taxoomy of hierarchical PP architecture. I the structured PP etwors, or more precisely, DHT-based PP etwors, the same tred ca be foud. Sa chez-artigas et al. [] distiguish horizotal hierarchical ad vertical hierarchical architecture ad summarize the differeces as follows: I a horizotal overlay, all the leaf overlay etwors are coected usig a sigle DHT that cotais the coceptual hierarchy ad optimizes the routig i the whole etwor, while i a vertical hierarchical architecture, every layer or leaf i the hierarchical tree is a self-cotaied DHT overlay etwor. I this paper, we further divide the vertical hierarchical architecture ito fully-vertical hierarchical architecture (FV-HA) ad partially-vertical hierarchical architecture (PV-HA). I FV-HA, all the peers participate i the top-tier sub-overlay as well as its local sub-overlay; therefore, o gateway peers are eeded; while i PV-HA, just partial peers participate i the top-tier overlay, the other peers do ot participate i the top-tier because of firewall security, Networ Address Traslatio (NAT), admiistrative reaso, etc. Therefore, dedicated gateway peers are eeded i PV-HA to route the query o behalf of the peers from lower-tiers of sub-overlays. A illustrated category of hierarchical PP architecture is show i Fig.. I the horizotal hierarchical architecture (H-HA), Cao [7], mdht [4], ad Cycloe [] are typical examples. Cao [7] ad Cycloe [] adopt special Idetifier (ID) desig mechaism to mae the total umber of lis per ode maitaiig remai the same as the flat DHT desig. I mdht [4], the selectio of eighborig lis is more flexible, it treats a group of host computers

4 4 i a subset participatig i the DHT overlay as a sigle ode, ad multiple lis ca be made betwee differet odes. I H-HA, o gateway peers are eeded. The advatages of H-HA iclude: fault isolatio, load balacig, topology awareess, ad hierarchical storage of cotet ad access cotrol [7]. To our best owledge, the most otable advatage of H-HA i compariso to PV-HA ad FV-HA is the optimized umber of coectios each ode maitaiig. The typical disadvatages of H-HA iclude: it supposes all the odes of the overlay etwor ca participate i the top-tier sub-overlay, i cases where may odes caot satisfy this requiremet because of firewall or NAT problem, etc. the H-HA does ot wor; furthermore, H-HA does ot have a clear distictio of the load differet odes are supposed to tae, which maes it o-suitable for highly heterogeeous eviromets. I FV-HA, all the peers participate i all the tiers of sub-overlays. HIERAS [9] is a represetative example. By groupig topologically adjacet peers ito lower level rigs, HIERAS provides the overlay etwor with routig locality. Meawhile, HIERAS has to create ad maitai oe figer table for each tier of the architecture. The advatages ad disadvatages of FV-HA are obvious. The former icludes routig locality, topology awareess, etc. The latter icludes the facts that it is o-suitable for eviromets where lots of peers locate behid firewall or NAT, ad it icreases overlay maiteace cost, etc. I PV-HA, the ey poit is the existece of dedicated gateway peers which participate i more tha oe tiers of the hierarchy ad serve as proxies of lower-tier peers. Besides most of the advatages of H-HA, i.e. fault isolatio, admiistrative autoomy, efficiet cachig ad replica, PV-HA has its ow beefits: it has a clear distictio of the load differet peers are supposed to tae which maes it suitable for highly heterogeeous eviromets, e.g. wireless etwors; it wors i eviromets where a umber of peers locate behid NAT or firewall, etc. A lot of proposals have bee put forward i this category, icludig Brocade [], Le et al. [], PPSIP [3], Garces-Erice et al.[8], Mislove et al. [], Zoels et al. [5] [6]. Our previous studies [] [3] also belog to this category. However, most proposals are focused o two-tier hierarchy, just [] ad our previous studies [] [3] explore the multiple-tier, or more precisely, more tha two-tier hierarchy. Le et al. [] presets a architecture where all the peers at the lower-tier form oly oe loop which maes it lose most of the advatages of PV-HA; therefore, we do ot study the special architecture i this paper. I [], we oly aalyzed the looup hop cout of the GTPP architecture ad did ot cosider the forwardig hop cout (the hop cout betwee differet tiers of sub-overlays); while i [3], we studied a special three-tier hierarchical architecture without ay emphasis o the geeral architecture (GTPP). I this paper, we exted the aalysis from our previous wor by ) cosiderig more performace metrics, icludig expected looup hop cout, expected looup latecy, ad maiteace traffic of multiple-tier PV-HA, ad ) substatiatig the claims regardig the looup hop cout ad maiteace traffic by simulatios. The idea is to study whether more tha two tiers of hierarchy ca provide added value i performace ad fuctioality. To our best owledge, this paper is the first attempt to provide mathematical aalysis to these metrics i a multiple-tier PV-HA. III. GENERAL TRUNCATED PYRAMID PP ARCHITECTURE I this sectio, the GTPP architecture ad the associated service looup procedure are itroduced. We do ot discuss the

5 5 mechaisms to classify N heterogeeous odes ito sub-overlays. There is a great deal of research wor o this already; oe example is [4]. There are also a great umber of DHT algorithms that ca be used to costitute the overlay. I this paper, we utilize Chord [] as oe istatiatio to form the overlay etwor. However, our results ca be easily exteded to other DHT algorithms, e.g. Kademlia [3], Pastry [4]. A. GTPP Architecture GTPP is a multiple-tier PV-HA. To mae it clear, Fig. just illustrates a three-tier hierarchical architecture. I each tier of sub-overlay, all the peers are grouped ito several disjoited sub-sub-overlays (deoted as SSOs, also the otatio of Sx_y i Fig. ). There is oly oe SSO at the highest tier. Because of the autoomy characteristic of the hierarchical architecture, differet SSO ca utilize differet DHT algorithms, or the topologies of differet SSO ca be differet, e.g. fully-mesh, sigle-coectio (each ormal peer just sets up oe coectio to its super-peer), or DHT-based. Without loss of geerality, this paper assumes all the SSOs adopt the same DHT topology ad the same DHT algorithm, i.e. Chord as our istatiatio. Peers from the same SSO ca loo up the eys stored o each other accordig to the associated DHT algorithm. Peers from differet SSO of the same tier caot loo up the eys stored o each other directly; istead, they utilize the odes from the upper tier of sub-overlay as proxies. Each SSO, except the topmost oe, has oe super-peer, which we ame as gateway super-peer to differetiate it from the other ormal peers. Besides participatig i the local SSO, the gateway super-peer also participates i the higher tier of SSO. From the viewpoit of robustess, practical overlay usually has more tha oe gateway super-peers i each SSO; however, this does ot affect our aalysis much. Therefore, for the simplicity of our aalysis, we just assume oe gateway super-peer i each SSO i the rest of this paper. Accordigly, the peers from the first tier of sub-overlay participate i oe SSO, while the peers from the other tiers of sub-overlays participate i two SSOs at the same time. As oe example i Fig., the first tier of sub-overlay cosists of six SSOs, deoted as S_, S_, etc.; the secod tier of sub-overlay cosists of three SSOs, deoted as S_, S_ ad S_3, while the third tier of sub-overlay cosists of oly oe SSO, deoted as S3_. N_5 ad N_4 participate i oly oe SSO, i.e. S_6. N_48 participates i two SSOs at the same time, i.e. S_6 ad S_3. N3_39 participates i two SSOs as well, i.e. S_3 ad S3_. From the top dow, from the vertical perspective, all the peers from differet sub-overlays costitute multiple trees rooted by the peers at the topmost sub-overlay, which maes it loo lie a pyramid beig trucated. Ad this ispires the ame of Trucated Pyramid (TP) i our GTPP architecture.

6 6 3 rd tier of sub-overlay N3_39 N3_9 Leged Request S3_ N3_4 Respose N_48 S_3 N_35 N_8 S_ N_ S_ N_ N_5 d tier of sub-overlay N_36 N_33 S_5 N_3 N_8 S_3 N_3 N_4 N_5 S_6 N_3 N_7 S_4 N_4 N_ S_ N_7 S_ st tier of sub-overlay Fig.. Geeral Trucated Pyramid PP (GTPP) architecture. B. Service looup procedure Whe a peer wats to loo up a service or resource provided withi the GTPP architecture, it follows the followig steps:. The iitiatig peer seds the looup request to its gateway super-peer, ad the the gateway super-peer forwards the request to its ow gateway super-peer at the higher tier, ad so o. This operatio is executed recursively util the request reaches the top-most tier of SSO.. The super-peer locatig at the top-most tier of SSO resolves the request ad loos up the service or resource i its local SSO utilizig the associated DHT algorithm. If o successful respose is got from its local SSO, the request is forwarded to the immediately close lower tier of SSO which is closest to the service or resource ad the looup procedure jumps to Step 3. If oe successful respose is got from the top-most tier of SSO, the looup procedure is halted immediately ad the respose is retured bac to the iitiatig peer. 3. The same procedure is doe recursively as i Step. If o successful respose is received, the looup procedure cotiues util the request reaches the lowest tier of SSO. 4. At the lowest tier of SSO, a respose, either successful or failed, is retured to the iitiatig peer. The respose follows the reverse path of the request (the so-called recursive routig) to the iitiatig peer. I Step, we assume that all the looup requests are resolved at the top-most tier of SSO firstly, which maes sese as the peers at the top-most tier of SSO have the most owledge of the whole overlay etwor. I Sectio VII.A, we will see the advatage of this foutai-lie looup mechaism to the efficiecy of cotet cachig i PV-HA. We also assume recursive routig i the aforemetioed looup procedure. We will aalyze the iterative routig mechaism i Sectio VII.B. I Step 4, if the respose is retured bac to the iitiatig peer directly istead of followig the reverse path of the request, the routig mechaism is so-called semi-recursive routig. The advatages ad disadvatages of semi-recursive routig are still uder debate. The most explicit disadvatages of semi-recursive routig iclude asymmetric routig ad wea capability of

7 7 traversig NAT. We do ot cosider this routig mechaism i this paper. Oe example sceario is illustrated i Fig., where N_5 i S_6 wats to fid the ey (ID=) stored at N_3 i S_. The requests ad resposes are show as the blac dashed lies ad the red dash-dotted lies respectively. The looup procedure is as follows:. N_5 seds the looup request to its gateway super-peer, i.e. N_48;. N_48 forwards the request to its ow gateway super-peer, i.e. N3_39; 3. N3_39 resolves the request i its local SSO, i.e. S3_, by utilizig the Chord algorithm, ad the the request is routed to N3_9 which is the closest peer to the requested ey i S3_; 4. N3_9 loos up the requested ey i its lower tier of SSO, i.e. S_, by utilizig Chord, ad the the request is routed to N_5 which is closest to the target ey i S_; 5. Fially, N_5 resolves the request i S_ ad fids the ey stored at N_3. The successful respose with the ey-value pair is retured bac to N_5 alog the reverse path of the request. I the looup procedure metioed above, it is oteworthy that Step ad Step oly cost oe looup hop, while Step 3-Step5 each costs multiple looup hops accordig to the adopted DHT algorithm. Except the forwardig hops to the gateway super-peers, we ca see that through oe SSO (S3_), the eys stored at the top-most tier of SSO (S3_) ca be foud; through two SSOs, the eys stored at the d tier of sub-overlay ca be foud; while through three SSOs, the eys stored at the st tier of sub-overlay ca be foud. Therefore, i a -tier GTPP architecture, at most SSOs are eeded to cover the whole overlay architecture. IV. PERFORMANCE ANALYSIS Le et al. [] adopted expoetial distributio (ED) to divide all the peers of the whole PP overlay ito multiple tiers of sub-overlays. The basic idea is that, accordig to the maximum iformatio etropy priciple [5], the expoetial distributio with a mea /λis the maximum etropy distributio amog all the cotiuous distributios supported i [, ) that have a mea of / λ. Physically, this also maes sese. As i real world, the majority of peers have relatively wea capability, while the much powerful peers are i the miority. By groupig the relatively wea peers ito lower tiers, ad the powerful peers ito the upper tiers, the limited physical capability of the whole overlay etwor ca be optimized. Therefore, Le et al. [] utilized the ED classifier to group the peers of the overlay etwor ito differet tiers. I our previous wor [], we foud the similarity betwee ED ad Geometric Distributio (GD), i.e. the GD has almost the same curve shape as ED except GD is i discrete domai ad the ED is i cotiuous domai, thus, GD ca roughly be treated as the discrete couterpart of ED. Therefore, we utilized GD to distribute all the peers of the overlay ito differet tiers approximately. I this paper, we cotiue to utilize the GD to group all the peers ito differet tiers. It meas from the bottom up, the umber of peers at each tier of sub-overlay follows GD. We argue here that the adopted distributio is ot so importat, as the mai goal of this paper focuses o the qualitative aalysis istead of quatitative aalysis. Differet distributio may have a ifluece o the quatitative result; however, its ifluece o qualitative aalysis is limited. The otatios used are show i Table.

8 8 TABLE I SYMBOLS AND THEIR MEANING Symbol Descriptio Symbol Descriptio N The total umber of peers i the whole overlay, atural umber. D(,) The average looup latecy for the whole GTPP overlay etwor. p The probability of oe peer beig located at the first tier of sub-overlay, <p<. ( ) Z i The matrix of the looup traffic distributio for a sigle looup which is iitiated by the i th tier of sub-overlay, i=,,,. The j th colum vector of ( ) Z i, j=,,3,,. The looup The total umber of tiers of GTPP, =,,3,, atural umber. ( ) z i j traffic distributio amog each tier of sub-overlay for the looup halted through j SSOs ad iitiated by the i th tier of sub-overlay, i=,,,. N i The umber of peers at the i th tier of sub-overlay, i=,,3,,. F Iterim matrix, with the size of *. ζ i The probability of oe ey beig stored at the i th tier of sub-overlay, i=,,3,,. f i The i th colum vector of F. P i The probability of oe peer beig located at the i th tier of sub-overlay, i=,,,. α i The looup traffic distributio of the peer at the i th tier of sub-overlay. H i, j The hop cout of oe successful looup through j SSOs, j=,,,, for the request iitiated at the i th tier of sub-overlay, i=,,3,,. β i The maiteace traffic distributio of the peer at the i th tier of sub-overlay. L i, j The latecy of oe successful looup through j SSOs, j=,,,, for the request iitiated at the i th tier of sub-overlay, i=,,3,,. γ i The republish traffic distributio of the peer at the i th tier of sub-overlay. ω i The average roud trip time (RTT) of oe looup hop at the i th tier of sub-overlay, i=,,3,,. ϑ The average umber of items shared by each peer. Γ i The expected hop cout of oe successful looup for peers at the i th tier of sub-overlay, i=,,,. m i The total traffic distributio of the peer at the i th tier of sub-overlay. Ω i The expected latecy of oe successful looup for peers at the i th tier of sub-overlay, i=,,,. T The time iterval. E(,) The average looup hop cout for the whole GTPP overlay etwor. To mae the aalysis clearer, we mae the followig assumptios:. The overlay is i stable state, which meas all the N peers are located at the proper sub-overlay tiers accordig to their physical capability. (The effect of chur to the performace of PV-HA is our future wor). The IDs of peers ad eys are geerated ad distributed uiformly, which meas all the peers from differet tiers have the same probability to store a ey. (This assumptio ca be easily satisfied utilizig the existig load balacig mechaisms) 3. Each peer from a differet tier of sub-overlay has equal probability to loo up a radom ey.

9 9 A. Looup hop cout Accordig to the assumptios ad otatios, we ca see that the umber of peers at each tier of sub-overlay has the followig equatio: N = p N N = p ( p) N.... () ( ) N = p ( p) N ( ) = ( ) N p N Here the topmost tier of sub-overlay has the differece betwee the total umber of peers ad the accumulated umber of peers from the other tiers of sub-overlays. That is to say, ( ) = i = ( ) i= N N N p N. Therefore, N p = = N p p. () Eq. () stads for the ratio of the umber of peers at the (-) th tier of sub-overlay ad the umber of peers at the th tier of sub-overlay. From Eq. (), we ca see that as log as p >.5, the N - >N. It meas the (-) th tier of sub-overlay has more peers tha the th tier of sub-overlay. It is ituitively reasoable i the sese that the peers at the lower tiers of sub-overlays have less physical capability ad accout for the majority of the whole overlay etwor. It also coforms to the maximum iformatio etropy priciple aforemetioed. From Eq. (), we ca also see that, if i, the N / N = / ( p ). As <p<, the value of / ( p) is always larger tha. It i i meas that the umber of peers at the ( i ) th tier of sub-overlay is / ( p) times of the umber of peers at the i th tier of sub-overlay. It also meas that the umber of peers i each SSO (except the topmost oe) is / ( p ) (see Fig. ). More precisely, the umber of peers i each SSO (except the topmost oe) is + / ( p ), as the gateway super-peer participates i two SSOs at the same time. To mae it clear, we deote / ( p) as, the Eq. () ca be expressed as follows: N = ( ) N N = ( ) N... N ( ) N = ( ) N ( ) = ( ) ( ) N. (3) We ca see that the SSO from the topmost tier of sub-overlay has N peers, while the other SSOs from the lower tiers of sub-overlays have the same (+) peers. As a example i Fig., the SSO from the topmost tier of sub-overlay, i.e. S3_, has three peers (N3_9, N3_4, ad N3_39); while the other SSOs from the first ad secod tiers of sub-overlays have the same three peers. S_6 icludes peers N_4, N_5, ad N_48. S_3 icludes peers N_35, N_48, ad N3_39. Gateway super-peers, e.g. N_48 ad N3_39, participate i two SSOs

10 at the same time. Actually, as we assume oe gateway super-peer i each SSO, each peer from the upper tiers of sub-overlays is a gateway super-peer, therefore, participates i two SSOs at the same time. I this way, by adjustig the value of, we ca get differet overlay topologies with variable peers at each tier of sub-overlay. From Eq. (3), we ca see that the probability of oe peer beig located at the i th tier of sub-overlay, i=,, ca be calculated by the followig equatios: N P = = N N P = = ( ) N... N P = = ( ) ( ) N N ( ) P = = ( ) N ( ). (4) With the Assumptio, the IDs of eys ad peers are distributed uiformly. Therefore, the probability of oe ey beig stored at the i th tier of sub-overlay, i=,, equals to the probability of oe peer beig located at the i th tier of sub-overlay, i.e. ζ = i therefore, the followig results exist: P, i N ζ = = N N ζ = = ( ) N... N ζ = = ( ) ( ) N N ( ) ζ = = ( ) N ( ). (5) Now, let us first cosider the situatio where the peer from the topmost tier of sub-overlay wats to loo up the eys stored by the other peers i GTPP. I this situatio, the followig results exist: H, = log( N ) = log( N) ( ) log( ) H, = log( ) + log( + ) N... H, = log( ) + ( ) log( + ) N H, = log( N ) + ( ) log( + ). (6) I Eq. (6) above, we assume the overlay is fully populated. Accordig to [], o average, log N hops are eeded to resolve the resposible peer i a fully populated DHT overlay with N peers. Tae H as a example, it meas the looup request is iitiated, from the th tier of sub-overlay, ad eeds two SSOs to complete the looup procedure. The first part of log( N ) meas the looup

11 hop cout i the topmost, i.e. th, tier of sub-overlay (the first SSO has N odes), while the secod part of log( + ) meas the looup hop cout i the (-) th tier of sub-overlay (the secod SSO has + odes). Thus, the expected hop cout for oe successful looup iitiated at the topmost tier of sub-overlay has the followig result: Γ = H, j ζ + j j= = log( N) ( ) log( ) + ( ) log( + ) ( ) j j= ( j). (7) From the looup procedure metioed i Sectio III.B, we ow that the looup procedure from the lower tiers of sub-overlays just adds a small umber of additioal forwardig hops to reach the topmost tier of sub-overlay. Thereafter, the looup procedure is the same as the looup iitiated from the topmost tier of sub-overlay. Thus, compared to the looup iitiated from the th tier of sub-overlay, the looup iitiated from the (-) th tier of sub-overlay adds oe more looup hop, while the looup iitiated from the (-) th tier of sub-overlay adds two more looup hops, ad so o. Based o Eq. (7), we ca get the followig equatio: Γ = Γ + Γ = Γ +... Γ = Γ + Γ = log( N) ( ) log( ) + ( ) log( + ) j ( ) j= ( j). (8) After we get the expected hop cout for the looup iitiated from each tier of sub-overlay ad the probability of oe peer located at each tier of sub-overlay, the expected hop cout for oe successful looup i the whole GTPP overlay ca be calculated as follows: i i i= E(, ) = P Γ. (9) B. Looup latecy Followig the similar aalysis procedure, based o Eq. (6), we ca get the values of L, j as follows by multiplyig the expected looup hop cout by the associated looup latecy for each hop: L, log( ) ω log( ) ( ) log( ) ω = N = N L, log( ) ω log( ) ω = N L, log( ) ω log( ) ω = N + + i j= L, = log( N ) ω + log( + ) ω i j=. () The expected latecy of oe successful looup for the peers at the top-most tier of sub-overlay is show as: Ω = L, j ζ + j. j=

12 The other values of Ω i ca be calculated as follows: Ω = Ω + ω j j= Ω = Ω + ω j j=... Ω = Ω + ω Ω = L ζ, j + j j=. () Tae Ω as a example, it meas the looup request is iitiated from the (-) th tier of sub-overlay. Compared to the looup request which is iitiated from the th tier of sub-overlay, oe more forwardig hop taig place at the (-) th tier of sub-overlay is eeded, ad thus, the associated RTT latecy is ω. After we get the expected latecy for the looup iitiated from each tier of sub-overlay, ad the probability of oe peer located at each tier, the expected latecy for oe successful looup i the whole GTPP architecture has the followig equatio: i i i= D(, ) = P Ω. () C. Traffic distributio I this sectio, we aalyze the traffic distributio of each sigle peer from differet tier of sub-overlay. We begi our aalysis with the looup traffic distributio. The, the maiteace traffic is aalyzed. Fially, the traffic geerated by republishig the resources is aalyzed. Looup traffic distributio We first aalyze the looup request iitiated from the topmost ( th ) tier of sub-overlay. From the aalysis procedure i Sectio IV.A, we ow that, if the looup procedure is halted at the topmost tier of sub-overlay, oe SSO is eough, i.e. / log( N ) looup hops; if the looup procedure is halted at the (-) th tier of sub-overlay, two SSOs are eeded, oe from the th tier of sub-overlay, ad the other from the (-) th tier of sub-overlay, / log( N ) ad / log( + ) looup hops, respectively. For the umber of messages set ad received, as oe hop eeds two messages set ad two messages received, the umber of messages set ad received is twice of the looup hop cout, respectively. Meawhile, it is oteworthy that the messages set ad received by the gateway super-peer should be grouped ito the upper tier of sub-overlay. Therefore, the followig equatio exists (just shows the umber of set messages): z ( ) T = [,,,log( N )] ( ) T z = [,,,log( + ),log( N ) + ] ( ) T z = [,log( + ),,log( + ),log( N ) + ] - ( ) T = [log( + ),log( + ),,log( + ),log( ) + ] z N. (3)

13 3 The probability of oe successful looup through i SSOs, i=,, 3, is show i Eq. (5). Thus, we ca get the value of f as follows: f ( ) ( ) log( ) + ( ) ( ) ( ) log( ) log( ) + + = i. (4) log( + ) log( + ) log( + ) ( ) log( ) log( ) + log( ) + log( ) + N N N N If the looup request is iitiated from the (-) th tier of sub-overlay, most of the looup procedure is the same as the request iitiated from the th tier, just oe more looup hop (forwardig the request to the top-most tier of sub-overlay) is eeded at the begiig of the looup procedure. Therefore, the value of f is as follows: f ( ) ( ) log( ) + ( ) ( ) ( ) log( ) log( ) = i. (5) log( + ) log( + ) + log( + ) + ( ) log( ) + log( ) + log( ) + log( ) + N N N N With the same processes, we ca get the other colum vectors off. The probability of oe peer beig located at the i th tier of sub-overlay is show i Eq. (4). Thus, we ca get the looup traffic distributio of oe sigle peer from differet tier of sub-overlay as follows: [ f f f ][ ] [ α, α,, α ] =,,, P, P,, P, (6) T T α = αi i=, (7) wherei α is the expected umber of messages set (or received) for oe looup of the whole GTPP architecture. As oe looup hop eeds two messages set, we ca also get the relatioship betwee α ad E(, ) as: Maiteace traffic distributio α = E(, ). (8) I additio to the traffic geerated by the service looup, each peer at each SSO also has to eep some state iformatio to mae the overlay etwor fuctio correctly. I Chord [], each peer has to ru the STABILIZE ad FIXFINGER protocols periodically to detect the failed peers ad esure the cosistecy of the figer tables. Each STABILIZE procedure icludes three messages: the iitiator seds the REQUESTPREDECESSOR message to its successor, the successor respods with RESPONSEPREDECESSOR message which icludes its ew (probably) predecessor, ad fially, the iitiator seds the NOTIFY message to this ew (probably) predecessor of the

14 4 successor. As the gateway super-peers participate i two SSOs at the same time, so they have to ru the STABILIZE algorithm i each of the two participatig SSOs periodically. Thus, the umber of messages geerated by the STABILIZE procedure for each peer from the i th tier of sub-overlay is as follows: β β β β, STAB, STAB, STAB, STAB = 3 = = 6 = = 6 = = 6. (9) Each peer from the i th tier of sub-overlay also has to ru the FIXFINGER algorithm periodically to update its figer table. Origially, each FIXFINGER operatio is a looup operatio for the ID of the required figer []. However, we do ot cosider the chur effect i this paper ad assume all the peers are i steady state; therefore, each peer just has to sed KEEPALIVE message to its figers periodically. Similar to STABILIZE procedure, the gateway super-peers also have to ru the FIXFINGER algorithm i each of the two participatig SSOs periodically. I a SSO with peers, the size of the figer table is log(), ad each FIXFINGER operatio eeds two messages, oe from the iitiator, the other from the respoder. Therefore, we ca get the followig results: β β β β, FIX, FIX, FIX, FIX = log( + ) = log( + ) + log( + ) = log( + ) + log( + ) = log( + ) + log( N ). () Republish traffic distributio I order to mae the stored service or ey-value pair up-to-date, peers also have to operate the republish procedure periodically for each of their shared items. The republish procedure is almost the same as the looup operatio. The oly differece is the republish time iterval. Therefore, the relatioship betwee γ i ad α i is: γ = ϑ α i i. Summary I recursive routig, as the umber of messages set ad received are the same, therefore, the total traffic distributio of oe sigle peer from each tier of sub-overlay has the followig result: α β β γ mi = T T T T i i, STAB i, FIX i ( ) LKP STAB FIX REP. () The total umber of messages set ad received by the whole overlay etwor is made up of two parts, the first part is the looup traffic ad republish traffic, the secod part is the maiteace traffic, i.e. the STABILIZE traffic ad the FIXFINGER traffic. Therefore, we ca get the followig results for the total traffic of the whole overlay etwor of GTPP ad Chord: α ϑ α β, β, (, ) = ( + ) + i STAB i FIX M N ( + ) Pi TLKP TREP i= TSTAB TFIX M Chord log( N) ϑ log( N) 3 log( N) = N ( + ) + ( + ) TLKP TREP TSTAB TFIX. () The maiteace traffic for GTPP ad Chord per time uit is as follows:

15 5 βi, STAB βi, FIX Mait eace(, ) = N ( + ) Pi i= TSTAB TFIX. (3) 3 log( N) Mait eace( Chord ) = N ( + ) T T STAB FIX V. RESULTS ANALYSIS I this sectio, we aalyze the expected looup hop cout, expected looup routig latecy, traffic distributio of oe sigle peer from a differet tier of sub-overlay ad the total traffic of GTPP architecture i compariso to flat architecture, based o the equatios i Sectio IV. I the aalysis procedure, we use three differet etwor scales, 4, 6 ad 8. However, we observe the similar curves with differet etwor scales. Therefore, the subsequet sectios just show the results with etwor scale 6. I the followig figures, we loo through all the itegers betwee the lower ad upper limit of. The lower limit of is two, which meas there are at least two peers i each SSO from the lower tiers of sub-overlays to mae the SSO fuctio as a distributed ( ) system. The upper limit of ca be roughly determied by the followig formula: N = ( ) N. Tae = as a example, the upper limit of is roughly 5,, actually 499,999 is the exact umber. I this case, the upper tier of SSO has peers, while each SSO from the lower tier of sub-overlay has equally 499,999 peers. Therefore, oce the total umber of the whole overlay N is fixed, a differet depth of GTPP () will result i a diverse upper limit of. The larger the value of is, the smaller the upper limit of is. Thus, the spa of x-axis is differet i the followig figures. A. Expected looup hop cout I this part, the effect of differet value of ad (the depth of GTPP) to the expected looup hop cout is studied. We aalyze four differet overlay depths ( equals to, 3, 4, ad 5, respectively), ad the results are show i the Fig. 3(a) - 3(d). The figures are based o Eq. (9) i Sectio IV. From the Fig. 3(a) 3(d), o the oe had, we ca see that the value of does ot affect the expected looup hop cout much. O the other had, as the value of becomes larger, the expected looup hop cout become slightly higher as well. The variatio is proportioal to the depth of GTPP, i.e. two tiers add aroud oe more looup hop compared to flat architecture (Chord as oe istatiatio), three tiers add two more hops, ad so o. The primary reaso for this is the additioal forwardig hops set to the top-most gateway super-peer by the peers locatig at the lowest tier of sub-overlay. As i the example i Fig., two more hops are eeded for the request from N_5 to reach the topmost (3 rd ) tier of sub-overlay. Because the peers from the lowest tier of sub-overlay accout for the majority of GTPP, they have the primary impact o the expected looup hop cout of the whole overlay etwor. The expected looup hop cout ca be further decreased by cachig the top-most gateway super-peer iformatio (ode ID, IP address, port) i each peer at the lower tiers of sub-overlays. I that case, the looup request is set to the topmost gateway super-peer directly from the lower tiers. Oly oe more forwardig hop is eeded for all the peers from the lower tiers of sub-overlays. The resultig figures are always similar to Fig. 3(a) ad are idepedet of the overlay depth (). Therefore, from the figures ad aalysis, we ca coclude that GTPP has a slightly higher amout of looup hop cout compared

16 6 to flat architecture. The expected looup hop cout ca be further decreased by cachig the topmost gateway super-peer iformatio at the lower tiers of sub-overlays E 8 6 E=E(,=) Chord E 8 6 E3=E(,=3) Chord x 5 (a) (b) E 8 6 E4=E(,=4) Chord E 8 6 E5=E(,=5) Chord (c) (d) Fig. 3 (a). Expected looup hop cout (=, N= 6 ); (b). Expected looup hop cout (=3, N= 6 ); (c). Expected looup hop cout (=4, N= 6 ); (d). Expected looup hop cout (=5, N= 6 ). B. Expected looup routig latecy This sectio aalyzes the impacts of differet value of ad to the expected looup routig latecy. We first fix the values of the RTT latecy of oe sigle hop at differet tiers of sub-overlays. I HIERAS [9], Xu et al. foud that i a two-tier hierarchical overlay architecture, with simple proximity approach, the average li delay i the lower rig was oly 35.3% of the li delay of the higher layer. I real life, however, the li latecy differece betwee local area etwor (LAN) ad wide area etwor (WAN) ca be eve larger. Without loss of geerality, we assume that the average RTT latecy for oe looup hop i flat Chord architecture is ms. I GTPP, we assume the same ms RTT latecy for oe hop at the top-most ( th ) tier of sub-overlay, while the RTT latecy for oe hop at the (-) th tier of SSO is half of that, i.e. 5 ms, ad so o. Therefore, the average RTT latecy for oe hop at the lowest ( st ) tier of sub-overlay is ( / ) ms. There is also some proximity approach that ca be used i flat architecture to decease the looup routig latecy. As we focus o the geeralized versio of PV-HA without optimizatios i this paper, we just compare GTPP with geeralized flat architecture without optimizatio either. The expected looup latecy of GTPP is show i Fig. 4(a) - 4(d).We ca see that both the values of

17 7 ad have effects o the expected looup routig latecy. Expected looup routig latecy (ms) D=D(,=) Chord x 5 (a) Expected looup routig latecy (ms) D3=D(,=3) Chord (b) Expected looup routig latecy (ms) D4=D(,=4) Chord Expected looup routig latecy (ms) D5=E(,=5) Chord (c) (d) Fig. 4(a). Expected looup routig latecy (=, N= 6, time uit=ms). (b). Expected looup routig latecy (=3, N= 6, time uit=ms). (c). Expected looup latecy (=4, N= 6, time uit=ms). (d). Expected looup latecy (=5, N= 6, time uit=ms). From the perspective of, the treds i each of Fig. 4(a)-4(d) are the same. As log as the value of becomes larger, the expected looup routig latecy of GTPP becomes shorter. From the aalysis procedure i Sectio IV.A, we ow that (or more precisely +) stads for the umber of peers i each SSO at the lower tiers of sub-overlays (except the topmost SSO). As the value of icreases, more peers are located i the lowest tier of sub-overlay, which has the shortest average RTT latecy i GTPP, therefore, the expected looup routig latecy of the GTPP architecture decreases as the value of icreases. From the perspective of, the treds are also clear. As the value of icreases, the optimal expected looup routig latecy decreases. It meas the more tiers GTPP has, the shorter expected looup routig latecy it ca achieve. The results are reasoable as the more tiers the GTPP architecture has, the shorter RTT routig latecy it has at the lowest tier of sub-overlay. From Fig. 4(a) - 4(d), we ca also see that, compared to flat architecture, two-tier GTPP architecture ca achieve aroud 3% shorter routig latecy compared to flat architecture for most of the values of (see Fig. 4(a), from the poit where the value of y-axis is 7 ms to the upper limit of ). Whe the value of varies from to 3, 4, the optimal value of routig latecy varies from aroud 6ms to 5ms, ad 4 ms, respectively. However, whe we cotiue to icrease the value of from 4 to 5, the optimal value of routig latecy varies slightly.

18 8 Therefore, from the viewpoit of routig latecy, we ca coclude that GTPP ca achieve better performace compared to flat architecture. Whe the depth of GTPP icreases from to 4, the expected looup routig latecy becomes eve shorter. However, after that, we caot achieve eve better performace just by icreasig the overlay depth. Thus, -4 tiers are optimal for GTPP. The traffic distributio of oe sigle peer The traffic distributio of oe sigle peer m(,=) m(,=) x (a) m(,=4) m(,=4) m3(,=4) m4(,=4) The traffic distributio of oe sigle peer The traffic distributio of oe sigle peer m(,=3) m(,=3) m3(,=3) (b) m(,=5) m(,=5) m3(,=5) m4(,=5) m5(,=5) (c) (d) Fig. 5(a). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=, N= 6 ). (b). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=3, N= 6 ). (c). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=4, N= 6 ). (d). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=5, N= 6 ). C. Traffic distributio of each sigle peer from differet tier of sub-overlay I this sectio, we aalyze the traffic distributio of each sigle peer from differet tier of sub-overlay. We use the followig experimetal parameter values which are the same as i [6], uless otherwise metioed. T = 6 s, T = 5 s, T = 3 s, T = 3 s, ϑ = 5.The results are based o the Eq. () i Sectio IV.C. I Fig. 5(a)-5(d), the y-axis, i.e. m i (, ), stads for the REP average umber of messages set ad received by each sigle peer per secod from the i th tier of sub-overlay. From Fig. 5(a)-5(d), we ca see that both the values of ad have iflueces o the results. From the perspective of, the treds of all the curves are the same, i.e. as log as the value of icreases, the traffic of each sigle peer from the lower tiers of sub-overlays icreases, while the traffic of oe sigle peer from the topmost tier of sub-overlay decreases. LKP STAB FIX

19 9 At some poits, they itersect. We ca also see that the curves of the itermediate tiers of sub-overlays itersect with the curve of the topmost tier before the curve of the lowest tier does. It meas the traffic of the itermediate tiers of sub-overlays icreases promptly with the SSO size of the lower tiers icreasig. Geerally, i hierarchical architectures, the peers from upper tiers of sub-overlays are assumed to have more physical capabilities. Therefore, the crossover poits i the figures above ca be used to decide the overlay size of the lower tiers of sub-overlays to avoid overloadig the peers from itermediate tiers of sub-overlays. Furthermore, i order to avoid overloadig the peers from the top-most tier of sub-overlay, some other parameters should also be defied to get certai optimal operatig poit for the whole overlay etwor. The settig of these parameters will be icluded i our future wor. From the perspective of, hierarchical architectures also show their beefits compared to flat architecture or H-HA. I reasoable fuctioal domais (the overlay size less tha the value of the crossover poits), the higher tier oe peer locates, the more traffic it shares. This maes PV-HA distribute traffic amog the peers from differet tiers of sub-overlays i a clearer ad more reasoable way. From Fig. 5(a) ad 5(b), it is clear that, whe the depth of GTPP icreases from to 3, the traffic shared by the lowest tier of sub-overlay decreases sigificatly. Whe we cotiue icreasig the depth of GTPP from 3 to 4, ad 5, the alleviatio of the traffic load from the lowest tier of sub-overlay is ot so distict. Although i Fig. 5(c) ad 5(d), the peers from the middle tiers of sub-overlays almost share the same traffic; this is maily because we assume each SSO from the lower tiers of sub-overlays have the same umber of peers for the simplicity of aalysis. This effect also proves, from aother perspective, that hierarchical architectures should ot have too may tiers to mae a clear distictio of traffic distributio. From the aalysis above, we ca coclude that, from the perspective of traffic distributio amog differet tiers of sub-overlays, GTPP has a clearer ad more reasoable way tha flat architecture ad -3 tiers are optimal to eep this beefit. D. Total traffic of the whole overlay etwor I the sectio, we aalyze the total traffic ad maiteace traffic of GTPP i compariso to Chord. The results are based o Eq. () ad Eq. (3) i Sectio IV.C. We use two differet looup rates T = 6s ad T = s for the total traffic aalysis. The other parameters are the same as i Sectio V.C., i.e. T = 5 s, T = 3 s, T = 3 s, ϑ = 5. We firstly show the results of the STAB FIX maiteace traffic per secod (umber of messages set ad received per secod for maiteace) i Fig. 6(a)-6(d). From Fig. 6(a)-6(d), it is clear that the maiteace traffic of GTPP is smaller tha Chord. As log as the overlay depth of GTPP icreases, the overall maiteace traffic decreases as well. This tred is evidet whe we vary the value of from to 3, ad 4. The primary reaso for this is that, whe we icrease the overlay depth of GTPP, the peers are partitioed ito smaller sizes of SSOs, which have fewer eighbors to maitai compared to larger SSOs. Therefore, the maiteace decreases remarably. Now, let us cosider the total traffic (umber of messages set ad received per secod for all the peers) of GTPP compared to Chord. The results with T = 6s are show i Fig. 7(a)-7(d), while the results with T = s are show i Fig. 8(a)-8(d). LKP LKP REP LKP LKP

20 4 x 6 4 x 6 Maiteace traffic Maiteace(,=) Maiteace(Chord) Maiteace traffic Maiteace(,=3) Maiteace(Chord) x 5 (a) (b) 4 x 6 4 x Maiteace(,=4) Maiteace(Chord) Maiteace(,=5) Maiteace(Chord) Maiteace traffic.5.5 Maiteace traffic (c) (d) Fig.6 (a).maiteace traffic GTPP vs. Chord (=, N= 6 ). (b). Maiteace traffic GTPP vs. Chord (=3, N= 6 ). (c). Maiteace traffic GTPP vs. Chord (=4, N= 6 ). (d). Maiteace traffic GTPP vs. Chord (=5, N= 6 )..5 x 7.5 x 7. M(,=) M Chord. M(,=3) M Chord Total traffic.5. Total traffic x (a) (b)

21 .5 x 7 M(,=4).5 x 7. M Chord. M(,=5) Total traffic.5. Total traffic.5. M Chord (c) (d) Fig. 7(a). Total traffic per secod GTPP vs. Chord (=, N= 6, T LKP=6s). (b). Total traffic per secod GTPP vs. Chord (=3, N= 6, T LKP=6s). (c).total traffic per secod GTPP vs. Chord (=4, N= 6, T LKP=6s). (d).total traffic per secod GTPP vs. Chord (=5, N= 6, T LKP=6s). 7 x 7 7 x Total traffic 4 3 M(,=) M Chord Total traffic 4 3 M(,=3) M Chord x 5 (a) (b) 7 x x Total traffic 4 3 M(,=4) M Chord Total traffic 4 3 M(,=5) M Chord (c) (d) Fig.8(a). Total traffic per secod GTPP vs. Chord (=, N= 6, T LKP=s. (b). Total traffic per secod GTPP vs. Chord (=3, N= 6, T LKP=s). (c). Total traffic per secod GTPP vs. Chord (=4, N= 6, T LKP=s). (d). Total traffic per secod GTPP vs. Chord (=5, N= 6, T LKP=s). From Fig. 7(a)-7(d), we ca see that the total traffic of GTPP slightly decreases whe the depth icreases from to 3, ad the sigificatly icreases whe the depth varies from 3 to 4, 5. Whe the depth is 3, the total traffic of GTPP is optimal ad is slightly smaller tha Chord. From Fig. 8(a)-8(d), it is clear that the total traffic of GTPP is greater tha Chord. However, the depth of or 3 still show its beefits as the differece of total traffic betwee GTPP ad Chord is ot so big. The primary reaso behid these pheomea is that the total traffic is made up of two parts, the looup ad republish traffic, ad the maiteace traffic. The looup

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea FPGA IMPLEMENTATION OF BASE-N LOGARITHM Salvador E. Tropea Electróica e Iformática Istituto Nacioal de Tecología Idustrial Bueos Aires, Argetia email: salvador@iti.gov.ar ABSTRACT I this work, we preset

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

THE deployment of router-based IP multicast has been

THE deployment of router-based IP multicast has been 88 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 ACOM: Ay-Source Capacity-Costraied Overlay Multicast i No-DHT P2P Networks Shipig Che, Baile Shi, Shigag Che, ad

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Consider the following population data for the state of California. Year Population

Consider the following population data for the state of California. Year Population Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB

More information

OCR Statistics 1. Working with data. Section 3: Measures of spread

OCR Statistics 1. Working with data. Section 3: Measures of spread Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Math Section 2.2 Polynomial Functions

Math Section 2.2 Polynomial Functions Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

4.3 Modeling with Arithmetic Sequences

4.3 Modeling with Arithmetic Sequences Name Class Date 4.3 Modelig with Arithmetic Sequeces Essetial Questio: How ca you solve real-world problems usig arithmetic sequeces? Resource Locker Explore Iterpretig Models of Arithmetic Sequeces You

More information

Visualization of Gauss-Bonnet Theorem

Visualization of Gauss-Bonnet Theorem Visualizatio of Gauss-Boet Theorem Yoichi Maeda maeda@keyaki.cc.u-tokai.ac.jp Departmet of Mathematics Tokai Uiversity Japa Abstract: The sum of exteral agles of a polygo is always costat, π. There are

More information

Parametric curves. Reading. Parametric polynomial curves. Mathematical curve representation. Brian Curless CSE 457 Spring 2015

Parametric curves. Reading. Parametric polynomial curves. Mathematical curve representation. Brian Curless CSE 457 Spring 2015 Readig Required: Agel 0.-0.3, 0.5., 0.6-0.7, 0.9 Parametric curves Bria Curless CSE 457 Sprig 05 Optioal Bartels, Beatty, ad Barsy. A Itroductio to Splies for use i Computer Graphics ad Geometric Modelig,

More information