GTPP: General Truncated Pyramid Peer-to-Peer Architecture. over Structured DHT Networks
|
|
- Carmel Williams
- 6 years ago
- Views:
Transcription
1 GTPP: Geeral Trucated Pyramid Peer-to-Peer Architecture over Structured DHT Networs Zhoghog Ou, Eri Harjula, Timo Kosela ad Mia Yliattila Abstract Hierarchical Distributed Hash Table (DHT) architectures have bee amog the most iterestig research topics sice the birth of flat DHT architecture. However, most of the previous wor has merely focused o the two-tier hierarchy. I this paper, we study ad aalyze Geeral Trucated Pyramid Peer-to-Peer (GTPP) architecture, the geeralized versio of Partially Vertical Hierarchical Architecture (PV-HA). The idea is to study whether added tiers of hierarchy ca provide added value i performace ad fuctioality. Through mathematical aalysis, we demostrate performace results i compariso to flat architecture, which helps uderstadig the typical characteristics of hierarchical architectures. Firstly, GTPP has slightly higher expected looup hop cout, although it ca be decreased with optimizig the sub-overlay setup. However, GTPP sigificatly decreases the expected looup routig latecy. Secodly, GTPP has clearer ad more reasoable traffic distributio amog all the peers from differet tiers of sub-overlays, ad ca wor with slightly lower maiteace traffic. Thirdly, our studies idicate that -3 tiers are most suitable i most cases for GTPP, cosiderig all the parameters. Keywords geeral trucated pyramid peer-to-peer architecture, hierarchical architecture, partially vertical, fully vertical, horizotal, DHT. I. INTRODUCTION Peer-to-Peer (PP) techologies have attracted extesive attetio of the academia, idustry, ad the media i the past few years due to their decetralized, failure tolerat ad scalable characteristics. A few importat proposals have bee put forward to implemet the distributed looup services utilizig Distributed Hash Table (DHT), icludig Chord [], CAN [], Kademlia [3], Pastry [4], Tapestry [5], just to ame a few. The ey poit of DHT-based PP overlay looup algorithms is that they firstly defie a certai metric for the distace of the peer-peer ad peer-ey, ad the store the ey-value pair i the closest peer accordig to the distace metric defied. Whe looig up the value of the ey, they utilize differet mechaisms to approach the target peer which stores the ey-value pair step by step, ad fially, get the value of the ey i a logarithmic umber of hops. Origially, the aforemetioed DHT looup algorithms are based o flat architecture, which meas the peers of the overlay have the same fuctioalities ad load i routig ad maiteace, etc. O the other had, the hierarchical architecture almost always accompaies the large-scale, complex systems. O the Iteret, routers are grouped ito various autoomous systems (AS). Differet routig protocols are used for the itra-as routig ad iter-as routig; while the former utilizes Routig Iformatio Protocol (RIP) or Ope Shortest Path First (OSPF) protocol, etc., the latter uses Border Gateway Protocol (BGP), etc. Whe describig the desig of a global ame system, Butler Lampso [6] stated the hierarchy as a fudametal method for accommodatig growth ad isolatig faults. I the cotext of DHT desig, hierarchy has This wor was supported i part by Tees, Noia, Ericsso ad Nethaw i the project Decicom. Zhoghog Ou was with Beijig Uiversity of Posts ad Telecommuicatios. He is ow with Departmet of Electrical ad Iformatio Egieerig, Uiversity of Oulu, Filad, ad School of Electroic Egieerig, Beijig Uiversity of Posts ad Telecommuicatios, Beijig, Chia. ( tommy@ee.oulu.fi). Eri Harjula, Timo Kosela ad Mia Yliattila are with Departmet of Electrical ad Iformatio Egieerig, Uiversity of Oulu, FIN-94, Filad. ( firstame.lastame@ee.oulu.fi ).
2 also some otable advatages proved by the previous wor: fault isolatio ad security, effective cachig ad badwidth utilizatio [7], deductio i looup hops ad latecy [8], adaptatio to the uderlyig physical etwor [7] [9], providig admiistratio cotrol ad autoomy [8] [], more adaptable to mobile eviromets []. I our previous studies [] [3], we also foud the same advatage of hierarchical DHT, e.g. decreased looup hop cout. I this paper, we cotiue our exploratio i the hierarchical DHT desig, or more precisely, the multiple-tier hierarchical DHT which is ot limited to two-tier, as was usually doe i the previous wor. We first put forward a geeralized multiple-tier hierarchical DHT, called Geeral Trucated Pyramid Peer-to-Peer (GTPP) architecture. Geeral here meas the architecture is built o the basic fuctioalities of the hierarchical DHT, all of the tiers utilize the same basic DHT looup algorithm (Chord as our istatiatio), o optimizatio is adopted i the architecture, e.g. aycast [], multicast [4], mesh-coectio or sigle-coectio [5] [6] i the lower tier. Thus, we ca treat GTPP as a geeralized versio of multiple-tier hierarchical DHT architecture. With these assumptios, we the aalyze the expected looup hop cout, expected looup routig latecy, traffic distributio of each sigle peer from a differet tier of sub-overlay ad the total traffic of GTPP compared to flat architecture. Fially, we give the experimetal results based o the two-tier hierarchical commuity maagemet system. The mai coclusios i this paper are as follows: GTPP, as the geeralized versio of multiple-tier hierarchical DHT architecture, has slightly higher amout of looup hop cout tha flat architecture. However, the looup latecy of GTPP is sigificatly decreased compared to flat architecture. GTPP has clearer ad more reasoable traffic distributio amog the peers from differet tiers of sub-overlays, i.e. the higher tier a peer locates, the more traffic it shares. The maiteace traffic of GTPP is slightly less tha flat architecture, although the total traffic of GTPP is slightly more tha flat architecture i a highly active overlay etwor where there are a great deal of looup operatios. The total traffic of GTPP is icreased as the umber of tiers icreases. As a whole, GTPP shows its advatages compared to flat architecture, our studies idicate that -3 tiers are most suitable i most cases for GTPP, cosiderig all the parameters. The remaider of this paper is orgaized as follows: Sectio II gives the related wor ad describes the taxoomy of hierarchical architecture. Sectio III itroduces the GTPP architecture. Sectio IV aalyzes the performace of GTPP. Sectio V presets the evaluatio results. I Sectio VI, we elaborate the experimetal results. Sectio VII gives some discussio about the cotet cachig ad iterative routig mechaism. Sectio VIII describes the future wor ad i Sectio IX we coclude the article. II. RELATED WORK AND TAXONOMY Hierarchical PP architecture is resulted from the high popularity of file-sharig applicatios based o ustructured PP etwors, e.g. KaZaA [7], Gutella [8]. Large populatio of KaZaA ad Gutella applicatio results i large scale PP etwors aroud the world, which i tur causes the ever icreasig search traffic across differet admiistrative domais. Meawhile, the search recall ratio, i.e. the ratio of the umber of search results ad the total umber of available copies of the searched object, is
3 3 sigificatly decreased as the etwor scale becomes larger [6]. Therefore, KaZaA ad Gutella itroduce the hierarchy i their architectures. KaZaA [7] desigates the more powerful ad available peers as super-odes. The ew odes joiig the KaZaA etwor set up coectios to the closest super-odes though the shortest Roud Trip Time (RTT) metric. The super-odes costruct a top-level overlay etwor by proprietary desig. I the later versio of Gutella [8], the similar mechaism is used which it ames as super-peers. No-super-peer loos up the service provided by the overlay through the gateway super-peers. The top level overlay utilizes the same ustructured algorithm as ormal Gutella. Aother similar architecture is CAP [9], a two-tier ustructured PP etwor focusig o scalability ad stability. Hierarchical PP Systems Structured (DHT-based) Ustructured Vertical Horizotal KaZaA [7] Gutella [8] CAP [9] Partially Fully Cao [7] Cycloe [] mdht [4] Two-tier Brocade [], PPSIP [3], Garces-Erice et al.[8], Mislove et al. [], Zoels et al. [5] [6]. Multipletier Le et al. [], GTPP [] [3] HIERAS [9] Fig.. Taxoomy of hierarchical PP architecture. I the structured PP etwors, or more precisely, DHT-based PP etwors, the same tred ca be foud. Sa chez-artigas et al. [] distiguish horizotal hierarchical ad vertical hierarchical architecture ad summarize the differeces as follows: I a horizotal overlay, all the leaf overlay etwors are coected usig a sigle DHT that cotais the coceptual hierarchy ad optimizes the routig i the whole etwor, while i a vertical hierarchical architecture, every layer or leaf i the hierarchical tree is a self-cotaied DHT overlay etwor. I this paper, we further divide the vertical hierarchical architecture ito fully-vertical hierarchical architecture (FV-HA) ad partially-vertical hierarchical architecture (PV-HA). I FV-HA, all the peers participate i the top-tier sub-overlay as well as its local sub-overlay; therefore, o gateway peers are eeded; while i PV-HA, just partial peers participate i the top-tier overlay, the other peers do ot participate i the top-tier because of firewall security, Networ Address Traslatio (NAT), admiistrative reaso, etc. Therefore, dedicated gateway peers are eeded i PV-HA to route the query o behalf of the peers from lower-tiers of sub-overlays. A illustrated category of hierarchical PP architecture is show i Fig.. I the horizotal hierarchical architecture (H-HA), Cao [7], mdht [4], ad Cycloe [] are typical examples. Cao [7] ad Cycloe [] adopt special Idetifier (ID) desig mechaism to mae the total umber of lis per ode maitaiig remai the same as the flat DHT desig. I mdht [4], the selectio of eighborig lis is more flexible, it treats a group of host computers
4 4 i a subset participatig i the DHT overlay as a sigle ode, ad multiple lis ca be made betwee differet odes. I H-HA, o gateway peers are eeded. The advatages of H-HA iclude: fault isolatio, load balacig, topology awareess, ad hierarchical storage of cotet ad access cotrol [7]. To our best owledge, the most otable advatage of H-HA i compariso to PV-HA ad FV-HA is the optimized umber of coectios each ode maitaiig. The typical disadvatages of H-HA iclude: it supposes all the odes of the overlay etwor ca participate i the top-tier sub-overlay, i cases where may odes caot satisfy this requiremet because of firewall or NAT problem, etc. the H-HA does ot wor; furthermore, H-HA does ot have a clear distictio of the load differet odes are supposed to tae, which maes it o-suitable for highly heterogeeous eviromets. I FV-HA, all the peers participate i all the tiers of sub-overlays. HIERAS [9] is a represetative example. By groupig topologically adjacet peers ito lower level rigs, HIERAS provides the overlay etwor with routig locality. Meawhile, HIERAS has to create ad maitai oe figer table for each tier of the architecture. The advatages ad disadvatages of FV-HA are obvious. The former icludes routig locality, topology awareess, etc. The latter icludes the facts that it is o-suitable for eviromets where lots of peers locate behid firewall or NAT, ad it icreases overlay maiteace cost, etc. I PV-HA, the ey poit is the existece of dedicated gateway peers which participate i more tha oe tiers of the hierarchy ad serve as proxies of lower-tier peers. Besides most of the advatages of H-HA, i.e. fault isolatio, admiistrative autoomy, efficiet cachig ad replica, PV-HA has its ow beefits: it has a clear distictio of the load differet peers are supposed to tae which maes it suitable for highly heterogeeous eviromets, e.g. wireless etwors; it wors i eviromets where a umber of peers locate behid NAT or firewall, etc. A lot of proposals have bee put forward i this category, icludig Brocade [], Le et al. [], PPSIP [3], Garces-Erice et al.[8], Mislove et al. [], Zoels et al. [5] [6]. Our previous studies [] [3] also belog to this category. However, most proposals are focused o two-tier hierarchy, just [] ad our previous studies [] [3] explore the multiple-tier, or more precisely, more tha two-tier hierarchy. Le et al. [] presets a architecture where all the peers at the lower-tier form oly oe loop which maes it lose most of the advatages of PV-HA; therefore, we do ot study the special architecture i this paper. I [], we oly aalyzed the looup hop cout of the GTPP architecture ad did ot cosider the forwardig hop cout (the hop cout betwee differet tiers of sub-overlays); while i [3], we studied a special three-tier hierarchical architecture without ay emphasis o the geeral architecture (GTPP). I this paper, we exted the aalysis from our previous wor by ) cosiderig more performace metrics, icludig expected looup hop cout, expected looup latecy, ad maiteace traffic of multiple-tier PV-HA, ad ) substatiatig the claims regardig the looup hop cout ad maiteace traffic by simulatios. The idea is to study whether more tha two tiers of hierarchy ca provide added value i performace ad fuctioality. To our best owledge, this paper is the first attempt to provide mathematical aalysis to these metrics i a multiple-tier PV-HA. III. GENERAL TRUNCATED PYRAMID PP ARCHITECTURE I this sectio, the GTPP architecture ad the associated service looup procedure are itroduced. We do ot discuss the
5 5 mechaisms to classify N heterogeeous odes ito sub-overlays. There is a great deal of research wor o this already; oe example is [4]. There are also a great umber of DHT algorithms that ca be used to costitute the overlay. I this paper, we utilize Chord [] as oe istatiatio to form the overlay etwor. However, our results ca be easily exteded to other DHT algorithms, e.g. Kademlia [3], Pastry [4]. A. GTPP Architecture GTPP is a multiple-tier PV-HA. To mae it clear, Fig. just illustrates a three-tier hierarchical architecture. I each tier of sub-overlay, all the peers are grouped ito several disjoited sub-sub-overlays (deoted as SSOs, also the otatio of Sx_y i Fig. ). There is oly oe SSO at the highest tier. Because of the autoomy characteristic of the hierarchical architecture, differet SSO ca utilize differet DHT algorithms, or the topologies of differet SSO ca be differet, e.g. fully-mesh, sigle-coectio (each ormal peer just sets up oe coectio to its super-peer), or DHT-based. Without loss of geerality, this paper assumes all the SSOs adopt the same DHT topology ad the same DHT algorithm, i.e. Chord as our istatiatio. Peers from the same SSO ca loo up the eys stored o each other accordig to the associated DHT algorithm. Peers from differet SSO of the same tier caot loo up the eys stored o each other directly; istead, they utilize the odes from the upper tier of sub-overlay as proxies. Each SSO, except the topmost oe, has oe super-peer, which we ame as gateway super-peer to differetiate it from the other ormal peers. Besides participatig i the local SSO, the gateway super-peer also participates i the higher tier of SSO. From the viewpoit of robustess, practical overlay usually has more tha oe gateway super-peers i each SSO; however, this does ot affect our aalysis much. Therefore, for the simplicity of our aalysis, we just assume oe gateway super-peer i each SSO i the rest of this paper. Accordigly, the peers from the first tier of sub-overlay participate i oe SSO, while the peers from the other tiers of sub-overlays participate i two SSOs at the same time. As oe example i Fig., the first tier of sub-overlay cosists of six SSOs, deoted as S_, S_, etc.; the secod tier of sub-overlay cosists of three SSOs, deoted as S_, S_ ad S_3, while the third tier of sub-overlay cosists of oly oe SSO, deoted as S3_. N_5 ad N_4 participate i oly oe SSO, i.e. S_6. N_48 participates i two SSOs at the same time, i.e. S_6 ad S_3. N3_39 participates i two SSOs as well, i.e. S_3 ad S3_. From the top dow, from the vertical perspective, all the peers from differet sub-overlays costitute multiple trees rooted by the peers at the topmost sub-overlay, which maes it loo lie a pyramid beig trucated. Ad this ispires the ame of Trucated Pyramid (TP) i our GTPP architecture.
6 6 3 rd tier of sub-overlay N3_39 N3_9 Leged Request S3_ N3_4 Respose N_48 S_3 N_35 N_8 S_ N_ S_ N_ N_5 d tier of sub-overlay N_36 N_33 S_5 N_3 N_8 S_3 N_3 N_4 N_5 S_6 N_3 N_7 S_4 N_4 N_ S_ N_7 S_ st tier of sub-overlay Fig.. Geeral Trucated Pyramid PP (GTPP) architecture. B. Service looup procedure Whe a peer wats to loo up a service or resource provided withi the GTPP architecture, it follows the followig steps:. The iitiatig peer seds the looup request to its gateway super-peer, ad the the gateway super-peer forwards the request to its ow gateway super-peer at the higher tier, ad so o. This operatio is executed recursively util the request reaches the top-most tier of SSO.. The super-peer locatig at the top-most tier of SSO resolves the request ad loos up the service or resource i its local SSO utilizig the associated DHT algorithm. If o successful respose is got from its local SSO, the request is forwarded to the immediately close lower tier of SSO which is closest to the service or resource ad the looup procedure jumps to Step 3. If oe successful respose is got from the top-most tier of SSO, the looup procedure is halted immediately ad the respose is retured bac to the iitiatig peer. 3. The same procedure is doe recursively as i Step. If o successful respose is received, the looup procedure cotiues util the request reaches the lowest tier of SSO. 4. At the lowest tier of SSO, a respose, either successful or failed, is retured to the iitiatig peer. The respose follows the reverse path of the request (the so-called recursive routig) to the iitiatig peer. I Step, we assume that all the looup requests are resolved at the top-most tier of SSO firstly, which maes sese as the peers at the top-most tier of SSO have the most owledge of the whole overlay etwor. I Sectio VII.A, we will see the advatage of this foutai-lie looup mechaism to the efficiecy of cotet cachig i PV-HA. We also assume recursive routig i the aforemetioed looup procedure. We will aalyze the iterative routig mechaism i Sectio VII.B. I Step 4, if the respose is retured bac to the iitiatig peer directly istead of followig the reverse path of the request, the routig mechaism is so-called semi-recursive routig. The advatages ad disadvatages of semi-recursive routig are still uder debate. The most explicit disadvatages of semi-recursive routig iclude asymmetric routig ad wea capability of
7 7 traversig NAT. We do ot cosider this routig mechaism i this paper. Oe example sceario is illustrated i Fig., where N_5 i S_6 wats to fid the ey (ID=) stored at N_3 i S_. The requests ad resposes are show as the blac dashed lies ad the red dash-dotted lies respectively. The looup procedure is as follows:. N_5 seds the looup request to its gateway super-peer, i.e. N_48;. N_48 forwards the request to its ow gateway super-peer, i.e. N3_39; 3. N3_39 resolves the request i its local SSO, i.e. S3_, by utilizig the Chord algorithm, ad the the request is routed to N3_9 which is the closest peer to the requested ey i S3_; 4. N3_9 loos up the requested ey i its lower tier of SSO, i.e. S_, by utilizig Chord, ad the the request is routed to N_5 which is closest to the target ey i S_; 5. Fially, N_5 resolves the request i S_ ad fids the ey stored at N_3. The successful respose with the ey-value pair is retured bac to N_5 alog the reverse path of the request. I the looup procedure metioed above, it is oteworthy that Step ad Step oly cost oe looup hop, while Step 3-Step5 each costs multiple looup hops accordig to the adopted DHT algorithm. Except the forwardig hops to the gateway super-peers, we ca see that through oe SSO (S3_), the eys stored at the top-most tier of SSO (S3_) ca be foud; through two SSOs, the eys stored at the d tier of sub-overlay ca be foud; while through three SSOs, the eys stored at the st tier of sub-overlay ca be foud. Therefore, i a -tier GTPP architecture, at most SSOs are eeded to cover the whole overlay architecture. IV. PERFORMANCE ANALYSIS Le et al. [] adopted expoetial distributio (ED) to divide all the peers of the whole PP overlay ito multiple tiers of sub-overlays. The basic idea is that, accordig to the maximum iformatio etropy priciple [5], the expoetial distributio with a mea /λis the maximum etropy distributio amog all the cotiuous distributios supported i [, ) that have a mea of / λ. Physically, this also maes sese. As i real world, the majority of peers have relatively wea capability, while the much powerful peers are i the miority. By groupig the relatively wea peers ito lower tiers, ad the powerful peers ito the upper tiers, the limited physical capability of the whole overlay etwor ca be optimized. Therefore, Le et al. [] utilized the ED classifier to group the peers of the overlay etwor ito differet tiers. I our previous wor [], we foud the similarity betwee ED ad Geometric Distributio (GD), i.e. the GD has almost the same curve shape as ED except GD is i discrete domai ad the ED is i cotiuous domai, thus, GD ca roughly be treated as the discrete couterpart of ED. Therefore, we utilized GD to distribute all the peers of the overlay ito differet tiers approximately. I this paper, we cotiue to utilize the GD to group all the peers ito differet tiers. It meas from the bottom up, the umber of peers at each tier of sub-overlay follows GD. We argue here that the adopted distributio is ot so importat, as the mai goal of this paper focuses o the qualitative aalysis istead of quatitative aalysis. Differet distributio may have a ifluece o the quatitative result; however, its ifluece o qualitative aalysis is limited. The otatios used are show i Table.
8 8 TABLE I SYMBOLS AND THEIR MEANING Symbol Descriptio Symbol Descriptio N The total umber of peers i the whole overlay, atural umber. D(,) The average looup latecy for the whole GTPP overlay etwor. p The probability of oe peer beig located at the first tier of sub-overlay, <p<. ( ) Z i The matrix of the looup traffic distributio for a sigle looup which is iitiated by the i th tier of sub-overlay, i=,,,. The j th colum vector of ( ) Z i, j=,,3,,. The looup The total umber of tiers of GTPP, =,,3,, atural umber. ( ) z i j traffic distributio amog each tier of sub-overlay for the looup halted through j SSOs ad iitiated by the i th tier of sub-overlay, i=,,,. N i The umber of peers at the i th tier of sub-overlay, i=,,3,,. F Iterim matrix, with the size of *. ζ i The probability of oe ey beig stored at the i th tier of sub-overlay, i=,,3,,. f i The i th colum vector of F. P i The probability of oe peer beig located at the i th tier of sub-overlay, i=,,,. α i The looup traffic distributio of the peer at the i th tier of sub-overlay. H i, j The hop cout of oe successful looup through j SSOs, j=,,,, for the request iitiated at the i th tier of sub-overlay, i=,,3,,. β i The maiteace traffic distributio of the peer at the i th tier of sub-overlay. L i, j The latecy of oe successful looup through j SSOs, j=,,,, for the request iitiated at the i th tier of sub-overlay, i=,,3,,. γ i The republish traffic distributio of the peer at the i th tier of sub-overlay. ω i The average roud trip time (RTT) of oe looup hop at the i th tier of sub-overlay, i=,,3,,. ϑ The average umber of items shared by each peer. Γ i The expected hop cout of oe successful looup for peers at the i th tier of sub-overlay, i=,,,. m i The total traffic distributio of the peer at the i th tier of sub-overlay. Ω i The expected latecy of oe successful looup for peers at the i th tier of sub-overlay, i=,,,. T The time iterval. E(,) The average looup hop cout for the whole GTPP overlay etwor. To mae the aalysis clearer, we mae the followig assumptios:. The overlay is i stable state, which meas all the N peers are located at the proper sub-overlay tiers accordig to their physical capability. (The effect of chur to the performace of PV-HA is our future wor). The IDs of peers ad eys are geerated ad distributed uiformly, which meas all the peers from differet tiers have the same probability to store a ey. (This assumptio ca be easily satisfied utilizig the existig load balacig mechaisms) 3. Each peer from a differet tier of sub-overlay has equal probability to loo up a radom ey.
9 9 A. Looup hop cout Accordig to the assumptios ad otatios, we ca see that the umber of peers at each tier of sub-overlay has the followig equatio: N = p N N = p ( p) N.... () ( ) N = p ( p) N ( ) = ( ) N p N Here the topmost tier of sub-overlay has the differece betwee the total umber of peers ad the accumulated umber of peers from the other tiers of sub-overlays. That is to say, ( ) = i = ( ) i= N N N p N. Therefore, N p = = N p p. () Eq. () stads for the ratio of the umber of peers at the (-) th tier of sub-overlay ad the umber of peers at the th tier of sub-overlay. From Eq. (), we ca see that as log as p >.5, the N - >N. It meas the (-) th tier of sub-overlay has more peers tha the th tier of sub-overlay. It is ituitively reasoable i the sese that the peers at the lower tiers of sub-overlays have less physical capability ad accout for the majority of the whole overlay etwor. It also coforms to the maximum iformatio etropy priciple aforemetioed. From Eq. (), we ca also see that, if i, the N / N = / ( p ). As <p<, the value of / ( p) is always larger tha. It i i meas that the umber of peers at the ( i ) th tier of sub-overlay is / ( p) times of the umber of peers at the i th tier of sub-overlay. It also meas that the umber of peers i each SSO (except the topmost oe) is / ( p ) (see Fig. ). More precisely, the umber of peers i each SSO (except the topmost oe) is + / ( p ), as the gateway super-peer participates i two SSOs at the same time. To mae it clear, we deote / ( p) as, the Eq. () ca be expressed as follows: N = ( ) N N = ( ) N... N ( ) N = ( ) N ( ) = ( ) ( ) N. (3) We ca see that the SSO from the topmost tier of sub-overlay has N peers, while the other SSOs from the lower tiers of sub-overlays have the same (+) peers. As a example i Fig., the SSO from the topmost tier of sub-overlay, i.e. S3_, has three peers (N3_9, N3_4, ad N3_39); while the other SSOs from the first ad secod tiers of sub-overlays have the same three peers. S_6 icludes peers N_4, N_5, ad N_48. S_3 icludes peers N_35, N_48, ad N3_39. Gateway super-peers, e.g. N_48 ad N3_39, participate i two SSOs
10 at the same time. Actually, as we assume oe gateway super-peer i each SSO, each peer from the upper tiers of sub-overlays is a gateway super-peer, therefore, participates i two SSOs at the same time. I this way, by adjustig the value of, we ca get differet overlay topologies with variable peers at each tier of sub-overlay. From Eq. (3), we ca see that the probability of oe peer beig located at the i th tier of sub-overlay, i=,, ca be calculated by the followig equatios: N P = = N N P = = ( ) N... N P = = ( ) ( ) N N ( ) P = = ( ) N ( ). (4) With the Assumptio, the IDs of eys ad peers are distributed uiformly. Therefore, the probability of oe ey beig stored at the i th tier of sub-overlay, i=,, equals to the probability of oe peer beig located at the i th tier of sub-overlay, i.e. ζ = i therefore, the followig results exist: P, i N ζ = = N N ζ = = ( ) N... N ζ = = ( ) ( ) N N ( ) ζ = = ( ) N ( ). (5) Now, let us first cosider the situatio where the peer from the topmost tier of sub-overlay wats to loo up the eys stored by the other peers i GTPP. I this situatio, the followig results exist: H, = log( N ) = log( N) ( ) log( ) H, = log( ) + log( + ) N... H, = log( ) + ( ) log( + ) N H, = log( N ) + ( ) log( + ). (6) I Eq. (6) above, we assume the overlay is fully populated. Accordig to [], o average, log N hops are eeded to resolve the resposible peer i a fully populated DHT overlay with N peers. Tae H as a example, it meas the looup request is iitiated, from the th tier of sub-overlay, ad eeds two SSOs to complete the looup procedure. The first part of log( N ) meas the looup
11 hop cout i the topmost, i.e. th, tier of sub-overlay (the first SSO has N odes), while the secod part of log( + ) meas the looup hop cout i the (-) th tier of sub-overlay (the secod SSO has + odes). Thus, the expected hop cout for oe successful looup iitiated at the topmost tier of sub-overlay has the followig result: Γ = H, j ζ + j j= = log( N) ( ) log( ) + ( ) log( + ) ( ) j j= ( j). (7) From the looup procedure metioed i Sectio III.B, we ow that the looup procedure from the lower tiers of sub-overlays just adds a small umber of additioal forwardig hops to reach the topmost tier of sub-overlay. Thereafter, the looup procedure is the same as the looup iitiated from the topmost tier of sub-overlay. Thus, compared to the looup iitiated from the th tier of sub-overlay, the looup iitiated from the (-) th tier of sub-overlay adds oe more looup hop, while the looup iitiated from the (-) th tier of sub-overlay adds two more looup hops, ad so o. Based o Eq. (7), we ca get the followig equatio: Γ = Γ + Γ = Γ +... Γ = Γ + Γ = log( N) ( ) log( ) + ( ) log( + ) j ( ) j= ( j). (8) After we get the expected hop cout for the looup iitiated from each tier of sub-overlay ad the probability of oe peer located at each tier of sub-overlay, the expected hop cout for oe successful looup i the whole GTPP overlay ca be calculated as follows: i i i= E(, ) = P Γ. (9) B. Looup latecy Followig the similar aalysis procedure, based o Eq. (6), we ca get the values of L, j as follows by multiplyig the expected looup hop cout by the associated looup latecy for each hop: L, log( ) ω log( ) ( ) log( ) ω = N = N L, log( ) ω log( ) ω = N L, log( ) ω log( ) ω = N + + i j= L, = log( N ) ω + log( + ) ω i j=. () The expected latecy of oe successful looup for the peers at the top-most tier of sub-overlay is show as: Ω = L, j ζ + j. j=
12 The other values of Ω i ca be calculated as follows: Ω = Ω + ω j j= Ω = Ω + ω j j=... Ω = Ω + ω Ω = L ζ, j + j j=. () Tae Ω as a example, it meas the looup request is iitiated from the (-) th tier of sub-overlay. Compared to the looup request which is iitiated from the th tier of sub-overlay, oe more forwardig hop taig place at the (-) th tier of sub-overlay is eeded, ad thus, the associated RTT latecy is ω. After we get the expected latecy for the looup iitiated from each tier of sub-overlay, ad the probability of oe peer located at each tier, the expected latecy for oe successful looup i the whole GTPP architecture has the followig equatio: i i i= D(, ) = P Ω. () C. Traffic distributio I this sectio, we aalyze the traffic distributio of each sigle peer from differet tier of sub-overlay. We begi our aalysis with the looup traffic distributio. The, the maiteace traffic is aalyzed. Fially, the traffic geerated by republishig the resources is aalyzed. Looup traffic distributio We first aalyze the looup request iitiated from the topmost ( th ) tier of sub-overlay. From the aalysis procedure i Sectio IV.A, we ow that, if the looup procedure is halted at the topmost tier of sub-overlay, oe SSO is eough, i.e. / log( N ) looup hops; if the looup procedure is halted at the (-) th tier of sub-overlay, two SSOs are eeded, oe from the th tier of sub-overlay, ad the other from the (-) th tier of sub-overlay, / log( N ) ad / log( + ) looup hops, respectively. For the umber of messages set ad received, as oe hop eeds two messages set ad two messages received, the umber of messages set ad received is twice of the looup hop cout, respectively. Meawhile, it is oteworthy that the messages set ad received by the gateway super-peer should be grouped ito the upper tier of sub-overlay. Therefore, the followig equatio exists (just shows the umber of set messages): z ( ) T = [,,,log( N )] ( ) T z = [,,,log( + ),log( N ) + ] ( ) T z = [,log( + ),,log( + ),log( N ) + ] - ( ) T = [log( + ),log( + ),,log( + ),log( ) + ] z N. (3)
13 3 The probability of oe successful looup through i SSOs, i=,, 3, is show i Eq. (5). Thus, we ca get the value of f as follows: f ( ) ( ) log( ) + ( ) ( ) ( ) log( ) log( ) + + = i. (4) log( + ) log( + ) log( + ) ( ) log( ) log( ) + log( ) + log( ) + N N N N If the looup request is iitiated from the (-) th tier of sub-overlay, most of the looup procedure is the same as the request iitiated from the th tier, just oe more looup hop (forwardig the request to the top-most tier of sub-overlay) is eeded at the begiig of the looup procedure. Therefore, the value of f is as follows: f ( ) ( ) log( ) + ( ) ( ) ( ) log( ) log( ) = i. (5) log( + ) log( + ) + log( + ) + ( ) log( ) + log( ) + log( ) + log( ) + N N N N With the same processes, we ca get the other colum vectors off. The probability of oe peer beig located at the i th tier of sub-overlay is show i Eq. (4). Thus, we ca get the looup traffic distributio of oe sigle peer from differet tier of sub-overlay as follows: [ f f f ][ ] [ α, α,, α ] =,,, P, P,, P, (6) T T α = αi i=, (7) wherei α is the expected umber of messages set (or received) for oe looup of the whole GTPP architecture. As oe looup hop eeds two messages set, we ca also get the relatioship betwee α ad E(, ) as: Maiteace traffic distributio α = E(, ). (8) I additio to the traffic geerated by the service looup, each peer at each SSO also has to eep some state iformatio to mae the overlay etwor fuctio correctly. I Chord [], each peer has to ru the STABILIZE ad FIXFINGER protocols periodically to detect the failed peers ad esure the cosistecy of the figer tables. Each STABILIZE procedure icludes three messages: the iitiator seds the REQUESTPREDECESSOR message to its successor, the successor respods with RESPONSEPREDECESSOR message which icludes its ew (probably) predecessor, ad fially, the iitiator seds the NOTIFY message to this ew (probably) predecessor of the
14 4 successor. As the gateway super-peers participate i two SSOs at the same time, so they have to ru the STABILIZE algorithm i each of the two participatig SSOs periodically. Thus, the umber of messages geerated by the STABILIZE procedure for each peer from the i th tier of sub-overlay is as follows: β β β β, STAB, STAB, STAB, STAB = 3 = = 6 = = 6 = = 6. (9) Each peer from the i th tier of sub-overlay also has to ru the FIXFINGER algorithm periodically to update its figer table. Origially, each FIXFINGER operatio is a looup operatio for the ID of the required figer []. However, we do ot cosider the chur effect i this paper ad assume all the peers are i steady state; therefore, each peer just has to sed KEEPALIVE message to its figers periodically. Similar to STABILIZE procedure, the gateway super-peers also have to ru the FIXFINGER algorithm i each of the two participatig SSOs periodically. I a SSO with peers, the size of the figer table is log(), ad each FIXFINGER operatio eeds two messages, oe from the iitiator, the other from the respoder. Therefore, we ca get the followig results: β β β β, FIX, FIX, FIX, FIX = log( + ) = log( + ) + log( + ) = log( + ) + log( + ) = log( + ) + log( N ). () Republish traffic distributio I order to mae the stored service or ey-value pair up-to-date, peers also have to operate the republish procedure periodically for each of their shared items. The republish procedure is almost the same as the looup operatio. The oly differece is the republish time iterval. Therefore, the relatioship betwee γ i ad α i is: γ = ϑ α i i. Summary I recursive routig, as the umber of messages set ad received are the same, therefore, the total traffic distributio of oe sigle peer from each tier of sub-overlay has the followig result: α β β γ mi = T T T T i i, STAB i, FIX i ( ) LKP STAB FIX REP. () The total umber of messages set ad received by the whole overlay etwor is made up of two parts, the first part is the looup traffic ad republish traffic, the secod part is the maiteace traffic, i.e. the STABILIZE traffic ad the FIXFINGER traffic. Therefore, we ca get the followig results for the total traffic of the whole overlay etwor of GTPP ad Chord: α ϑ α β, β, (, ) = ( + ) + i STAB i FIX M N ( + ) Pi TLKP TREP i= TSTAB TFIX M Chord log( N) ϑ log( N) 3 log( N) = N ( + ) + ( + ) TLKP TREP TSTAB TFIX. () The maiteace traffic for GTPP ad Chord per time uit is as follows:
15 5 βi, STAB βi, FIX Mait eace(, ) = N ( + ) Pi i= TSTAB TFIX. (3) 3 log( N) Mait eace( Chord ) = N ( + ) T T STAB FIX V. RESULTS ANALYSIS I this sectio, we aalyze the expected looup hop cout, expected looup routig latecy, traffic distributio of oe sigle peer from a differet tier of sub-overlay ad the total traffic of GTPP architecture i compariso to flat architecture, based o the equatios i Sectio IV. I the aalysis procedure, we use three differet etwor scales, 4, 6 ad 8. However, we observe the similar curves with differet etwor scales. Therefore, the subsequet sectios just show the results with etwor scale 6. I the followig figures, we loo through all the itegers betwee the lower ad upper limit of. The lower limit of is two, which meas there are at least two peers i each SSO from the lower tiers of sub-overlays to mae the SSO fuctio as a distributed ( ) system. The upper limit of ca be roughly determied by the followig formula: N = ( ) N. Tae = as a example, the upper limit of is roughly 5,, actually 499,999 is the exact umber. I this case, the upper tier of SSO has peers, while each SSO from the lower tier of sub-overlay has equally 499,999 peers. Therefore, oce the total umber of the whole overlay N is fixed, a differet depth of GTPP () will result i a diverse upper limit of. The larger the value of is, the smaller the upper limit of is. Thus, the spa of x-axis is differet i the followig figures. A. Expected looup hop cout I this part, the effect of differet value of ad (the depth of GTPP) to the expected looup hop cout is studied. We aalyze four differet overlay depths ( equals to, 3, 4, ad 5, respectively), ad the results are show i the Fig. 3(a) - 3(d). The figures are based o Eq. (9) i Sectio IV. From the Fig. 3(a) 3(d), o the oe had, we ca see that the value of does ot affect the expected looup hop cout much. O the other had, as the value of becomes larger, the expected looup hop cout become slightly higher as well. The variatio is proportioal to the depth of GTPP, i.e. two tiers add aroud oe more looup hop compared to flat architecture (Chord as oe istatiatio), three tiers add two more hops, ad so o. The primary reaso for this is the additioal forwardig hops set to the top-most gateway super-peer by the peers locatig at the lowest tier of sub-overlay. As i the example i Fig., two more hops are eeded for the request from N_5 to reach the topmost (3 rd ) tier of sub-overlay. Because the peers from the lowest tier of sub-overlay accout for the majority of GTPP, they have the primary impact o the expected looup hop cout of the whole overlay etwor. The expected looup hop cout ca be further decreased by cachig the top-most gateway super-peer iformatio (ode ID, IP address, port) i each peer at the lower tiers of sub-overlays. I that case, the looup request is set to the topmost gateway super-peer directly from the lower tiers. Oly oe more forwardig hop is eeded for all the peers from the lower tiers of sub-overlays. The resultig figures are always similar to Fig. 3(a) ad are idepedet of the overlay depth (). Therefore, from the figures ad aalysis, we ca coclude that GTPP has a slightly higher amout of looup hop cout compared
16 6 to flat architecture. The expected looup hop cout ca be further decreased by cachig the topmost gateway super-peer iformatio at the lower tiers of sub-overlays E 8 6 E=E(,=) Chord E 8 6 E3=E(,=3) Chord x 5 (a) (b) E 8 6 E4=E(,=4) Chord E 8 6 E5=E(,=5) Chord (c) (d) Fig. 3 (a). Expected looup hop cout (=, N= 6 ); (b). Expected looup hop cout (=3, N= 6 ); (c). Expected looup hop cout (=4, N= 6 ); (d). Expected looup hop cout (=5, N= 6 ). B. Expected looup routig latecy This sectio aalyzes the impacts of differet value of ad to the expected looup routig latecy. We first fix the values of the RTT latecy of oe sigle hop at differet tiers of sub-overlays. I HIERAS [9], Xu et al. foud that i a two-tier hierarchical overlay architecture, with simple proximity approach, the average li delay i the lower rig was oly 35.3% of the li delay of the higher layer. I real life, however, the li latecy differece betwee local area etwor (LAN) ad wide area etwor (WAN) ca be eve larger. Without loss of geerality, we assume that the average RTT latecy for oe looup hop i flat Chord architecture is ms. I GTPP, we assume the same ms RTT latecy for oe hop at the top-most ( th ) tier of sub-overlay, while the RTT latecy for oe hop at the (-) th tier of SSO is half of that, i.e. 5 ms, ad so o. Therefore, the average RTT latecy for oe hop at the lowest ( st ) tier of sub-overlay is ( / ) ms. There is also some proximity approach that ca be used i flat architecture to decease the looup routig latecy. As we focus o the geeralized versio of PV-HA without optimizatios i this paper, we just compare GTPP with geeralized flat architecture without optimizatio either. The expected looup latecy of GTPP is show i Fig. 4(a) - 4(d).We ca see that both the values of
17 7 ad have effects o the expected looup routig latecy. Expected looup routig latecy (ms) D=D(,=) Chord x 5 (a) Expected looup routig latecy (ms) D3=D(,=3) Chord (b) Expected looup routig latecy (ms) D4=D(,=4) Chord Expected looup routig latecy (ms) D5=E(,=5) Chord (c) (d) Fig. 4(a). Expected looup routig latecy (=, N= 6, time uit=ms). (b). Expected looup routig latecy (=3, N= 6, time uit=ms). (c). Expected looup latecy (=4, N= 6, time uit=ms). (d). Expected looup latecy (=5, N= 6, time uit=ms). From the perspective of, the treds i each of Fig. 4(a)-4(d) are the same. As log as the value of becomes larger, the expected looup routig latecy of GTPP becomes shorter. From the aalysis procedure i Sectio IV.A, we ow that (or more precisely +) stads for the umber of peers i each SSO at the lower tiers of sub-overlays (except the topmost SSO). As the value of icreases, more peers are located i the lowest tier of sub-overlay, which has the shortest average RTT latecy i GTPP, therefore, the expected looup routig latecy of the GTPP architecture decreases as the value of icreases. From the perspective of, the treds are also clear. As the value of icreases, the optimal expected looup routig latecy decreases. It meas the more tiers GTPP has, the shorter expected looup routig latecy it ca achieve. The results are reasoable as the more tiers the GTPP architecture has, the shorter RTT routig latecy it has at the lowest tier of sub-overlay. From Fig. 4(a) - 4(d), we ca also see that, compared to flat architecture, two-tier GTPP architecture ca achieve aroud 3% shorter routig latecy compared to flat architecture for most of the values of (see Fig. 4(a), from the poit where the value of y-axis is 7 ms to the upper limit of ). Whe the value of varies from to 3, 4, the optimal value of routig latecy varies from aroud 6ms to 5ms, ad 4 ms, respectively. However, whe we cotiue to icrease the value of from 4 to 5, the optimal value of routig latecy varies slightly.
18 8 Therefore, from the viewpoit of routig latecy, we ca coclude that GTPP ca achieve better performace compared to flat architecture. Whe the depth of GTPP icreases from to 4, the expected looup routig latecy becomes eve shorter. However, after that, we caot achieve eve better performace just by icreasig the overlay depth. Thus, -4 tiers are optimal for GTPP. The traffic distributio of oe sigle peer The traffic distributio of oe sigle peer m(,=) m(,=) x (a) m(,=4) m(,=4) m3(,=4) m4(,=4) The traffic distributio of oe sigle peer The traffic distributio of oe sigle peer m(,=3) m(,=3) m3(,=3) (b) m(,=5) m(,=5) m3(,=5) m4(,=5) m5(,=5) (c) (d) Fig. 5(a). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=, N= 6 ). (b). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=3, N= 6 ). (c). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=4, N= 6 ). (d). Traffic distributio of a sigle peer (umber of messages set ad received by each peer per secod) from differet tier of sub-overlay (=5, N= 6 ). C. Traffic distributio of each sigle peer from differet tier of sub-overlay I this sectio, we aalyze the traffic distributio of each sigle peer from differet tier of sub-overlay. We use the followig experimetal parameter values which are the same as i [6], uless otherwise metioed. T = 6 s, T = 5 s, T = 3 s, T = 3 s, ϑ = 5.The results are based o the Eq. () i Sectio IV.C. I Fig. 5(a)-5(d), the y-axis, i.e. m i (, ), stads for the REP average umber of messages set ad received by each sigle peer per secod from the i th tier of sub-overlay. From Fig. 5(a)-5(d), we ca see that both the values of ad have iflueces o the results. From the perspective of, the treds of all the curves are the same, i.e. as log as the value of icreases, the traffic of each sigle peer from the lower tiers of sub-overlays icreases, while the traffic of oe sigle peer from the topmost tier of sub-overlay decreases. LKP STAB FIX
19 9 At some poits, they itersect. We ca also see that the curves of the itermediate tiers of sub-overlays itersect with the curve of the topmost tier before the curve of the lowest tier does. It meas the traffic of the itermediate tiers of sub-overlays icreases promptly with the SSO size of the lower tiers icreasig. Geerally, i hierarchical architectures, the peers from upper tiers of sub-overlays are assumed to have more physical capabilities. Therefore, the crossover poits i the figures above ca be used to decide the overlay size of the lower tiers of sub-overlays to avoid overloadig the peers from itermediate tiers of sub-overlays. Furthermore, i order to avoid overloadig the peers from the top-most tier of sub-overlay, some other parameters should also be defied to get certai optimal operatig poit for the whole overlay etwor. The settig of these parameters will be icluded i our future wor. From the perspective of, hierarchical architectures also show their beefits compared to flat architecture or H-HA. I reasoable fuctioal domais (the overlay size less tha the value of the crossover poits), the higher tier oe peer locates, the more traffic it shares. This maes PV-HA distribute traffic amog the peers from differet tiers of sub-overlays i a clearer ad more reasoable way. From Fig. 5(a) ad 5(b), it is clear that, whe the depth of GTPP icreases from to 3, the traffic shared by the lowest tier of sub-overlay decreases sigificatly. Whe we cotiue icreasig the depth of GTPP from 3 to 4, ad 5, the alleviatio of the traffic load from the lowest tier of sub-overlay is ot so distict. Although i Fig. 5(c) ad 5(d), the peers from the middle tiers of sub-overlays almost share the same traffic; this is maily because we assume each SSO from the lower tiers of sub-overlays have the same umber of peers for the simplicity of aalysis. This effect also proves, from aother perspective, that hierarchical architectures should ot have too may tiers to mae a clear distictio of traffic distributio. From the aalysis above, we ca coclude that, from the perspective of traffic distributio amog differet tiers of sub-overlays, GTPP has a clearer ad more reasoable way tha flat architecture ad -3 tiers are optimal to eep this beefit. D. Total traffic of the whole overlay etwor I the sectio, we aalyze the total traffic ad maiteace traffic of GTPP i compariso to Chord. The results are based o Eq. () ad Eq. (3) i Sectio IV.C. We use two differet looup rates T = 6s ad T = s for the total traffic aalysis. The other parameters are the same as i Sectio V.C., i.e. T = 5 s, T = 3 s, T = 3 s, ϑ = 5. We firstly show the results of the STAB FIX maiteace traffic per secod (umber of messages set ad received per secod for maiteace) i Fig. 6(a)-6(d). From Fig. 6(a)-6(d), it is clear that the maiteace traffic of GTPP is smaller tha Chord. As log as the overlay depth of GTPP icreases, the overall maiteace traffic decreases as well. This tred is evidet whe we vary the value of from to 3, ad 4. The primary reaso for this is that, whe we icrease the overlay depth of GTPP, the peers are partitioed ito smaller sizes of SSOs, which have fewer eighbors to maitai compared to larger SSOs. Therefore, the maiteace decreases remarably. Now, let us cosider the total traffic (umber of messages set ad received per secod for all the peers) of GTPP compared to Chord. The results with T = 6s are show i Fig. 7(a)-7(d), while the results with T = s are show i Fig. 8(a)-8(d). LKP LKP REP LKP LKP
20 4 x 6 4 x 6 Maiteace traffic Maiteace(,=) Maiteace(Chord) Maiteace traffic Maiteace(,=3) Maiteace(Chord) x 5 (a) (b) 4 x 6 4 x Maiteace(,=4) Maiteace(Chord) Maiteace(,=5) Maiteace(Chord) Maiteace traffic.5.5 Maiteace traffic (c) (d) Fig.6 (a).maiteace traffic GTPP vs. Chord (=, N= 6 ). (b). Maiteace traffic GTPP vs. Chord (=3, N= 6 ). (c). Maiteace traffic GTPP vs. Chord (=4, N= 6 ). (d). Maiteace traffic GTPP vs. Chord (=5, N= 6 )..5 x 7.5 x 7. M(,=) M Chord. M(,=3) M Chord Total traffic.5. Total traffic x (a) (b)
21 .5 x 7 M(,=4).5 x 7. M Chord. M(,=5) Total traffic.5. Total traffic.5. M Chord (c) (d) Fig. 7(a). Total traffic per secod GTPP vs. Chord (=, N= 6, T LKP=6s). (b). Total traffic per secod GTPP vs. Chord (=3, N= 6, T LKP=6s). (c).total traffic per secod GTPP vs. Chord (=4, N= 6, T LKP=6s). (d).total traffic per secod GTPP vs. Chord (=5, N= 6, T LKP=6s). 7 x 7 7 x Total traffic 4 3 M(,=) M Chord Total traffic 4 3 M(,=3) M Chord x 5 (a) (b) 7 x x Total traffic 4 3 M(,=4) M Chord Total traffic 4 3 M(,=5) M Chord (c) (d) Fig.8(a). Total traffic per secod GTPP vs. Chord (=, N= 6, T LKP=s. (b). Total traffic per secod GTPP vs. Chord (=3, N= 6, T LKP=s). (c). Total traffic per secod GTPP vs. Chord (=4, N= 6, T LKP=s). (d). Total traffic per secod GTPP vs. Chord (=5, N= 6, T LKP=s). From Fig. 7(a)-7(d), we ca see that the total traffic of GTPP slightly decreases whe the depth icreases from to 3, ad the sigificatly icreases whe the depth varies from 3 to 4, 5. Whe the depth is 3, the total traffic of GTPP is optimal ad is slightly smaller tha Chord. From Fig. 8(a)-8(d), it is clear that the total traffic of GTPP is greater tha Chord. However, the depth of or 3 still show its beefits as the differece of total traffic betwee GTPP ad Chord is ot so big. The primary reaso behid these pheomea is that the total traffic is made up of two parts, the looup ad republish traffic, ad the maiteace traffic. The looup
3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More information1&1 Next Level Hosting
1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationCHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs
CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationBig-O Analysis. Asymptotics
Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationTerm Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.
CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More information1.2 Binomial Coefficients and Subsets
1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationData Structures and Algorithms. Analysis of Algorithms
Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationWhat are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs
What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure
More informationA Study on the Performance of Cholesky-Factorization using MPI
A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationAlpha Individual Solutions MAΘ National Convention 2013
Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationThe Value of Peering
The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More information27 Refraction, Dispersion, Internal Reflection
Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More information15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015
15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationOn (K t e)-saturated Graphs
Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph
More informationA Note on Least-norm Solution of Global WireWarping
A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract
More informationFPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea
FPGA IMPLEMENTATION OF BASE-N LOGARITHM Salvador E. Tropea Electróica e Iformática Istituto Nacioal de Tecología Idustrial Bueos Aires, Argetia email: salvador@iti.gov.ar ABSTRACT I this work, we preset
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationLecture 2: Spectra of Graphs
Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad
More informationAnalysis of Algorithms
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The
More informationMulti-Threading. Hyper-, Multi-, and Simultaneous Thread Execution
Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig
More informationOperating System Concepts. Operating System Concepts
Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationOntology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection
2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,
More informationCMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More information( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb
Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most
More informationCIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)
CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig
More informationECE4050 Data Structures and Algorithms. Lecture 6: Searching
ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated
More informationTHE deployment of router-based IP multicast has been
88 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 ACOM: Ay-Source Capacity-Costraied Overlay Multicast i No-DHT P2P Networks Shipig Che, Baile Shi, Shigag Che, ad
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationChapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More informationExact Minimum Lower Bound Algorithm for Traveling Salesman Problem
Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute
More informationAPPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS
APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful
More informationDescriptive Statistics Summary Lists
Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard
More informationCombination Labelings Of Graphs
Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationConsider the following population data for the state of California. Year Population
Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB
More informationOCR Statistics 1. Working with data. Section 3: Measures of spread
Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationCubic Polynomial Curves with a Shape Parameter
roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad
More informationAdministrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today
Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised
More informationRunning Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The
More informationMath Section 2.2 Polynomial Functions
Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably
More informationRecursive Procedures. How can you model the relationship between consecutive terms of a sequence?
6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.
More informationLecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV
Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationUNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals
UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used
More informationOutline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis
Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis
More informationSD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.
SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that
More informationChapter 4 The Datapath
The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that
More informationUsing VTR Emulation on Avid Systems
Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit
More informationLoad balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *
Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationChapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,
More informationDATA MINING II - 1DL460
DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,
More informationNumerical Methods Lecture 6 - Curve Fitting Techniques
Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationMAC Throughput Improvement Using Adaptive Contention Window
Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationStone Images Retrieval Based on Color Histogram
Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies
More information4.3 Modeling with Arithmetic Sequences
Name Class Date 4.3 Modelig with Arithmetic Sequeces Essetial Questio: How ca you solve real-world problems usig arithmetic sequeces? Resource Locker Explore Iterpretig Models of Arithmetic Sequeces You
More informationVisualization of Gauss-Bonnet Theorem
Visualizatio of Gauss-Boet Theorem Yoichi Maeda maeda@keyaki.cc.u-tokai.ac.jp Departmet of Mathematics Tokai Uiversity Japa Abstract: The sum of exteral agles of a polygo is always costat, π. There are
More informationParametric curves. Reading. Parametric polynomial curves. Mathematical curve representation. Brian Curless CSE 457 Spring 2015
Readig Required: Agel 0.-0.3, 0.5., 0.6-0.7, 0.9 Parametric curves Bria Curless CSE 457 Sprig 05 Optioal Bartels, Beatty, ad Barsy. A Itroductio to Splies for use i Computer Graphics ad Geometric Modelig,
More information