Baltzer Journals Modelling Aspects of Distributed Processing. in Telecommunication Networks

Size: px
Start display at page:

Download "Baltzer Journals Modelling Aspects of Distributed Processing. in Telecommunication Networks"

Transcription

1 Baltzer Journals Modelling Aspects of Distributed Processing in Telecommunication Networks Asgeir Tomasgard 1, Jan A. Audestad 2, Shane Dye 1 Leen Stougie 3, Maarten H. van der Vlerk 4, Stein W. Wallace 1 1 Department of Economics and Technology Management, Norwegian University of Science and Technology, N-7034 Trondheim, Norway 2 Telenor AS, P.O. Box 6701 St. Olavs plass, N-0130 Oslo, Norway 3 Faculty of Economics and Econometrics, University of Amsterdam, Roetersstraat 11, 1018 WB Amsterdam, The Netherlands 4 Dept. of Econometrics, University of Groningen, P.O. Box 800, 9700 AV Groningen, The Netherlands The purpose of this paper is to formally describe new optimization models for telecommunication networks with distributed processing. Modern distributed networks put more focus on the processing of information and less on the actual transportation of data than we are traditionally used to in telecommunications. This paper introduces new approaches for modelling decision support at operational, tactical and strategic levels. One of the main advantages of the technological framework we are working within is its inherent exibility, which enables us to dynamically plan and consider uncertainty when decisions are made. When we present the models, emphasis is placed on the modelling discussions around the shift of focus towards processing, the new technological aspects, and how to utilize exibility to cope with uncertainty. Keywords: distributed networks, distributed processing, telecommunication, stochastic (integer) programming, stochastic modelling, optimization. 1 Introduction In this paper we present several models for telecommunication networks with distributed processing. In particular, we consider possibilities for handling uncertainty which is present in operational as well as investment problems. Several factors are important in the technological push that has opened the possibilities for distributing the processing in telecommunication networks. Examples of technological factors are digital technology, modern high-speed network architectures like B- ISDN and packet switched data transmission concepts like ATM (see for example [8, 31]). Work partially funded by Telenor

2 A. Tomasgard et al. /Modelling Aspects of Distributed Processing... 2 This allows for provision of more and more complex services. Another technological factor is the use of bre optics for the network wiring, which yields cheap transportation capacity. In addition several standardization initiatives for distributed telecommunication architectures have been developed. The standardization concerns software, equipment, and interfaces between the `objects' present in the network. One of these initiatives is the Telecommunications Information Networking Architecture Consortium (TINA-C) [6, 33] scheduled to be completed in One of the main dierences between new networks based on distributed processing and traditional telecommunication networks (with localized processing) is the increased exibility in resource allocation. The impact of the above developments is that an enormous number of services can be provided on a telecommunication network. In this paper the term service is used to encompass a set of software applications together with the set of computing and network resources it uses. Typical examples of resources in a distributed network are: switches, servers, transmission options, routers, and computers. Services capable of processing information are oered through computers, or computing nodes, by the software applications running on these computers. While traditional services tend to use more of the transportation resources in the network, we believe that the extensive growth in newer services will come from those requiring more resources on the computers running the applications used by the services. At the same time the investment cost of transportation capacities has decreased as bre optic technology has become standard. This means that the limited resource in the distributed networks will often be the computing resources, such as the processing capacity at the network nodes. If there is a shortage of computing resources, then some of the requested services can not be oered. Another development is that deregulation all over the world introduces competition in telecom markets. New players enter the telecommunications scene and the roles of old players change. For example, the dierences between distributed computer networks and telecommunication networks are getting smaller as a consequence of the development discussed above. Deregulation and new technology together create a rapidly changing industry: traditional telecommunication companies lose their monopolistic positions and will therefore have to become competitive. New technology and deregulation mean that there is a need to introduce optimization models at a higher layer in the communications network. This paper presents models with operational and tactical/strategic time horizons. We concentrate on models in which services and distributed processing of information at computing nodes is treated rather than transportation and routing of information. The main purpose of the paper is to present examples of how the change of focus in service provision towards processing of information will lead to interesting new optimization models. We do not attempt, at this stage, to provide the precision necessary for real applications. As far as the literature is concerned, a reference on the technological aspects of distributed networks is [27]. However, this reference is neither telecommunications nor optimization oriented. A large number of optimization models with applications within telecommunications exist, see for example [15, 16, 32]. There are also papers dealing with aspects of specic new services introduced into modern telecommunication networks, like video on demand [1, 5]. The theory of queuing networks has been applied to transportation aspects of communications networks, see for example [28]. Then, stochastic linear programming models have been used to address uncertainty in demand when investing in components of the transportation structure [13, 35]. When it comes to robustness

3 A. Tomasgard et al. /Modelling Aspects of Distributed Processing... 3 and reliable routing an example is found in [14]. A common feature of all of the above work is that the main focus is on transportation of data and the resources related to transportation. In [20] distribution of the workload in a network of computers is discussed with whole jobs being processed on a single machine. In fact we are not aware of any literature dealing with optimization models for distributed networks that focus on distributed processing aspects and distributed services' use of processing capacity at the network nodes. Clearly, there is a great deal of uncertainty found in both investments in and the operation of these modern distributed networks. At the same time, as we will see, we have excellent mechanisms for dealing with this uncertainty because of greater exibility in investment, conguration, and resource allocation. In this paper we will deal with uncertainty using stochastic programming models. For the basic concepts and terminology of stochastic programming we refer to [19]. The paper is organized as follows. Section 2 denes the necessary technological terms and the framework we operate within. At the operational level, consideration is given to the problem of how to utilize network resources in order to meet demand for services both now and in the near future (Section 3). As an example of a problem that appears at the tactical/strategic level, we treat the question of where to place computer resources in a region in the distributed network (Section 4). This section closes by introducing some notation used in the rest of the paper. Stochastic parameters are always denoted by Greek letters accented with a tilde, e.g. ~, whereas is a realization of the same stochastic parameter. Furthermore parameters related to demand for processing capacity are denoted with d or everywhere in the paper. Parameter s is used to denote capacity and variables x are always concerned with processing capacity. Their interpretation and units vary between the models, as the models operate in dierent timeframes and concentrate on dierent aspects. 2 The technological framework Aspects of distribution constitute the basis for the optimization models that are presented below in Sections 3 and 4. Therefore we will briey describe a telecommunications model of the distributed framework. This section is based on the TINA-C documentation for which [3, 7, 30] are introductions. The basis for parts of TINA-C has been the Information Networking Architecture (INA) of Bellcore[2, 34]. 2.1 A distributed network model We may describe the relationship between transportation networks, computers with processing resources and the applications used to build services by the three planes shown in Figure 1. In the upper plane we have a set of software applications. The computers, or computing nodes, where the applications reside, can be seen as the \glue" which binds the distributed application architecture and the underlying network architecture together. Examples of interaction between applications are shown by the solid lines between them. This interaction usually creates information ows through the computers and the underlying networks. The solid lines in the computing nodes plane describe virtual links

4 A. Tomasgard et al. /Modelling Aspects of Distributed Processing... 4 Applications Computing nodes Networks Figure 1: The relationship between the transportation networks, the computing nodes and service applications. between pairs of computers. We use the term virtual to indicate that there does not necessarily exist a corresponding direct physical link between the two nodes but that it is possible to transport information between them. The real transportation of information happens in physical links in the networks described in the network plane. In the network plane the nodes describe physical networks and the solid lines indicate which networks are connected to each other (without saying how they are connected). If all the networks are connected, we have virtual all-to-all links in the computing nodes plane. Mappings, possibly many-to-many, between planes are shown by the broken lines. One computing node may accommodate several applications and several identical instances of an application may reside at dierent nodes. In the same way one network may contain several computing nodes and one computing node may reside in several networks (providing processing for all these networks while not necessarily allowing transportation between them). Applications may be moved or copied between computing nodes with no limitation on how often this may occur. The mapping between applications and computing nodes is therefore dynamic. From the above description we understand that several instances of an application can exist at dierent computing nodes mapped to the same or to dierent networks. In many contexts the mapping between computing nodes and the networks will be stable. However, systems are emerging where even the mapping between nodes and

5 A. Tomasgard et al. /Modelling Aspects of Distributed Processing... 5 networks is dynamic. This is, for example, the case in mobile telephony, where the computing node in the mobile station can be mapped to several physical networks during execution of a service. Another example is low orbit satellites where the computing node is actually the satellite. For modelling purposes we will assume in the rest of this paper that the mapping between networks and computing nodes is static. Note that the distributed network model described above is a useful model for the Internet. The upper plane corresponding to the Web; the middle plane representing the servers; and the bottom plane being the international structure of telephone and data networks. 2.2 Distribution transparencies In order to formalize some of the requirements for a distributed network, the TINA-C documentation [3, 17] describes a set of features, called transparencies, that a distributed telecommunication network must have. These transparencies are important with respect to the ability to adapt to changes, the availability of services and the exibility in service deployment, provision and management. Access transparency. Every application reveals a standardized interface to other applications, independent of where co-operating applications are placed. Applications which together constitute a service can thus be placed on dierent computers, without this aecting the interaction between them and the access they have to each other. Location transparency hides the location of applications from each other. Applications can interact while their locations change over time, without the other applications noticing it. Migration transparency is an extension to the location and access transparencies above which allows dynamic relocation of application instances. Relocation can take place while services are interacting with each other. This transparency gives us the possibility to completely move an application while it is in use and interacting with other applications. Concurrency transparency allows several applications to interact with the same instance of another application at the same time. The fact that other applications use the same instance is hidden. Failure transparency ensures that errors generated by one instance of the application are hidden from other applications and users. Replication transparency hides the replication of one application to other computers, from other applications. This means that it may not be possible to know which instance of an application we are actually using. These transparencies imply that applications can be distributed freely over the computing nodes of the network.

6 A. Tomasgard et al. /Modelling Aspects of Distributed Processing Abstract infrastructure The engineering model [17] from TINA-C is used to describe any distributed system as a set of objects interacting through an abstract infrastructure, the Distributed Processing Environment (DPE). This abstract infrastructure exists on every computer in the network and provides a layer between the computer's native computing and communication environment and the services composed of applications. The mechanisms necessary to implement the transparencies above are hidden in the implementation of the DPE. The infrastructure and functionality provided by the DPE are the same for all hardware platforms and all services. In this abstract infrastructure traders ll an important role. A trader is a repository which contains information about available interfaces and application instances. Each trader has a domain where it is working and a domain can have several traders. Traders interact with each other to make sure that requests for applications can be met independently of where both the application instances and the users reside. Hence the traders make it possible to assume that our applications can interact to make a service without knowing each other's location or physical hardware platform. 2.4 Roles We identify some of the roles of agents that are found in a distributed network. We only include the roles that have an impact on the models addressed in this paper. The customers are people or software requesting services. A service provider oers services to customers. A service can be provided by anyone who has a computer which runs a DPE and is connected to a network. A network provider provides a transportation network with routing and switching capabilities to customers and service providers. Some or all of the network nodes are computing nodes with a DPE, they correspond to computing nodes in Figure 1. The network providers thereby act as hosts for the service providers' applications, both when it comes to computing resources like processing capacity and when it comes to transportation resources. Deregulation all over the world opens the possibility of many network and service providers operating in the same market. It is important to note that a network provider does not necessarily act as a service provider, and that service providers do not necessarily own any of the processing or transmission equipment they use. 3 Service provision The rst model we will consider is that of dynamically allocating processing resources at the computing nodes. From Section 2 we know that applications are connected to each other virtually through the underlying computing nodes and physically through the network structure, as described in Figure 1. The service provider allocates node resources in order to meet customer requests for services. The resource allocation should be made in order to utilize the resources in the best possible way, and may include an option to reject requests. We assume that processing capacity is the limiting resource. Before we completely dene the problem, we must take a closer look at the services,

7 A. Tomasgard et al. /Modelling Aspects of Distributed Processing... 7 service A service B services composed of subservices video sound data subservices computing nodes plane Figure 2: Services are composed of subservices. Services can be distributed. how they use resources, and how the distribution transparencies from Section 2.2 inuence resource allocation. 3.1 Services and subservices A service has already been dened as a set of applications and their required resources. As a result of the distribution transparencies described in Section 2.2 the applications constituting a service may in principle be allocated arbitrarily to computing nodes of the network. However, from a practical point of view, it may be useful to group applications together into units that always run on the same node. We dene a subservice as such a collection of applications that are to be located together to perform their assigned task. Thus, in the rest of this paper we will consider the subservices as the smallest indivisible entities of computer code that are the building blocks for the construction of services. Thus, all services are built from subservices, as shown in Figure 2. Here service A is built from subservices \sound" and \video". Service B is built from subservices \sound", \data" and \video". The distribution transparencies mean that services can be distributed, with their subservice instances spread over several nodes. Figure 2 illustrates this for service B. Also several instances of the same subservice may exist at dierent nodes, as for subservice \sound" in the illustrated example. The arcs in the lower half of the gure represent the dierent instances. A subservice instance can be used by several services and a service usually consists of several subservices. The number of customer requests for a service describes the demand from the customer locations. When a subservice is installed at a node, we assume that the only limit on the number of requests that can be served by it is the node's processing capacity. Concurrency and failure transparencies hide the requests from each other. We distinguish between two types of computer capacity use by a subservice. The rst one is a xed resource requirement induced by having the software running and ready to meet requests in real time. A subservice uses a xed amount of the node resources whenever it is installed

8 A. Tomasgard et al. /Modelling Aspects of Distributed Processing... 8 on the node, even when it is not satisfying a single request. The second one emerges from accessing the subservice. In this paper we assume that this second processing capacity requirement of a subservice increases linearly with the number of simultaneous requests for a service having the subservice as a constituting part. The linear factor depends on the specic service as the processing intensity diers from service to service. When a decision is made to install a subservice at a node, the subservice cannot usually be used to meet the demand immediately. There is normally a setup time in which the subservice can be collected from a database, loaded into the memory and initialized, before it can be used to serve requests. There can also be a delay between the time the service provider decides to remove a subservice and the time its xed resource use is released. 3.2 Quality of service, transparencies and location of demand The customer's requirements from a service are covered in the concept Quality of Service (QoS) [18]. QoS for applications or subservices can be looked at as a set of user perceivable attributes dening the desired behavior of the subservice when it comes to, for example, delay, reliability, image quality, image size, security etc. At a lower level one also denes QoS parameters for the networks: bandwidth, delay, blocking probabilities, loss rates, etc. We are only concerned with QoS for subservices here, because we are examining the problem facing service providers. To be as general as possible, we will not specify the specic parameters. In light of the distribution transparencies we assume that the QoS of a subservice is not aected by the specic computing node on which it is installed. The distribution transparencies from Section 2.2 indicate that the location of the subservice instances used to meet requests is not important from either the point of view of the interacting subservices or that of the customers. Customers have no preferences when it comes to the service instances they use, except through QoS, which we assumed not to be aected by dierences in the nodes. The distribution transparencies therefore give rise to a lot of exibility when it comes to allocating resources in the network, and are crucial to the problem described in this section. The location of subservices clearly does matter when information generated or processed by services is to be transported in the underlying transportation networks. Even if we assume that all nodes have the same capabilities to run subservices, transportation may aect the QoS experienced by the customer, for example, through time delay as a consequence of congested networks. It is natural to assume that the network provider can interact with the service provider to deploy services to nodes nearby the customers. This makes it possible to reduce the overhead from transportation of data when information ows depends on the allocation of services to nodes. The important question is then: Is it, in our setting and given our assumptions, sensible to integrate into our decision models the representation of the actual underlying co-operation and the information ows? Even if the inclusion of information ows in service provision models may at rst sight seem necessary, there are several reasons why the opposite can be true. Firstly, in cases where the service provider is not the network provider, an agent oering services may not know the physical location of his own subservices, because of migration and replication transparencies. It is also reasonable to believe that service providers, who rent computer capacity from network providers, can use this capacity to set up any service they like. Network providers responsible for the transportation network therefore cannot necessarily

9 A. Tomasgard et al. /Modelling Aspects of Distributed Processing... 9 control which services are running at which locations. Secondly, a service provider may not know the location of all of the users or even subservices of his service because this information can be hidden by the transparencies and the use of traders dened in Section 2.3. Thirdly, we have indicated that there is a shift in focus, where services move from being mainly transportation oriented to being processing oriented. In keeping with the focus of this paper we assume that the processing capacity is the limiting factor, not the transportation. Under the fundamental assumptions that we have a distributed network where distribution transparencies are valid, and processing capacity is the limiting resource, we have the following interpretation of the eect of distribution transparencies on resource allocation at an operational level: A1 : In regions of the networks the demand for processing capacity can be served at any computing node in the region, independent of the demand's and the node's location and without aecting the subservices' QoS. Based on the above discussion, this would imply the following underlying assumption: A2 : Within regions of the global network, the transportation networks are designed to keep the time delay acceptable on transportation of generated information and to ensure the correct QoS for subservices, independent of the allocation of requests for subservices to nodes. If processing capacity is the limited resource, the interpretation above is necessary to fully utilize the possibilities created by the distributed environment for dynamic resource allocation. It is important to note that the size of the regions above does not depend on physical distance, but rather on the underlying transportation networks of the network providers in question and their alliances. Possibly only one such region could exist, namely the whole world. If the regions are non-overlapping we can model the allocation of node resources for each region independently and without regard to customers' QoS requirements arising from transportation. In this way, it is possible to (heuristically) decompose any network into regions in which transportation has no eect on the customers QoS. As we see the distributed framework from Section 2 strongly inuences our decision problem. The main eect on modelling the resource allocation is that we do not have to model any information ows generated by a request, only the demand for the services. Under our assumptions, the actual locations of customers are thus irrelevant to the problem of allocating node resources. This means that the demand for processing capacity through subservices can be aggregated over the customers, services and all the locations in at least a region in the network providing the service. 3.3 A deterministic service provision model We are now able to specify in more detail the service provider's problem. The service provider has a set of computers available where he can install subservices. He wants to allocate subservices to computing nodes in order to meet the demand for services. Installing too many subservices at a node implies that there will be no processing capacity

10 A. Tomasgard et al. /Modelling Aspects of Distributed Processing left to serve the demand for them, because of their xed resource need. Providing too few may imply that there is the capacity to serve demand, but not the ability. If by our allocation strategy or simply through over-demand the node capacity is not sucient to meet all demand, we will have to reject customers. There are several ways of interpreting rejections. Because of deregulation we know that there is a competitive market for subservices. In view of the distribution transparencies described in Section 2.2 and the DPE functionality described in Section 2.3, it is reasonable to assume that traders will be able to perform the task of identifying other instances of the subservice that the service provider is not able to oer. Subservices that are rejected are then either hired from other providers, or served in another region of our provider's operating area. The rejection cost can be interpreted as the cost of obtaining the subservice elsewhere. It is also possible that when a customer is rejected, he chooses to nd another service provider, or that a trader performs this task for him. Under the additional assumption that the service provider is not able to change the market price with his decisions, the rejection cost is equal to the market price for the rejected (sub)service. When there is a market for subservices and we utilize the functionality of traders, we can treat hiring subservices from elsewhere as partial rejection of a service. We do not have to dierentiate between the dierent activities above that would be taken for individual customer rejections. In all cases the rejection cost is equal to the market price for the rejected subservice. This allows us to have services appearing only implicitly in the model. In Section 3.6 we will briey discuss the model in which services should be explicitly modelled. In that case rejection costs for a service are introduced. Let us rst describe a static model assuming deterministic demand and no lead time for installing subservices. Although demand uctuates over time and is not known in advance, there are two reasons for considering this model. First it gives us insight in the underlying allocation problem that may be used in solving the more realistic but also more complicated non-deterministic problem. Secondly, taking average values for the demand may be useful to nd a sort of default conguration of the system, i.e., a conguration that is used as long as no strange demand patterns occur. The above problem can be modelled as a linear mixed integer programming problem (MIP) [29]. The aim is then to allocate the subservices over our computing nodes so as to minimize the cost of rejection. Let I be the set of computing nodes and J the set of subservices. The zero-one variable z(i; j) indicates whether or not node i has subservice j installed on it. The variable x(i; j) denotes the amount of demand for processing capacity generated by subservice j and met at node i. In practice, the x(i; j) will take on integer values, however relaxing the integrality requirements does not aect the optimal solution much since the optimal values will, typically, be either 0 or relatively large. Let the demand for processing capacity generated by subservice j be d(j). The cost of meeting a request for subservice j by hiring it from elsewhere is denoted by (j). The xed resource usage for subservice j at node i is denoted by r(i; j). The total capacity of node i is s(i). The feasible region of the deterministic subservice provision problem without rejections is then formulated in the following mathematical programming model: min (j)(d(j)? x(i; j)) j2j i2i

11 A. Tomasgard et al. /Modelling Aspects of Distributed Processing s.t. j2j r(i; j)z(i; j) + j2j i2i x(i; j) s(i); i 2 I; x(i; j) d(j); j 2 J ; M(i; j)z(i; j)? x(i; j) 0; (i; j) 2 I J ; z(i; j) 2 f0; 1g; x(i; j) 0; (i; j) 2 I J : The term d(j)? x(i; j) in the objective is that part of the demand for subservice j Pi2I that we have to reject. The rst set of constraints makes sure for each node that the sum of the xed resource use induced by installing subservices at the node and the demand met at the node do not exceed its capacity. The second set of constraints says that we can only process the subservice demands that we see. The third set of constraints ensures that the processing capacity at a node cannot be used to meet demand for a subservice, unless the subservice is installed there. The constants M(i; j) in these constraints are upper bounds on the values for the corresponding variables x(i; j), and the lowest value M(i; j) can take is minfs(i)? r(i; j); d(j)g. For this deterministic mixed-integer problem a large class of facets of the feasible region is known [9]. The related feasibility problem (i.e., the problem of nding a feasible solution that satises all demand, under the assumption that such a solution exists) has the structure of a Transportation Network with Supply Eating Arcs (TSEA) [10]. It is interesting to note that the deterministic feasibility problem of TSEA is N P-complete in the strong sense, see [10]. In [10] an algorithm is also given that solves the TSEA feasibility problem when r(i; j) = r(j). 3.4 Uncertainty One of the main advantages oered by the distribution transparencies of Section 2.2 is the possibility of dynamically changing the resource allocation. This ability to change is even more important when we try to consider uncertainty of demand in our models. In the treatment of uncertainty here and in the rest of the paper, we use terminology from stochastic programming. In a stochastic programming setting we assume that uncertainty in the demand for services can be modelled by making them random parameters with known probability distributions. In Section 3.1 we described how demand for services can be mapped to demand for processing capacity through their use of subservices. Thus, from the demand distributions for services we derive distributions for resource use generated by the subservices. Further discussion on this subject can be found in [38, 39]. At any time the state of the system of computers running services can be described by the current demand for processing capacity, a list of the running subservices, and a probability distribution of resource use generated by the dierent subservices at some future point in time. A very useful observation is that under most (ordinary) demand patterns for the services there will be no trouble meeting demand (otherwise, the investment problem is not properly solved). We are not interested in these cases. Instead, we will study

12 A. Tomasgard et al. /Modelling Aspects of Distributed Processing requests time required to install a subservice time required to shut down any subservice event begins event identifiable current configuration inadequate event ends time Figure 3: Example of a peak in service demand situations in which unexpected peaks in demand for a single service occur. We assume that the time between these peaks is so large that we need only consider one service peaking at a time. After a peak has occurred, there is time to return to a robust state before a new peak might arrive. The conditional probability distribution concerning which service, if any, is going to peak in the next time period and the height of the peak, is based on observed trac patterns. The progress of a peak is depicted in Figure 3. Here we can see the relations between uncertainty and decisions as the peak develops. At some point in time an event begins and the service provider soon becomes aware of it (but not which service is peaking). As the peak evolves the service provider gains more information until he can identify the peak. We assume that at this point, due to relatively high setup times of installing subservices and release times of the xed capacity use after shutting down subservices, there is not enough time to change the conguration in order to meet the peak. The service provider must then rely on his prior decisions made under uncertainty. Under the above assumptions for the duration and distributions of peaks and for subservice lead times, the decision process can be modeled as a two-stage process. In the rst stage we decide which subservices to oer (install) on which computing nodes, having only probabilistic information on which service is going to peak. In the second stage uncertainty is resolved, and our only possible recourse action concerns what demand should be met using the subservices we installed in the rst stage. For an example see Figure 4 of Section 3.5. The time frame of the dynamic decision process will typically be

13 A. Tomasgard et al. /Modelling Aspects of Distributed Processing from milliseconds to minutes, depending on the lead time for setting up services and the duration of demand uctuations. In this paper we will model the case of discrete distributions, described in terms of scenarios [19]. The above discussion indicates that the individual scenarios typically only show peaks in a few of the subservices, depending on which service peaks in that scenario. Some of the subservices may peak in all scenarios, but some of them will also only be signicantly aected if one specic service peaks. So, in general, our distribution is such that the dierences between scenarios can be large. If not, uncertainty would probably not be important. 3.5 Subservice arrangement under uncertainty Now we turn to the mathematical model incorporating the two-stage dynamic decision process described above. We base the problem formulation on the deterministic model in Section 3.3 and the above discussion. In the stochastic case prices can be uncertain as well as demand. Let ~(j) be the random cost of rejecting demand for the resource created by subservice j. Random demand for subservice j is denoted by (j). ~ Here we give an example of a two-stage formulation of the stochastic service provision problem. Minimize s:t: j2j Q(z) r(i; j)z(i; j) s(i); i 2 I; z(i; j) 2 f0; 1g; (i; j) 2 I J ; where the constraint indicates that the node capacity limits how many subservices can be installed in a node, and Q(z) = E[q(z; ; )]: The expectation is taken over the stochastic parameters ~ and, ~ and q(z; ; ) = min (j)[(j)? x(i; j)] s.t. j2j i2i j2j i2i x(i; j) s(i)? r(i; j)z(i; j) = s z(i); i 2 I; j2j x(i; j) (j); j 2 J ; x(i; j) M(i; j)z(i; j); (i; j) 2 I J ; x(i; j) 0; (i; j) 2 I J : The second-stage problem is a bipartite transportation problem with cost coecients only on the arcs used to reject demand. The constraints mean the same here as in the deterministic problem in Section 3.3, but the z-variables are now xed and moved to the right-hand side to indicate this. The structure of the objective function can be utilized when solving the model, for example as in [36]. The rst stage is a binary knapsack problem [26] with several independent knapsacks and a convex objective.

14 A. Tomasgard et al. /Modelling Aspects of Distributed Processing One should also note that the rst-stage constraints are redundant, since they are represented in a stronger form in the second stage. On the other hand, since the rststage constraints imply s z(i) 0 8i 2 I, the model can be regarded as a stochastic integer programming model with relatively complete continuous recourse (see for example [19, 37]). The following example indicates why uncertainty, rejections and dynamics must be included in the model. Example 1: The eect of uncertainty on decisions Assume that we have only one node with a capacity of 200 resource units. We have three subservices (A; B; C), with deterministic rejection costs = (40; 31; 30) and xed resource usage r = (40; 20; 10). Uncertain demand is described by two possible future scenarios, S1 with S1 = (80; 0; 70) and S2 with S2 = (0; 150; 70). The two scenarios have equal probability of occurring. Let us rst try to look at this from the point of view of deterministic analysis. The optimal solution if we know ahead of time that scenario S1 will occur, is z 1 = (1; 0; 1) and x 1 = (80; 0; 70). The rejection cost is 0. The optimal solution if we know that S2 will occur is z 2 = (0; 1; 1) and x 2 = (0; 150; 20). The rejection cost is 1500, due to partial rejection of subservice C. Remember that in reality the demands are not known when subservices are installed. The two solutions above therefore give no idea about the solution to this stochastic dynamic problem, because in one case subservice A is installed and in the other subservice B. Next, we consider using expected demand = (40; 75; 70) as data, thus treating the problem as if it was deterministic. The optimal deterministic solution (z ; x ) is then to install subservices B and C, z = (0; 1; 1), and set x = (0; 75; 70) with a rejection cost of 4040 = It follows from Jensen's inequality (see for example [19]) that this rejection cost gives a lower bound to the expected rejection cost of our actual stochastic problem. The interesting part of this solution is only its rst-stage decision z. In practice, we will minimize the actual rejection costs of the scenario that occurs. This decision process is shown in Figure 4. Thus, to nd the expected cost of the rst-stage solution z, for each scenario we must nd the minimum rejection cost given that only subservices B and C are installed. If scenario S1 occurs we meet the entire demand for subservice C, hence x S1 = (0; 0; 70), and if S2 occurs we choose to meet the entire demand for subservice B and as much as possible for subservice C, so that x S2 = (0; 150; 20). It follows that the true expected cost resulting from the rst-stage solution of the deterministic model is 0: : = Obviously, this is an upper bound for the expected cost of the optimal solution of the stochastic model. All of the choices the service provider has, together with rejection costs are given in Table 1. It can easily be seen that the best expected rejection cost is given by installing all three subservices, leading to an optimal cost of As we can see the solution we found from deterministic analysis in this case is not optimal. Its expected rejection cost is 42% higher than the optimal one. Here the possibility of a peak in demand for subservice A and the resulting high rejection cost in this scenario, more than outweigh the expected marginal value of any alternative use of the resource units involved. This was not discovered through deterministic analysis.

15 A. Tomasgard et al. /Modelling Aspects of Distributed Processing S1 x S1 z δ ~ S2 x S2 set up subservices demand revealed meet demand time Figure 4: The two-stage decision process of our example. Table 1: All possible rst-stage solutions with their expected rejection costs. installed x S1 x S2 expected rejection cost ( 0; 0; 0) ( 0; 0; 0) 6025 A (80; 0; 0) ( 0; 0; 0) 4425 B ( 0; 0; 0) ( 0; 150; 0) 3700 C ( 0; 0; 70) ( 0; 0; 70) 3925 A; B (80; 0; 0) ( 0; 140; 0) 2255 A; C (80; 0; 70) ( 0; 0; 70) 2325 B; C ( 0; 0; 70) ( 0; 150; 20) 2350 A; B; C (80; 0; 50) ( 0; 130; 0) 1660

16 A. Tomasgard et al. /Modelling Aspects of Distributed Processing Extensions of the models In the previous models we implicitly assumed that the service provider had full knowledge of the sizes of all the available computing nodes and the ability to utilize this. We can imagine that, in some cases, the network provider who owns the computers on which the subservices are running, is free to replicate and migrate the subservice instances running on his infrastructure. In hiding the complete infrastructure from the service provider using migration and replication transparencies, he is completely free to utilize his resources. The service provider sees the infrastructure only as one single node. Note that the models presented in this paper then describes the network provider's problem. The corresponding service provider's problem will have only one computing node, and is discussed in [38, 39]. It may also be useful to model rejection of requests for services. In other words we then model a situation where the service provider is, or wants to be, the only provider of all or some of the subservices constituting a service. In case there are no customer rejections, there is no dierence from the earlier models. Models representing the problem with service rejections can be found in [38], where also multi-stage models and other variants of the service provision problem are discussed. 4 Node location problem At the operational level we have seen that the distributed framework of Section 2 enables us to both dynamically reallocate resources at the nodes and to distribute the processing in a region. This clearly inuences the discussion of the network provider's strategic investments in the underlying infrastructure on which we run the services, namely the computing nodes. We will assume that processing capacity is the limited resource, that distribution transparencies are valid and that our networks are divided into nonoverlapping regions of the type discussed in Section 3.2. As an example of a problem at a strategic level we treat the problem of locating computing nodes (computers) in the network. In the node location problem we consider a xed set of candidate sites inside a region in our network. The purpose of the computers is to meet demand for processing capacity generated by the requests for services within the region. Each site has a computer of a given capacity, and there is an investment cost associated with installing it. In practice there may be several \sites" with the same geographical location, but with computers of dierent size, type and cost. Each site also has costs connected to oering (sub)services to customers located at dierent places in the region. The network provider wants to locate the processing capacity within the region so as to minimize the cost of installing enough processing and link capacity to meet the overall demand. Obviously dierent choices of node sites can lead to dierent costs for meeting service demand, both as a consequence of investments made in the transportation infrastructure and as a consequence of dierent operating costs.

17 A. Tomasgard et al. /Modelling Aspects of Distributed Processing possible site e 1 i 1 e 5 i 2 e 2 e 8 e 10 e 6 virtual link e 9 i 4 e 7 i 3 e 3 e 4 Figure 5: Possible computing node sites and locations of demand in a region of the network. 4.1 Transparencies, link capacities and demand First we need to dene customers and their locations in the region. Imagine that the locations of customers correspond to the possible sites for the computing nodes in Figure 5. Subservices are often requested as an interaction between two or more customers, possibly at dierent locations. In Section 2.1 we explained that all pairs of computing nodes are connected by virtual links. We let these virtual links between the possible sites of the computing nodes as well as the sites themselves correspond to the \locations" of the requests for subservices. This is shown in Figure 5 where demand locations are indicated with the letter e and possible sites with i. Note that many subservices bring about interactions between more than two locations. In this case, the request would contribute to demand for the subservice over all links included in the request. It is important to see how the technological framework we dened in Section 2 in- uences investments. We are free to install the processing capacity where we want in the region, because assumption A1 in Section 3.2 says that the location of a subservice inside a region should not inuence the QoS experienced by the customer. The distribution transparencies hence indicate that it is possible to deliberately invest in processing capacity in such a way that there is a shortage of capacity in one part of the region to be met by a surplus in other parts. Because demand is uncertain this is one of the most important issues when we are discussing investments in distributed networks. In general the uncertain demand is not equally distributed over the region and not necessarily correlated in dierent parts of the region. The exibility we experienced in the distributed framework at the operational level is now carried along to deal with uncertainty at the tactical/strategic level when discussing investments. Although we are free to install processing capacity wherever we want, this does not mean that the operational and investment costs are independent of these locations. The exibility at the operational level when it comes to resource allocation at the nodes as described in assumption A1, induces a requirement for investments in transportation infrastructure in assumption A2. Over- or under-investing in node capacity in parts of the region implies extra information ows between the demand locations and the computing nodes. The eect of this must be considered when the network provider dimensions the

18 A. Tomasgard et al. /Modelling Aspects of Distributed Processing underlying transportation infrastructure. We will now at the tactical/strategic level try to minimize this location dependent cost of transportation infrastructure together with the investment cost in nodes. There are at least two dierent ways of including location dependency in the model: We can explicitly model the links between customer locations and their capacity and instalment costs. In the price of meeting demand for processing capacity at a location from a given site, we include the cost of the necessary transportation infrastructure generated by this choice. The last approach is selected because there is an enormous amount of eort already put into models for transportation network design. Given the location of sites, their sizes, and the type/amount of demand we expect at the sites, the problem of designing the underlying transportation network is extensively treated in the literature, see for example [13, 15, 16, 28, 32, 35]. The extra investment costs of the local transportation infrastructure coming from installing a node at a specic site, can be split in two. A xed cost depending on whether a node is built or not and \operating costs" depending on the actual usage of the node the demand met there. The xed part of investments in local transportation infrastructure is best included in the investment cost for the node. For every computing node the price of meeting demand for processing capacity generated at a given location contains operating costs of both the node and the underlying transportation infrastructure. 4.2 Uncertainty Demand for processing capacity is uncertain. At the dierent demand locations we consider aggregated demand for processing capacity over customers and subservices. It is not feasible to retain the identity of the subservices generating the demand when we allocate it to nodes at the tactical/strategic level. One reason is the uncertainty about which subservices will actually exist. Another equally important reason is, as indicated in Section 3, that at the operational level distribution transparencies allow us to allocate subservices to the computing nodes dynamically. At the tactical/strategic level it is therefore the amount of demand for processing capacity that is allocated to a node that matters, not which subservices that generated it. Estimates for the capacity used just to install and provide dierent subservices must be contained in the demand for processing capacity. This is in addition to customer demand. Other uncertain factors are the prices of meeting demand at dierent locations from dierent computing nodes and rejection costs. We assume that all these uncertain parameters are only known in distribution when investment decisions for processing capacity are made. It is natural to think that over time, when new insights in demand patterns become available, the investments can be modied utilizing this new information. The decision process is then typically multi-stage. In other cases the investment decision can be of the type \now or never", and the only recourse action is to utilize the equipment when it is installed. Then a two-stage model will capture the decision process. In this paper we treat the two-stage model. It better

2 The Service Provision Problem The formulation given here can also be found in Tomasgard et al. [6]. That paper also details the background of the mo

2 The Service Provision Problem The formulation given here can also be found in Tomasgard et al. [6]. That paper also details the background of the mo Two-Stage Service Provision by Branch and Bound Shane Dye Department ofmanagement University of Canterbury Christchurch, New Zealand s.dye@mang.canterbury.ac.nz Asgeir Tomasgard SINTEF, Trondheim, Norway

More information

V 1. volume. time. t 1

V 1. volume. time. t 1 On-line Trac Contract Renegotiation for Aggregated Trac R. Andreassen and M. Stoer a a Telenor AS, P.O.Box 83, 2007 Kjeller, Norway. Email: fragnar.andreassen, mechthild.stoerg@fou.telenor.no Consider

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

Performance Comparison Between AAL1, AAL2 and AAL5

Performance Comparison Between AAL1, AAL2 and AAL5 The University of Kansas Technical Report Performance Comparison Between AAL1, AAL2 and AAL5 Raghushankar R. Vatte and David W. Petr ITTC-FY1998-TR-13110-03 March 1998 Project Sponsor: Sprint Corporation

More information

Rowena Cole and Luigi Barone. Department of Computer Science, The University of Western Australia, Western Australia, 6907

Rowena Cole and Luigi Barone. Department of Computer Science, The University of Western Australia, Western Australia, 6907 The Game of Clustering Rowena Cole and Luigi Barone Department of Computer Science, The University of Western Australia, Western Australia, 697 frowena, luigig@cs.uwa.edu.au Abstract Clustering is a technique

More information

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois Dynamic Multi-Path Communication for Video Trac Hao-hua Chu, Klara Nahrstedt Department of Computer Science University of Illinois h-chu3@cs.uiuc.edu, klara@cs.uiuc.edu Abstract Video-on-Demand applications

More information

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science MDP Routing in ATM Networks Using the Virtual Path Concept 1 Ren-Hung Hwang, James F. Kurose, and Don Towsley Department of Computer Science Department of Computer Science & Information Engineering University

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

10. Network planning and dimensioning

10. Network planning and dimensioning lect10.ppt S-38.145 - Introduction to Teletraffic Theory - Fall 2001 1 Contents Introduction Network planning Traffic forecasts Dimensioning 2 Telecommunication network A simple model of a telecommunication

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Question 1 In answering the following questions use the following network conguration. Each node in the network represents a router, and the weights o

Question 1 In answering the following questions use the following network conguration. Each node in the network represents a router, and the weights o University of Uppsala Department of Computer Systems (DoCS) Final Examination Datakommunikation (DVP)) Data Communication and Networks INSTRUCTIONS TO CANDIDATES This is a SIX (6) hour examination Answer

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

BMVC 1996 doi: /c.10.41

BMVC 1996 doi: /c.10.41 On the use of the 1D Boolean model for the description of binary textures M Petrou, M Arrigo and J A Vons Dept. of Electronic and Electrical Engineering, University of Surrey, Guildford GU2 5XH, United

More information

What is the role of teletraffic engineering in broadband networks? *

What is the role of teletraffic engineering in broadband networks? * OpenStax-CNX module: m13376 1 What is the role of teletraffic engineering in broadband networks? * Jones Kalunga This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution

More information

10. Network planning and dimensioning

10. Network planning and dimensioning lect10.ppt S-38.145 - Introduction to Teletraffic Theory - Fall 2000 1 Contents Introduction Network planning Traffic forecasts Dimensioning 2 Telecommunication network A simple model of a telecommunication

More information

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University)

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University) Transportation and Assignment Problems The transportation model is a special class of linear programs. It received this name because many of its applications involve determining how to optimally transport

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz Results obtained by researchers in the aspect-oriented programming are promoting the aim to export these ideas to whole software development

More information

The only known methods for solving this problem optimally are enumerative in nature, with branch-and-bound being the most ecient. However, such algori

The only known methods for solving this problem optimally are enumerative in nature, with branch-and-bound being the most ecient. However, such algori Use of K-Near Optimal Solutions to Improve Data Association in Multi-frame Processing Aubrey B. Poore a and in Yan a a Department of Mathematics, Colorado State University, Fort Collins, CO, USA ABSTRACT

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Methods and Models for Combinatorial Optimization Modeling by Linear Programming

Methods and Models for Combinatorial Optimization Modeling by Linear Programming Methods and Models for Combinatorial Optimization Modeling by Linear Programming Luigi De Giovanni, Marco Di Summa 1 Linear programming models Linear programming models are a special class of mathematical

More information

Routing and Ad-hoc Retrieval with the. Nikolaus Walczuch, Norbert Fuhr, Michael Pollmann, Birgit Sievers. University of Dortmund, Germany.

Routing and Ad-hoc Retrieval with the. Nikolaus Walczuch, Norbert Fuhr, Michael Pollmann, Birgit Sievers. University of Dortmund, Germany. Routing and Ad-hoc Retrieval with the TREC-3 Collection in a Distributed Loosely Federated Environment Nikolaus Walczuch, Norbert Fuhr, Michael Pollmann, Birgit Sievers University of Dortmund, Germany

More information

Performance Measures for Multi-Graded Relevance

Performance Measures for Multi-Graded Relevance Performance Measures for Multi-Graded Relevance Christian Scheel, Andreas Lommatzsch, and Sahin Albayrak Technische Universität Berlin, DAI-Labor, Germany {christian.scheel,andreas.lommatzsch,sahin.albayrak}@dai-labor.de

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have been red in the sequence up to and including v i (s) is deg(v)? s(v), and by the induction hypothesis this sequence

More information

CTO s cloud(y) agenda Clouds on CTO s heaven?

CTO s cloud(y) agenda Clouds on CTO s heaven? CTO s cloud(y) agenda Clouds on CTO s heaven? Cloud computing is one of the most advertised technological trends and its discussion mainly focuses on cost efficiency aspects of IT infrastructures. This

More information

Transaction Processing in Mobile Database Systems

Transaction Processing in Mobile Database Systems Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

Architecting the High Performance Storage Network

Architecting the High Performance Storage Network Architecting the High Performance Storage Network Jim Metzler Ashton, Metzler & Associates Table of Contents 1.0 Executive Summary...3 3.0 SAN Architectural Principals...5 4.0 The Current Best Practices

More information

Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach

Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach Amir Salehipour School of Mathematical and Physical Sciences, The University of Newcastle, Australia

More information

APPLICATION OF THE FUZZY MIN-MAX NEURAL NETWORK CLASSIFIER TO PROBLEMS WITH CONTINUOUS AND DISCRETE ATTRIBUTES

APPLICATION OF THE FUZZY MIN-MAX NEURAL NETWORK CLASSIFIER TO PROBLEMS WITH CONTINUOUS AND DISCRETE ATTRIBUTES APPLICATION OF THE FUZZY MIN-MAX NEURAL NETWORK CLASSIFIER TO PROBLEMS WITH CONTINUOUS AND DISCRETE ATTRIBUTES A. Likas, K. Blekas and A. Stafylopatis National Technical University of Athens Department

More information

Stability in ATM Networks. network.

Stability in ATM Networks. network. Stability in ATM Networks. Chengzhi Li, Amitava Raha y, and Wei Zhao Abstract In this paper, we address the issues of stability in ATM networks. A network is stable if and only if all the packets have

More information

Worst-case running time for RANDOMIZED-SELECT

Worst-case running time for RANDOMIZED-SELECT Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case

More information

Introduction to Cisco ASR 9000 Series Network Virtualization Technology

Introduction to Cisco ASR 9000 Series Network Virtualization Technology White Paper Introduction to Cisco ASR 9000 Series Network Virtualization Technology What You Will Learn Service providers worldwide face high customer expectations along with growing demand for network

More information

Availability of Coding Based Replication Schemes. Gagan Agrawal. University of Maryland. College Park, MD 20742

Availability of Coding Based Replication Schemes. Gagan Agrawal. University of Maryland. College Park, MD 20742 Availability of Coding Based Replication Schemes Gagan Agrawal Department of Computer Science University of Maryland College Park, MD 20742 Abstract Data is often replicated in distributed systems to improve

More information

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1.

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1. 134 8. CONCLUSION AND FUTURE WORK 8.1 CONCLUSION Virtualization and internet availability has increased virtualized server cluster or cloud computing environment deployments. With technological advances,

More information

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988 SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS BY IAN RAMSAY PHILP B.S., University of North Carolina at Chapel Hill, 1988 M.S., University of Florida, 1990 THESIS Submitted in partial fulllment

More information

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the Heap-on-Top Priority Queues Boris V. Cherkassky Central Economics and Mathematics Institute Krasikova St. 32 117418, Moscow, Russia cher@cemi.msk.su Andrew V. Goldberg NEC Research Institute 4 Independence

More information

Automatic Code Generation for Non-Functional Aspects in the CORBALC Component Model

Automatic Code Generation for Non-Functional Aspects in the CORBALC Component Model Automatic Code Generation for Non-Functional Aspects in the CORBALC Component Model Diego Sevilla 1, José M. García 1, Antonio Gómez 2 1 Department of Computer Engineering 2 Department of Information and

More information

Numerical Evaluation of Hierarchical QoS Routing. Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar. Computer Science Department and UMIACS

Numerical Evaluation of Hierarchical QoS Routing. Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar. Computer Science Department and UMIACS Numerical Evaluation of Hierarchical QoS Routing Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar Computer Science Department and UMIACS University of Maryland, College Park CS-TR-395 April 3, 1998

More information

Hyperplane Ranking in. Simple Genetic Algorithms. D. Whitley, K. Mathias, and L. Pyeatt. Department of Computer Science. Colorado State University

Hyperplane Ranking in. Simple Genetic Algorithms. D. Whitley, K. Mathias, and L. Pyeatt. Department of Computer Science. Colorado State University Hyperplane Ranking in Simple Genetic Algorithms D. Whitley, K. Mathias, and L. yeatt Department of Computer Science Colorado State University Fort Collins, Colorado 8523 USA whitley,mathiask,pyeatt@cs.colostate.edu

More information

III Data Structures. Dynamic sets

III Data Structures. Dynamic sets III Data Structures Elementary Data Structures Hash Tables Binary Search Trees Red-Black Trees Dynamic sets Sets are fundamental to computer science Algorithms may require several different types of operations

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Dierential-Linear Cryptanalysis of Serpent? Haifa 32000, Israel. Haifa 32000, Israel

Dierential-Linear Cryptanalysis of Serpent? Haifa 32000, Israel. Haifa 32000, Israel Dierential-Linear Cryptanalysis of Serpent Eli Biham, 1 Orr Dunkelman, 1 Nathan Keller 2 1 Computer Science Department, Technion. Haifa 32000, Israel fbiham,orrdg@cs.technion.ac.il 2 Mathematics Department,

More information

Extra-High Speed Matrix Multiplication on the Cray-2. David H. Bailey. September 2, 1987

Extra-High Speed Matrix Multiplication on the Cray-2. David H. Bailey. September 2, 1987 Extra-High Speed Matrix Multiplication on the Cray-2 David H. Bailey September 2, 1987 Ref: SIAM J. on Scientic and Statistical Computing, vol. 9, no. 3, (May 1988), pg. 603{607 Abstract The Cray-2 is

More information

In the world of networks, control techniques

In the world of networks, control techniques NEM470 12/23/02 7:09 PM Page 1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2003; 13: 000 000 (DOI: 10.1002/nem.470) Resource allocation in the new fixed and mobile Internet generation

More information

Enumeration of Full Graphs: Onset of the Asymptotic Region. Department of Mathematics. Massachusetts Institute of Technology. Cambridge, MA 02139

Enumeration of Full Graphs: Onset of the Asymptotic Region. Department of Mathematics. Massachusetts Institute of Technology. Cambridge, MA 02139 Enumeration of Full Graphs: Onset of the Asymptotic Region L. J. Cowen D. J. Kleitman y F. Lasaga D. E. Sussman Department of Mathematics Massachusetts Institute of Technology Cambridge, MA 02139 Abstract

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

2 Keywords Backtracking Algorithms, Constraint Satisfaction Problem, Distributed Articial Intelligence, Iterative Improvement Algorithm, Multiagent Sy

2 Keywords Backtracking Algorithms, Constraint Satisfaction Problem, Distributed Articial Intelligence, Iterative Improvement Algorithm, Multiagent Sy 1 The Distributed Constraint Satisfaction Problem: Formalization and Algorithms IEEE Trans. on Knowledge and DATA Engineering, vol.10, No.5 September 1998 Makoto Yokoo, Edmund H. Durfee, Toru Ishida, and

More information

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved NOTICE This document contains DragonWave proprietary information. Use, disclosure, copying or distribution of any part of the information contained herein, beyond that for which it was originally furnished,

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL RESEARCH REPORT A Scalable Extension of Group Key Management Protocol by R. Poovendran, S. Ahmed, S. Corson, J. Baras CSHCN T.R. 98-5 (ISR T.R. 98-14) The Center for Satellite and Hybrid Communication

More information

Preliminary results from an agent-based adaptation of friendship games

Preliminary results from an agent-based adaptation of friendship games Preliminary results from an agent-based adaptation of friendship games David S. Dixon June 29, 2011 This paper presents agent-based model (ABM) equivalents of friendshipbased games and compares the results

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on

More information

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM EXERCISES Prepared by Natashia Boland 1 and Irina Dumitrescu 2 1 Applications and Modelling 1.1

More information

Transform your video services with a cloud platform: Succeed in a fragmented marketplace

Transform your video services with a cloud platform: Succeed in a fragmented marketplace with a cloud platform: Succeed in a fragmented marketplace Contents 3 4 7 cloud-based platform 8 10 12 14 16 points: Great in action 18 : Your business faces a significant challenge. Subscriber demands

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax:

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax: Consistent Logical Checkpointing Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3112 hone: 409-845-0512 Fax: 409-847-8578 E-mail: vaidya@cs.tamu.edu Technical

More information

Transport protocols are of practical. login, le transfer, and remote procedure. calls. will operate on and therefore are generally

Transport protocols are of practical. login, le transfer, and remote procedure. calls. will operate on and therefore are generally Hazard-Free Connection Release Jennifer E. Walter Department of Computer Science Texas A&M University College Station, TX 77843-3112, U.S.A. Jennifer L. Welch Department of Computer Science Texas A&M University

More information

On Constraint Problems with Incomplete or Erroneous Data

On Constraint Problems with Incomplete or Erroneous Data On Constraint Problems with Incomplete or Erroneous Data Neil Yorke-Smith and Carmen Gervet IC Parc, Imperial College, London, SW7 2AZ, U.K. nys,cg6 @icparc.ic.ac.uk Abstract. Real-world constraint problems

More information

Scheduling Periodic and Aperiodic. John P. Lehoczky and Sandra R. Thuel. and both hard and soft deadline aperiodic tasks using xed-priority methods.

Scheduling Periodic and Aperiodic. John P. Lehoczky and Sandra R. Thuel. and both hard and soft deadline aperiodic tasks using xed-priority methods. Chapter 8 Scheduling Periodic and Aperiodic Tasks Using the Slack Stealing Algorithm John P. Lehoczky and Sandra R. Thuel This chapter discusses the problem of jointly scheduling hard deadline periodic

More information

Scaling-Out with Oracle Grid Computing on Dell Hardware

Scaling-Out with Oracle Grid Computing on Dell Hardware Scaling-Out with Oracle Grid Computing on Dell Hardware A Dell White Paper J. Craig Lowery, Ph.D. Enterprise Solutions Engineering Dell Inc. August 2003 Increasing computing power by adding inexpensive

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

Chapter. CAC & Routing Strategies

Chapter. CAC & Routing Strategies Chapter 5 CAC & Routing Strategies CONNECTION admission control and routing functions are key elements of resource management and trac control in broadband networks. They can inuence signicantly several

More information

n = 2 n = 1 µ λ n = 0

n = 2 n = 1 µ λ n = 0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University Abstract We consider wavelength

More information

LP-Modelling. dr.ir. C.A.J. Hurkens Technische Universiteit Eindhoven. January 30, 2008

LP-Modelling. dr.ir. C.A.J. Hurkens Technische Universiteit Eindhoven. January 30, 2008 LP-Modelling dr.ir. C.A.J. Hurkens Technische Universiteit Eindhoven January 30, 2008 1 Linear and Integer Programming After a brief check with the backgrounds of the participants it seems that the following

More information

TINA-COMPLIANT SERVICE PROVISION AND NUMBERING IN UMTS

TINA-COMPLIANT SERVICE PROVISION AND NUMBERING IN UMTS Proceedings of 6th IEE Conference on Telecommunications, Conference Publication No. 451 Edinburgh, UK, 29 March - 1 April 1998 TINA-COMPLIANT SERVICE PROVISION AND NUMBERING IN UMTS Axel Küpper and Frank

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reed y Paul Syverson y January 28, 1999 1 Introduction Preserving privacy means not only hiding the content of messages,

More information

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t Data Reduction - an Adaptation Technique for Mobile Environments A. Heuer, A. Lubinski Computer Science Dept., University of Rostock, Germany Keywords. Reduction. Mobile Database Systems, Data Abstract.

More information

The Replication Technology in E-learning Systems

The Replication Technology in E-learning Systems Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 28 (2011) 231 235 WCETR 2011 The Replication Technology in E-learning Systems Iacob (Ciobanu) Nicoleta Magdalena a *

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

Deploying MPLS & DiffServ

Deploying MPLS & DiffServ Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention

More information

Broadband Backhaul Asymmetric Wireless Transmission

Broadband Backhaul Asymmetric Wireless Transmission Broadband Backhaul Asymmetric Wireless Transmission Abstract Ceragon Networks offers its customers an innovative way to increase mobile backhauling capacity over microwave networks. Based on a unique asymmetric

More information

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction Rearrangement of DNA fragments: a branch-and-cut algorithm 1 C. E. Ferreira 1 C. C. de Souza 2 Y. Wakabayashi 1 1 Instituto de Mat. e Estatstica 2 Instituto de Computac~ao Universidade de S~ao Paulo e-mail:

More information

Column Generation Method for an Agent Scheduling Problem

Column Generation Method for an Agent Scheduling Problem Column Generation Method for an Agent Scheduling Problem Balázs Dezső Alpár Jüttner Péter Kovács Dept. of Algorithms and Their Applications, and Dept. of Operations Research Eötvös Loránd University, Budapest,

More information

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for Comparison of Two Image-Space Subdivision Algorithms for Direct Volume Rendering on Distributed-Memory Multicomputers Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc Dept. of Computer Eng. and

More information

1300 scree

1300 scree Determining the Number of Dimensions Underlying Customer-choices with a Competitive Neural Network Michiel C. van Wezel 1, Joost N. Kok 2, Kaisa Sere 3 1 Centre for Mathematics and Computer Science (CWI)

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer Mathias Fischer Resilient Networks. Resilient Network Design - Intro Prepared along: Michal Pioro and Deepankar Medhi - Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan

More information

The 4/5 Upper Bound on the Game Total Domination Number

The 4/5 Upper Bound on the Game Total Domination Number The 4/ Upper Bound on the Game Total Domination Number Michael A. Henning a Sandi Klavžar b,c,d Douglas F. Rall e a Department of Mathematics, University of Johannesburg, South Africa mahenning@uj.ac.za

More information

CMORC: Class-based Multipath On-demand Routing protocol for Cognitive radio networks

CMORC: Class-based Multipath On-demand Routing protocol for Cognitive radio networks Scientia Iranica D (2017) 24(6), 3117{3131 Sharif University of Technology Scientia Iranica Transactions D: Computer Science & Engineering and Electrical Engineering www.scientiairanica.com CMORC: Class-based

More information

Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time

Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time A CONNECTED A CONNECTED Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time Service providers gain a competitive advantage by responding to customer

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

Modelling Combinatorial Problems for CLP(FD+R) Henk Vandecasteele. Department of Computer Science, K. U. Leuven

Modelling Combinatorial Problems for CLP(FD+R) Henk Vandecasteele. Department of Computer Science, K. U. Leuven Modelling Combinatorial Problems for CLP(FD+R) Henk Vandecasteele Department of Computer Science, K. U. Leuven Celestijnenlaan 200A, B-3001 Heverlee, Belgium henk.vandecasteele@cs.kuleuven.ac.be Robert

More information

Network Improvement for Equilibrium Routing

Network Improvement for Equilibrium Routing Network Improvement for Equilibrium Routing UMANG BHASKAR University of Waterloo and KATRINA LIGETT California Institute of Technology Routing games are frequently used to model the behavior of traffic

More information

Combating Packet Loss in OPS networks: A Case for Network Coding. Gergely Biczók and Harald Øverby NTNU Dept. of Telematics.

Combating Packet Loss in OPS networks: A Case for Network Coding. Gergely Biczók and Harald Øverby NTNU Dept. of Telematics. Combating Packet Loss in OPS networks: A Case for Network Coding Gergely Biczók and Harald Øverby NTNU Dept. of Telematics Abstract Fighting packet loss in optical packet-switched networks has been a priority

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Grid Computing with Voyager

Grid Computing with Voyager Grid Computing with Voyager By Saikumar Dubugunta Recursion Software, Inc. September 28, 2005 TABLE OF CONTENTS Introduction... 1 Using Voyager for Grid Computing... 2 Voyager Core Components... 3 Code

More information

Andrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell,

Andrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell, An Overview of Cellular IP Andrew T. Campbell, Javier Gomez Center for Telecommunications Research, Columbia University, New York [campbell, javierg]@comet.columbia.edu Andras G. Valko Ericsson Research

More information

UNIVERSITÄT PADERBORN. ComponentTools

UNIVERSITÄT PADERBORN. ComponentTools UNIVERSITÄT PADERBORN ComponentTools Component Library Concept Project Group ComponentTools pg-components@uni-paderborn.de Alexander Gepting, Joel Greenyer, Andreas Maas, Sebastian Munkelt, Csaba Pales,

More information

SQL Server 2008 Consolidation

SQL Server 2008 Consolidation Technology Concepts and Business Considerations Abstract The white paper describes how SQL Server 2008 consolidation provides solutions to basic business problems pertaining to the usage of multiple SQL

More information

The International Intelligent Network (IN)

The International Intelligent Network (IN) The International Intelligent Network (IN) Definition In an intelligent network (IN), the logic for controlling telecommunications services migrates from traditional switching points to computer-based,

More information

An ATM Network Planning Model. A. Farago, V.T. Hai, T. Cinkler, Z. Fekete, A. Arato. Dept. of Telecommunications and Telematics

An ATM Network Planning Model. A. Farago, V.T. Hai, T. Cinkler, Z. Fekete, A. Arato. Dept. of Telecommunications and Telematics An ATM Network Planning Model A. Farago, V.T. Hai, T. Cinkler, Z. Fekete, A. Arato Dept. of Telecommunications and Telematics Technical University of Budapest XI. Stoczek u. 2, Budapest, Hungary H-1111

More information

The Data Link Layer. 32 PART I Networking Basics

The Data Link Layer. 32 PART I Networking Basics 32 PART I Networking Basics weather station. More realistic devices use duplex mode, where all systems can send or receive with equal facility. This is often further distinguished as half-duplex (the system

More information

Transparent Access to Legacy Data in Java. Olivier Gruber. IBM Almaden Research Center. San Jose, CA Abstract

Transparent Access to Legacy Data in Java. Olivier Gruber. IBM Almaden Research Center. San Jose, CA Abstract Transparent Access to Legacy Data in Java Olivier Gruber IBM Almaden Research Center San Jose, CA 95120 Abstract We propose in this paper an extension to PJava in order to provide a transparent access

More information