Data Allocation and Dynamic Load Balancing for Distributed Video Storage Server

Size: px
Start display at page:

Download "Data Allocation and Dynamic Load Balancing for Distributed Video Storage Server"

Transcription

1 Journal of Visual Communication and Image Representation 10, (1999) Article ID jvci , available online at on Data Allocation and Dynamic Load Balancing for Distributed Video Storage Server Shiao-Li Tsao,, Meng Chang Chen,,1 Ming-Tat Ko, Jan-Ming Ho, and Yueh-Min Huang Institute of Information Science, Academia Sinica, Taiwan; Department of Engineering Science, National Cheng Kung University, Taiwan Received January 20, 1998; accepted March 8, 1999 In this paper, a novel initial videos allocation scheme and a dynamic load balancing strategy are proposed for a distributed video storage server in order to increase the availability and reduce operation cost. The initial allocation scheme determines the allocation of video replicas on the servers to achieve static load balance and to obtain a configuration for efficient dynamic load adjustment. From the simulation results, the proposed load shifting algorithm can reduce up to 50% request fail rate if compared with the same initialization algorithm without load shifting. The proposed initial allocation with load shifting also reduces 25% to 60% request fail rate from the least load first initial allocation scheme with load shifting, 5% to 10% request fail rate and 5% to 25% the number of shifting steps from the DASD dancing method. Moreover, a prototype is implemented on Windows NT to examine the correctness and practicability of the proposed schemes. C 1999 Academic Press 1. INTRODUCTION Recent advances in computing and communication technologies enable the distributed multimedia applications that video storage servers play an important role. One of the important issues of designing video servers is the scalability problem [1 3]. Of late, the distributed video (storage) servers composed of low-end computers were proposed to solve the issue [4 8]. Even though the video servers as a whole have sufficient computing power to serve all the current user requests, some user requests may fail since the computers with the desired videos do not have the available computing power to handle the requests. As the low-end computers have limited storage space and computing power, it is extremely important to properly allocate the video files and balance the user requests among them. A statistical result of long-term observation of user behaviors blended with domain expertise, called This research is partially supported by NSC under Grant NSC E This article was originally part of the Special Section on Multimedia Storage and Archiving Systems, which appeared in the Journal of Visual Communication and Image Representation, Vol. 9, No. 4, December Corresponding author /99$30.00 Copyright C 1999 by Academic Press All rights of reproduction in any form reserved.

2 198 TSAO ET AL. expected request pattern, is used to guide the video file allocation process. However, as the user requests of videos are dynamic in nature, the actual request pattern is skewed from the expected request pattern [9 11] that results in the increase of request failures. One possible data allocation solution is to stripe every video file over all servers [12, 13]. The advantage of this approach is that it can achieve maximum load balancing, since user requests can be served by any available server. However, the system is not reliable, since the failure of one server will result in the failure of whole system. System synchronization overhead and a complex system control mechanism are also its drawbacks. Alternatively, we can replicate videos to several servers so that the requests can be migrated to other servers during server failure or for load balance purposees [14, 3]. The cost of this approach is extra disk space [7]. The fundamental policies of data replication had been explored in the previous study [11]. Serpanos et al. [15] proposed a data replication scheme for distributed multimedia servers to achieve both load and storage balance. With the assumption of the actual requests being identical to the expected load, they focused on the initial allocation of video replicas to achieve static load balance. However, the actual requests may not be identical to the expected demands due to two reasons. First, the expected load is calculated and forecasted according to long-term statistical data that may not represent the short-term request pattern. Second, the access probabilities of some videos may not be accurately predicted (e.g., the actor in the movie won an award yesterday). The discrepancy of actual and expected request patterns induces request failures. Wolf et al. [16] proposed the DASD dancing algorithm to balance the user requests of a multidisk server. They modeled disks as nodes of a graph, and a pair of the same video replicas on two disks as an edge between the nodes. The initial allocation algorithm tried to reduce the diameter of the graph. Then, they proposed a on-line load balance scheme on hard disks, called DASD dancing, to migrate progressing requests among disks. However, the DASD dancing scheme assumes each replica of a video has the same access probability to simplify the problem, so that the graph they constructed is undirected and unweighted. Moreover, it does not consider reducing the number of shifting steps (i.e. request migrations) when performing dancing, as the cost of migration is negligible in the single server environment. In a distributed environment, each migration of a user request from one server to another server pays the cost of control messages passing, admission control exercising, and job rescheduling. The cost varies from environment to environment, and sometimes it is too large to be ignored. In this paper, we elaborate a novel initial data allocation algorithm to obtain a high connectivity between servers, together with a dynamic load balancing strategy called load shifting to efficiently migrate the progressing requests in a distributed environment. The major differences between the DASD dancing [16] and our approach are that our approach considers the access probability of video replicas to optimize the connectivity between servers and our approach also reduces the shifting steps. We discuss the implementation issues, and prototype our scheme on Windows NT to prove its practicability. The rest of the paper is organized as follows. The architecture of a distributed video server, the basic concept of load shifting procedure, and notations in the paper are described in Section 2. Then, the initial data allocation and reallocation algorithms are proposed and discussed in Section 3. The load shifting algorithm is in Section 4. In Section 5, the simulation results and implementation issues are discussed. Finally, we conclude the paper in Section 6.

3 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 199 FIG. 1. The environment of a video service system System Architecture 2. BASIC CONCEPTS OF LOAD SHIFTING The environment of a distributed video service system is depicted in Fig. 1. The elements of the system include tertiary storage servers, disk-based video storage server clusters, a backbone network (e.g. ATM), an access network (e.g. HFC), and end-user equipment. All of the video data are stored in the tertiary storage servers, and hot videos are cached in the disk-based video server clusters. In this paper, we focus on the disk-based video server cluster. We apply file replication among servers within a cluster. A video file is a basic unit of replication and may be striped to all the disks within a video server. In other words, a video file is never striped across a network. A cluster of servers shares a single name, called cluster name. The cluster name can be an IP address or a domain name. Clients request video services by referring to the unique cluster name. The request is received by all servers, but only one server within the cluster will respond to the request. A progressing request may be migrated to other servers within the same cluster dynamically. In this research, we extend the approach of OneIP proposed by Damani et al. [17], which is a technique to share a single IP address with servers within a cluster. We will describe OneIP in detail and present its extension to support our scheme in Section 5. Before giving a formal description of the problem and our solution, we first illustrate a complete processing flow of a user request in the distributed video service system. A user first requests the video service by using the cluster name. As we described above,

4 200 TSAO ET AL. the request to a cluster will be received by all servers. Only one server within the cluster will handle this request. In order to achieve load balancing, progressing requests may be migrated to other servers within the same cluster. As the migration is transparent to the user, the user uses the same cluster name during the entire service. Occasionally, the hand-off procedure of a migrated request may not be executed smoothly due to the timing difference between the two servers; a certain amount of buffer in the client side is required. Lee studied the synchronization problems between multiple servers delivering data to a client and summarized the architectures into three approaches [18], i.e. proxy-at-server, independent proxy [19], and proxy-at-client. Our design for the synchronization problem is basically one type of proxy-at-client solution Concepts of Load Shifting In a video storage server cluster, when a request on a particular video arrives and no server with the desired video within a cluster has sufficient computing power to serve this request, the request is blocked. A blocked request can only be served when one of the servers with the desired video within the cluster reclaims sufficient resources previously allocated to other requests. The basic concept of load shifting scheme is that a blocked request on a server can be admitted by shifting a progressing request on the server to other servers within the same cluster, and the shifted request can be admitted in the other server immediately or after applying one or more shifts. Note that shift operations can act as a chain reaction until all the shifted requests are admitted. In Fig. 2, the cluster consists of four video servers; each server can store two videos and serve up to four requests simultaneously. Assume three of the four video servers, are fully utilized, except Server 4. Meanwhile, a request for Video 1 arrives. Video 1 is only stored on Server 1, but Server 1 has no resource to serve the request. Then Server 1 migrates a request for Video 2 to Server 2, Server 2 migrates a request for Video 3 to Server 3, and Server 3 migrates a request for Video 4 to Server 4 subsequently. Finally, the new request for Video 1 can be admitted without dropping any request. FIG. 2. Video i/j means j requests on video i.

5 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 201 Before describing our proposed initial allocation strategy and shifting scheme, we fix some notations. Let S and M denote the number of servers and the number of videos in the system. For a video server cluster, all the video files are stored in the tertiary storage servers, and a limited number of videos are cached in the video servers within a cluster. We assume that the servers are identical with the disk storage capacity of C videos, and the computing capability to serve a maximum number of A max users. For a large-scale system, M is usually much larger than C S, i.e. M C S, and only the first K hottest videos are cached in the cluster. In order to improve the availability of a video server cluster, some videos may be replicated several times and stored on different servers. We define V i, j as { 1, if a copy of video i stored on server j; V i, j = 0, otherwise. P i, j denotes the number of progressing streams of video i on server j with the following properties: for any pair of video i and server j, wehave M i=1 P i,j A max, and if P i, j 1, V i, j = 1 must be true. For the first property, M i=1 P i, j A max, it means that the number of serving requests on any server must be less than its total service capacity. For the second property, the progressing streams of video i on server j is larger than one only if server j has video i. When a new request arrives at the cluster, if all the servers with the desired video are not available, the load-shifting procedure will try to adjust the load of servers to accommodate the new request. For example, a new request of video V req arrives at a system while no server with video V req is available; the request is blocked. Meanwhile, the shifting algorithm proceeds to find a feasible shifting path in order to admit the request. A request is called failed if it is blocked and no feasible shifting path can be found. We define a shifting path for a new request on video V req as SP(V req ) = {( NULL, V req, S i1 ), ( Si1, V j1, S i2 ), ( Si2, V j2, S i3 ),..., ( Sid 1,V jd 1,S id )}, where the triple (S i, V j, S i ) is a shifting step that shows a progressing stream of video V j on server S i migrated to server S i. The first vector (NULL, V req, S i1 ) in the shifting path shows the new request is assigned to server S i1. For a feasible shifting path, it satisfies the following properties: For every tuple (S i, V j, S i ) in a shifting path, V j,i = 1, P j,i 1, and V j,i = 1. This property means that for any shifting step, both the server migrating out a request and the server taking over the request have the desired video of the migrated request. M i=1 P i,s id < A max. That is, the number of progressing streams on the last server in the shifting path must be less than the maximum number of streams supported by a server. The number of serving streams on the servers, excluding the last one in the shifting path, are the same after the shifting procedure is performed. 3. INITIAL ALLOCATION STRATEGY To increase the service availability of a distributed video storage server, the first issue is to explore an initial data allocation algorithm to achieve the static load balance among these servers and to improve the possibility of finding feasible shifting paths for blocked requests. The next issue is to develop an efficient load shifting algorithm to reduce the

6 202 TSAO ET AL. shifting steps. Suppose each video, say video V i, has an expected access probability Pr i. We want to determine the number of replicas for each video under the given expected access probabilities of the K cached videos and the storage capacity of the video server cluster, i.e. C S. It is intuitive that the number of replicas of a video should be proportional to their access probabilities since the video with more replicas on different servers means higher availability. Since storing more than one copy of a video cannot improve its availability, an obvious constraint is that the maximal number of replicas of a video must be less than the number of video servers, i.e. S. Another constraint is the storage limitation of servers. The number of replicas of videos are integers so that the apportionment of the amount of C S storage space to K cached videos by their access probabilities is an integer resource allocation problem [20]. Several fair integer resource allocation algorithms were investigated in [20, 21], which determine the number of replicas of each video under the above constraints. Roughly, the number of replicas of video V i, R i, can be calculated as R i = Pr i K j=1 Pr j C S. For the details of the resource allocation algorithms, readers can refer to [20]. After deciding the number of replicas of every video, we further allocate the access probability of the video to its replicas. Let Pr j i denote the access probability of the jth copy of the ith video. The summation of the access probabilities of all the replicas equals the access probability of the video; i.e. Pr i = R i j=1 Pr j i. The initial data allocation can be represented as a directed graph, called the connection graph. The server is a node in the graph, and an edge (or a connection) between two servers indicates that there is a video whose replicas are stored on both of the servers. Each edge has a weight which is defined as the access probability of the replica stored in the out-going node of the edge. In other words, the weight of the edge means the probability that a request will be shifted from the out-going node to the in-coming node. The edges are always paired that each may have a different weight if the replicas have different access probabilities. For example, the connection graph in Fig. 3 shows the access probability allocation of videos in Table 1. A blocked request can be admitted only if there are feasible shifting paths from the designated server. To increase the possibility of finding feasible shifting paths for a blocked request, it is favorable that the designated server has many out-going edges with high access probabilities, as well as their neighbors. We define the connectivity of a server as the total access probabilities of its video replicas. I.e. the connectivity C l of the lth server is defined as C l = M S i=1 k=1 V i,l V i,k Pr n(i,l) i, where n(i, l) is a mapping function which denotes the n(i, l)th replica of the ith video stored in the lth server. As the total connectivity of all the servers is fixed for a given {R i, 1 i M} and {Pr j i,1 i M and 1 j R i}, itis TABLE 1 The Access Probabilities of Video Replicas Server #1 Server #2 Server #3 Server #4 Total access probability Video Video Video Video

7 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 203 FIG. 3. The connection graph for the initial allocation shown in Table 1. desirable to balance the connectivity of the servers. Then, we can define that the objective function is to maximize the production, C 1 C 2 C 3 C S, since C 1 C 2 C 3 C S is maximal when C 1 C 2 C 3 C S. Once we have the number of replicas of each video determined by an apportionment algorithm [20] and the access probability of each replica obtained by an access probability allocation algorithm, we can allocate these replicas to servers. The access probability allocation algorithm is to apportion the access probability of one video to its replicas. Several access probability allocation algorithms were proposed, such as the uniform apportionment of access probability on all replicas, i.e. Pr j i = Pr i /R i by [16], or the nonuniform apportionment algorithm proposed by [15]. Our initial allocation algorithm can obtain a balanced connectivity of a video storage server cluster under any given access probabilities obtained by any apportionment algorithm. Our proposed initial allocation strategy allocates the video from the hottest to the collest. For a video V i with R i copies, we allocate the R i copies to R i distinct servers, which maximizes C 1 C 2 C 3 C S at the moment. After the video replica with Pr n(i,j) i access probability is allocated to server j, the server gains Pr n(i,j) i access probability, and the connectivity of the server is increased by Pr n(i,j) i R i 1, since the server will create R i 1 edges, each with Pr n(i,j) i weight to the other R i 1 servers. If more than one set of R i servers maximizing C 1 C 2 C 3 C S are found, the set of R i servers with the lowest total access probability is selected. For the videos with only one copy, they do not contribute to the connectivity and are assigned to the server with minimal access probability. That is, the videos with only one copy are allocated to the server in a least-load-first manner. Figure 4 shows the proposed initial allocation algorithm. To support the dynamic changes of the system, including the insertion of new servers and files and changes of the access probabilities of videos, we propose two video reallocation policies. The first one is called partial reallocation policy, which requires less updates on

8 204 TSAO ET AL. FIG. 4. The proposed initial allocation algorithm. the servers but it cannot guarantee the optimal connectivity between servers. The other one is called total reallocation policy, which reallocates all videos on the servers to obtain the optimal connectivity. The total reallocation policy performs the initial allocation algorithm presented in the previous section. While it can obtain the optimal file allocation, total reallocation policy introduces recomputation overhead of the initial allocation algorithm, as well as expensive file copies within the cluster. On the other hand, the partial reallocation policy takes the original video locations into account and only considers the newly inserted or changed videos. The partial reallocation policy first determines the number of replicas of each file according to the storage space and new access probability. If the number of replicas of a video changes, these replicas are called undetermined replicas that their locations are yet to be determined. The set of undetermined replicas is called as undetermined set. Then, the undetermined replicas will be first sorted by their access probabilities and the policy runs our proposed initial allocation algorithm for determining their new locations. The allocation algorithm may not always find a feasible solution, e.g. a file with five replicas when there are only four different servers with available storage space. In this situation, the policy will remove the video with the least access probability from the servers, insert all its replicas in the undetermined set and resume the initial allocation algorithm. The flow chart of the partial reallocation algorithm is depicted in Fig. 5. It is clear that the result is not optimal.

9 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 205 FIG. 5. Flowchart of the partial reallocation policy. Table 2 shows an example. Originally, we have three servers and three files. Suppose we insert a new file, save Video 4, and a new server, say server D, into the cluster. The access probabilities are also changed. We have the new file locations by applying partial reallocation and total replication policies in Table 2. The location obtained by the partial reallocation policy introduces no video copy on the original servers, but it obtains a connectivity value, TABLE 2 An Example of File Locations by Applying Different Reallocation Policies Server D Server A Server B Server C (storage (storage (storage (storage space = 2) Total access Number of space = 2) space = 2) space = 2) (new server) probability replicas Original file allocation Video Video Video Video 4 (new video) New file allocation by partial reallocation policy Video Video Video Video 4 (new video) New file allocation by total reallocation policy Video Video Video Video 4 (new video) 0.1 1

10 206 TSAO ET AL On the other hand, the total reallocation policy copies two files on the original servers and obtains a higher connectivity value, In order not to interrupt the video services, we need to allocate the unused system resources to perform the reallocation. Techniques to perform the reallocation job on-line can be found in [22] that both total and partial reallocation policies can be applied to a system in operation. 4. LOAD SHIFTING SCHEME The goal of load shifting is to make room to accomodate the difference between actual access probabilities and expected access probabilities of videos. When a new request arrives, it is assigned to one of the servers with the desired video, following the access probabilities of the replicas. For example, the request of video 1 in Table 1 has probability of 0.75 to be assigned to Server 1 and 0.25 to Server 2. If the access probabilities of all the replicas are equal, the least loaded server with the desired video is selected. In the proposed load shifting algorithm, the shifting procedure can be activated in the following two conditions; for the new request of a video, S j is the selected server: when M i=1 P i, j Min{ M i=1 P i, j } T 1, where S j is a neighbor of S j,or M i=1 P i,j A max T 2. T 1 and T 2 are predefined thresholds. The first condition is to compare the load of the selected server with its neighbors to decide if load shifting is needed, while the second condition is only checking the load of the selected server against the threshold value. Both checks can be performed as a background or a real-time job. The system administrator can set values of the two thresholds to obtain the desired operating policy. For instance, if T 1 = and T 2 = 0, the load shifting process is performed in real time when the new request is blocked. If 0 T 1, T 2 A max, the load shifting process can be implemented as a background job to reduce request delays. The shifting procedure finds feasible shifting paths from the assigned server servers with system load less than A max. In order to reduce the shifting steps to accomodate the requests, the shortest feasible shifting path is selected. Since there may be more than one shortest feasible shifting path, some criteria need to be added to distinguish them. As mentioned in the previous section, the initial allocation is to maximize the connectivity C 1 C 2 C 3 C S, based on the expected access probabilities. For the load shifting, the run-time connectivity denoted as Ci cur for the server S i, is applied to select the shifting path from the shortest feasible shifting paths which maximize the product C1 cur C2 cur C3 cur CS cur. Since we model the allocation of video replicas on servers as a directed graph, it is obvious that breadth-first search can be used to find the optimal shifting path. Figure 6 shows the proposed load-shifting algorithm Simulations 5. SIMULATION RESULTS AND IMPLEMENTATION ISSUES In this section, we compare the performance of the proposed approach and others via simulation. The user request is assumed to be Poisson process with 0.83 request/minute arrival rate. The simulation environment of the video server cluster consists of 10 identical video servers that each server can support up to ten 6-Mbps MPEG-2 streams simultaneously.

11 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 207 FIG. 6. The proposed load-shifting algorithm. The video file length is assumed 5.4 GB for 2 h playback. The top 100 popular videos are cached in the disks that at least one copy of the videos can be found on one of the servers. The number of replicas of each video is determined by applying the Hamilton method which is one of the frequently used integer resource allocation algorithms [20], and we also adopt the uniform apportionment to allocate the access probabilities of videos to the replicas. The distribution of requests on videos are modeled as Zipf s distribution [23], which is defined as / P i = c N, where c = 1 i 1 1 θ i (1 θ), i {1,2,...,N}. Figure 7 shows the access probabilities of videos, based on Zipf s distributions with various θ values. In the first simulation, we allocate 64.8 GB disks for each server. In total, 120 copies of video files can be stored. I.e., 20 copies are for replicas. We forecast the expected access distribution to be Zipf s distribution with θ = 0.1, while we let the actual access probabilities range from θ = 0.1toθ=0.9 of Zipf s distribution. Note that the initial video allocation is based on the expected access distribution. We examine four different initial data allocation and load balancing approaches, including the least-load-first initial allocation without load shifting (LLF without LS), the least-load-first with load shifting (LLF with LS), the DASD dancing method with dancing threshold (DSAD), and the proposed initial allocation algorithm with load shifting (CO with LS). The least-load-first (LLF) initial data allocation strategy sorts the videos in descending order by the access probabilities and allocates the video replica in the order to the server with the minimal load. In order to have a fair comparison of the number of shifting steps, we set the thresholds of the proposed approach as T 1 = and T 2 = 0, and we also set the dancing threshold of the DASD dancing method i=1

12 208 TSAO ET AL. FIG. 7. The access probabilities of videos sorted by ranks. to infinity, which implies that request dancing is only performed while the new request is blocked. Figure 8 depicts the request fail rate over the distribution of actual demands. From the figure, we learn that the request fail rate increases with the increment of actual requests from θ = 0.1 toθ=0.9. The request fail rate is minimal when the actual demand distribution fully matches to the forecasted, i.e. θ = 0.1 in this case. The figure also shows that LLF FIG. 8. The request fail rate over the actual demands under the expected parameter (θ = 0.1).

13 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 209 FIG. 9. (θ = 0.1). The number of shifting steps per 100 requests over the actual demand under the expected parameter initial allocation with load shifting can reduce the request fail rate by 30% to 50% from the LLF method without load shifting. The service capacity improvement of a video server cluster by employing the load shifting procedure is quite significant. Comparing with other approaches, our initial allocation scheme can further reduce 25% to 60% request fail rate from the LLF method with load shifting and around 5% fail requests from the DASD dancing. Our approach obtains the lowest request fail rate, since the definition of connectivity in our approach considers both the number of video replicas and their access probabilities that better balance the loads of the servers. Figure 9 shows the number of shifting steps per 100 requests over the distribution of actual demands with the expected parameter (θ = 0.1). The figure should be viewed with caution, as the failed requests are counted in the total requests. It means lower shifting steps may be due to better algorithms or higher fail rates. While the proposed approach reduces 25% to 60% request fail rate from LLF approach, it introduces 8% to 30% more shifting steps. Comparing with the DASD approach, we can observe 10% to 25% the number of shifting steps are reduced by our approach and still a 5% reduction of fail rate can be seen from Fig. 8. To have a clear view of the combined effects of shifting ability and system availability derived from the initial data allocation schemes, we define a reward function to evaluate their performance. We assume that the system earns RE a units of reward when accepting a new request, while paying a penalty of RE p units for a shifting step. Therefore, the reward function can be used as a basis of comparison of different initial data allocation approaches. Figure 10 shows the outcomes of the reward function with RE a =5 and RE p =1 of different initial allocation schemes under various actual request probabilities. From the figure, it can be seen that our proposed method obtains 100% and 10% more reward units than the LLF method and the DASD method with load shifting, respectively.

14 210 TSAO ET AL. FIG. 10. The reward obtained by different initial allocation schemes over different distribution of actual demands under the expected parameter (θ = 0.1). In the next simulation, we modify the forecasted demand on videos to Zipf s distribution with θ = 0.9 and repeat the previous simulation with all other parameters unchanged. The simulation results are shown in Figs. 11, 12, and 13, which are in parallel to Figs. 8, 9, and 10. From Figs. 11, 12, and 13, it shows that our proposed approach has a better performance than the others, just like in Figs. 8, 9, and 10. It can also be observed that the initial allocation FIG. 11. The request fail rate over the actual demand under the expected parameter (θ = 0.9).

15 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 211 FIG. 12. (θ = 0.9). The number of shifting steps per 100 requests over the actual demand under the expected parameter of all approaches based on a near uniform distribution, such as Zipf s distribution with θ = 0.9 in this simulation, has lower connectivity which results in lower shifting capability and higher fail rate when the actual demands in videos differ from the forecast. In the next simulation, we explore the relation between the factor of the number of replicas and system performance. We adopt the same simulation parameters and increase FIG. 13. The reward obtained by different initial allocation schemes over different distribution of actual demands under the expected parameter (θ = 0.9).

16 212 TSAO ET AL. FIG. 14. The request fail rate over different percentage of replication. the percentage of replication from 10% to 100%, i.e. 108 GB per server. We examine the four situations: (1) the expected demand θ = 0.1 and the actual request θ = 0.1, denoted as (EP = 0.1/P = 0.1); (2) the expected demand θ = 0.1 and the actual request θ = 0.9, denoted as (EP = 0.1/P = 0.9); (3) the expected demand θ = 0.9 and the actual request θ = 0.1, denoted as (EP = 0.9/P = 0.1); (4) the expected demand θ = 0.9 and the actual request θ = 0.9, denoted as (EP = 0.9/P = 0.9). Figure 14 illustrates the request fail rate over the percentage of replications of the DASD dancing approach and our approach. We find that the request fail rate decreases by the increment of the percentage of replications, and our proposed method obtains lower request fail rate than the DASD method from around 5% under 10% replication to 10% under 100% replication. The reason is that, as the percentage of replication increases, our approach can better allocate replicas to the servers. Note that a higher percentage of replication means more edges in the connection graph and a more sophisticated algorithm gains advantage. Figure 14 also shows that EP = 0.1/P = 0.1 and EP = 0.1/P = 0.9 result in the best and poorest performances, respectively, among the four situations. Figure 15 shows the number of shifting steps per 100 requests of the simulation in Fig. 14. The shifting steps increase by the increment of replications due to the decrease of fail rate. In the last simulation, we examine the relation between the request fail rate and the service capacity of a storage server, i.e. the number of streams supported by a server. Figure 16 shows the results. We see that the request fail rate decreases by increasing the number of supported streams of a server. For the two situations, EP = 0.1/P = 0.1 and EP = 0.9/P = 0.1, the request fail rates reduce dramatically, since the skewed access pattern can be alleviated by increasing the number of users in a system. Moreover, DASD and the proposed method become closer for a higher number of served user in a system since the requests on servers are naturally balanced.

17 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 213 FIG. 15. The number of shifting steps per 100 requests under different percentage of replication Implementation Issues To realize the proposed load-shifting scheme, we adopt and extend the broadcast dispatching scheme of OneIP presented by Damani et al. [17]. The basic concept behind the broadcast dispatching scheme of OneIP is that a cluster of servers publishes a cluster IP FIG. 16. The request fail rate under different service capacity of a storage server.

18 214 TSAO ET AL. FIG. 17. Apply OneIP technique to a video server cluster. address to users. All requests to the cluster use the cluster IP as their destination, and only one server within the cluster will respond for each request. Figure 17 demonstrates the request/response packet flows when OneIP is applied to a video server cluster. First, we assign a unique IP address and an ID to each server and a shared cluster IP to all servers within a cluster. The request packets use the cluster IP as their destination IP address. The destination medium access control (MAC) address of the request packet will be replaced by the broadcasting MAC address. In this way, all servers in the cluster will receive the request packets. The servers run an election algorithm to determine a server to handle the request. For example, a fair election algorithm can be a MOD operation on the source IP address of the request packet, and the result of MOD operation determines the ID of the server which will handle the request. Later, the selected server responds to the request by using the cluster IP address. If the source IP addresses of the incoming request packets are uniformly distributed, the load of each server will be balanced. The details of OneIP can be found in [17]. OneIP suggests using a simple server election algorithm such as MOD operation in order to reduce computation complexity and the memory space of a dispatching table. We extend OneIP to support video server clusters and the load shifting operation by maintaining a file location table and the load information of each server within the cluster. While the request arrives, the servers determine a server to handle it by looking up the file location table and load information. Suppose the server with ID = k is assigned to respond to the request and the server will reply to the client with the handling server ID = k. From then on, the following request packets for the same video service from the client will always carry the handling server ID. The handling server ID can be inserted in the protocol, realtime stream protocol (RTSP) or DSM-CC packets. Hence, the servers can easily determine if the incoming packets are assigned to themselves by checking the handling server ID in

19 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER 215 the packet. Before migrating progressing requests between servers, the system will notify clients to update their handling server IDs in the request packets. While a new request is blocked, servers will run the load-shifting algorithm to identify a shifting path. If a feasible shifting path can be found, the first server in the shifting path will initiate the shifting operation by sending a hand-off packet to all the servers in the shifting path. The hand-off packet contains the local time, the expected hand-off time point, all videos to be shifted, and the servers in the shifting path. Once a server receives the hand-off packet, it calculates the expected hand-off point of the video file that will be shifted from it, and sends the information to its neighboring server in the path. After all the servers in the path receive the hand-off packets, the new handling server ID is sent to the clients viewing to-be-shifted videos. The next step is to perform hand-off operation when the expected hand-off time is reached. Since the downstream is connectionless and the cluster IP address is always the same, it is obvious that the hand-off procedure is transparent to clients. Time distortion and timer drift on servers may incur difficulty to smooth migration. Little buffer on the client site is necessary to accommodate the timing difference between the stop of video transmission from the previous server and the start of transmission from the new server. According to our experiments, if the hand-off time is set to 1 s and the service is 1.5 Mbps MPEG-1 video, around 100 KB buffer is sufficient. We extend OneIP as an intermediate driver on Windows NT to support the operations of a distributed file server. Figure 18 shows Windows NT network architecture and packet flows of extended OneIP. The intermediate driver works between of network layer and the MAC layer. When it receives request packets, the driver discards the request packets with the wrong handling server ID. For the packets to the server, it forwards the packets to the upper layer. The driver also performs the load-shifting procedure in order to reduce operating system overhead and to improve delay latency. It sends and processes the hand-off packets. According to the experimental results, the driver introduces less than 3% overhead FIG. 18. Packet flows of the extended OneIP driver on Windows NT.

20 216 TSAO ET AL. in sending and receiving load-shifting related packets, and requires around 1-s hand-off time, which varies for different interconnection network of the servers. 6. CONCLUSIONS In this paper, a novel initial allocation of videos for a distributed video storage server was proposed. With the proposed load-shifting algorithm, the system can reduce the request fail rate and shifting steps. According to the simulation results, we can reduce 50% the request fail rate from that without the load-shifting procedure, around 25% to 60% the request fail rate from that of the LLF initial allocation scheme with load shifting, and 5% to 10% the request fail rate with 5% to 25% shifting steps from the DASD dancing method. Moreover, a kernel level driver on Windows NT was prototyped to examine the practicability of the proposed load-shifting scheme. REFERENCES 1. C. Freedman and D. Dewitt, The spiffi scalable video-on-demand server, in ACM SIGMOD, D. Pegler, N. Yeadon, D. Hutchison, and D. Shepherd, Incorporating scalability into networked multimedia storage systems, in SPIE Conference on Multimedia Computing and Networking, 1997, pp P. Lougher, R. Lougher, D. Shepherd, and D. Pegler, A scalable hierarchical video storage architecture, in SPIE Conference on Multimedia Computing and Networking, 1996, pp W. Tetzlaff, M. Kienzle, and D. Sitaram, A methodology for evaluation storage system in distributed and hierarchical video servers, in Spring COMPCON 94, C. Federighi and L. A. Rowe, A distributed hierarchical storage manager for a video-on-demand system, in Proceeding of Symp. On Elec. Imaging Sci. and Tech., Feb D. N. Serpanos and T. Bouloutas, Centralized vs Distributed Multimedia Servers, Technical Report RC 20411, IBM Research Division, T. J. Watson Research Center, March D. Pegler, D. Hutchison, and D. Shepherd, Scalability issues for a networked multimedia storage architecture, in Proceedings of 1995 IEE Data Transmission, W. J. Bolosky, J. S. Barrera, R. P. Draves, R. P. Fitzgerald, G. A. Gibson, M. B. Jones, S. P. Levi, N. P. Myhrvold, and R. F. Rashid, The tiger video fileserver, in Proceedings of the Sixth International Workshop on Network and Operating System Support for Digital Audio and Video, Y. N. Doganata and A. N. Tantawi, Making a cost-effective video server, IEEE Multimedia 1, 1994, Y. Doganata and A. Tantawi, A cost/performance study of video servers with hierarchical storage, in 1st International Conference on Multimedia Computing and Systems, T. D. C. Little and D. Venkatesh, Probability-based assignment of videos to storage devices in a video-ondemand system, ACM/Springer Multimedia System 2, 1994, R. Tewari, D. Dias, R. Mukherjee, and H. Vin, High Availability in Clustered Video Server, Technical Report RC 20108, IBM Research Division, T. J. Watson Research Center, June R. Tewari, R. Mukherjee, D. Dias, and H. Vin, Design and performance tradeoffs in clustered video servers, in 3rd IEEE International Conference on Multimedia Computing and Systems, 1996, A. Dan, M. Kienzle, and D. Sitaram, A dynamic policy of segment replication for load balancing in videoon-demand servers, ACM/Springer Multimedia System 3, 1995, D. N. Serpanos, L. Georagiadis, and T. Bouloutas, Mmpacking: A Load and Storage Balancing Algorithm for Distributed Multimedia Servers, Technical Report RC 20410, IBM Research Division, T. J. Watson Research Center, March J. L. Wolf, P. S. Yu, and H. Shachnai, Disk load balancing for video-on-demand systems, ACM/Springer Multimedia System 5, 1997, O. P. Damani, P. Y. Chung, Y. Huang, C. M. Kintala, and Y. M. Wang, One-ip: Techniques for hosting a service on a cluster of machines, in Sixth International World Wide Web Conference, J. Y. Lee, Parallel video servers: A tutorial, IEEE Multimedia April/June, 1998, M. Kienzle, A. Dan, D. Sitaram, and W. Tetzlaff, The effect of video server topology on contingency capacity requirements, in Proceedings of Multimedia Computing and Networking, 1996.

21 LOAD BALANCING FOR DISTRIBUTED VIDEO SERVER T. Ibarkai and N. Katoh, Resource Allocation Problems Algorithmic Approaches, MIT Press, Cambridge, MA, A. Federgruem and H. Groenevelt, The greedy procedure for resource allocation problem: Necessary and sufficient conditions for optimality, Oper. Res. 34, 1986, A. Dan and D. Sitaram, An online video placement policy based on bandwidth to space ratio (bsr), in Proceedings of SIGMOD 95, G. Zipf, Human Behavior and the Principle of Least Effort, Addison-Wesley, Reading, MA, SHIAO-LI TSAO received the B.S., M.S., and Ph.D. degrees in engineering science from National Cheng Kung University, Tainan, Taiwan, in 1995, 1996, and 1999, respectively. His research interests include multimedia system, computer network, operating system, and mobile computing. He has published about 30 international journal/conference papers in the area of multimedia storage servers. He holds or has filed four U.S. patents in total. MENG CHANG CHEN received the B.S. and M.S. degrees in computer science from National Chiao Tung University, Taiwan in 1979 and 1981, respectively, and the Ph.D. degree in computer science from UCLA in He joined AT&T Bell Labs in 1989 as a member of the technical staff. He became an associate professor in the Department of Information Management, National Sun Yat-Sen University, Taiwan in Since 1993, he has been with the Institute of Information Science, Academia Sinica, Taiwan. His current research interests include multimedia systems and networking, QoS networking, operating systems, database and knowledge base systems, and Internet documents management and access. MING-TAT KO received the B.S. and M.S. degrees in mathematics from National Taiwan University in 1979 and 1982, respectively. He received a Ph.D. in computer science from National Tsing Hua University, Taiwan in Then he joined the Institute of Information Science as an associate research fellow. Dr. Ko s major research interest include the design and analysis of algorithms, computational geometry, graph algorithms, multimedia systems, and computer graphics.

22 218 TSAO ET AL. JAN-MING HO received his Ph.D. degree in electrical engineering and computer science from Northwestern University in He received his B.S. in electrical engineering from National Cheng Kung University in 1978 and his M.S. at the Institute of electronics of National Chiao Tung University in He joined the Institute of Information Science, Academia Sinica, Taiwan as an associate research fellow in 1989 and was promoted to research fellow in He visited IBM T.J. Watson Research Center in summer 1987 and 1988, the Leonardo Fibonacci Institute for the Foundations of Computer Science, Italy, in summer 1992, and the Dagstuhl-Seminar on Combinatorial Methods for Integrated Circuit Design, IBFI-Geschäftsstelle, Schloss Dagstuhl, Fachbereich Informatik, Bau 36, Universität des Saarlandes, Germany, in October His research interests include realtime operating systems with applications to continuous media systems, e.g., video on demand and video conferencing, computational geometry, combinatorial optimization, VLSI design algorithms, and implementation and testing of VLSI algorithms on real designs. YUEH-MIN HUANG received the B.S. degree in engineering science from the National Cheng-Kung University, Taiwan, in 1982, and the M.S. and the Ph.D. degrees in electrical engineering from the University of Arizona in 1988 and 1991, respectively. He has been with the National Cheng-Kung University since 1991 and is currently an associate professor of the Department of Engineering Science. His research interests include video-on-demand system, real time operating systems, multimedia, and data mining.

Improving VoD System Efficiency with Multicast and Caching

Improving VoD System Efficiency with Multicast and Caching Improving VoD System Efficiency with Multicast and Caching Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 1. Introduction 2. Previous Works 3. UVoD

More information

Distributed Video Systems Chapter 7 Parallel Video Servers Part 1 - Introduction and Overview

Distributed Video Systems Chapter 7 Parallel Video Servers Part 1 - Introduction and Overview Distributed Video Systems Chapter 7 Parallel Video Servers Part 1 - Introduction and Overview Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 71 Introduction

More information

A Proxy Caching Scheme for Continuous Media Streams on the Internet

A Proxy Caching Scheme for Continuous Media Streams on the Internet A Proxy Caching Scheme for Continuous Media Streams on the Internet Eun-Ji Lim, Seong-Ho park, Hyeon-Ok Hong, Ki-Dong Chung Department of Computer Science, Pusan National University Jang Jun Dong, San

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Study of Load Balancing Schemes over a Video on Demand System

Study of Load Balancing Schemes over a Video on Demand System Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video

More information

DYNAMIC REPLICATION OF CONTENT IN THE HAMMERHEAD MULTIMEDIA SERVER

DYNAMIC REPLICATION OF CONTENT IN THE HAMMERHEAD MULTIMEDIA SERVER DYNAMIC REPLICATION OF CONTENT IN THE HAMMERHEAD MULTIMEDIA SERVER Jonathan Dukes Jeremy Jones Department of Computer Science Trinity College Dublin, Ireland Email: Jonathan.Dukes@cs.tcd.ie KEYWORDS Multimedia

More information

Video Server Architectures: Performance and Scalability

Video Server Architectures: Performance and Scalability 1 Introduction Video Server Architectures: Performance and Scalability Extended Abstract Christoph Bernhardt, Ernst Biersack Institut Eurécom, 2229 Route des Crêtes, 06904 Sophia-Antipolis France Phone:

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Nowadays data-intensive applications play a

Nowadays data-intensive applications play a Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted

More information

A Simulation-Based Analysis of Scheduling Policies for Multimedia Servers

A Simulation-Based Analysis of Scheduling Policies for Multimedia Servers A Simulation-Based Analysis of Scheduling Policies for Multimedia Servers Nabil J. Sarhan Chita R. Das Department of Computer Science and Engineering The Pennsylvania State University University Park,

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

RECURSIVE PATCHING An Efficient Technique for Multicast Video Streaming

RECURSIVE PATCHING An Efficient Technique for Multicast Video Streaming ECUSIVE ATCHING An Efficient Technique for Multicast Video Streaming Y. W. Wong, Jack Y. B. Lee Department of Information Engineering The Chinese University of Hong Kong, Shatin, N.T., Hong Kong Email:

More information

An Enhanced Binning Algorithm for Distributed Web Clusters

An Enhanced Binning Algorithm for Distributed Web Clusters 1 An Enhanced Binning Algorithm for Distributed Web Clusters Hann-Jang Ho Granddon D. Yen Jack Lee Department of Information Management, WuFeng Institute of Technology SingLing Lee Feng-Wei Lien Department

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology

Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology H S Guruprasad Research Scholar, Dr MGR University Asst Prof& HOD / Dept of ISE BMSCE, Bangalore, India hs_gurup@yahoo.com

More information

Performance Improvement of Hardware-Based Packet Classification Algorithm

Performance Improvement of Hardware-Based Packet Classification Algorithm Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Proxy Caching for Video on Demand Systems in Multicasting Networks

Proxy Caching for Video on Demand Systems in Multicasting Networks MER A MITSUBISHI EECTRIC RESEARCH ABORATORY http://wwwmerlcom roxy Caching for Video on Demand Systems in Multicasting Networks i Zhu, Gang Cheng, Nirwan Ansari, Zafer Sahinoglu, Anthony Vetro, and Huifang

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 333-339 (2002) Short aper An Evaluation of Deficit Round Robin Fair ueuing Applied in Router Congestion Control Department of Electrical Engineering National

More information

Probability Admission Control in Class-based Video-on-Demand System

Probability Admission Control in Class-based Video-on-Demand System Probability Admission Control in Class-based Video-on-Demand System Sami Alwakeel and Agung Prasetijo Department of Computer Engineering College of Computer and Information Sciences, King Saud University

More information

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi

More information

Dynamic Load Sharing Policy in Distributed VoD using agents

Dynamic Load Sharing Policy in Distributed VoD using agents 270 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 Dynamic Load Sharing Policy in Distributed VoD using agents H S Guruprasad Asst Prof & HOD Dept of ISE,

More information

Load Balancing Algorithms for Internet Vhdeo and Audio Server

Load Balancing Algorithms for Internet Vhdeo and Audio Server Load Balancing Algorithms for nternet Vhdeo and Audio Server Dusit Niyato Chutim.et Srinilta s2061036@kmitl.ac.th chutimet@ce.kmitl.ac. th Department of Computer Engineering, Engineering Faculty, King

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information

DUE TO advances in broadband technology, media

DUE TO advances in broadband technology, media IEEE TRANSACTIONS ON BROADCASTING, VOL. 53, NO. 1, MARCH 2007 79 A Priority Selected Cache Algorithm for Video Relay in Streaming Applications Shin-Hung Chang, Ray-I Chang, Jan-Ming Ho, and Yen-Jen Oyang

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

On a Unified Architecture for Video-on-Demand Services

On a Unified Architecture for Video-on-Demand Services 38 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 4, NO. 1, MARCH 2002 On a Unified Architecture for Video-on-Demand Services Jack Y. B. Lee Abstract Current video-on-demand (VoD) systems can be classified into

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

On Latency Management in Time-Shared Operating Systems *

On Latency Management in Time-Shared Operating Systems * On Latency Management in Time-Shared Operating Systems * Kevin Jeffay University of North Carolina at Chapel Hill Department of Computer Science Chapel Hill, NC 27599-3175 jeffay@cs.unc.edu Abstract: The

More information

Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines

Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines The Scientific World Journal Volume 2013, Article ID 596724, 6 pages http://dx.doi.org/10.1155/2013/596724 Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines Weizhe

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Buffer Management Scheme for Video-on-Demand (VoD) System

Buffer Management Scheme for Video-on-Demand (VoD) System 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Buffer Management Scheme for Video-on-Demand (VoD) System Sudhir N.

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Load Management in Distributed Video Servers

Load Management in Distributed Video Servers Load Management in Distributed Video Servers Nalini Venkat asubramanian and Srinivas Ramanathan Hewlett-Packard Laboratories 1501 Page Mill Road, Palo Alto, CA 94304 (nalini,srinivas)@hpl.hp.com Abstract

More information

Caching video contents in IPTV systems with hierarchical architecture

Caching video contents in IPTV systems with hierarchical architecture Caching video contents in IPTV systems with hierarchical architecture Lydia Chen 1, Michela Meo 2 and Alessandra Scicchitano 1 1. IBM Zurich Research Lab email: {yic,als}@zurich.ibm.com 2. Politecnico

More information

Reservation Based Admission Control of a Multimedia Server

Reservation Based Admission Control of a Multimedia Server Reservation Based Admission Control of a Multimedia Server Md. Mujibur Rahman Dr. Mostofa Akbar Rukhsana Afroz Ruby Dept. of Computer Science Dept. of Computer Science & Engg, Millinium Solutions Ltd.

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS

THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS 1 ZHU QIANG, 2 SUN YUQIANG 1 Zhejiang University of Media and Communications, Hangzhou 310018, P.R. China 2 Changzhou University, Changzhou 213022,

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

The Transmitted Strategy of Proxy Cache Based on Segmented Video

The Transmitted Strategy of Proxy Cache Based on Segmented Video The Transmitted Strategy of Proxy Cache Based on Segmented Video Zhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang Faculty of Computer Science and Technology, Jilin University, Changchun City, 130012,

More information

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 )

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) Abstract Traditionally, Content Delivery Networks (CDNs)

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &

More information

On the Min-Max 2-Cluster Editing Problem

On the Min-Max 2-Cluster Editing Problem JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 29, 1109-1120 (2013) On the Min-Max 2-Cluster Editing Problem LI-HSUAN CHEN 1, MAW-SHANG CHANG 2, CHUN-CHIEH WANG 1 AND BANG YE WU 1,* 1 Department of Computer

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues D.N. Serpanos and P.I. Antoniadis Department of Computer Science University of Crete Knossos Avenue

More information

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Module 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth

Module 17: Interconnection Networks Lecture 37: Introduction to Routers Interconnection Networks. Fundamentals. Latency and bandwidth Interconnection Networks Fundamentals Latency and bandwidth Router architecture Coherence protocol and routing [From Chapter 10 of Culler, Singh, Gupta] file:///e /parallel_com_arch/lecture37/37_1.htm[6/13/2012

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Adaptive QoS Platform in Multimedia Networks

Adaptive QoS Platform in Multimedia Networks Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Maximizing the Number of Users in an Interactive Video-on-Demand System

Maximizing the Number of Users in an Interactive Video-on-Demand System IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,

More information

Energy-Efficient Mobile Cache Invalidation

Energy-Efficient Mobile Cache Invalidation Distributed and Parallel Databases 6, 351 372 (1998) c 1998 Kluwer Academic Publishers. Manufactured in The Netherlands. Energy-Efficient Mobile Cache Invalidation KUN-LUNG WU, PHILIP S. YU AND MING-SYAN

More information

Network Load Balancing Methods: Experimental Comparisons and Improvement

Network Load Balancing Methods: Experimental Comparisons and Improvement Network Load Balancing Methods: Experimental Comparisons and Improvement Abstract Load balancing algorithms play critical roles in systems where the workload has to be distributed across multiple resources,

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength 166 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

More information

Source Routing Algorithms for Networks with Advance Reservations

Source Routing Algorithms for Networks with Advance Reservations Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

Distributed System Chapter 16 Issues in ch 17, ch 18

Distributed System Chapter 16 Issues in ch 17, ch 18 Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication

More information

The Google File System

The Google File System October 13, 2010 Based on: S. Ghemawat, H. Gobioff, and S.-T. Leung: The Google file system, in Proceedings ACM SOSP 2003, Lake George, NY, USA, October 2003. 1 Assumptions Interface Architecture Single

More information

Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment

Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment SANJEEV KUMAR, SENIOR MEMBER, IEEE AND ALVARO MUNOZ, STUDENT MEMBER, IEEE % Networking Research Lab,

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

A Robust Bloom Filter

A Robust Bloom Filter A Robust Bloom Filter Yoon-Hwa Choi Department of Computer Engineering, Hongik University, Seoul, Korea. Orcid: 0000-0003-4585-2875 Abstract A Bloom filter is a space-efficient randomized data structure

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

Improving object cache performance through selective placement

Improving object cache performance through selective placement University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied

More information

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao

More information

Cost-based cache replacement and server selection for multimedia proxy across wireless Internet

Cost-based cache replacement and server selection for multimedia proxy across wireless Internet University of Massachusetts Amherst From the SelectedWorks of Lixin Gao January 1, 2004 Cost-based cache replacement and server selection for multimedia proxy across wireless Internet Q Zhang Z Xiang WW

More information

Algorithms for Storage Allocation Based on Client Preferences

Algorithms for Storage Allocation Based on Client Preferences Algorithms for Storage Allocation Based on Client Preferences Tami Tamir Benny Vaksendiser Abstract We consider a packing problem arising in storage management of Video on Demand (VoD) systems. The system

More information

Scheduling Strategy for Realistic Implementation of Video on Demand over IPTV System

Scheduling Strategy for Realistic Implementation of Video on Demand over IPTV System Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 271 Scheduling Strategy for Realistic Implementation of Video

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM *

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM * Journal of Contemporary Issues in Business Research ISSN 2305-8277 (Online), 2012, Vol. 1, No. 2, 42-56. Copyright of the Academic Journals JCIBR All rights reserved. IMPLEMENTATION OF INFORMATION RETRIEVAL

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

Segment-Based Proxy Caching of Multimedia Streams

Segment-Based Proxy Caching of Multimedia Streams Segment-Based Proxy Caching of Multimedia Streams Kun-Lung Wu, Philip S. Yu and Joel L. Wolf IBM T.J. Watson Research Center 3 Saw Mill River Road Hawthorne, NY 1532 fklwu, psyu, jlwg@us.ibm.com ABSTRACT

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Using Multicast for Streaming Videos across Wide Area Networks

Using Multicast for Streaming Videos across Wide Area Networks Using Multicast for Streaming Videos across Wide Area Networks Bing Wang ½, Subhabrata Sen ¾, Micah Adler ½ and Don Towsley ½ ½ Department of Computer Science University of Massachusetts, Amherst, MA 0003

More information

How Routing Algorithms Work

How Routing Algorithms Work How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information

More information

A Fault Tolerant Video Server Using Combined Raid 5 and Mirroring

A Fault Tolerant Video Server Using Combined Raid 5 and Mirroring Proceedings of Multimedia Computing and Networking 1997 (MMCN97), San Jose, CA, February 1997 A Fault Tolerant Video Server Using Combined Raid 5 and Mirroring Ernst W. BIERSACK, Christoph BERNHARDT Institut

More information

High-Speed Cell-Level Path Allocation in a Three-Stage ATM Switch.

High-Speed Cell-Level Path Allocation in a Three-Stage ATM Switch. High-Speed Cell-Level Path Allocation in a Three-Stage ATM Switch. Martin Collier School of Electronic Engineering, Dublin City University, Glasnevin, Dublin 9, Ireland. email address: collierm@eeng.dcu.ie

More information

A Proposal for a High Speed Multicast Switch Fabric Design

A Proposal for a High Speed Multicast Switch Fabric Design A Proposal for a High Speed Multicast Switch Fabric Design Cheng Li, R.Venkatesan and H.M.Heys Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John s, NF, Canada AB X

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information