An Optimal Median Calculation Algorithm for Estimating Internet Link Delays From Active Measurements.

Size: px
Start display at page:

Download "An Optimal Median Calculation Algorithm for Estimating Internet Link Delays From Active Measurements."

Transcription

1 An Optimal Median Calculation Algorithm for Estimating Internet Link Delays From Active Measurements. Dima Feldman and Yuval Shavitt Tel-Aviv University, Ramat Aviv 69978,Israel Abstract. Delay estimation in the Internet can improve performance of many applications, e.g., web browsing, peer-to-peer applications and distributed games. For this purpose it was suggested to build an Internet distance service that can efficiently supply applications with delay information based on an Internet delay map. This can be achieved by deploying a large scale measurement infrastructure such as the DIMES project where internal delay information is extracted from end to end measurements. We suggest to estimate internal Internet link delays by the median of differences between the measurement to its end points. We suggest a very efficient algorithm for this calculation, which works in linear time and constant space; prove its correctness; and compare its performance to the much slower intuitive algorithms on real Internet data. Key words: link delay, median, median estimation 1 Introduction As the Internet evolved rapidly in the last decade, so has the interest in measuring and studying its structure. The delay between end nodes of the network is an important parameter that influence the experience of applications such as web browsing and online games. Knowledge of the delays between network nodes is also likely to improve network utilization of peer-to-peer and content distribution application. There are several works [1 5] that suggested using end-to-end delays between small amount of nodes in order to produce estimation of a host distance to other hosts. The DIMES project [6, 7] produces a vast amount of measurement results from thousands of locations worldwide. DIMES software based agents that reside in volunteer host machines use both traceroute and ping measurements to discover the Internet connectivity and internal delays. The results of these measurements are stored in a MySQL [8] database in raw format. All the works that suggested to use Internet delay estimation [1 5] assume that obtaining link delays from measurements is a trivial task. We claim that this task is not trivial, especially if we want to estimate the delay on an internal Internet link for which we do not have a direct end-to-end measurement. Thus,

2 2 Dima Feldman and Yuval Shavitt we suggest to use the median of the difference between the traceroute measurement to the link end-nodes as a good estimation of the delay on a link. But more important, if one aims at building an Internet wide delay infrastructure the calculation of millions of link delays from many measurements need to be efficient, especially when done in parallel, and this is the major contribution of this paper. In this work we use DIMES results to estimate link delays in the core of the network. We have developed a robust and effective technique for link delay estimation using a fast and memory efficient algorithm for median estimation. We tested our algorithm on one US wide provider, and show that the results comply with direct inefficient delay calculations and to geographic distances. 2 Link delay estimation and Median calculation Link delay is composed of queueing delay, transmission delay, and propagation delay. The transmission delay is negligible for today s high speed links, the queueing delay is dynamic in many cases, and thus, propagation delay is the stable and important measure for many applications. The propagation delay is linearly related to the geographic line length 1 and is roughly equal to 1mS RTT between points at 100Km distance. In measurements of RTT delays (e.g., using traceroute), there is additional noise due to delays caused by the CPU load on the responding nodes. When measuring the propagation delay, we can treat the queueing delay and the delay due to CPU load as additive positive noise [9]. Fig. 1. Link Delay Measurement Currently, the DIMES project has over 11,000 agents spread in 91 countries, on all continents except Antarctica [7]. Agents continuously download script files that can be tailored by their location. The script includes a list commands for the agent (such as ping and traceroute ) and target IP addresses. The use of traceroute gives us the RTT delay from an agent to each one of the hosts on the route to some designated address. It should be noted that we have no control 1 Geographic line length should be distinguished from the air distance since fibers usually follow railways and highways.

3 An Optimal Median Calculation Algorithm for Link Delays Estimation. 3 over the route to the destination, therefore by tracerouting to a host on the other side of the globe, the agent measures delays to the intermediate hosts along a route selected by both the intra- and inter-as routing algorithms. This route may not be unique, for example due to load balancing, or may change during the measurement. Our goal in this paper, is to estimate the delay between each pair of nodes (routers) that consecutively appear in any traceroute measurements. The straight forward method for link delay estimation between two nodes S and D, as shown in figure 1, is the difference of the minimum RTT as it is measured by agents. For agent j, delay j (S, D) = min(rt T (D j )) min(rt T (S j )). To combine multiple agents results, we chose a weighted median algorithm, which gives a larger weight to the agent that made more measurements of a specific link 2. This method, which we term the Min Min algorithm, has two major disadvantages: non-revertability of the data and high storage requirement 3. In a dynamic network, a topology change in layer 2 may cause a layer 3 link delay to change. Since a = min(a, b) is a non-increasing function, it might never reflect the change. The other problem is the storage requirement for the calculation. In the two day period of DIMES measurements we examined, each network edge was measured by 10 agents on average, what is forcing us to keep on average 10 records for each edge. The alternative method we propose is a statistical analysis of the RT T (D i ) RT T (S i ) values, where i is a measurement number. Notice that we ignore the measurement source. The classical approach is averaging : delay(d, S) = 1 N N i=1 RT T (D i) RT T (S i ). However, for this to give a good estimation the data should have Gaussian noise and no outliers. Fig. 2. Histogram of RT T (D i) RT T (S i) of link. The mean of the distribution is 24.5ms, while the median is 31ms. 2 For values and weights vectors v and w, weighted median defined as a median of values of v, when v i is repeated w i times. 3 When working with a large amounts of data, large storage requirement is also translated to non-negligible computation/access time

4 4 Dima Feldman and Yuval Shavitt It is widely agreed that for many practical measurements, especially with long tail distributions, median gives a better estimation to the measured value than linear operator such as mean [10]. Median filtering is also widely used in image processing to remove impulse noise [11]. However, exact median calculations require sorting the data and then selecting the middle value. The time complexity of such a calculation is O(N log(n)) and the storage complexity is O(N). This makes the use of direct median calculation impractical for large amount of data, such as in the DIMES case, especially when simultaneous calculations are performed. Many median estimation methods are mentioned by Battiato et al. [12] and the references therein, some of them have a running time of O(N) but also O(N) of storage is required. Rousseeuw et al. [10] propose a practical algorithm for median estimation using a construction termed Remedain with calculation complexity of O(N log(n)) and storage complexity of O(log(N)) but it requires predeterminate amount of samples. Many communication and signal processing algorithms often utilize windowing algorithms to reduce the required memory and to give a higher priority to the latest samples (and therefore are more sensitive to the noise at the last samples) [13]. For link delay estimation there is no reason to give the last samples more importance than the first samples (we refer to dynamic macroscopic changes later in the paper). Thus, the windowing approach is inappropriate. We suggest here our Fast Algorithm for Median Estimation (FAME ) which decrease the required storage for each link to only two double precision variables, while giving a good median estimate of i.i.d. samples. Our algorithm is linear in the number of samples with a small constant. Similar, but simpler algorithms were suggested in [14, 15], however they are highly vulnerable to noise in the last samples of the data and have significantly larger convergence time. To depict the advantage of using median in calculations of delay measurement observe Figure 2, which shows a histogram of the delay difference for a typical link example. The histogram shows the typical concentration of the samples in a vicinity of the true value and the existence of many outliers. In this case, like in many others, median(rt T (D i ) RT T (S i )) gives reliable approximation of link delay. 3 The Fast Algorithm for Median Estimation FAME uses two variables, the step size, step, and the median estimator, M. For every new data sample, d, M is increased if d is larger than M and decreased if smaller, namely M = M + step sign(d M). If the data sample d is close to M, the step is halved: if d (M step, M + step) : step = step/2. While the presentation in this paper concentrate on pseudo code which can be implemented with a high level language such as C or Java, FAME can be easily and efficiently implemented in hardware or with database query languages. The hardware implementation is important for calculating median for measurement values that arrive on the fly, e.g., in a programmable NIC. The MySQL

5 An Optimal Median Calculation Algorithm for Link Delays Estimation. 5 implementation is the one we used with DIMES and is also efficient due to the use of the insert... on duplicate... statement which enables writing to the database only when a new estimation is needed. The proposed median estimation algorithm has two important features. First, the convergence time depends on the quality of the data. The larger the amount of outliers and the larger is the variance of the data, the longer it will take to reduce the step variable to a small value. Second, the step size as a function of the data size gives a qualifier for the estimation accuracy. Algorithm 1 : Fast Algorithm for Median Estimation 1: Initialization: 2: M = data(1) 3: Step = max( data(1)/2, b) // b is a minimal initial step 4: For each new item i: 5: if M > data(i) then 6: M = M step 7: else if M < data(i) then 8: M = M + step 9: end if 10: if data(i) M < step then 11: step = step/2 12: end if There are two modifications that can be applied to FAME : - In order to eliminate overshooting in median prediction when the number of samples is small, we apply the following change. In case where a new sample is in the range M ± step, M = M ± step (lines 6 and 8) can be replaced with M = data(i). We term this variation FAME NO OS. - To allow the algorithm to follow changes in the link statistics over time, it is possible to multiply the step by 1 + ε for some small ε every step (For hardware implementation one can alternatively use a larger ε every few steps). This will give the algorithm a windowing flavor. 3.1 Proof sketch In this section we show that the algorithm converges to the median, and it increases the accuracy with the amount of data. The proof assumes that all samples are i.i.d.. Lemma 1. Let C be one dimensional Markov chain with transition probabilities P r (i) = 1 P (x < X(i)) and P l (i) = P (x < X(i)) as shown in figure 3. Then the mode of the steady state distribution of the Markov chain π(n) will be one of two nodes adjacent to the median of the distribution P (x < X). i.e. if X(i) median(x) X(i + 1) i argmax(π(n)) i + 1

6 6 Dima Feldman and Yuval Shavitt Fig D Markov chain. P(x) is a probability density function of x. P l (i) = P (x < X(i)) is transition probability from state i to state i 1. P r(i) = 1 P (x < X(i)) is transition probability from state i to state i + 1. Proof. Let m to be the median of a distribution function P (x X), i.e., P (m X) = 1 2. According to the Markov chain definition X(i) > m, P r(i) P l (i + 1), but in steady state π(i) P r (i) = π(i + 1) P l (i + 1). Therefore the steady state distributions ratio = π(i+1) π(i) 1. In the same manner, X(i) < m : π(i+1) π(i) 1. Hence i argmax(π(n)) i + 1 when X(i) m X(i + 1). For a Markov chain C, we define the refined Markov chain C. C inherits all the states of C and, in addition, has exactly one state between every pair of inherited states of C. The transition probabilities are calculated using the same formula as in C. Lemma 2. Let X(m) and X(n), m < n, be the two states with the highest steady state probability in a Markov chain C; and let C be a refined Markov chain of C. Then i m, CDF (i ) < CDF (i) when X (i ) = X(i). Namely, the error probability in the refined Markov chain C is smaller than the one in C. The proof is omitted due to space limitation. The phenomena of concentrated probability density function with the increasing number of nodes in the Markov chain is demonstrated in figure 4. Fig. 4. Steady State CDF of different length Markov chains, for the Exponential distribution with λ = ln(2)/ (median = 0.5, mean = λ ).

7 An Optimal Median Calculation Algorithm for Link Delays Estimation. 7 As can be seen in Figure 5, FAME can be treated as a multi-level 1D-Markov chain, where each level is a median estimator and the accuracy increases as the algorithm receives more data samples. When the variance is smaller the faster step will be reduced and the algorithm will descend the Markov chain hierarchy. As a result, FAME convergence speed depends on the quality of the data. Fig. 5. FAME State Machine. Solid lines are transition inside a single detention of the chain, dashed line is a transition between chains with different steps. 4 Tests on Internet data We have applied the algorithms, Min Min, FAME, FAME NO OS, and the median on RT T (D i ) RT T (S i ), on the raw data collected by DIMES during a period of 2 days in July We have used the Min Min algorithm as a yardstick to the other methods. Figure 6 shows that for links with more than 10 measurement results, more than 95% of the results differs by less than 2ms from the Min Min results. Comparing all the results, we can see that FAME NO OS, is more accurate than FAME, and for 4ms accuracy it is even better than the direct median calculation. Overall, both FAME and FAME NO OS are shown to calculate the median with an extremely good quality. It should be noted that the runtime of our algorithm over 32,000,000 measurements of 677,000 edges was about 1 hour, while Min Min run for about 24 hours, and took 10 time more storage for the same measurements, on the same system (MySQL 5 database, 2x 2.66MHz Intel Xeon CPU with 1GB RAM). Next, we performed a sanity check for the delay estimation we obtained. We selected Broadwing, an ISP with a nation-wide presence in the US, which publish its network structure [16]. Out of all internal measurements of Broadwing network, we selected the 178 IP edges that we were able to perform a reverse DNS resolution for both their end points. Although, in some cases, there is inconsistency in DNS resolution and geographic location [17], we used manual examination and the DIMES router aliasing to reduce geographic mapping er-

8 8 Dima Feldman and Yuval Shavitt Fig. 6. CDF of estimation error rors 4. Then we compared the geographic distances (air-line) to the calculated link delays. Figure 7(left) shows that for most links with positive link delay 5, the estimated link delay is highly correlated to the geographic distance. The histogram in figure 7(right) demonstrates that the majority of the results are above the theoretical limit, and there are many results in a close proximity to the theoretical limit. From the layer 2 map of Broadwing [16] it is clear that in many cases the physical route is longer than the air-line distance and even than the driving distance. Thus, we conclude that our delay estimation is reasonable though a more exhaustive study is needed. We drew the measured links on the geographic map of continental US to show the connectivity of the network at the IP level. In figure 8 the line width represent the number of measurements we obtained for each link, the more data we have the wider the line. For most cases there is more than one IP level link between a pair of cites, therefore only the most measured link is observable. 5 Conclusion We have shown that FAME is efficient and accurate in calculating the median of delay measurements. We also showed that the delay measurements seem to well represent the propagation delay on the links. There are links that have negative delay results, most of them are small and represent short distance links with different router response times. Some links, exhibit consistent large negative delays, which can be explained, for example, by a different return path. For these links, traceroute measurements are not effective for delay estimation. With DIMES growing ability to measure from different vantage points, this effect might be mitigated. 4 Various GEOIP services were not useful in obtaining geographic locations of internal nodes of this network. In this and other networks large portions of the IP address space were mapped to the network HQ. 5 Obviously there is no true link with negative delay and the estimated delay does not represents the distance.

9 An Optimal Median Calculation Algorithm for Link Delays Estimation. 9 Fig. 7. Left: Estimated RTT delay vs. geographic link length. The lower diagonal line is a theoretical limit assuming maximum 100Km distance for 1ms of RTT, the upper line is twice the theoretical limit. Right: A histogram of a link delay/distance ratio, 1 stands for the theoretical limit, 2 means the link delay is twice the theoretical limit, etc. Fig. 8. A map of Broadwing named routers connections.

10 10 Dima Feldman and Yuval Shavitt References 1. Francis, P., Jamin, S., Jin, C., Jin, Y., Raz, D., Shavitt, Y., Zhang, L.: IDMaps: A global internet host distance estimation service. IEEE/ACM Transactions on Networking 9(5) (2001) Shavitt, Y., Tankel, T.: Big-Bang simulation for embedding network distances in Euclidean space. IEEE/ACM Transactions on Networking 12(6) (2004) Shavitt, Y., Tankel, T.: On the curvature of the internet and its usage for overlay construction and distance estimation. In: Infocom, Hong Kong (2004) 4. Dabek, F., Cox, R., Kaashoek, M.F., Morris, R.: Vivaldi: a decentralized network coordinate system. In: SIGCOMM. (2004) Lim, H., Hou, J.C., Choi, C.H.: Constructing internet coordinate system based on delay measurement. IEEE/ACM Transactions on Networking 13(3) (2005) Shavitt, Y., Shir, E.: DIMES: Let the internet measure itself. In: ACM SIGCOMM Computer Communication Review. Volume 35. (2005) : (Dimes) 8. : (MySQL) 9. Shavitt, Y., Sun, X., Wool, A., Yener, B.: Computing the unmeasured: An algebraic approach to internet mapping. IEEE Journal on Selected Areas in Communications 22(1) (2004) Rousseeuw, Peter J., Bassett, Gilbert W., Jr.: The remedian: A robust averaging method for large data sets. Journal of the American Statistical Association 85(409) (1990) Tukey, J.: Nonlinear (nonsuperposable) methods for smoothing data. In: Congr. Rec. EASCOM 74. (1974) Battiato, S., Cantone, D., Catalano, D., Cincotti, G., Hofri, M.: An efficient algorithm for the approximate median selection problem. In: CIAC. (2000) Datar, M., Gionis, A., Indyk, P., Motwani, R.: Maintaining stream statistics over sliding windows. SIAM J. Comput. 31(6) (2002) Manzanera, A., Richefeu, J.C.: A robust and computationally efficient motion detection algorithm based on sigma-delta background estimation. In: ICVGIP. (2004) McFarlane, N.J.B., Schofield, C.P.: Segmentation and tracking of piglets in images. Machine Vision and Applications 8(3) (1995) : (Broadwing network map) Zhang, M., Ruan, Y., Pai, V.S., Rexford, J.: How DNS misnaming distorts internet topology mapping. In: Proceedings of the 2006 Usenix Annual Technical Conference, Boston, MA, USA (2006)

AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies

AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 28 Table of Contents 1 Introduction

More information

Charm: A charming network coordinate system

Charm: A charming network coordinate system Charm: A charming network coordinate system Çağatay Demiralp December 5, 27 Abstract We present a new network coordinate system, Charm, embedding round-trip time latencies into the Euclidean space. Charm

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

A Hierarchical Approach to Internet Distance Prediction

A Hierarchical Approach to Internet Distance Prediction A Hierarchical Approach to Internet Distance Prediction Rongmei Zhang,Y.CharlieHu, Xiaojun Lin, and Sonia Fahmy 2 School of Electrical and Computer Engineering 2 Department of Computer Science Purdue University,

More information

Vivaldi: A Decentralized Network Coordinate System

Vivaldi: A Decentralized Network Coordinate System Vivaldi: A Decentralized Network Coordinate System Xintong Wang, Han Zhang EECS 589 Paper Review 1 Full Reference Authors: Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris. Title: Vivaldi: A Decentralized

More information

PinPoint: A Ground-Truth Based Approach for IP Geolocation

PinPoint: A Ground-Truth Based Approach for IP Geolocation PinPoint: A Ground-Truth Based Approach for IP Geolocation Brian Eriksson Network Mapping and Measurement Conference 2010 Paul Barford Robert Nowak Bruce Maggs Introduction Consider some resource in the

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Applying the Q n Estimator Online

Applying the Q n Estimator Online Applying the Q n Estimator Online Robin Nunkesser 1, Karen Schettlinger 2, and Roland Fried 2 1 Department of Computer Science, Univ. Dortmund, 44221 Dortmund Robin.Nunkesser@udo.edu 2 Department of Statistics,

More information

The Internet Structure

The Internet Structure DIMES DIMES Distributed Internet MEasurement and Simulation Yuval Shavitt shavitt@eng.tau.ac.il http://www.netdimes.org The Internet Structure routers 1 The Internet Structure The AS graph The Internet

More information

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates

More information

A view from inside a distributed Internet coordinate system

A view from inside a distributed Internet coordinate system A view from inside a distributed Internet coordinate system Mohamad JABER, Cao-Cuong NGO and Chadi BARAKAT EPI Planète, INRIA, France Email:{mjaber, cngo, cbarakat}@sophia.inria.fr Abstract The Vivaldi

More information

PoP Level Mapping And Peering Deals

PoP Level Mapping And Peering Deals PoP Level Mapping And Peering Deals Mapping Internet Methodology Data Collection IP Classification to PoP PoP Geolocation PoP locations on Peering estimations Outline Internet Service Providers ISPs are

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Network Maps beyond Connectivity

Network Maps beyond Connectivity Network Maps beyond Connectivity Cheng Jin Zhiheng Wang Sugih Jamin {chengjin, zhihengw, jamin}@eecs.umich.edu December 1, 24 Abstract Knowing network topology is becoming increasingly important for a

More information

Performance Comparison of TFRC and TCP

Performance Comparison of TFRC and TCP ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS FINAL PROJECT Performance Comparison of TFRC and TCP Spring 2002 Yi Zheng and Jian Wen {zyi,jwena}@cs.sfu.ca

More information

Vivaldi: : A Decentralized Network Coordinate System

Vivaldi: : A Decentralized Network Coordinate System Vivaldi: : A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Presenter: Yi-Chao Chen 1 Introduction Design Issues Idea Algorithm Evaluation Model

More information

CS321: Computer Networks Introduction to Computer Networks and Internet

CS321: Computer Networks Introduction to Computer Networks and Internet CS321: Computer Networks Introduction to Computer Networks and Internet Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in What is Data Communication? Data communications

More information

BIG-IP Global Traffic Manager : Load Balancing. Version 11.6

BIG-IP Global Traffic Manager : Load Balancing. Version 11.6 BIG-IP Global Traffic Manager : Load Balancing Version 11.6 Table of Contents Table of Contents About Global Server Load Balancing...5 Introducing the Global Traffic Manager...5 About global server load

More information

On the Utility of Inference Mechanisms

On the Utility of Inference Mechanisms On the Utility of Inference Mechanisms Ethan Blanton Sonia Fahmy Greg N. Frederickson June 23, 2009 On the Utility of Inference Mechanisms We present an algorithm for determining when and if an inference

More information

CS 532: 3D Computer Vision 11 th Set of Notes

CS 532: 3D Computer Vision 11 th Set of Notes 1 CS 532: 3D Computer Vision 11 th Set of Notes Instructor: Philippos Mordohai Webpage: www.cs.stevens.edu/~mordohai E-mail: Philippos.Mordohai@stevens.edu Office: Lieb 215 Lecture Outline Line Intersection

More information

Popularity of Twitter Accounts: PageRank on a Social Network

Popularity of Twitter Accounts: PageRank on a Social Network Popularity of Twitter Accounts: PageRank on a Social Network A.D-A December 8, 2017 1 Problem Statement Twitter is a social networking service, where users can create and interact with 140 character messages,

More information

Network Positioning from the Edge

Network Positioning from the Edge Network Positioning from the Edge An empirical study of the effectiveness of network positioning in P2P systems David R. Choffnes, Mario A. Sánchez and Fabián E. Bustamante EECS, Northwestern University

More information

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,

More information

Christos Papadopoulos

Christos Papadopoulos CS557: Measurements Christos Papadopoulos Adapted by Lorenzo De Carli Outline End-to-End Packet Dynamics - Paxon99b Wireless measurements - Aguayo04a Note: both these studies are old, so the results have

More information

Technical Report. An implementation of a coordinate based location system. David R. Spence. Number 576. November Computer Laboratory

Technical Report. An implementation of a coordinate based location system. David R. Spence. Number 576. November Computer Laboratory Technical Report UCAM-CL-TR-576 ISSN 1476-2986 Number 576 Computer Laboratory An implementation of a coordinate based location system David R. Spence November 23 15 JJ Thomson Avenue Cambridge CB3 FD United

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Record Placement Based on Data Skew Using Solid State Drives

Record Placement Based on Data Skew Using Solid State Drives Record Placement Based on Data Skew Using Solid State Drives Jun Suzuki 1, Shivaram Venkataraman 2, Sameer Agarwal 2, Michael Franklin 2, and Ion Stoica 2 1 Green Platform Research Laboratories, NEC j-suzuki@ax.jp.nec.com

More information

Vivaldi: A Decentralized Coordinate System

Vivaldi: A Decentralized Coordinate System Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer

More information

Mining Data Streams. Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction. Summarization Methods. Clustering Data Streams

Mining Data Streams. Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction. Summarization Methods. Clustering Data Streams Mining Data Streams Outline [Garofalakis, Gehrke & Rastogi 2002] Introduction Summarization Methods Clustering Data Streams Data Stream Classification Temporal Models CMPT 843, SFU, Martin Ester, 1-06

More information

Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts

Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts Y. Angela Wang 1, Cheng Huang 2, Jin Li 2, and Keith W. Ross 1 1 Polytechnic Institute of NYU, Brooklyn, NY 1121, USA 2 Microsoft Research,

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

Introduction to Ethernet Latency

Introduction to Ethernet Latency Introduction to Ethernet Latency An Explanation of Latency and Latency Measurement The primary difference in the various methods of latency measurement is the point in the software stack at which the latency

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction : A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng,XingLi Department of Electronic Engineering, Tsinghua

More information

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control Introduction Routing & Addressing: Multihoming 10/25/04 Hong Tat Tong Two attempts to control/ensure best performance over the Internet Multihoming from the endpoints Overlay with some help from middle-boxes

More information

On the Diversity, Stability and Symmetry of End-to-End Internet Routes

On the Diversity, Stability and Symmetry of End-to-End Internet Routes On the Diversity, Stability and Symmetry of End-to-End Internet Routes Yaron Schwartz School of Electrical Engineering Tel-Aviv University, Israel Yuval Shavitt School of Electrical Engineering Tel-Aviv

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

An overview on Internet Measurement Methodologies, Techniques and Tools

An overview on Internet Measurement Methodologies, Techniques and Tools An overview on Internet Measurement Methodologies, Techniques and Tools AA 2011/2012 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 2/05/2012 Part 1 Intro basic concepts ISP Traffic exchange (peering)

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

BIG-IP DNS: Load Balancing. Version 13.1

BIG-IP DNS: Load Balancing. Version 13.1 BIG-IP DNS: Load Balancing Version 13.1 Table of Contents Table of Contents About Global Server Load Balancing... 5 Introducing BIG-IP DNS...5 About global server load balancing...5 Static load balancing

More information

Bridge-Node Selection and Loss Recovery in Island Multicast

Bridge-Node Selection and Loss Recovery in Island Multicast Bridge-Node Selection and Loss Recovery in Island Multicast W.-P. Ken Yiu K.-F. Simon Wong S.-H. Gary Chan Department of Computer Science The Hong Kong University of Science and Technology Clear Water

More information

Analyzing Dshield Logs Using Fully Automatic Cross-Associations

Analyzing Dshield Logs Using Fully Automatic Cross-Associations Analyzing Dshield Logs Using Fully Automatic Cross-Associations Anh Le 1 1 Donald Bren School of Information and Computer Sciences University of California, Irvine Irvine, CA, 92697, USA anh.le@uci.edu

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

NetForecast: A Delay Prediction Scheme for Provider Controlled Networks

NetForecast: A Delay Prediction Scheme for Provider Controlled Networks NetForecast: A Delay Prediction Scheme for Provider Controlled Networks Ahmed Elmokashfi Simula Research Laboratory Oslo, Norway Email: ahmed@simula.no Michael Kleis Fraunhofer Institut FOKUS Competence

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Replicate It! Scalable Content Delivery: Why? Scalable Content Delivery: How? Scalable Content Delivery: How? Scalable Content Delivery: What?

Replicate It! Scalable Content Delivery: Why? Scalable Content Delivery: How? Scalable Content Delivery: How? Scalable Content Delivery: What? Accelerating Internet Streaming Media Delivery using Azer Bestavros and Shudong Jin Boston University http://www.cs.bu.edu/groups/wing Scalable Content Delivery: Why? Need to manage resource usage as demand

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

Geometric Exploration of the Landmark Selection Problem

Geometric Exploration of the Landmark Selection Problem Geometric Exploration of the Landmark Selection Problem Liying Tang and Mark Crovella Department of Computer Science, Boston University, Boston, MA 2215 {litang,crovella}@cs.bu.edu Abstract. Internet coordinate

More information

School of Computer and Information Science

School of Computer and Information Science School of Computer and Information Science CIS Research Placement Report Multiple threads in floating-point sort operations Name: Quang Do Date: 8/6/2012 Supervisor: Grant Wigley Abstract Despite the vast

More information

Data Preprocessing. Slides by: Shree Jaswal

Data Preprocessing. Slides by: Shree Jaswal Data Preprocessing Slides by: Shree Jaswal Topics to be covered Why Preprocessing? Data Cleaning; Data Integration; Data Reduction: Attribute subset selection, Histograms, Clustering and Sampling; Data

More information

Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute

More information

Hybrid filters for medical image reconstruction

Hybrid filters for medical image reconstruction Vol. 6(9), pp. 177-182, October, 2013 DOI: 10.5897/AJMCSR11.124 ISSN 2006-9731 2013 Academic Journals http://www.academicjournals.org/ajmcsr African Journal of Mathematics and Computer Science Research

More information

Building Large-scale Distributed Systems with Network Coordinates

Building Large-scale Distributed Systems with Network Coordinates Distributed Software Engineering (DSE) Group Department of Computing Building Large-scale Distributed Systems with Network Coordinates Peter Pietzuch prp@doc.ic.ac.uk Distributed Software Engineering (DSE)

More information

Preprocessing Short Lecture Notes cse352. Professor Anita Wasilewska

Preprocessing Short Lecture Notes cse352. Professor Anita Wasilewska Preprocessing Short Lecture Notes cse352 Professor Anita Wasilewska Data Preprocessing Why preprocess the data? Data cleaning Data integration and transformation Data reduction Discretization and concept

More information

Network Delay Model for Overlay Network Application

Network Delay Model for Overlay Network Application , 2009, 5, 400-406 doi:10.4236/ijcns.2009.25045 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Network Delay Model for Overlay Network Application Tian JIN, Haiyan JIN School of Electronics

More information

Spatial Outlier Detection

Spatial Outlier Detection Spatial Outlier Detection Chang-Tien Lu Department of Computer Science Northern Virginia Center Virginia Tech Joint work with Dechang Chen, Yufeng Kou, Jiang Zhao 1 Spatial Outlier A spatial data point

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu

More information

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Stanley Bak Abstract Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid

More information

Data Mining Chapter 3: Visualizing and Exploring Data Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University

Data Mining Chapter 3: Visualizing and Exploring Data Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University Data Mining Chapter 3: Visualizing and Exploring Data Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University Exploratory data analysis tasks Examine the data, in search of structures

More information

Efficient Counting of Network Motifs

Efficient Counting of Network Motifs Efficient Counting of Network Motifs Dror Marcus School of Computer Science Tel-Aviv University, Israel Email: drormarc@post.tau.ac.il Yuval Shavitt School of Electrical Engineering Tel-Aviv University,

More information

Detecting Behavior Propagation in BGP Trace Data Brian J. Premore Michael Liljenstam David Nicol

Detecting Behavior Propagation in BGP Trace Data Brian J. Premore Michael Liljenstam David Nicol Detecting Behavior Propagation in BGP Trace Data Brian J. Premore Michael Liljenstam David Nicol Institute for Security Technology Studies, Dartmouth College 1 Motivation Is there a causal connection between

More information

Algorithms in Systems Engineering ISE 172. Lecture 12. Dr. Ted Ralphs

Algorithms in Systems Engineering ISE 172. Lecture 12. Dr. Ted Ralphs Algorithms in Systems Engineering ISE 172 Lecture 12 Dr. Ted Ralphs ISE 172 Lecture 12 1 References for Today s Lecture Required reading Chapter 6 References CLRS Chapter 7 D.E. Knuth, The Art of Computer

More information

A Study on PoP Level Mapping

A Study on PoP Level Mapping A Study on PoP Level Mapping Outline qnetwork Mapping qevaluation of Internet qthe reasons for Mapping Internet qinternet Mapping Levels qrelated Works qconclusion Network Mapping ARPANET 1969 ARPANET

More information

CSE 5243 INTRO. TO DATA MINING

CSE 5243 INTRO. TO DATA MINING CSE 5243 INTRO. TO DATA MINING Cluster Analysis: Basic Concepts and Methods Huan Sun, CSE@The Ohio State University Slides adapted from UIUC CS412, Fall 2017, by Prof. Jiawei Han 2 Chapter 10. Cluster

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

TCP Spatial-Temporal Measurement and Analysis

TCP Spatial-Temporal Measurement and Analysis TCP Spatial-Temporal Measurement and Analysis Infocom 05 E. Brosh Distributed Network Analysis (DNA) Group Columbia University G. Lubetzky-Sharon, Y. Shavitt Tel-Aviv University 1 Overview Inferring network

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

Lecture 5: Data Streaming Algorithms

Lecture 5: Data Streaming Algorithms Great Ideas in Theoretical Computer Science Summer 2013 Lecture 5: Data Streaming Algorithms Lecturer: Kurt Mehlhorn & He Sun In the data stream scenario, the input arrive rapidly in an arbitrary order,

More information

Science foundation under Grant No , DARPA award N , TCS Inc., and DIMI matching fund DIM

Science foundation under Grant No , DARPA award N , TCS Inc., and DIMI matching fund DIM A Simple Conceptual Model for the Internet Topology Sudhir L. Tauro Christopher Palmer Georgos Siganos Michalis Faloutsos U.C. Riverside C.M.U. U.C.Riverside U.C.Riverside Dept. of Comp. Science Dept.

More information

Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases

Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases Mohammad Kolahdouzan and Cyrus Shahabi Department of Computer Science University of Southern California Los Angeles, CA, 90089, USA

More information

The Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm

The Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm 01 International Conference on Image, Vision and Computing (ICIVC 01) IPCSI vol. 50 (01) (01) IACSI Press, Singapore DOI: 10.7763/IPCSI.01.V50.56 he Improved Embedded Zerotree Wavelet Coding () Algorithm

More information

BGP Routing: A study at Large Time Scale

BGP Routing: A study at Large Time Scale BGP Routing: A study at Large Time Scale Georgos Siganos U.C. Riverside Dept. of Comp. Science siganos@cs.ucr.edu Michalis Faloutsos U.C. Riverside Dept. of Comp. Science michalis@cs.ucr.edu Abstract In

More information

Clustering. (Part 2)

Clustering. (Part 2) Clustering (Part 2) 1 k-means clustering 2 General Observations on k-means clustering In essence, k-means clustering aims at minimizing cluster variance. It is typically used in Euclidean spaces and works

More information

packet-switched networks. For example, multimedia applications which process

packet-switched networks. For example, multimedia applications which process Chapter 1 Introduction There are applications which require distributed clock synchronization over packet-switched networks. For example, multimedia applications which process time-sensitive information

More information

Predicting connection quality in peer-to-peer real-time video streaming systems

Predicting connection quality in peer-to-peer real-time video streaming systems Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

A Finite State Mobile Agent Computation Model

A Finite State Mobile Agent Computation Model A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,

More information

Data Preprocessing. Why Data Preprocessing? MIT-652 Data Mining Applications. Chapter 3: Data Preprocessing. Multi-Dimensional Measure of Data Quality

Data Preprocessing. Why Data Preprocessing? MIT-652 Data Mining Applications. Chapter 3: Data Preprocessing. Multi-Dimensional Measure of Data Quality Why Data Preprocessing? Data in the real world is dirty incomplete: lacking attribute values, lacking certain attributes of interest, or containing only aggregate data e.g., occupation = noisy: containing

More information

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously.

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously. EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication

More information

Computational Geometry

Computational Geometry for map overlay Lecture 2: for map overlay 1 Map layers Map overlay In a geographic information system (GIS) data is stored in separate layers A layer stores the geometric information about some theme,

More information

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

Machine Learning for Pre-emptive Identification of Performance Problems in UNIX Servers Helen Cunningham

Machine Learning for Pre-emptive Identification of Performance Problems in UNIX Servers Helen Cunningham Final Report for cs229: Machine Learning for Pre-emptive Identification of Performance Problems in UNIX Servers Helen Cunningham Abstract. The goal of this work is to use machine learning to understand

More information

Bluetooth Time Division Duplex - Exact Analysis as a Polling System

Bluetooth Time Division Duplex - Exact Analysis as a Polling System CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Yang Chen,PengSun 2, Xiaoming Fu, Tianyin Xu,3 Institute of Computer Science, University of Goettingen, Germany 2

More information

Random Walk Distributed Dual Averaging Method For Decentralized Consensus Optimization

Random Walk Distributed Dual Averaging Method For Decentralized Consensus Optimization Random Walk Distributed Dual Averaging Method For Decentralized Consensus Optimization Cun Mu, Asim Kadav, Erik Kruus, Donald Goldfarb, Martin Renqiang Min Machine Learning Group, NEC Laboratories America

More information

STA Rev. F Learning Objectives. Learning Objectives (Cont.) Module 3 Descriptive Measures

STA Rev. F Learning Objectives. Learning Objectives (Cont.) Module 3 Descriptive Measures STA 2023 Module 3 Descriptive Measures Learning Objectives Upon completing this module, you should be able to: 1. Explain the purpose of a measure of center. 2. Obtain and interpret the mean, median, and

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction In a packet-switched network, packets are buffered when they cannot be processed or transmitted at the rate they arrive. There are three main reasons that a router, with generic

More information

BGP Route Flap Damping Algorithms

BGP Route Flap Damping Algorithms BGP Route Flap Damping Algorithms Wei Shen and Ljiljana Trajković * Simon Fraser University Vancouver, British Columbia, Canada {wshen, ljilja}@cs.sfu.ca Keywords: Routing protocols, BGP, route flap damping,

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

STA Module 2B Organizing Data and Comparing Distributions (Part II)

STA Module 2B Organizing Data and Comparing Distributions (Part II) STA 2023 Module 2B Organizing Data and Comparing Distributions (Part II) Learning Objectives Upon completing this module, you should be able to 1 Explain the purpose of a measure of center 2 Obtain and

More information

STA Learning Objectives. Learning Objectives (cont.) Module 2B Organizing Data and Comparing Distributions (Part II)

STA Learning Objectives. Learning Objectives (cont.) Module 2B Organizing Data and Comparing Distributions (Part II) STA 2023 Module 2B Organizing Data and Comparing Distributions (Part II) Learning Objectives Upon completing this module, you should be able to 1 Explain the purpose of a measure of center 2 Obtain and

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 4

CPSC 536N: Randomized Algorithms Term 2. Lecture 4 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 4 University of British Columbia In today s lecture we will see two applications of negative binomially distributed random variables.

More information

Correctness. The Powercrust Algorithm for Surface Reconstruction. Correctness. Correctness. Delaunay Triangulation. Tools - Voronoi Diagram

Correctness. The Powercrust Algorithm for Surface Reconstruction. Correctness. Correctness. Delaunay Triangulation. Tools - Voronoi Diagram Correctness The Powercrust Algorithm for Surface Reconstruction Nina Amenta Sunghee Choi Ravi Kolluri University of Texas at Austin Boundary of a solid Close to original surface Homeomorphic to original

More information

Switching CHAPTER 8. Solutions to Review Questions and Exercises. Review Questions

Switching CHAPTER 8. Solutions to Review Questions and Exercises. Review Questions CHAPTER 8 Switching Solutions to Review Questions and Exercises Review Questions 1. Switching provides a practical solution to the problem of connecting multiple devices in a network. It is more practical

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information