CS644 Advanced Networks

Size: px
Start display at page:

Download "CS644 Advanced Networks"

Transcription

1 Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot provide service differetiatio amog traffic aggregates Early efforts Teet group at Berkeley ATM IETF efforts Itegrated services iitiative Differetiated services iitiative Sprig Sprig So, what is required? Flow differetiatio Simple FIFO schedulig will ot work! Admissio cotrol Resource reservatio Flow specificatio Itegrated Services Iteret Ehace IP s service model Old model: sigle best-effort service class New model: multiple service classes, icludig best-effort ad QoS classes Create protocols ad algorithms to support ew service models Old model: o resource maagemet at IP level New model: explicit resource maagemet at IP level Key architecture differece Old model: stateless New model: per flow state maitaied at routers used for admissio cotrol ad schedulig set up by sigalig protocol Sprig Sprig

2 Itegrated Services Example Itegrated Services Example Achieve per-flow badwidth ad delay guaratees Example: guaratee 1MBps ad < 100 ms delay to a flow Receiver Seder Allocate resources - perform per-flow admissio cotrol Receiver Seder Sprig Sprig Itegrated Services Example Itegrated Services Example Seder Istall per-flow state Receiver Seder Istall per flow state Receiver Sprig Sprig

3 Itegrated Services Example: Data Path Per-flow classificatio Receiver Seder Itegrated Services Example: Data Path Seder Per-flow buffer maagemet Receiver Sprig Sprig Itegrated Services Example Per-flow schedulig How Thigs Fit Together Seder Receiver Routig Messages Routig RSVP Admissio Cotrol Cotrol Plae RSVP messages Data I Forwardig Table Route Lookup Per Flow QoS Table Classifier Scheduler Data Plae Data Out Sprig Sprig

4 Service Classes Service ca be viewed as a cotract betwee etwork ad commuicatio cliet ed-to-ed service other service scopes possible Three commo services best-effort ( elastic applicatios) hard real-time ( real-time applicatios) soft real-time ( tolerat applicatios) Hard Real Time: Guarateed Services Service cotract etwork to cliet: guaratee a determiistic upper boud o delay for each packet i a sessio cliet to etwork: the sessio does ot sed more tha it specifies Algorithm support admissio cotrol based o worst-case aalysis per flow classificatio/schedulig at routers Sprig Sprig Soft Real Time: Cotrolled Load Service Service cotract: etwork to cliet: similar performace as a uloaded besteffort etwork cliet to etwork: the sessio does ot sed more tha it specifies Algorithm Support admissio cotrol based o measuremet of aggregates schedulig for aggregate possible Role of RSVP i the Architecture Sigalig protocol for establishig per flow state Carry resource requests from hosts to routers Collect eeded iformatio from routers to hosts At each hop cosults admissio cotrol ad policy module sets up admissio state or iforms the requester of the failure Sprig RSVP Usage ad Related Issues 16

5 What is still Missig? Classificatio algorithm Schedulig algorithm Admissio cotrol algorithm QoS Routig algorithm Why did ItServ fail? Ecoomic factors Deploymet cost vs Beefit Is reservatio, the right approach? Multicast cetric view Is per-flow state maiteace a issue? What about QoS i geeral? Sprig Sprig What is the Problem? Goal: provide support for wide variety of applicatios: Iteractive TV, IP telephoy, o-lie gammig (distributed simulatios), VPNs, etc Problem: Best-effort caot do it (see previous lecture) Itserv ca support all these applicatios, but Too complex Not scalable Differetiated Services (Diffserv) Build aroud the cocept of domai Domai a cotiguous regio of etwork uder the same admiistrative owership Differetiate betwee edge ad core routers Edge routers Perform per aggregate shapig or policig Mark packets with a small umber of bits; each bit ecodig represets a class (subclass) Core routers Process packets based o packet markig Far more scalable tha Itserv, but provides weaker services Sprig Sprig

6 Diffserv Architecture Differetiated Service (DS) Field Igress routers Police/shape traffic Set Differetiated Service Code Poit (DSCP) i Diffserv (DS) field Core routers Implemet Per Hop Behavior (PHB) for each DSCP Process packets based o DSCP Igress DS-1 Egress Igress DS-2 Egress DS Filed Versio HLe TOS Legth Idetificatio Flags Fragmet offset TTL Protocol Header checksum Source address Destiatio address Data IP header Edge router Core router Sprig DS filed reuse the first 6 bits from the former Type of Service (TOS) byte The other two bits are proposed to be used by ECN Sprig Differetiated Services Two types of service Assured service Premium service Plus, best-effort service Assured Service [Clark & Wroclawski 97] Defied i terms of user profile, how much assured traffic is a user allowed to iject ito the etwork Network: provides a lower loss rate tha best-effort I case of cogestio best-effort packets are dropped first User: seds o more assured traffic tha its profile If it seds more, the excess traffic is coverted to besteffort Sprig Sprig

7 Assured Service Large spatial graularity service Theoretically, user profile is defied irrespective of destiatio All other services we leart are ed-to-ed, i.e., we kow destiatio(s) apriori This makes service very useful, but hard to provisio (why?) Traffic profile Igress Premium Service [Jacobso 97] Provides the abstractio of a virtual pipe betwee a igress ad a egress router Network: guaratees that premium packets are ot dropped ad they experiece low delay User: does ot sed more tha the size of the pipe If it seds more, excess traffic is delayed, ad dropped whe buffer overflows Sprig Sprig Cotrol Path Each domai is assiged a Badwidth Broker (BB) Usually, used to perform igress-egress badwidth allocatio BB is resposible to perform admissio cotrol i the etire domai BB ot easy to implemet Require complete kowledge about domai Sigle poit of failure, may be performace bottleeck Desigig BB still a research problem Example Achieve ed-to-ed badwidth guaratee seder 1 9 BB BB 5 BB 8 profile 6 profile 4 profile receiver Sprig Sprig

8 Compariso to Best-Effort ad Itserv Service Service scope Complexity Scalability Best-Effort Coectivity No isolatio No guaratees Ed-to-ed No setup Highly scalable (odes maitai oly routig state) Diffserv Per aggregate isolatio Per aggregate guaratee Domai Log term setup Scalable (edge routers maitais per aggregate state; core routers per class state) Itserv Per flow isolatio Per flow guaratee Ed-to-ed Per flow steup Not scalable (each router maitais per flow state) Summary Diffserv more scalable tha Itserv Edge routers maitai per aggregate state Core routers maitai state oly for a few traffic classes But, provides weaker services tha Itserv, e.g., Per aggregate badwidth guaratees (premium service) vs. per flow badwidth ad delay guaratees BB is ot a etirely solved problem Sigle poit of failure Hadle oly log term reservatios (hours, days) Sprig Sprig What is the Problem? Iteret has limited resources ad maagemet capabilities Proe to cogestio, ad deial of service Caot provide guaratees Existig solutios Stateless scalable ad robust, but weak etwork services Stateful powerful services, but much less scalable ad robust Stateless vs. Stateful Solutios Stateless solutios routers maitai o fie graied state about traffic + scalable, robust - weak services Stateful solutios routers maitai per-flow state + powerful services guarateed services + high resource utilizatio fie graied differetiatio Protectio - much less scalable ad robust Sprig Sprig

9 Existig Solutios QoS Network support for cogestio cotrol Teet [Ferrari & Verma 89] Itserv [Clark et al 91] ATM [late 80s] Stateful Roud Robi [Nagle 85] Fair Queueig [Demers et al 89] Flow Radom Early Drop (FRED) [Li & Morris 97] Diffserv - [Clark & DecBit [Ramkrisha & Jai 88] Stateless Wroclawski 97] - [Nichols et al 97] Radom Early Detectio (RED) [Floyd & Jacobso 93] BLUE [Feg et al 99] Questio Ca we achieve the best of two worlds, i.e., provide services implemeted by stateful etworks while maitaiig advatages of stateless architectures? Sprig Sprig Scalable Core (SCORE) A trusted ad cotiguous regio of etwork i which edge odes perform per flow maagemet core odes do ot perform per flow maagemet The Approach 1. Defie a referece stateful etwork that implemets the desired service 2. Emulate the fuctioality of the referece etwork i a SCORE etwork edge odes core odes edge odes Referece Stateful Network SCORE Network Sprig Sprig

10 The Idea Istead of havig core routers maitaiig per-flow state have packets carry per-flow state The Techique: Dyamic Packet State (DPS) Igress ode: compute ad isert flow state i packet s header Referece Stateful Network SCORE Network Sprig Sprig The Techique: Dyamic Packet State (DPS) Igress ode: compute ad isert flow state i packet s header The Techique: Dyamic Packet State (DPS) Core ode: process packet based o state it carries ad ode s state update both packet ad ode s state Sprig Sprig

11 The Techique: Dyamic Packet State (DPS) Egress ode: remove state from packet s header Why Guarateed Service Example? Illustrate power ad flexibility of our solutio guarateed service - strogest sematic service proposed i cotext of stateful etworks best-effort cogestio cotrol support differetiated services statistical services guarateed services worse service quality better Sprig Sprig Example: Guarateed Services Goal: provide per-flow delay ad badwidth guaratees How: emulate ideal model i which each flow traverses dedicated liks of capacity r Guarateed Services Defie referece etwork to implemet service cotrol path: per-flow admissio cotrol, reserve capacity r o each lik data path: eforce ideal model, by usig Jitter Virtual Clock (Jitter-VC) scheduler flow (reservatio = r ) r r r Jitter-VC Jitter-VC Jitter-VC Jitter-VC Jitter-VC Jitter-VC Jitter-VC Per-hop packet service time = (packet legth) / r Sprig Referece Stateful Network Sprig

12 Guarateed Services Use DPS to elimiate per-flow state i core cotrol path: emulate per-flow admissio cotrol data path: emulate Jitter-VC by Core-Jitter Virtual Clock (CJVC) Data Path Ideal Model Jitter-VC Jitter-VC Jitter-VC Jitter-VC CJVC CJVC CJVC Stateful solutio: Jitter Virtual Clock Jitter-VC Jitter-VC Jitter-VC CJVC CJVC Stateless solutio: Core-Jitter Virtual Clock Referece Stateful Network CJVC SCORE Network Sprig Sprig Ideal Model: Example legth(p1) / r p1 arrival p2 arrival legth(p2) / r packet arrival time packet trasmissio time (service) i ideal model Sprig time Stateful Solutio: Jitter Virtual Clock (Jitter-VC) With each packet associate eligible time start time of servig packet i ideal model deadlie fiish time of servig packet i ideal model eligible times deadlies Sprig time

13 Jitter-VC Algorithm: schedule eligible packets i icreasig order of their deadlies Property: guaratees that all packets meet their deadlies deadlies Jitter-VC: Eligible Time Computatio Miimum betwee arrival time deadlie at previous ode + propagatio delay deadlie of previous packet eligible time = arrival time eligible times Sprig time eligible time = packet deadlie at previous ode Sprig time Jitter-VC: Eligible Time Computatio Miimum betwee arrival time deadlie at previous ode + propagatio delay deadlie of previous packet eligible time = arrival time Stateless Solutio: Core-Jitter Virtual Clock (CJVC) Goal: elimiate per-flow state elimiate depedecy o previous packet deadlie eligible time = packet deadlie at prev. ode eligible time = prev. packet deadlie usig previous packet s Sprig 2004 deadlie Ë per flow state51time Sprig time

14 Core-Jitter Virtual Clock (CJVC) Solutio: make eligible time greater or equal to previous packet deadlie Sprig time Core-Jitter Virtual Clock (CJVC) How: associate to each packet a slack variable s Delay eligible time at each ode by s eligible time = packet deadlie at prev. ode + s Sprig s time CJVC Properties Theorem: CJVC ad Jitter-VC provide the same edto-ed delay bouds s ca be computed at igress: depeds o curret ad previous packet eligible times (e ad e p ) curret ad previous packet legths (l p ad l) slack variable associated to previous packet (s p ) flow reservatio (r) umber of hops (h) computed at admissio time s = max 0, s p l + p l e + r p e + l h 1 / r Sprig p CJVC Algorithm Each packet carries i its header three variable slack variable s (computed ad iserted by igress) flow s reserved rate r (iserted by igress) ahead of schedule a (iserted by previous ode) Eligible time = arrival time + a + s Deadlie = eligible time + (packet legth) / r NOTE: usig a istead of the deadlie at previous ode Ë o eed for sychroized clocks Sprig

15 Jitter-VC: Core Router CJVC: Core Router Data path Per-flow classificatio Per-flow buffer maagemet Per-flow schedulig Cotrol path istall ad maitai per-flow state for data ad cotrol paths Classifier Per flowl State flow 1 flow 2 flow Buffer maagemet Scheduler Data path Per-flow classificatio Per-flow buffer maagemet Per-packet schedulig Cotrol path Istall ad maitai per-flow state for data ad cotrol paths Cotrol State Buffer maagemet Scheduler Sprig Sprig Cotrol Path: Admissio Cotrol Goal: reserve resources (badwidth) for each flow alog its path Approach: light-weight protocol that does ot require core odes to maitai per-flow state yes yes yes yes Per-hop Admissio Cotrol A ode admits a reservatio r, if C output lik capacity R = r i r C R i R aggregate reservatio: Need: maitai aggregate reservatio R Problem: it requires per flow state to hadle partial reservatio failures ad message loss Sprig Sprig

16 Solutio 1. Estimate aggregate reservatio R est 2. Accout for approximatios ad compute a upper boud R boud, i.e., R boud >= R 3. Use R boud, istead of R, to perform admissio cotrol, i.e., admit a reservatio r if r C R boud Estimatig Aggregate Reservatio (R est ) Observatio: If all flows were sedig at their reserved rates, computig R est is trivial: just measure the traffic throughput, e.g., R est = i S ( a, a+ T ) legth( i) T where S(a, a+t) cotais all packets of all flows received durig [a, a+t) R est 5 Mbps r = 1 2 Mbps r = 2 3Mbps Sprig Sprig Virtual Legth Problem: What if flows do ot sed at their reserved rates? Virtual Legth Problem: What if flows do ot sed at their reserved rates? Solutio: associate to each packet a virtual legth such that if legths of all packets of a flow were equal to their virtual legths, the flow seds at its reserved rate The, use virtual legths istead of actual packet legths to compute R est Sprig Sprig

17 Virtual Legth Defiitio: virtuallegth = r ( crt _ time prev _ time) r flow reserved rate crt_time trasmissio time of curret packet prev_time trasmissio time of previous packet Example: assume a flow with reservatio r = 1 Mbps sedig 1000 bit packets 1.9 ms 1.3 ms 1.2 ms legth Sprig virtual legth Estimatig Aggregate Reservatio (R est ) Use Dyamic Packet State (DPS) Igress ode: upo each packet departure computes the virtual legth ad iserts it i the packet header Core ode: Estimate R est o each output lik as R est = i S ( a, a+ T ) virtuallegth( i) T where S(a, a+t) cotais of all packets of all flows received durig [a, a+t) Sprig Aggregate Reservatio Estimatio: Discussio Core Router The estimatio algorithm is robust i presece of cotrol message loss ad duplicatio their effect is forgotte after oe estimatio iterval If o packet of a flow departs durig a predefied iterval (i.e., maximum iterdeparture time), igress ode geerates a dummy packet Utilizatio <= 1 f, where f = (max. iter-departure time) / (estimatio it.) e.g.: max. iter-departure time = 5s; estimatio it. = 30s Ë utilizatio <= 0.83 Sprig Data path Per-flow classificatio Per-flow buffer maagemet Per-packet schedulig Cotrol path Istall ad maitai per flow state for data ad cotrol paths Cotrol State Buffer maagemet Scheduler Sprig

18 Core Router Data path Per-flow classificatio Per-flow buffer maagemet Per-packet schedulig Cotrol path Istall ad maitai per flow state for data ad cotrol paths Cotrol State Buffer maagemet Scheduler o eed to maitai cosistecy of per-flow state Implemetatio: State Ecodig Problem: Where to isert the state? Possible solutios: betwee lik layer ad etwork layer headers as a IP optio (IP optio 23 allocated by IANA) fid room i IP header Sprig Sprig Implemetatio: State Ecodig Curret solutio 4 bits i DS field (belog to former TOS) 13 bits by reusig fragmet offset Ecodig techiques Take advatage of implicit depedecies betwee state values Temporal multiplexig: use oe field to ecode two states, if these states do ot eed to be simultaeously preseted i each packet Implemetatio FreeBSD Petium II 400 MHz ZNYX etwork cards 10/100 Mbps Etheret Fully implemets cotrol ad data path fuctioalities Maagemet ad moitorig ifrastructure Sprig Sprig

19 Moitorig Ifrastructure Light weight mechaism that allows cotiuous moitorig at packet level Implemetatio Record each packet (28 bytes) IP header ad port umbers arrival, departure or drop times Use raw IP to sed this iformatio to a moitorig site A Simple Experimet Three flows sharig a 10 Mbps lik Flow 1: 1 Mbps reservatio Flow 2: 3 Mbps reservatio with ON/OFF traffic Flow 3: best-effort UDP sedig at > 8 Mbps Moitorig machie aruba (igress) cozumel (core) Sprig Sprig Aggregate Reservatio Computatio 0.5 Mbps reservatio active durig etire iterval 0.5 Mbps reservatio startig at 18 sec; edig at 39 sec 1.2 Rate (Mbps) accept reservatio (0.5 Mbps) termiate reservatio (0.5 Mbps) Aggregate Time (sec) 35 Sprig 45 Sprig Rboud R

20 Coclusios SCORE ad DPS bridge the gap betwee stateless ad stateful solutios Key ideas Istead of core routers maitai per-flow state have packets carry this state Use state to coordiate edge ad core router actios Coclusios (cot d) SCORE architecture ca provide: Service guaratees Network support for cogestio cotrol Service differetiatio DPS compatible with Diffserv: ca greatly ehace the fuctioality while requirig miimal chages Referece Stateful Network SCORE Network Sprig Sprig

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Traffic Models and QoS

Traffic Models and QoS Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright

More information

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

EE 122: Differentiated Services

EE 122: Differentiated Services What is the Problem? EE 122: Differentiated Services Ion Stoica Nov 18, 2002 Goal: provide support for wide variety of applications: - Interactive TV, IP telephony, on-line gamming (distributed simulations),

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

QoS Services with Dynamic Packet State

QoS Services with Dynamic Packet State QoS Services with Dynamic Packet State Ion Stoica Carnegie Mellon University (joint work with Hui Zhang and Scott Shenker) Today s Internet Service: best-effort datagram delivery Architecture: stateless

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d) Problems with IntServ EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service

Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service Cogestio Cotrol Overview Queueig Disciplies TCP Cogestio Cotrol Cogestio Avoidace Mechaisms Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Today s Topic: Vacatios Sa Fracisco Moterey

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW. Prof. Yanjing Li University of Chicago

CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW. Prof. Yanjing Li University of Chicago CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW Prof. Yajig Li Uiversity of Chicago Admiistrative Stuff Lab2 due toight Exam I: covers lectures 1-9 Ope book, ope otes, close device

More information

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Goals of the Lecture UML Implementation Diagrams

Goals of the Lecture UML Implementation Diagrams Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

TCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1

TCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1 TCP Iterals Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 TCP Usage Model Coectio setup 3-way hadshake Data trasport Seder writes data TCP Breaks data ito segmets Seds each segmet over IP Retrasmits,

More information

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

Unwanted Traffic: Denial of Service Attacks

Unwanted Traffic: Denial of Service Attacks CS 155 Uwated Traffic: Deial of Service Attacks Da Boeh 1 What is etwork DoS? Goal: take out a large site with little computig work How: Amplificatio Small umber of packets big effect Two types of amplificatio

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Priority Queuing Technique Promoting Deadline Sensitive Data Transfers in Router based Heterogeneous Networks

Priority Queuing Technique Promoting Deadline Sensitive Data Transfers in Router based Heterogeneous Networks Priority Queuig Techique Promotig Deadlie Sesitive Data Trasfers i Router based Heterogeeous Networks Jyothish K Joh 1 ad R.V.Siva Bala 2 1 Research Scholar at Noorul Islam Uiversity, Tamil Nadu, Idia.

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

TU Dortmund Chair Computer Science 3. BeeJamA. Honey Bee Inspired Traffic Jam Avoidance

TU Dortmund Chair Computer Science 3. BeeJamA. Honey Bee Inspired Traffic Jam Avoidance TU Dortmud Chair Computer Sciece 3 Operatig Systems & System Architecture BeeJamA Hoey Bee pired Traffic Jam Avoidace Highly Dyamic ad Adaptive Traffic Cogestio Avoidace i Real-Time pired by Hoey Bee Behavior

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

EECS 122, Lecture 24 Introduction to the Telephone Network. Kevin Fall Jean Walrand

EECS 122, Lecture 24 Introduction to the Telephone Network. Kevin Fall Jean Walrand EECS 122, Lecture 24 Itroductio to the Telephoe Network Kevi Fall kfall@cs.berkeley.edu Jea Walrad wlr@eecs.berkeley.edu Outlie Overview Cocepts Recet History Structure Hierarchical Addressig Ed Systems

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

Next generation IP- based multimedia services on cable TV networks

Next generation IP- based multimedia services on cable TV networks Iteratioal Telecommuicatio Uio Next geeratio IP- based multimedia services o cable TV etworks Volker Leisse ECCA Pre - coferece draft ITU-T Workshop All Star Network Access Geeva, 2-4 Jue 2004 Outlie o

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2002 Lecture 10: Quality of Service Stefan Savage Today s class: Quality of Service What s wrong with Best Effort service? What kinds of service do applications

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Information Network 1 Transport layer: TCP. Youki Kadobayashi Doudou Fall NAIST

Information Network 1 Transport layer: TCP. Youki Kadobayashi Doudou Fall NAIST Iformatio Network 1 Trasport layer: TCP Youki Kadobayashi Doudou Fall NAIST Trasport layer: a birds-eye view Hosts maitai state for each trasport-layer edpoit Routers do t maitai per-host state H R R R

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

An upper bound model for TCP and UDP throughput in IPv4 and IPv6

An upper bound model for TCP and UDP throughput in IPv4 and IPv6 ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

THE deployment of router-based IP multicast has been

THE deployment of router-based IP multicast has been 88 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 ACOM: Ay-Source Capacity-Costraied Overlay Multicast i No-DHT P2P Networks Shipig Che, Baile Shi, Shigag Che, ad

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 20 Itroductio to Trasactio Processig Cocepts ad Theory Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Trasactio Describes local

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Windows Server 2008 R2 networking

Windows Server 2008 R2 networking Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced

More information

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks IPv6 Autocofiguratio i Large Scale Mobile Ad-Hoc Networks Kilia Weiger, Martia Zitterbart Istitute of Telematics Uiversity of Karlsruhe, 768 Karlsruhe, Germay Ph:++9 7 608-{65/600}, Email: {weiger,zit}@tm.uka.de

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information