Simulation of Reliability in Multi-server Computer Networks

Size: px
Start display at page:

Download "Simulation of Reliability in Multi-server Computer Networks"

Transcription

1 Simulation of Reliability in Multi-server Computer Networks SAULIUS MINKEVIČIUS, VU Institute of Mathematics Informatics, Akademijos 4, Vilnius, Lithuania Vilnius University Mathematics Informatics faculty, Naugarduko 24, LT Vilnius, LITHUANIA Abstract: -The performance in terms of reliability of multi-server computer networks motivates this paper. The probability limit theorem is derived on the virtual waiting time of job in nodes in a multi-server open queueing network applied to a reliability model for multi-server computer networks we relate the time of failure of a multi-server computer network to the system parameters. Key-Words: - Performance evaluation, reliability theory, queuing theory, mathematical models of technical systems, multi-server open queuing network, heavy traffic, the probability limit theorem, a virtual waiting time of job in nodes in a multi-server open queuing network. 1 Introduction Probabilistic models queuing networks have long been used to study the performance reliability of computer systems [4, 5] to analyse the performance reliability of computer networks of distributed information systems [6, 7]. In this paper, we will first review the works related to using the queuing theory of computer systems reliability, then present some new results on the estimation of the time of failure of a computer network. In one of the first papers of this kind [20], an an efficient algorithm was investigated for the reliability of a circular consecutive-k-out-of-n system. The author in paper [10] considers network topological optimization with a reliability constraint. In [9] the classical twoterminal reliability is extended for a wireless computer network. Papers [13, 1] investigated the reliability of distributed systems computer networks in which computing nodes communication links may fail with certain probabilities. In [12] limit theorems on the extreme queue length extreme virtual waiting time in open queuing networks in heavy traffic are derived applied to a reliability model for computer networks. In [18, 19], the primitives, concepts, terminology, fundamental ideas of service reliability theory engineering were developed. Also, the purpose of these papers is to describe some mathematical models useful for service reliability engineering to illustrate the use of these ideas by some examples. Paper [3] investigated heavy traffic asymptotics for systems with unreliable servers. In this paper, we present the probability limit theorem on the virtual waiting time of job in nodes of a multi-server open queuing network in heavy traffic conditions. 2 The Network Model Consider a network of stations, indexed by The station has servers, indexed by. A description of the primitive data construction of processes of interest are the focus of this section. No probability space will be mentioned in this section, of course, one can always think that all the variables processes are defined on the same probability space. First, are sequences of exogenous interarrival times, is the interarrival time between the job the st job which arrive at the station j exogenously (from the outside of the network). Define is called the exogenous arrival process of the station j, i.e., counts the number of jobs that arrived at the station from the outside of the network. ISBN:

2 Second, are service times, sequences of is the service time for the th customer served by the server of the station Define is called a service process for the server at the station, i.e., counts the number of services completed by the server at the station during the server s busy time. We note with all of these terms assumed finite. In addition, let be the total number of jobs routed to the th station of the network in the interval be the total number of jobs after service departure from the th station of the network in the interval be the total number of jobs routed to the server of the th station of the network in the interval let be the total number of customers after service departure from the server of the th station of the network in the interval be the total number of jobs after service departure from the server of the th station of the network routed to the server of the th station of the network in the interval Let be a probability of the job after service at the th station of the network routed to the th station of the network. Denote as part of the total number of jobs which, after service at the server of the th station of the network, are routed to the server of the th station of the network in the interval Also let as the total amount of time that a server at the station is busy in the interval Now we introduce the following processes, indicates the number of jobs (queue of length) waiting to be served by the server of the station at time Now we introduce the following processes, indicates the virtual waiting time of job (workload process) in server of the station at time ; The dynamics of the queuing system (to be specified) depends on the service discipline at each service station. To be more precise, first come, first served (FCFS) service discipline is assumed for all stations. When a customer arrives at a station finds more than one server available, it will join one of the servers with the smallest index. We assume that the service station is work conserving; namely, not all servers at a station can be idle when there are customers waiting for service at that station. In particular, we assume that a station must serve at its full capacity when the number of jobs waiting is equal to or exceeds the number of servers at that station. 3 The Main Results Now we present probability limit theorem for the virtual waiting time of job in nodes of a multi-server open queuing network. Similarly as in [11], let us investigate multi-server open queuing networks in a series: are independent identically distributed rom variables in the th network;. Also, we define Let us denote We will also assume that the following overload conditions" are fulfilled. (1) ISBN:

3 Note that these conditions quarantee that the length of all the queues will grow indefinitely with probability one. The results of the present paper are based on the following theorem: Theorem 3.1. If conditions (1) are fulfilled, then Proof. Applying the results of paper [2], we see that virtual waiting time of job (workload process) in server of station is equal Denote (2) Proof. At first, using Theorem 3.1, we get that for Let us investigate a computer network node, which consists of elements (computers), Denote Note that Denote the structural function of the system of elements connected by scheme 1 from (see, for example, [13], as follows: At first we will prove that At last we have that (3) of the computer node. Suppose is the parameter of failure (4) are stard Wiener processes, Thus, using the convergence together theorem from (3) (4) we derive that is stard Wiener processes, By [11], for the vector convergence to hold it suffices that a limit process is continuous in Using this note we complete the proof of the theorem. Let us estimate the reliability function of the system (computer network) using the formula of a conditional probability for the reliability function of the computer node Note that But for fixed we have that 4 The Reliability of a Multi-server Computer Network Theorem 4.1. If conditions (1) are fulfilled, the computer network becomes unreliable (all computers fail). ISBN:

4 Finally, we denote as a probability of blocking (workload process) of the server in node in a multi-server computer network, So, is the probability of blocking of the whole multi-server computer network (because if Thus, (5) Applying Theorem 3.1, we obtain that for then for all ),. Thus, we prove the following corollary about the probability of blocking of a multi-server computer network. Corollary 5.1. If conditions (1) are fulfilled, then (6) 6 Proof. Denote we achieve that as a complement of set A. Thus, It follows from (6) that (7) Consequently, (see (4) (6)), which completes the proof. (8) 5 Applications of the Main Results At first we present a theorem about the fluid approximation for the virtual waiting time of job in nodes of a multi-server open queuing network under heavy traffic conditions. Theorem 5.1. If conditions (1) are fulfilled, then If conditions (1) are satisfied, let us prove that. Next, we present the law of the iterated logarithm for the virtual waiting time of job in nodes of a multi-server open queuing network under heavy traffic conditions. Theorem 5.2. If conditions (1) are satisfied, then But for applying Theorem 3.1 we obtain (9) is the normal distribution function. Consequently, we derive that (see (7) (9)) ISBN:

5 or The proof of Corollary 5.1 is complete. Consequently, if conditions (1) are fulfilled, then the whole multi-server network is busy. Consequently, if conditions (1) are fulfilled, then the whole multi-server network is busy. 6 Concluding remarks future research 1. If the conditions of the theorem on the probability limit theorem are fulfilled (i. e., conditions (1) are satisfied), the network is occupied at first (see Corollary 4.1) if conditions (1) are satisfied later on, the network becomes uncontrollable after a certain time (as ) (see Corollary 5.1). 2. Conditions (1) are fundamental, - the behaviour of the whole network its evolution is not clear, if conditions (1) are not satisfied. Therefore, this fact is the object of further research discussion. 3. Note that the computer with the Windows opera- =tion system functions steadily, if the number of jobs does not exceed 5 (therefore,. In the opposite cases, the computer fails (see paragraph 1). 4. The theorems of this paper are proved for a class of a multi-server open queuing network in heavy traffic with the service principle ``first come, first served", endless waiting time of a customer in each node of the queuing system, the times between the arrival of customers at the multi-server open queuing networks are independent identically distributed rom variables. However, analogous theorems can be applied to a wider class of multiserver open queuing networks in heavy traffic: when the arrival service of customers in a queue is by groups, when interarrival times of customers at the multi-server open queuing network are weakly dependent rom variables, etc. References: [1] Yinong Chen, Zhongshi He,.Bounds on the reliability of distributed systems with unreliable nodes links, IEEE Transactions on Reliability, Vol.53, No.2, 2004, pp [2] H. Chen H., Shanthikumar J. George. Fluid limits diffusion approximations for networks of multi-server queues in heavy traffic, Discrete Event Dynamic Systems, Vol.4, 1994, pp [3] Jean Francois Dantzer, Isi Mitrani, Philippe Robert. Large scale heavy traffic asymptotics for systems with unreliable servers, Institut National De Recherche En Informatique Et En Automatique}, 3807, November [4] E. Gelenbe, Unified approach to the evaluation of a class of replacement algorithms, IEEE Transactions on Computers, Vol. C22, No. 6, pp [5] E. Gelenbe, Probabilistic models of computer systems, Part II, Acta Informatica, Vol,12, pp , [6] E. Gelenbe, D. Finkel, S.K. Tripathi Availability of a distributed computer system with failures, Acta Informatica, 23 (6): , November [7] E. Gelenbe, X.W. Wang., R. Onvural Diffusion based statistical call admission control in ATM, Performance Evaluation}, Vol.27, No.8, 1996, pp [8] E. Gelenbe, J.M. Fourneau, G-networks with resets, Performance Evaluation, Vol.49, No.(1-4), 2002, pp [9] Sahin Yasar. Algorithm design for reliability analysis in mobile communication networks, Journal Of Aeronautics And Space Technologies, Vol. 3, No.1, 2007, pp [10] Rong Hong Jan, Fung Jen Hwang, Sheng Tzong Cheng, Topological optimization of a communication network subject to a reliability constraint, IEEE Transactions on Reliability, Vol.42, No. 1, 1993, pp [11] S. Minkevičius, Weak convergence in multiphase queues, Lietuvos Matematikos Rinkinys, Vol. 26, 1986, pp , (in Russian). [12] S. Minkevičius, Analysis of the componentbased reliability in computer networks, CUBO A Mathematical Journal, Vol. 12, No. 1, 2010, pp [13] H. Mohamed, S. Mohamed, Yang Xiaozong, Liu Hongwei Wu Zhibo, An efficient algorithm for reliability upper bound of distributed systems with unreliable nodes, International Journal on Computer Science Engineering, Vol. 02, No 02, 2010, pp [14] J.J. Morder, S. E. Elmaghraby (eds.), Hbook of operational research models applications, Van Nostr Reinhold, New York, [15] L.L. Sakalauskas, S. Minkevičius. On the law of the iterated logarithm in open queueing ISBN:

6 networks, European Journal of Operational Research, Vol. 120, 2000, pp , [16] L.L. Sakalauskas, S. Minkevičius. Nonlinear phenomena in digital networks. II, Information Technology Control, 2014, to appear. [17] V. Zubov (ed.) Mathematical theory of reliability of queueing systems, Radio i Sviaz, [18] M. Tortorella, Service reliability theory engineering, I: fundamentals, Quality Technology Quantitative Management, Vol. 2, No. 1, 2005, pp [19] M. Tortorella, Service reliability theory engineering, II: models examples, Quality Technology Quantitative Management, Vol. 2, No. 1, 2005, pp [20] Jer Shyan Wu, Rong Jaye Chen, Efficient algorithm for reliability of a circular consecutive-k-out-of-n system, IEEE Transactions on Reliability, Vol. 42, No. 1, 1993, pp ISBN:

Fuzzy Queueing Model Using DSW Algorithm

Fuzzy Queueing Model Using DSW Algorithm Fuzzy Queueing Model Using DSW Algorithm R. Srinivasan Department of Mathematics, Kongunadu College of Engineering and Technology, Tiruchirappalli 621215, Tamilnadu ABSTRACT--- This paper proposes a procedure

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1

BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 ISSN 2277-2685 IJESR/May 2017/ Vol-7/Issue-5/40-45 Ashish Upadhayay / International Journal of Engineering & Science Research BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 1 Research Scholar,

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

AN APPROXIMATION APPROACH FOR RANKING FUZZY NUMBERS BASED ON WEIGHTED INTERVAL - VALUE 1.INTRODUCTION

AN APPROXIMATION APPROACH FOR RANKING FUZZY NUMBERS BASED ON WEIGHTED INTERVAL - VALUE 1.INTRODUCTION Mathematical and Computational Applications, Vol. 16, No. 3, pp. 588-597, 2011. Association for Scientific Research AN APPROXIMATION APPROACH FOR RANKING FUZZY NUMBERS BASED ON WEIGHTED INTERVAL - VALUE

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Applied Mathematics 160 (2012) 505 512 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam 1-planarity of complete multipartite

More information

VHDL framework for modeling fuzzy automata

VHDL framework for modeling fuzzy automata Doru Todinca Daniel Butoianu Department of Computers Politehnica University of Timisoara SYNASC 2012 Outline Motivation 1 Motivation Why fuzzy automata? Why a framework for modeling FA? Why VHDL? 2 Fuzzy

More information

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Discussiones Mathematicae Graph Theory xx (xxxx) 1 13 doi:10.7151/dmgt.2106 PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Vladislav Taranchuk Department of Mathematics and Statistics California State

More information

Section 13. Basis for a Topology

Section 13. Basis for a Topology 13. Basis for a Topology 1 Section 13. Basis for a Topology Note. In this section, we consider a basis for a topology on a set which is, in a sense, analogous to the basis for a vector space. Whereas a

More information

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,

More information

MAXIMUM WIENER INDEX OF TREES WITH GIVEN SEGMENT SEQUENCE

MAXIMUM WIENER INDEX OF TREES WITH GIVEN SEGMENT SEQUENCE MAXIMUM WIENER INDEX OF TREES WITH GIVEN SEGMENT SEQUENCE ERIC OULD DADAH ANDRIANTIANA, STEPHAN WAGNER, AND HUA WANG Abstract. A segment of a tree is a path whose ends are branching vertices (vertices

More information

Some Properties of Soft -Open Sets in Soft Topological Space

Some Properties of Soft -Open Sets in Soft Topological Space IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn:2319-765x. Volume 9, Issue 6 (Jan. 2014), PP 20-24 Some Properties of Soft -Open Sets in Soft Topological Space a Gnanambal Ilango, b B.

More information

A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions

A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions Nira Dyn School of Mathematical Sciences Tel Aviv University Michael S. Floater Department of Informatics University of

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Some Inequalities Involving Fuzzy Complex Numbers

Some Inequalities Involving Fuzzy Complex Numbers Theory Applications o Mathematics & Computer Science 4 1 014 106 113 Some Inequalities Involving Fuzzy Complex Numbers Sanjib Kumar Datta a,, Tanmay Biswas b, Samten Tamang a a Department o Mathematics,

More information

Generell Topologi. Richard Williamson. May 6, 2013

Generell Topologi. Richard Williamson. May 6, 2013 Generell Topologi Richard Williamson May 6, 2013 1 8 Thursday 7th February 8.1 Using connectedness to distinguish between topological spaces I Proposition 8.1. Let (, O ) and (Y, O Y ) be topological spaces.

More information

Title: Increasing the stability and robustness of simulation-based network assignment models for largescale

Title: Increasing the stability and robustness of simulation-based network assignment models for largescale Title: Increasing the stability and robustness of simulation-based network assignment models for largescale applications Author: Michael Mahut, INRO Consultants Inc. Larger-scale dynamic network models

More information

AXIOMS FOR THE INTEGERS

AXIOMS FOR THE INTEGERS AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,

More information

RADIO LABELING OF SOME LADDER-RELATED GRAPHS

RADIO LABELING OF SOME LADDER-RELATED GRAPHS RADIO LABELING OF SOME LADDER-RELATED GRAPHS ALI AHMAD and RUXANDRA MARINESCU-GHEMECI Communicated by Ioan Tomescu Let d(u, v) denote the distance between two distinct vertices of a connected graph G,

More information

An Efficient Queuing Model for Resource Sharing in Cloud Computing

An Efficient Queuing Model for Resource Sharing in Cloud Computing The International Journal Of Engineering And Science (IJES) Volume 3 Issue 10 Pages 36-43 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 An Efficient Queuing Model for Resource Sharing in Cloud Computing

More information

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori The Computer Journal, 46(6, c British Computer Society 2003; all rights reserved Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes Tori KEQIN LI Department of Computer Science,

More information

Stability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology

Stability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology 76 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 1, JANUARY 2003 Stability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology Yang Liu, Member, IEEE, Kevin M. Passino,

More information

Some bounds on chromatic number of NI graphs

Some bounds on chromatic number of NI graphs International Journal of Mathematics and Soft Computing Vol.2, No.2. (2012), 79 83. ISSN 2249 3328 Some bounds on chromatic number of NI graphs Selvam Avadayappan Department of Mathematics, V.H.N.S.N.College,

More information

END-TO-END estimation of the spare capacity along a network

END-TO-END estimation of the spare capacity along a network 130 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 A Stochastic Foundation of Available Bandwidth Estimation: Multi-Hop Analysis Xiliang Liu, Kaliappa Ravindran, and Dmitri Loguinov,

More information

Generalized Convex Set-Valued Maps

Generalized Convex Set-Valued Maps Generalized Convex Set-Valued Maps September 20, 2008 Joël Benoist Department of Mathematics LACO URA-CNRS 1586 University of Limoges 87060 Limoges, France E-mail: benoist@unilim.fr Nicolae Popovici Faculty

More information

Star Forests, Dominating Sets and Ramsey-type Problems

Star Forests, Dominating Sets and Ramsey-type Problems Star Forests, Dominating Sets and Ramsey-type Problems Sheila Ferneyhough a, Ruth Haas b,denis Hanson c,1 and Gary MacGillivray a,1 a Department of Mathematics and Statistics, University of Victoria, P.O.

More information

ON WIENER INDEX OF GRAPH COMPLEMENTS. Communicated by Alireza Abdollahi. 1. Introduction

ON WIENER INDEX OF GRAPH COMPLEMENTS. Communicated by Alireza Abdollahi. 1. Introduction Transactions on Combinatorics ISSN (print): 51-8657, ISSN (on-line): 51-8665 Vol. 3 No. (014), pp. 11-15. c 014 University of Isfahan www.combinatorics.ir www.ui.ac.ir ON WIENER INDEX OF GRAPH COMPLEMENTS

More information

Preemptive Scheduling of Equal-Length Jobs in Polynomial Time

Preemptive Scheduling of Equal-Length Jobs in Polynomial Time Preemptive Scheduling of Equal-Length Jobs in Polynomial Time George B. Mertzios and Walter Unger Abstract. We study the preemptive scheduling problem of a set of n jobs with release times and equal processing

More information

arxiv: v1 [math.co] 24 Oct 2012

arxiv: v1 [math.co] 24 Oct 2012 On a relation between the Szeged index and the Wiener index for bipartite graphs arxiv:110.6460v1 [math.co] 4 Oct 01 Lily Chen, Xueliang Li, Mengmeng Liu Center for Combinatorics, LPMC-TJKLC Nankai University,

More information

Constructions of hamiltonian graphs with bounded degree and diameter O(log n)

Constructions of hamiltonian graphs with bounded degree and diameter O(log n) Constructions of hamiltonian graphs with bounded degree and diameter O(log n) Aleksandar Ilić Faculty of Sciences and Mathematics, University of Niš, Serbia e-mail: aleksandari@gmail.com Dragan Stevanović

More information

ON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS

ON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS N. 38 017 (137 144) 137 ON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS Xianya Geng Zhixiang Yin Xianwen Fang Department of Mathematics and Physics

More information

Discrete Time Batch Arrival Queue with Multiple Vacations

Discrete Time Batch Arrival Queue with Multiple Vacations International Journal of Engineering Research Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 7 (July 2017), PP.49-55 Discrete Time Batch Arrival Queue with Multiple Vacations

More information

Self-formation, Development and Reproduction of the Artificial System

Self-formation, Development and Reproduction of the Artificial System Solid State Phenomena Vols. 97-98 (4) pp 77-84 (4) Trans Tech Publications, Switzerland Journal doi:.48/www.scientific.net/ssp.97-98.77 Citation (to be inserted by the publisher) Copyright by Trans Tech

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Optimization Problems Under One-sided (max, min)-linear Equality Constraints

Optimization Problems Under One-sided (max, min)-linear Equality Constraints WDS'12 Proceedings of Contributed Papers, Part I, 13 19, 2012. ISBN 978-80-7378-224-5 MATFYZPRESS Optimization Problems Under One-sided (max, min)-linear Equality Constraints M. Gad Charles University,

More information

Infinite locally random graphs

Infinite locally random graphs Infinite locally random graphs Pierre Charbit and Alex D. Scott Abstract Motivated by copying models of the web graph, Bonato and Janssen [3] introduced the following simple construction: given a graph

More information

Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded

Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Cemil Dibek Tınaz Ekim Pinar Heggernes Abstract We determine the maximum number of edges that a claw-free

More information

Some Topological Indices of Spider s Web Planar Graph

Some Topological Indices of Spider s Web Planar Graph Applied Mathematical Sciences, Vol. 6, 0, no. 63, 345-355 Some Topological Indices of Spider s Web Planar Graph Mohamed Essalih LRIT associated unit to CNRST (URAC 9), Faculty of Sciences, Mohammed V-Agdal

More information

Study of Load Balancing Schemes over a Video on Demand System

Study of Load Balancing Schemes over a Video on Demand System Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video

More information

On Soft Topological Linear Spaces

On Soft Topological Linear Spaces Republic of Iraq Ministry of Higher Education and Scientific Research University of AL-Qadisiyah College of Computer Science and Formation Technology Department of Mathematics On Soft Topological Linear

More information

Comparative Study of blocking mechanisms for Packet Switched Omega Networks

Comparative Study of blocking mechanisms for Packet Switched Omega Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

The Space of Closed Subsets of a Convergent Sequence

The Space of Closed Subsets of a Convergent Sequence The Space of Closed Subsets of a Convergent Sequence by Ashley Reiter and Harold Reiter Many topological spaces are simply sets of points(atoms) endowed with a topology Some spaces, however, have elements

More information

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Journal of ELECTRICAL ENGINEERING, VOL. 57, NO. 6, 2006, 360 364 EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Peter Kvačkaj

More information

A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions

A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions Nira Dyn Michael S. Floater Kai Hormann Abstract. We present a new four-point subdivision scheme that generates C 2 curves.

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

On Fuzzy Topological Spaces Involving Boolean Algebraic Structures

On Fuzzy Topological Spaces Involving Boolean Algebraic Structures Journal of mathematics and computer Science 15 (2015) 252-260 On Fuzzy Topological Spaces Involving Boolean Algebraic Structures P.K. Sharma Post Graduate Department of Mathematics, D.A.V. College, Jalandhar

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Improving the scheduling analysis of hard real-time traffic by analyzing traffic dependencies

Improving the scheduling analysis of hard real-time traffic by analyzing traffic dependencies TECHNICAL REPORT IDE0892 Improving the scheduling analysis of hard real-time traffic by analyzing traffic dependencies KRISTINA KUNERT School of Information Science, Computer and Electrical Engineering

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Deduction and Logic Implementation of the Fractal Scan Algorithm

Deduction and Logic Implementation of the Fractal Scan Algorithm Deduction and Logic Implementation of the Fractal Scan Algorithm Zhangjin Chen, Feng Ran, Zheming Jin Microelectronic R&D center, Shanghai University Shanghai, China and Meihua Xu School of Mechatronical

More information

arxiv: v1 [math.co] 13 Aug 2017

arxiv: v1 [math.co] 13 Aug 2017 Strong geodetic problem in grid like architectures arxiv:170803869v1 [mathco] 13 Aug 017 Sandi Klavžar a,b,c April 11, 018 Paul Manuel d a Faculty of Mathematics and Physics, University of Ljubljana, Slovenia

More information

(i, j)-almost Continuity and (i, j)-weakly Continuity in Fuzzy Bitopological Spaces

(i, j)-almost Continuity and (i, j)-weakly Continuity in Fuzzy Bitopological Spaces International Journal of Scientific and Innovative Mathematical Research (IJSIMR) Volume 4, Issue 2, February 2016, PP 89-98 ISSN 2347-307X (Print) & ISSN 2347-3142 (Online) www.arcjournals.org (i, j)-almost

More information

EDGE MAXIMAL GRAPHS CONTAINING NO SPECIFIC WHEELS. Jordan Journal of Mathematics and Statistics (JJMS) 8(2), 2015, pp I.

EDGE MAXIMAL GRAPHS CONTAINING NO SPECIFIC WHEELS. Jordan Journal of Mathematics and Statistics (JJMS) 8(2), 2015, pp I. EDGE MAXIMAL GRAPHS CONTAINING NO SPECIFIC WHEELS M.S.A. BATAINEH (1), M.M.M. JARADAT (2) AND A.M.M. JARADAT (3) A. Let k 4 be a positive integer. Let G(n; W k ) denote the class of graphs on n vertices

More information

Some new results on circle graphs. Guillermo Durán 1

Some new results on circle graphs. Guillermo Durán 1 Some new results on circle graphs Guillermo Durán 1 Departamento de Ingeniería Industrial, Facultad de Ciencias Físicas y Matemáticas, Universidad de Chile, Santiago, Chile gduran@dii.uchile.cl Departamento

More information

Topology and Topological Spaces

Topology and Topological Spaces Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,

More information

ON SWELL COLORED COMPLETE GRAPHS

ON SWELL COLORED COMPLETE GRAPHS Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains

More information

REPRESENTATION OF BIG DATA BY DIMENSION REDUCTION

REPRESENTATION OF BIG DATA BY DIMENSION REDUCTION Fundamental Journal of Mathematics and Mathematical Sciences Vol. 4, Issue 1, 2015, Pages 23-34 This paper is available online at http://www.frdint.com/ Published online November 29, 2015 REPRESENTATION

More information

Section 17. Closed Sets and Limit Points

Section 17. Closed Sets and Limit Points 17. Closed Sets and Limit Points 1 Section 17. Closed Sets and Limit Points Note. In this section, we finally define a closed set. We also introduce several traditional topological concepts, such as limit

More information

Rough Connected Topologized. Approximation Spaces

Rough Connected Topologized. Approximation Spaces International Journal o Mathematical Analysis Vol. 8 04 no. 53 69-68 HIARI Ltd www.m-hikari.com http://dx.doi.org/0.988/ijma.04.4038 Rough Connected Topologized Approximation Spaces M. J. Iqelan Department

More information

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University

More information

Adjacent Vertex Distinguishing Incidence Coloring of the Cartesian Product of Some Graphs

Adjacent Vertex Distinguishing Incidence Coloring of the Cartesian Product of Some Graphs Journal of Mathematical Research & Exposition Mar., 2011, Vol. 31, No. 2, pp. 366 370 DOI:10.3770/j.issn:1000-341X.2011.02.022 Http://jmre.dlut.edu.cn Adjacent Vertex Distinguishing Incidence Coloring

More information

Component Connectivity of Generalized Petersen Graphs

Component Connectivity of Generalized Petersen Graphs March 11, 01 International Journal of Computer Mathematics FeHa0 11 01 To appear in the International Journal of Computer Mathematics Vol. 00, No. 00, Month 01X, 1 1 Component Connectivity of Generalized

More information

2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall

2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall c Dr Oksana Shatalov, Fall 2014 1 2. Sets 2.1&2.2: Sets and Subsets. Combining Sets. Set Terminology and Notation DEFINITIONS: Set is well-defined collection of objects. Elements are objects or members

More information

Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets

Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Saul Glasman 14 September 2016 Let s give the definition of an open subset of R. Definition 1. Let U R. We

More information

FUDMA Journal of Sciences (FJS) Maiden Edition Vol. 1 No. 1, November, 2017, pp ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES

FUDMA Journal of Sciences (FJS) Maiden Edition Vol. 1 No. 1, November, 2017, pp ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES FUDMA Journal of Sciences (FJS) Maiden Edition Vol 1 No 1 November 2017 pp 28-34 ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES * A O Yusuf 1 A M Ibrahim 2 1 Department of Mathematical Sciences Information

More information

Properly Colored Paths and Cycles in Complete Graphs

Properly Colored Paths and Cycles in Complete Graphs 011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Lecture 1. 1 Notation

Lecture 1. 1 Notation Lecture 1 (The material on mathematical logic is covered in the textbook starting with Chapter 5; however, for the first few lectures, I will be providing some required background topics and will not be

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus) Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.

More information

Minimum congestion spanning trees of grids and discrete toruses

Minimum congestion spanning trees of grids and discrete toruses Minimum congestion spanning trees of grids and discrete toruses A. Castejón Department of Applied Mathematics I Higher Technical School of Telecommunications Engineering (ETSIT) Universidad de Vigo Lagoas-Marcosende

More information

The Fibonacci hypercube

The Fibonacci hypercube AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven

More information

Application of QNA to analyze the Queueing Network Mobility Model of MANET

Application of QNA to analyze the Queueing Network Mobility Model of MANET 1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:

More information

The Edge Fixing Edge-To-Vertex Monophonic Number Of A Graph

The Edge Fixing Edge-To-Vertex Monophonic Number Of A Graph Applied Mathematics E-Notes, 15(2015), 261-275 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.edu.tw/ amen/ The Edge Fixing Edge-To-Vertex Monophonic Number Of A Graph KrishnaPillai

More information

Application of Network Calculus to the TSN Problem Space

Application of Network Calculus to the TSN Problem Space Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch

More information

= [ U 1 \ U 2 = B \ [ B \ B.

= [ U 1 \ U 2 = B \ [ B \ B. 5. Mon, Sept. 8 At the end of class on Friday, we introduced the notion of a topology, and I asked you to think about how many possible topologies there are on a 3-element set. The answer is... 29. The

More information

SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE

SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE 78 Proceedings of the 4 th International Conference on Informatics and Information Technology SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE D. Ulbikiene, J. Ulbikas, K.

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

On Jeśmanowicz Conjecture Concerning Pythagorean Triples

On Jeśmanowicz Conjecture Concerning Pythagorean Triples Journal of Mathematical Research with Applications Mar., 2015, Vol. 35, No. 2, pp. 143 148 DOI:10.3770/j.issn:2095-2651.2015.02.004 Http://jmre.dlut.edu.cn On Jeśmanowicz Conjecture Concerning Pythagorean

More information

Open and Closed Sets

Open and Closed Sets Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

Progress Towards the Total Domination Game 3 4 -Conjecture

Progress Towards the Total Domination Game 3 4 -Conjecture Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa

More information

The Genetic Algorithm for finding the maxima of single-variable functions

The Genetic Algorithm for finding the maxima of single-variable functions Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 46-54 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com The Genetic Algorithm for finding

More information

An Improved Upper Bound for the Sum-free Subset Constant

An Improved Upper Bound for the Sum-free Subset Constant 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin

More information

The effect of server s breakdown on the performance of finite-source retrial queueing systems

The effect of server s breakdown on the performance of finite-source retrial queueing systems 6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. The effect of server s breakdown on the performance of finite-source retrial queueing systems János Roszik, János

More information

ADAPTIVE SORTING WITH AVL TREES

ADAPTIVE SORTING WITH AVL TREES ADAPTIVE SORTING WITH AVL TREES Amr Elmasry Computer Science Department Alexandria University Alexandria, Egypt elmasry@alexeng.edu.eg Abstract A new adaptive sorting algorithm is introduced. The new implementation

More information

A NOTE ON THE NUMBER OF DOMINATING SETS OF A GRAPH

A NOTE ON THE NUMBER OF DOMINATING SETS OF A GRAPH A NOTE ON THE NUMBER OF DOMINATING SETS OF A GRAPH STEPHAN WAGNER Abstract. In a recent article by Bród and Skupień, sharp upper and lower bounds for the number of dominating sets in a tree were determined.

More information

The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs

The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs G. Ayorkor Mills-Tettey Anthony Stentz M. Bernardine Dias CMU-RI-TR-07-7 July 007 Robotics Institute Carnegie Mellon University

More information

ON DECOMPOSITION OF FUZZY BԐ OPEN SETS

ON DECOMPOSITION OF FUZZY BԐ OPEN SETS ON DECOMPOSITION OF FUZZY BԐ OPEN SETS 1 B. Amudhambigai, 2 K. Saranya 1,2 Department of Mathematics, Sri Sarada College for Women, Salem-636016, Tamilnadu,India email: 1 rbamudha@yahoo.co.in, 2 saranyamath88@gmail.com

More information

Subdivided graphs have linear Ramsey numbers

Subdivided graphs have linear Ramsey numbers Subdivided graphs have linear Ramsey numbers Noga Alon Bellcore, Morristown, NJ 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv,

More information

Symmetric Product Graphs

Symmetric Product Graphs Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-20-2015 Symmetric Product Graphs Evan Witz Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

SOFT GENERALIZED CLOSED SETS IN SOFT TOPOLOGICAL SPACES

SOFT GENERALIZED CLOSED SETS IN SOFT TOPOLOGICAL SPACES 5 th March 0. Vol. 37 No. 005-0 JATIT & LLS. All rights reserved. ISSN: 99-8645 www.jatit.org E-ISSN: 87-395 SOFT GENERALIZED CLOSED SETS IN SOFT TOPOLOGICAL SPACES K. KANNAN Asstt Prof., Department of

More information

THE GROWTH DEGREE OF VERTEX REPLACEMENT RULES

THE GROWTH DEGREE OF VERTEX REPLACEMENT RULES THE GROWTH DEGREE OF VERTEX REPLACEMENT RULES JOSEPH P. PREVITE AND MICHELLE PREVITE 1. Introduction. 2. Vertex Replacement Rules. 3. Marked Graphs Definition 3.1. A marked graph (G, p) is a graph with

More information

Some Problems of Fuzzy Modeling of Telecommunications Networks

Some Problems of Fuzzy Modeling of Telecommunications Networks Some Problems of Fuzzy Modeling of Telecommunications Networks Kirill Garbuzov Novosibirsk State University Department of Mechanics and Mathematics Novosibirsk, Russia, 630090, Email: gartesk@rambler.ru

More information