IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

Size: px
Start display at page:

Download "IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model"

Transcription

1 IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao, Abstract The IP Multimedia Subsystem (IMS) is envisioned as the next-generation IP-based multimedia system that integrates data, seech, and video network services over both wireless and wireline networks. Modeling and design of IMS network has been an imortant area to both researchers and network roviders. Our interest is in the area of develoing efficient design models and otimization methods for IMS networks. In this aer, we focus on otimizing the cost of SIP server deloyment in an IMS network. To reflect the traffic loads on the servers, a flow-based model is used to characterize the SIP traffic. Formulated as a linear rogramming roblem, the cost otimization involves maing a logical IMS core network toology into a hysical network toology. Three otential maing strategies are roosed. Each strategy s secific constraints are incororated into the mathematical formulation of the roblem. A numerical examle of each strategy is resented, and the discussion on the formulations is rovided. Index Terms IP Multimedia Subsystem, CSCF Server, SIP signaling Traffic, Cost Otimization, Maing Strategy 1. INTRODUCTION IMS is envisioned as the next generation IP-based multimedia communication system that integrates data, seech, and video network technology and covers wireless and wireline networks. The IMS [1][1], as a new core network domain, was first introduced by the Third Generation Partnershi Project (3GPP) in two hases (release 5 and release 6) [2] for Universal Mobile Telecommunications System (UMTS) networks. 3GPP2 further defined an IP multimedia framework, which finally harmonized with the IMS. Figure 1 illustrates a simlified IMS core network architecture. IMS based networks consist of distinct Call/Session Control Function (CSCF) servers and Home Subscriber Server (HSS). There are three tyes of CSCF servers, the Proxy-, Interrogating- and Server-Call/Session Control Function servers (P-CSCF, I-CSCF, S-CSCF, resectively [1]). This aer only focuses on the network entities illustrated. Based on IP technology, IMS rovides a multimedia session control service that allows mobile users to access new multimedia and multisession alications as well as to establish synchronous multimedia sessions across fixed and mobile terminals Error! Reference source not found.[3][4]. Since the service creation interfaces are standardized by IMS, they allow for the develoment of new multimedia and multi-session alications. IMS offers this session control to the alications by Session Initiation Protocol (SIP) [5][6]. Figure 1: Simlified IMS Core Network Architecture SIP, as an alication layer control rotocol, is defined by Internet Engineering Task Force (IETF) [6]. SIP lies at the core of IMS architecture and lays the role of session establishment, modification, and termination between two or more end users. Each CSCF server is actually a secialized SIP server. Modeling and design of IMS network have always been an imortant area to both researchers and network roviders. Our interest is in the area of develoing efficient design models and otimization methods for IMS network. In our research, we focus on IMS network deloyment cost otimization to roduce a good network design otentially caable of securing considerable saving. In this aer, the mathematical modeling and the alication of efficient otimization methods are alied. We, as designers, have to make selective use of various available theoretical models and different aroximations, such as hysical node caacity and hysical link bandwidth. Also we consider various ractical constraints in secific models. In a real IMS network, the logical IMS network can be maed to different IMS hysical networks with different maing strategies, where the logical CSCF servers are maed into the hysical node(s). In this aer, three otential maing strategies are roosed. Then, each maing strategy can be formulated as cost otimization issue, in a linear rogramming roblem. Each strategy s secific constraints are incororated into the mathematical formulation of the roblem. In order to better understand how to formulate the cost otimization in a secific strategy, an examle for each maing strategy is rovided, including the detailed rocedures. The discussion on the formulations is rovided at the end. The challenge for studying IMS is the comlexity of its signaling rocedures. There are numerous signaling rocedures

2 defined in IMS [3]. Each user agent (UA) may trigger a secific signaling rocedure at a secific time deending on its secific call scenario at that moment. Estimating server loads based on individual signaling rocedures is therefore not scalable. We roosed a flow-based traffic model that allows redicting the loads of IMS CSCF servers in a scalable way by utilizing the characteristics of IMS messages in [8]. A flow is an aggregation of signaling messages that traverse the same ath in an IMS network. In [8] we demonstrated that all signaling rocedures can be aggregated into 17 flows, as shown in Table 1. The flow concet has significantly simlified the rocess to estimate the loads of various CSCF servers while the correlation structure across the loads of these servers is still catured. For more details about the flow concet, readers are referred to [8]. In this aer, we assume that all signaling rocedures have been aggregated into 17 flows that traverse various CSCF servers. We therefore focus on the issue of maing CSCF servers to hysical server nodes. Table 1: Summary of 17 flows Flows Flow Path 1 P S --- S P 2 S P 3 P S 4 I S P --- P S I 5 S P --- P S 6 P S I S I S --- S I 9 S I P P I S I P 12 I S I 13 I S P 14 I S 15 HSS I 16 HSS S 17 S HSS Moreover, each maing strategy has its own advantages and disadvantages. Network roviders select a maing strategy with the best erformance results according to their needs and actual network conditions, including the number of users, the caacity of hysical nodes, the budget lan, and so forth. This requires the roviders to consider both advantages and disadvantages of each maing strategy, in order to determine the one that is satisfied by themselves and their users. In the following sections, we start with a generic maing strategy, and then focus on two secial maing strategies, which can be widely used in the ublic domain. 2.1 Generic Maing Strategy The Generic Maing Strategy is a method that allows for the maing of a logical CSCF server into any hysical node. The uer art of Figure 2 illustrates a logical IMS core network toology, which is the way that the IMS messages ass through the network from one logical server to the next without regard to the hysical interconnection of the hysical nodes. The loads of each logical server can be redicted by alying the flow-based traffic model [8]. However, in the hysical structure of the IMS network, also called hysical IMS network toology, which is deicted in the lower art of Figure 2, the loads of each hysical node can be estimated according to the different maing strategies, each determining how the logical servers are maed into the hysical node(s).. Figure 2 shows the Generic Strategy of maing logical servers in the IMS core network into hysical nodes interconnected through a network. In this case, any hysical node can host one or more logical server(s). On the other hand, two or more hysical nodes can host one or more identical logical servers. Any two or more hysical nodes can be identical, which means that they can host the same logical servers. The Generic Maing Strategy includes all ossible maing ways. Most of IMS-related research work currently has concentrated on IMS architecture and SIP rotocol develoment [4], network erformance evaluation under varying network arameters [3][9], and the Quality of Service (QoS) issue [10]. To our best knowledge, there is no such reference that rovides the formulation on IMS network deloyment cost otimization roblem utilizing the flow-based traffic model. 2. MAPPING STRATEGY The IMS servers (P/S/I-CSCF and HSS) illustrated in Figure 1 are all logical entities. In a real network, all logical servers need to be imlemented on hysical node(s). How to ma logical servers located in a logical IMS core network toology to hysical node(s) located in hysical IMS network toology is not standardized, but is of great interest to the network roviders. Network roviders may choose different maing strategies to achieve their own objectives. On the other hand, an industry-leading network rovider may want a maing strategy that rovides high reliability and high exandability. Figure 2: A Generic Maing Strategy

3 Although the maing strategy is called generic, certain constraint is necessary to minimize the search for the otimal solution. The constraint is related to the flow concet. All flows listed in Table 1 can be classified into two tyes: round tri flow and single tri flow. The round tri flow is defined as a flow that traverses the involved logical servers twice: one in the forward direction and one in the reverse direction. The single tri flow asses the involved logical servers only once. The selection of hysical nodes for erforming both directions in a round tri flow should be identical. This is because the hysical nodes chosen in the forwarding direction may hold some information regarding the end users. It will minimize the information to be dulicated on different hysical nodes by choosing the reverse ath to be the same hysical nodes excet the order is reversed Notations for Network Modeling As you will see, a good mathematical notation can reresent a secific design roblem in a comact and unambiguous way. It hels us to understand the formulation better. Physical Node, Logical Server, and Flow The four different logical servers in logical IMS network are labeled with the generic label v, where v 1, 2, 3, 4, and the hysical nodes are denoted as y, where y 1, 2,, Y, and Y is the number of hysical nodes in the network. A flow is denoted as f, where f 1, 2,, 17. A direct hysical link connects its hysical end nodes directly. Flow Demand, Physical Path Flow demand volume is denoted as h f, and it reresents the traffic volume (number of messages) in a given unit of time. For flow f, the total number of available hysical aths is denoted by P f, and they are labeled with from the first hysical ath to the total number of hysical aths, i.e. 1, 2,, Pf. This sequence is called the list of candidate hysical aths. Each hysical ath connects the hysical end nodes of flow f, and it is described as the set of hysical links of which the hysical ath is comosed of. In this aer, we assume the candidate aths for a flow are known to the carrier. A carrier may decide the candidate aths based on its own olicy. Figure 3 deicts an examle of maing the logical servers into four hysical nodes, which are hosting the corresonding logical servers, as shown in the bracket. A list of hysical aths that can carry flow 3 (flow ath: PS; f = 3) is drawn in the lower art of Figure 3. Table 2 lists the candidate hysical aths for flow 3 under the network toology in Figure 3. Moreover, for hysical ath 5, hysical node #3 can handle flow 3 alone. Now, flow demand volume is assigned to the available hysical aths. The loads assigned to hysical ath, a candidate hysical ath of flow f are denoted by w f, as shown in Table 2. Since the demand volume of flow f needs to be realized by the traffic on all the candidate hysical aths, we can write the following equation: w 31 w32 w33 w34 w35 w36 h3 (1) It leads to the demand constraint, which can be written in a general form as follows: P f 1 Logical Toology Flow 3, f=3 Physical Toology Node #2 (P) P-CSCF Node #1 (P) w f h f HSS h3 Path 4. w34 S-CSCF Internet Cloud Path 1, w31 Path 3, w33 Path 2, w32 I-CSCF Path 5,w35 Node #3 (P/I/S) Path 6, w36 Node #4 (S/HSS) Figure 3: An Examle of Maing, 6 Available Physical Paths for Flow 3 (Flow Path: PS) Table 2: A List of Candidate Physical Paths for Flow 3, under the Network Toology in Figure 3 Candidate hysical aths for flow 3 (flow ath: PS) w f 1 Physical node #1 #3 w 31 2 Physical node #1 #4 w 32 3 Physical node #2 #3 w 33 4 Physical node #2 #4 w 34 5 Physical node #3 w 35 6 Physical node #3 #4 w 36 Indicator Two indicators are defined for formulating the design roblem. The first indicator, denoted by fyv, indicates the relationshi among hysical node y, logical server v, hysical ath, and flow f. It is defined as: fvy 1, if hysical node y hosts logical server v along fvy hysical ath of flow f (3) 0, otherwise. is constant and obtained from the analysis erformed on network toology assuming that the carrier knows all candidate aths for each flow based on its olicy. The second indicator determines the number of times that logical server v is involved in flow f, and it is denoted by. (2) fv

4 As discussed, there are two tyes of flow, which are the round tri flow and the single tri flow as summarized in Table 3. The ath of each flow is rovided in Table 1. The logical servers along a round tri flow are involved twice. And, the logical servers along a single tri flow are involved once. However, flow 11 and flow 12 are secial cases due to the flow traverses logical S-CSCF server only once although they look like a round tri flow. is written as follows: fv 2, 1,if 2,if 2,if 1,if 2,if 1,if 0, otherwise. fv if logical server v is involved in flow f, and flow f is a round tri logical server v is involved in flow f, and flow f is a single tri logical server v is P - CSCF, for flow 11 logical server v is I - CSCF, for flow 11 logical server v is S - CSCF, for flow 11 logical server v is I - CSCF, for flow 12 logical server v is S - CSCF, for flow 12 Table 3: The Tyes of Flows Tyes of flow Flow Single tri flow #2, #3, #6, #7, #9, #10, #13, #14, #15, #16, #17 Round tri flow #1, #4, #5, #8 Secial flow #11, #12 Load, Rate, Caacity The cost of a hysical node mainly deends on its caacity. Thus, the loads of hysical node are redicted in order to determine the best choice for the caacity of a hysical node. The loads on each hysical node indicate the number of actual IMS messages rocessed in a given unit of time, and we denote these loads as l y for hysical node y. As we can see in Figure 3, the loads of a hysical node are calculated as the summary of the loads of the flows that traverse the node. l w y (4) f v fv fvy f (5) In secific, this equation can be divided into three stes. Ste a: fvyw f, accumulates the loads allocated to each available hysical ath of the flow f, with a given logical server v and hysical node y. Ste b: v fv fvyw f, reresents the total loads on hysical node y, for flow f. Ste c: f v fv fvyw f, sums u the loads for all the involved flows. Our goal is to find the caacity of a hysical node that can satisfy the loads requirement. Let cy reresents the rocessing caability of a hysical node. c y can be in various units that are related to the cost of the server. For examle, c y can be the number of certain CPUs the server carries. Since in IMS network, each logical server has different message functions to be rocessed, we need to decide how much caacity is required to rocess messages for each tye of logical server. This caacity coefficient is denoted as for v logical server v. v is in the unit of time-caacity roduct. For examle, v =2 can mean that a message requires two time units for a logical server with a single CPU or one time unit for a logical server with two CPUs. Here we assume the overhead associated with multile CPUs is negligible to simlify the analysis. However our analysis can be generalized to include those overheads. It should be noted that messages rocessed by the same logical server do not necessarily take the same amount rocessing time due to their different tyes. To simlify our analysis, we take v as the statistical mean of the caacity required by all tyes of messages rocessed by the logical server. Equation (5 calculates the loads of hysical node y, which reresent a sum of the loads on logical server v that is hosted in a hysical node y. Hereby, the caacity of hysical node y should be greater than the accumulation of the loads of logical server v times v, for all ossible logical server v that the hysical node y hosts. This is a second set of constraints that can be generally written as: f v v fv fvyw f c y (6) Furthermore, in the design roblem, we aim to minimize the hysical node caacity cost. Therefore, a rate y is introduced and it reresents the cost er unit rocessing caability for hysical node y Formulation of Cost Otimization Problem IMS network deloyment cost otimization issue is considered with a set of given flow demand volumes. A comlete version of formulating the cost otimization issue as a linear rogramming roblem for a Generic Maing Strategy is rovided below. When the hysical network construction is given, the formulation can be formed. - Indices: f =1, 2,, 17, flow v = 1, 2, 3, 4, logical server =1, 2, P f, candidate hysical ath for flow f y=1, 2, Y, hysical node - Constants: fyv : =1, if hysical node y hosts logical server v along hysical ath that is one available hysical ath of flow f; 0, otherwise. fv : number of times that logical server v is involved in flow f. h f : flow demand volume for flow f. v : caacity coefficient in time-caacity roduct unit for logical server v. y : cost coefficient er unit rocessing caacity for hysical node y. - Variables: w f : loads allocated to hysical ath of flow f.

5 - Objective: Minimize total network hysical nodes cost. F (7) - Constraints: Demand Constraints: y y c y w (8) f h f Caacity Constraints: f v v fv fvyw f c Constraints on variables, w 0 (continuous, non - negative) f y (9) c y 0 (continuous, non - negative) (10) (11) According to Equation 8 and 9, the cost otimization issue can be formulated as a linear rogramming roblem. In the otimal solution of this roblem, all constraints resented in Equation 9 are binding, i.e., the hysical node loads are equal to the hysical nodes caacities; however, the caacity of the hysical node may not come in continuous value. To reduce the unused caacity, we can set c y to integer. Then the roblem becomes an integer rogramming roblem which is more difficult to solve Examle An examle to show the formulation of the cost otimization roblem is rovided. The simle network is shown in Figure 4, with 5 hysical nodes connected through a network. Each hysical node is hosting one or more logical server(s), as shown in the bracket after the name of hysical node. The assumtions are made as follows: 1. There are 3 flows involved; they are flow 11, 15, 16, i.e. f 11,15, 16. The corresonding hysical aths are extracted from Figure 4 for each flow. 2. It is easy to see that the number of otential aths that can be used as candidate aths is large. To simlify the examle, we assume only the aths listed in Table 4 are the candidate aths. Figure 4: An Examle of Formulating Cost Otimization Problem, with 3 Flows Involved, for a Generic Maing Strategy Table 4: The Candidate Physical Paths, Reference to Figure 4 The choice of Candidate hysical aths hysical nodes for 3 flows P I S HSS Flow 11 (PISIP) 1 #1 #4 #2 #1(P) #4 (I) #2 (S) #4 (I) #1(P) 2 #1 #4 #3 #1(P) #4(I) #3 (S) #4(I) #1(P) Flow 15 (HSSI) 1 #4 #5 #5 (HSS) #4 (I) Flow 16 (HSSS) 1 #2 #5 #5 (HSS) #2 (S) 2 #3 #5 #5 (HSS) #3 (S) The given information is rovided as follows: a) Flow demand volume, 400, f 11 f 250, f , f 16 b) Caacity coefficient for logical server v, 2, v 1 1, v 2 v 5, v 3 2, v 4 c) Cost coefficient for hysical node y, 5, y 1 10, y 2 y 10, y 3 5, y 4 5, y 5 h (12) (13) (14) The objective function can be written as: Minimize F Subject to: a) Demand Constraints: w 5c1 10c2 10c3 5c4 5c5 (15) w 11,1 11,2 h (16) w 15,1 h (17) w 16,1 w16,2 h (18) b) Caacity Constraints: 2 2 ( w w c 11,1 11,2 ) 1 (19) 5 ( w11,1 ) 5 ( w16,1 ) c2 (20) 5 ( w11,2 ) 5 ( w16,2 ) c3 (21) 2 ( w11 1, w11,2 ) ( w15,1 ) c4 (22) ( w1 5,1 ) 2 ( w16,1 w16,2 ) 5 (23) 2 c c) Constraints on variables: 1, 2, for f 11 0, for 1, for f 15 1, 2, for f 16 w f (24)

6 2.2 Customized Maing Strategy 1 Four logical servers (P/I/S-CSCF, HSS) that we concentrated on lay different roles in IMS system. When using Customized Maing Strategy 1 to ma these logical servers to the hysical nodes, each hysical node only hosts one logical server, and it focuses on erforming one tye of tasks. The tasks on each hysical node are clearly demarcated. This maing strategy is desired when the loads of two or more logical servers exceed the caacity of a hysical node. This is often the case for the network roviders with a large number of users. Overall, there are three advantages by using this maing strategy. First, it is easier to create a backu hysical node and ugrade caacity for the future. Second, this strategy brings a small imact to the system when the failure occurs on the hysical nodes, because each hysical node only takes care of one tye of tasks. Third, it is easy to imlement and maintain the hysical nodes. The main disadvantage of this maing strategy is cost. The remaining caacity of the hysical nodes which host one tye of logical server can not be allocated to other logical servers and therefore will be wasted. Figure 5 deicts this maing strategy, where each hysical node hosts only one logical server. Multile hysical nodes, which host the same tye of logical server, can then erform a load balance. Logical Toology P-CSCF IMS CORE NETWORK I-CSCF SIP Diameter S-CSCF HSS - Indices: f =1, 2,, 17, flow v = 1, 2, 3, 4, logical server y v =1, 2, Y v, hysical node that hosts logical server v - Constants: : =1, if flow f traverses logical server v; =0, otherwise. fv fv : number of times that logical server v is involved in flow f. h : flow demand volume for flow f. f v : caacity coefficient in time-caacity roduct unit for logical server v. vy : cost coefficient er unit rocessing caacity for hysical node y that hosts logical server v. - Variables: w fvy v : loads allocated to hysical node y of flow f for logical server v. - Objective: Minimize total hysical nodes cost for logical server v. F c (25) v - Constraints: Demand Constraints: yv yv vyv vyv w (26) fvy h v f Caacity Constraints: w fv c f v fv fv fvyv vy v (27) Constraints on variables, w 0 (continuous, non - negative) fvy v c vy v 0 (continuous, non - negative) (28) (29) Physical Toology P #1 P #m I #1 Internet Cloud I #mi HSS #1 HSS #mhss Examle An examle is rovided to formulate the cost otimization roblem when using maing strategy 1. The network toology illustrated in Figure 6 is the toology shown in Figure 4 with the relocation of logical servers in 5 hysical nodes. The assumtions and given information remain the same as rovided in Section In this case, only Nodes #2 and #3 need to be otimized for logical server S-CSCF. S #ms S #1 Figure 5: Customized Maing Strategy Formulation of Cost Otimization Problem In this maing strategy, it is easy to see that the hysical nodes that suort one logical server lay loads balance among themselves. Because there is no sharing of residual caacities among different logical servers, the hysical nodes that suort different tyes of logical servers can be otimized searately. This can significantly simlify the otimization rocess because the number of variables to be otimized only deends on the number of hysical nodes hosting the same logical server rather than the number of candidate aths. The otimization roblem described in the last section can be reformulated as follows. Figure 6: An Examle of Formulating the Network Cost Otimization Problem, with 3 Flows Involved, for Customized Maing Strategy 1

7 The objective function can be written as: Minimize F3 10c3,2 10c Subject to: - Demand Constraints: w h 400 3,3 (30) w 11,3,2 11,3,3 11 (31) w 16,3,2 w16,3,3 h (32) - Caacity Constraints: 5 ( w11,3,2 w16,3,3 ) c3,2 (33) 5 ( w11,3,2 w16,3,2 ) c3,3 (34) - Constraints on variables: w, w 0 (35) 11,3,2 0 11,3, 3 w 16,3,2 0, w16,3, 3 0 (36) In this examle, each hysical node hosts only one logical server. It reduces the comlexity of the roblem formulation. Moreover, it carries a small number of variables so that it requires the less comutation time to solve the roblem, comared with the generic maing strategy. 2.3 Customized Maing Strategy 2 While the Customized Maing Strategy 1 discussed in the last section fits large carriers with numerous users, the maing strategy discussed in this section fits small carriers who try to act different logical servers into the same hysical nodes to save footrint and cost. The Customized Maing Strategy 2 is illustrated in Figure 7. In this strategy, hysical nodes are divided into different grous. One logical server can be hosted by the hysical nodes located in one grou only. One grou of hysical nodes can host one or more than one logical servers. Furthermore, we assume that a message that traverses the logical servers that belong to the same grou will be rocessed by one hysical node only in the grou. This constraint can reduce the traveling time within a grou. In the extreme case, if each grou hosts only one logical server, this becomes the customized maing strategy 1. The Customized Maing Strategy 2 allows a hysical node to host two or more logical servers. For many network roviders, the caacity of one hysical node may be more than the loads of one logical server. This maing strategy is more ractical than the revious strategy for this tye of carriers. In general, there are two main advantages of using this maing strategy over the first one. First, maing more than one logical server to a hysical node can utilize the existing hysical node caacity, thus reduce costs. Second, this method can reduce the messages traveling time. The main disadvantage of this maing strategy over the revious one is the comlexity involved. When a hysical node hosts more than one logical server, the hysical node has to handle more tyes of tasks which may interfere with each other. The maintenance cost will clearly be higher Formulation of Cost Otimization Problem In this maing strategy, the grou concet is introduced. A grou of hysical nodes is denoted as g, where g 1,2,3,...,G and G is the total number of grous we have in the network toology. In a grou, the hysical nodes host the same logical servers. Every hysical node y belongs to one grou. Because the residual caacities of the hysical nodes can only be shared among the hysical nodes in the same grou, the otimization can be decomosed into the otimization of each grou of hysical nodes. It can be formulated as the follows. - Indices: f =1, 2,, 17, flow v = 1, 2, 3, 4, logical server g=1,2,3,,g, grou number y g =1, 2, Y g, hysical node located in grou g. - Constants: fg : =1, if flow f traverses grou g. fvg : =1, if flow f traverses logical server v maed to grou g. fv : number of times that logical server v is involved in flow f. h : flow demand volume for flow f. f v : caacity coefficient in time-caacity roduct unit for each logical server v. gy : cost coefficient er unit rocessing caacity for hysical node y in grou g. - Variables: w fgy g : loads of flow f allocated to hysical node y in grou g. - Objective: Minimize total hysical nodes cost for grou g. F c (37) g yv gyg gyg - Constraints: Demand Constraints: w fgy h g f fg (38) yv Figure 7: Customized Maing Strategy 2

8 Caacity Constraints: f v v fv fvg w fgy c g gy g (39) Constraints on variables, w 0 (continuous, non - negative) fgy g c gy g 0 (continuous, non - negative) (40) (41) Examle The network toology illustrated in Figure 8 is rovided to show the formulation of cost otimization roblem using the Maing Strategy 2. This network toology is the toology discussed in Section with a relocation of the logical servers in the 5 hysical nodes. The assumtions and given information remain the same as rovided in Section Clearly only Grous #1 and #2 can be otimized. Figure 8: An Examle of Formulating Network Cost Otimization roblem, with Flows Involved, for Customized Maing Strategy 2 The objective function can be written as: Minimize F1 10 Minimize F Subject to - Demand Constraints: w w h 400 (44) 5c1,1 c1,2 (42) 2 10c2,3 5c2,4 (43) 11,1,1 11,1,2 11 w 11,2,3 w11,2,4 h (45) w 15,2,3 w15,2,4 h (46) w 16,2,3 w16,2,4 h (47) - Caacity Constraints: 2 2w c 11,1,1 1,1 (48) 2 2w11,1,2 c1,2 (49) 11,2,3 5w11,2,3 w15,2,3 5w16,2,3 2,3 (50) 11,2,4 5w11,2,4 w15,2,4 5w16,2,4 2,4 (51) 2w c 2w c - Constraints on variables: w 0, w 0, w w 11,1,1 15,2,3 0, w 0, w 0, 11,1,2 11,2,3 11,2,4 (52) 15,2,4 0, w16,2,3 0, w16,2,4 0 15,2,3 0 15,2, 4 w 16,2,3 0, w16,2, 4 0 (54) w, w 0 (53) 3. CONCLUSION There are three otential maing strategies introduced in this aer. One of them is the Generic Maing Strategy that includes all the ossible maing ways. Network roviders can decide the tye and the number of logical servers hosted in the hysical nodes according to their needs. Therefore, once the hysical network toology is given by the network rovider, cost otimization roblem can be formulated. Since a hysical node can host one or more logical servers, the comlexity of the otimization formulation increases quickly due to the dramatic increase of otential candidate aths. However, when new constraints are introduced into the formulation, the comutation time can be reduced significantly. This has been shown in the two customized maing strategies. The Customized Maing Strategy 1 only allows a hysical node host one logical server. The overall otimization roblem can then be decomosed into the otimization roblem for each logical server. The comlexity only deends on the number of hysical nodes that suort the secific logical server. This maing strategy can be alied to networks owned by large carriers. The Customized Maing Strategy 2 is, on the other hand, designed for small carriers. In this strategy, hysical nodes are divided into grous. Its comlexity then deends on the number of hysical nodes in a grou. While the otimization comlexity is reduced, it also allows multile logical servers maed to the same hysical node. This will also make server utilization more efficient. Last but not the least, the formulations of the maing strategies roosed in this aer are all based on the novel flow concet we roosed in [8]. Without the flow concet, it s not ossible to formulate the roblems in a scalable way. REFERENCES [1] G. Camarillo and M. A. Garcia-Martin, The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular worlds, Second Edition, Wiley, [2] J. C. Chen and T. Zhang, IP-based Next-Generation Wireless Network, Wiley, [3] G. T. Digital Cellular Telecommunications System (Phase 2+); Universal Mobile Telecommunications System (UMTS); IP Multimedia Subsystem (IMS); Stage 2, version 7.5.0, ETSI TS123228, [4] S. Pandey, V. Jain, D. Das, V. Planat and R. Periannan, Performance Study of IMS Signaling Plane, Proceeding of International Conference on IP Multimedia Subsystem Architecture and Alications,.1-5, December [5] V. Koukoulidis and M. Shah, The IP Multimedia Domain in Wireless Networks: Concets, Architecture, Protocols and Alications, Proceeding of IEEE 6 th International Symosium on Multimedia Software Engineering, , Miami, December [6] M. Handley, H. Schulzrinne, E. Schooler and J. D. Rosenberg, SIP: Session Initiation Protocol, IETF RFC 2543, March [7] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnson, J. Peterson, R. Sar M. Handley and E. Schooler, The session initiation rotocol (SIP), IETF RFC 3261, [8] J. Xiao, C. Huang and J. Yan, A Flow-based Traffic Model for SIP Messages in IMS, IEEE GLOBECOM, Hawaii USA, November [9] A. A Kist, E. A. Kist and R. J. Harris, ''SIP Signaling Delay in 3GPP, Proceeding of the 6 th International Symosium on Communications Interworking of IFIP interworking 2002, , Fremantle, October [10] J. Hwang, N. Kim, S. Kang and J. Koh, A Framework for IMS Interworking Networks with Quality of Service Guarantee, Proceeding of the 7 th International Conference on Networking, , Cancun, Aril 2008.

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Mung Chiang, Daniel ONeill, David Julian andstehenboyd Electrical Engineering Deartment Stanford University, CA 94305, USA Abstract-

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

Incremental Planning of Multi-layer Elastic Optical Networks

Incremental Planning of Multi-layer Elastic Optical Networks Incremental Planning of Multi-layer Elastic Otical Networks P. Paanikolaou, K. Christodoulooulos, and E. Varvarigos School of Electrical and Comuter Engineering, National Technical University of Athens,

More information

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

A joint multi-layer planning algorithm for IP over flexible optical networks

A joint multi-layer planning algorithm for IP over flexible optical networks A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Fast Distributed Process Creation with the XMOS XS1 Architecture

Fast Distributed Process Creation with the XMOS XS1 Architecture Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

BGP Path visibility issues.

BGP Path visibility issues. BGP Path visibility issues Pierre.Francois@UCLouvain.be ToC ibgp draft-ietf-idr-add-aths Why doing Add-aths draft-ietf-idr-add-aths-guidelines (draft-uttaro-idr-add-aths-guidelines) Why only a small subset

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Modified Bloom filter for high performance hybrid NoSQL systems

Modified Bloom filter for high performance hybrid NoSQL systems odified Bloom filter for high erformance hybrid NoSQL systems A.B.Vavrenyuk, N.P.Vasilyev, V.V.akarov, K.A.atyukhin,..Rovnyagin, A.A.Skitev National Research Nuclear University EPhI (oscow Engineering

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

A Reconfigurable Architecture for Quad MAC VLIW DSP

A Reconfigurable Architecture for Quad MAC VLIW DSP A Reconfigurable Architecture for Quad MAC VLIW DSP Sangwook Kim, Sungchul Yoon, Jaeseuk Oh, Sungho Kang Det. of Electrical & Electronic Engineering, Yonsei University 132 Shinchon-Dong, Seodaemoon-Gu,

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

SEARCH ENGINE MANAGEMENT

SEARCH ENGINE MANAGEMENT e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING Proceedings of the 2002 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds.. SIMULATION SYSTEM MODELING FOR MASS CUSTOMIATION MANUFACTURING Guixiu Qiao Charles McLean

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Distributed Algorithms

Distributed Algorithms Course Outline With grateful acknowledgement to Christos Karamanolis for much of the material Jeff Magee & Jeff Kramer Models of distributed comuting Synchronous message-assing distributed systems Algorithms

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

This version of the software

This version of the software Sage Estimating (SQL) (formerly Sage Timberline Estimating) SQL Server Guide Version 16.11 This is a ublication of Sage Software, Inc. 2015 The Sage Grou lc or its licensors. All rights reserved. Sage,

More information

Network-based Fast Handover for IMS Applications and Services

Network-based Fast Handover for IMS Applications and Services Network-based Fast Handover for IMS Applications and Services Sang Tae Kim 1, Seok Joo Koh 1, Lee Kyoung-Hee 2 1 Department of Computer Science, Kyungpook National University 2 Electronics and Telecommunications

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

A Scalable Parallel Sorting Algorithm Using Exact Splitting

A Scalable Parallel Sorting Algorithm Using Exact Splitting A Scalable Parallel Sorting Algorithm Using Exact Slitting Christian Siebert 1,2 and Felix Wolf 1,2,3 1 German Research School for Simulation Sciences, 52062 Aachen, Germany 2 RWTH Aachen University, Comuter

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Flexible Manufacturing Cell Formation of Processing Workshop based on Intelligent Computing

Flexible Manufacturing Cell Formation of Processing Workshop based on Intelligent Computing 27 A ublication of CHEMICAL ENGINEERINGTRANSACTIONS VOL. 55, 206 Guest Editors:Tichun Wang, Hongyang Zhang, Lei Tian Coyright 206, AIDIC Servizi S.r.l., ISBN978-88-95608-46-4; ISSN 2283-926 The Italian

More information

An object oriented approach to lattice gas modeling

An object oriented approach to lattice gas modeling An object oriented aroach to lattice gas modeling Alexandre Duuis and Bastien Choard University of Geneva, CUI, 24, rue Général-Dufour, CH - 1211 Geneva, Switzerland [Alexandre.Duuis Bastien.Choard]@cui.unige.ch

More information